123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Design Activity: Designing Technical Controls To Manage The Use Of Laptop Computers

Profile Picture
By Author: unknownmem
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this activity, you must use what you learned in all three lessons and apply it to a real-world situation. Read the 70-620 Exam(http://www.mcitp-70-620.com)
and then complete the exercise that follows. You can find answers for the exercise in the "Questions and Answers" section at the end of this chapter.

Many employees spend part of their time at the office and part of their time traveling. Some employees work almost entirely from their homes or from various locations while they are traveling. All employees that must travel are issued company laptops with all the software necessary to do their jobs. Laptops are running either Windows 2000 or Windows XP Professional. Microsoft Office is installed on all laptops, as are personal firewalls and antivirus software. GPOs that contain restrictive administrative template settings are linked to OUs that contain user and computer accounts. There are some OUs that contain computer accounts for both laptops and desktops. All laptop computers are members of a Windows Server 2003 domain.
Interviews
Following is a list of company personnel interviewed and their ...
... statements:
Chief Security Officer "We have a very restrictive MCITP certification(http://www.mcitp-70-620.com)
desktop lockdown program. If there is a way to configure an application so that you must be an administrator to configure it, we do it. If there is a control that can be locked down and/or removed from the user interface, we do so. We have developed a large number of custom-written profiles that describe the tasks a user must do and how much his computer can be locked down and still allow him to do it. These have been trans-lated into GPOs and are applied to all desktop computers used at company offices. However, we cannot link these GPOs to OUs that contain laptop comput?ers because this prevents the laptop users from being able to do their job."
Network administrator "The laptop users have too much access to their computers' utilities and configuration. We are constantly seeing problems caused by the changes that they make. They delete software, reconfigure network settings, add software that causes problems, change settings in Control Panel, and generally are like young puppies to whom everything security+ certification(http://www.upcert.com)
is a chew bone. If a setting can be changed, I can guarantee you that some laptop user has changed it."

Total Views: 333Word Count: 376See All articles From Author

Add Comment

System/Network Administration Articles

1. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan

2. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan

3. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan

4. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia

5. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore

6. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya

7. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan

8. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan

9. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine

10. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl

11. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle

12. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan

13. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan

14. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services

15. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: