answersLogoWhite

0


Best Answer

They work very similar to one another

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What advantages and disadvantages do you see for both TrueCrypt and EFS?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What does group policy mean in computer language?

Group Policy is a feature of the Microsoft Windows NT family of operating systems. Group Policy is a set of rules which control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications and users' settings in an Active Directory environment. In other words, Group Policy in part controls what users can and can't do on a computer system. Although Group Policy is more often seen in use in enterprise environments, it is also common in schools, smaller businesses and other kinds of smaller organizations. Group Policy is often used to restrict certain actions that may pose potential security risks, for example: to block access to the Task Manager, restrict access to certain folders, disable the downloading of executable files and so on.OverviewGroup Policy can control a target object's registry, NTFS security, audit and security policy, software installation, logon- and logoff-scripts, Security filtering is the process of customizing the scope of the GPO by choosing which users and groups the GPO applies to.Windows Management Instrumentation (WMI) filtering is the process of customizing the scope of the GPO by choosing a WMI filter to apply.Delegation is the process of customizing the security descriptors of the GPO by assigning specific users and groups and the individual permissions that will be applied for each. This has more control than security filtering as it allows modification of both Apply and Deny permissions.[edit] GPO applicationThe Group Policy client operates on a "pull" model - every so often (a randomized delay of between 90 and 120 minutes, although this offset is configurable via Group Policy) it will collect the list of GPOs appropriate to the machine and logged on user (if any). The Group Policy client will then apply those GPOs which will thereafter affect the behavior of policy-enabled operating system components and applications.[edit] Local Group PolicyLocal Group Policy (LGP) is a more basic version of the Group Policy used by Active Directory. In versions of Windows before Windows Vista, LGP can configure the Group Policy for a single local computer, but unlike Active Directory Group Policy, can not make policies for individual users or groups. It also has many fewer options overall than Active Directory Group Policy. The specific-user limitation can be overcome by using the Registry Editor to make changes under the HKCU or HKU keys. LGP simply makes registry changes under the HKLM key, thus affecting all users. The same changes can be made under HKCU or HKU to only affect certain users. Microsoft has more information on using the Registry Editor to configure Group Policy available on TechNet.[1] LGP can be used on a computer on a domain, and it can be used on Windows XP Home Edition.Windows Vista supports Multiple Local Group Policy objects (MLGPO), which allows setting local Group Policy for individual users.[2][edit] SecurityOne potential problem with per-user policies is that they're only enforced voluntarily by the targeted applications. A malevolent user can interfere with the application so that it cannot successfully read its Group Policy settings thus enforcing potentially lower security defaults or even return arbitrary values.[citation needed] The user can also create a copy of the application at a writable location, then modify it such that it ignores the Group Policy settings.[citation needed][edit] See alsoGroup Policy improvements in Windows VistaAdministrative Templates[edit] References[3]^ Group Policy Settings Reference^ Step-by-Step Guide to Managing Multiple Local Group Policy Objects^ Remote installation without using Group Policy[edit] External linksMicrosoft Group Policy pagehttp://www.gpanswers.com/The Group Policy Management Console (GPMC)Step-by-Step Guide to Managing Multiple Local Group Policy ObjectsGroup Policy Settings (in Excel format) and registry key equivalents, from Microsoft[hide] v • d • e Windows componentsCore Aero · AutoRun · ClearType · Desktop Window Manager · DirectX · Explorer · Taskbar · Start menu · Shell (Shell extensions ·namespace · Special Folders · File associations) · Search (Saved search · IFilter) · Graphics Device Interface · Imaging Format · .NET Framework · Server Message Block · XML Paper Specification · Active Scripting (WSH · VBScript · JScript) · COM (OLE · OLE Automation · DCOM ·ActiveX · ActiveX Document · Structured storage · Transaction Server) · Previous Versions ·Win32 consoleManagementtools Backup and Restore Center · command.com ·cmd.exe · Control Panel (Applets) · Device Manager · Disk Cleanup · Disk Defragmenter · Driver Verifier · Event Viewer · Management Console ·Netsh · Problem Reports and Solutions · Sysprep · System Policy Editor · System Configuration · Task Manager · System File Checker · System Restore · WMI · Windows Installer · PowerShell · Windows Update · WAIK · WinSAT ·Windows Easy TransferApplications Calculator · Calendar · Character Map · Contacts · DVD Maker · Fax and Scan ·Internet Explorer · Journal · Mail · Magnifier · Media Center · Media Player · Meeting Space · Mobile Device Center · Mobility Center ·Movie Maker · Narrator · Notepad · Paint · Photo Gallery · Private Character Editor ·Remote Assistance · Windows Desktop Gadgets ·Snipping Tool · Sound Recorder · Speech Recognition · WordPadGames Chess Titans · FreeCell · Hearts · Hold 'Em · InkBall · Mahjong Titans · Minesweeper · Purble Place · Solitaire · Spider Solitaire · TinkerKernel Ntoskrnl.exe · hal.dll · System Idle Process · Svchost.exe · Registry · Windows service · Service Control Manager · DLL · EXE ·NTLDR / Boot Manager · Winlogon · Recovery Console · I/O · WinRE · WinPE · Kernel Patch ProtectionServices BITS · Task Scheduler · Wireless Zero Configuration · Shadow Copy · Error Reporting · Multimedia Class Scheduler · CLFSFile systems NTFS (Hard link · Junction point · Mount Point · Reparse point · Symbolic link · TxF · EFS) · FAT32·FAT16·FAT12 · exFAT ·CDFS · UDF · DFS · IFSServer Domains · Active Directory · DNS ·Group Policy · Roaming user profiles · Folder redirection · Distributed Transaction Coordinator ·MSMQ · Windows Media Services · Rights Management Services · IIS · Terminal Services · WSUS · Windows SharePoint Services · Network Access Protection · PWS · DFS Replication · Remote Differential Compression · Print Services for UNIX ·Remote Installation Services · Windows Deployment Services · System Resource Manager · Hyper-VArchitecture NT series architecture · Object Manager · Startup process (Vista) · I/O request packet · Kernel Transaction Manager · Logical Disk Manager · Security Accounts Manager · Windows Resource Protection · LSASS · CSRSS · SMSS ·MinWinSecurity User Account Control · BitLocker · Defender · Data Execution Prevention · Security Essentials · Protected Media Path · Mandatory Integrity Control · User Interface Privilege Isolation · Windows Firewall · Security CenterCompatibility Unix subsystem (Microsoft POSIX · Interix) · Virtual DOS machine · Windows on Windows ·WoW64 · Windows XP Mod


Related questions

What is the first step in creating an EFS Recovery Agent?

enabling the EFS Recovery Agent template


A folder must be on what file system to be encrypted using EFS?

A folder must be on NTFS to be encrypted using EFS.


What happens when you lose or remove a certificate issued for EFS?

Unless you have a backup of your user profile folder before you deleted the EFS certificate, your files are gone.


What security features are supported by both Windows XP Professional and Windows 2000 Professional without installing additional software or service packs?

EFS and Keberos


What NTFS feature is incompatible with EFS encryption?

Compression


Which bank issues credit card begining5569?

efs


What is the purpose of the Microsoft EFS?

Microsoft EFS stands for Encryption File System. This is used when you want to encrypt and protect your data and personal information from others by using a password.


What task are involved in setting up and maintain EFs?

fgf9rgg9vrxtbezt0sw


What are the release dates for EFS Covert Ops Unlimited - 2012 TV?

EFS Covert Ops Unlimited - 2012 TV was released on: USA: 25 July 2012 (DVD premiere)


What is 3 L on an EFS?

3 Lions on an England Football Shirt


1. What File System is required in order to use EFS?

NTFS


What company owns the efs fuel card?

The EFS fuel card is owned by the company First Data. The card features added benefits for its users, including fuel management tools and purchase control, to name a couple.