123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Practice: Using A Security Policy To Define The Baseline Template

Profile Picture
By Author: Shirley Green
Total Articles: 129
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this practice, you will examine parts of a fictitious company's MCTS Certification and identify whether or not these parts can be implemented in the baseline template. You will also identify -whether these parts of the security policy should be implemented and, if they should, where in the template you can do so. Read the scenario and then complete the exercises that follow. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of the chapter.
Stand-Alone Computer Security
Stand-alone computers cannot be configured using an OU infrastructure and GPOs linked to the OUs. However, baseline and incremental templates can still be developed to provide consistent security for these servers. The delivery mechanism can be script and task-scheduled based.
Security for Computers on Perimeter Networks
Computers on perimeter networks offer special security challenges. They can be standalone computers or domain members. The way that security is ...
... applied will depend on their status. They will require additional sfree Network+ study guides and protection beyond what security templates can apply.
Server Application Security
Although this chapter develops the concept of using security templates and Group Policy to apply security via server role, do not lose sight of the security configuration that must be done outside of security templates. Security templates are operating system tools for security. Server applications all have unique requirements and tools for configuring security. A complete plan for applying security by security role should include these requirements, dictate baseline security for each role, and provide information about how security is applied.
If a server can be shut down, any number of attacks can be carried out that will provide the attacker with complete control of the server. Reducing the number of people who can shut down the server reduces this threat. Remember, though, that someone with physical access to the computer could use the power switch to shut the server off without shutting it down. You should also consider ways to protect against this possibilityor at least make it harder to access the power MCITP study guides free download and perhaps more noticeable when someone does.

Total Views: 335Word Count: 366See All articles From Author

Add Comment

Computer Programming Articles

1. Best Data Science Training In Bhopal To Kickstart Your Data Career In 2025
Author: Rohan Rajput

2. Blue Wizard Liquid Drops 30 Ml 2 Bottles Price In Rawalpindi
Author: bluewizard.pk

3. Blue Wizard Liquid Drops 30 Ml 2 Bottles Price In Faisalabad
Author: bluewizard.pk

4. Blue Wizard Liquid Drops 30 Ml 2 Bottles Price In Karachi
Author: bluewizard.pk

5. The Ultimate Guide To Launching A Successful Online Store
Author: Rudram Technology Solutions LLP

6. Best Data Science Institute In Bhopal Offering Practical Training & Placements
Author: Rohan Rajput

7. Why Cfos Are Switching To Automated Depreciation Software?
Author: Maco Infotech

8. Agentic Ai Development Services: Unlocking The Future Of Smarter Automation
Author: Albert

9. Why The Best Data Science Institute In Bhopal Is The Gateway To Top It Jobs
Author: Rohan Rajput

10. Complete Php Tutorial: Master Core Php Concepts With Examples
Author: Tech Point

11. Framework7 Tutorial For Beginners – Create Powerful Hybrid Apps
Author: Tech Point

12. Why Spadegaming Is Dominating The Asian Igaming Market
Author: Alex

13. Why Express.js And Mongodb Are A Dynamic Duo For Node.js Development
Author: Andy

14. Discover The Best Data Science Institute In Bhopal For A Future-ready Career
Author: Rohan Rajput

15. Best Data Science Institute In Bhopal: Learn Ai, Ml & Analytics With Experts
Author: Rohan Rajput

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: