ALL >> System-Network-Administration >> View Article
Design Activity: Designing Technical Controls To Manage The Use Of Laptop Computers
In this activity, you must use what you learned in all three lessons and apply it to a real-world situation. Read the 70-620 Exam(http://www.mcitp-70-620.com)
and then complete the exercise that follows. You can find answers for the exercise in the "Questions and Answers" section at the end of this chapter.
Many employees spend part of their time at the office and part of their time traveling. Some employees work almost entirely from their homes or from various locations while they are traveling. All employees that must travel are issued company laptops with all the software necessary to do their jobs. Laptops are running either Windows 2000 or Windows XP Professional. Microsoft Office is installed on all laptops, as are personal firewalls and antivirus software. GPOs that contain restrictive administrative template settings are linked to OUs that contain user and computer accounts. There are some OUs that contain computer accounts for both laptops and desktops. All laptop computers are members of a Windows Server 2003 domain.
Interviews
Following is a list of company personnel interviewed and their ...
... statements:
Chief Security Officer "We have a very restrictive MCITP certification(http://www.mcitp-70-620.com)
desktop lockdown program. If there is a way to configure an application so that you must be an administrator to configure it, we do it. If there is a control that can be locked down and/or removed from the user interface, we do so. We have developed a large number of custom-written profiles that describe the tasks a user must do and how much his computer can be locked down and still allow him to do it. These have been trans-lated into GPOs and are applied to all desktop computers used at company offices. However, we cannot link these GPOs to OUs that contain laptop comput?ers because this prevents the laptop users from being able to do their job."
Network administrator "The laptop users have too much access to their computers' utilities and configuration. We are constantly seeing problems caused by the changes that they make. They delete software, reconfigure network settings, add software that causes problems, change settings in Control Panel, and generally are like young puppies to whom everything security+ certification(http://www.upcert.com)
is a chew bone. If a setting can be changed, I can guarantee you that some laptop user has changed it."
Add Comment
System/Network Administration Articles
1. When Every Access Decision Matters, How Smart Identity Can Make Hipaa Compliance A RealityAuthor: Tushar Pansare
2. Fibre Optic Pigtail Cables: Designs, Connectors, And Use Cases
Author: Ryan
3. Exploring Optical Circulators: Categories, Functionality, And Benefits
Author: Ryan
4. Precision In Fiber Optics: Polarization Maintaining Axis And Fiber Rotation Systems
Author: Ryan
5. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan
6. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan
7. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan
8. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia
9. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore
10. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya
11. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan
12. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan
13. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine
14. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl
15. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle






