Real World Microsoft Access Database Protection and Security

U

ubiquitous Users group , 355

allowing read-only rights for, 315 “17, 334

care with permissions assigned to, 313

denying access to tables for, 322

explanation of term , 309

removing permissions granted to, 367, 375

and User -Level Security wizard, 334, 336

UNC (universal naming convention), 95 “96

Understanding Microsoft Jet Locking (LDB Files) , 172

universal naming convention (UNC), 95 “96

update of this book, 21

upgrading

preventing, 265

whether assists in security, 17

Use Access Special Keys option, 30

User Accounts wizard, 427

User and Group Permissions dialog, 368, 370

user and object surveillance, 161 “96

Access Workbench program, 173 “76

checking for users who skip startup sequence, 191 “93

further reading, 193 “95

Jet User Roster form, 163 “69

preventing more users from logging on, 165 “66

retrieving user roster by using VBA code, 166 “69

LDBView utility, 169 “73

logging Windows users, computers, and Access accounts, 176 “82

completing user log, 180 “82

initiating user log, 178 “80

overview, 176 “78

overview, 161 “62

recording when objects are opened, 182 “87

retrieving computer name , 187 “88, 189 “90

retrieving Windows user ID, 187 “89

retrieving workgroup user name, 187 “88, 190 “91

using VBA code to log use of individual Access forms and reports , 184 “87

user commands, renaming, 254 “55

User_FX function, 179

User-Level Security Wizard

for Access 2000 (or Later)

results of, 340 “43

steps to protecting data with, 334 “40

for Access 97, 343 “45

UserLog table, 191, 195

Users and Groups dialog, 415, 416, 417

Users and Passwords dialog, 413, 415, 416

Users group, 243

adding new user to, 250

Admin account as member of, 253

changing permissions, 238 “39

clearing Open /Run permission for, 275 “76

Full Data Users group

permissions to access data, 321

permissions to change data in database, 336

removing permissions granted to, 375

reviewing permissions, 342

and password protection with workgroup security, 300 “301

ubiquitous Users group, 355

allowing read-only rights for, 315 “17, 334

care with permissions assigned to, 313

denying access to tables for, 322

explanation of term, 309

removing permissions granted to, 367, 375

and User-Level Security wizard, 334, 336

using permissions to tame, 278 “82

USys prefix, 70

Категории