Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Roaming profiles and digital certificates

Posted on 2008-11-01
2
Medium Priority
?
766 Views
Last Modified: 2013-12-04
Hi all,
when using roaming profiles (in a MS environmnet either with windows server 2003 or windows server 2008) are user digital cerficates included in these profiles? If so, in a scenery where a user with a roaming profile logging in different workstations, how to prevent that misuse of those unattended user digital cerficates?
Thanks for your help
Leonardo
0
Comment
Question by:leobis
2 Comments
 

Author Comment

by:leobis
ID: 22966834
any suggestions?
0
 
LVL 3

Accepted Solution

by:
H_Harry earned 1500 total points
ID: 22966954
Hi, yes the certificates will be placed in the users certificate stores on each workstation they log into.
Only administrators can access these stroes, however, which is by design for data recovery etc if a user leaves, so they should be quite safe unless all your users are local admins.
0

Featured Post

Ready for your healthcare security check-up?

In the past few years, healthcare organizations have become a prime target for advanced attacks. Does your organization have what it needs to defend itself? Schedule your healthcare security check-up today and download our free Healthcare Security Resource Kit today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question