123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

How To Configure And Use Administrative Templates

Profile Picture
By Author: Mike Jones
Total Articles: 256
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

To configure and use administrative templates, open a online MCTS certification and navigate to the Administrative Templates section of the computer or user node of the GPO. The loca?tion is shown in Figure 11-10. Double-click a specific container in the template to change its settings. An open template container property page is shown in Figure 11-11. When the GPO is downloaded by the client, the settings will be applied. Admin?istrative template settings will be displayed in the Group Policy Management Console.
Consider the following security options, event log settings, restricted groups, services settings, and object permission settings in your security template design:
Consider limiting the number of logon credentials that are cached locally. These credentials are used when a domain controller is not available. Setting cached logon credentials to 0 prevents logon if no domain controller is available. This setting might be appropriate for highly sensitive client
computers, but it is not acceptable for laptop computers, as they will frequently be used where domain ...
... controllers are not available for logon. Consider setting sensitive laptops to 1. However, remember that the last logon is the one that will be MCTS benefits cached. If an administrator or technician logs on to the laptop for any reason, her or his credentials will be cached. Unless the authorized user of the laptop logs on and off before disconnecting from the network, the authorized user will not be able to log on to the laptop until it is connected to the network.
Consider enabling the security option Do Not Allow Storage Of Credentials Or .NET Passports For Network Authentication. If you enable this option, users will not be able to store Passport credentials and credentials used to log on to remote servers and workstations on their client computers, and therefore they will have to type them in each time they want to use them. Not storing cre?
dentials makes the access to applications, Web sites, databases, and so on safer.
However, when users have multiple passwords to remember, they are more likely to write them down, use a weak password, or both. You will have to evaluate which approach poses the most risk MCSE study guides free download for your organization.

Total Views: 387Word Count: 363See All articles From Author

Add Comment

Business Articles

1. Fitatoo Smile Eco Raglan Hoodie Sustainable Streetwear In The Uk
Author: Fitatoo

2. Bridging Knowledge Gaps In Hse Through Interactive E-learning
Author: Jane

3. Role Of Quick Lime In The Pulp And Paper Industry: Uses And Benefits
Author: Shaurya Minerals

4. Top 5 Mistakes Homeowners Make When Hiring A Builder In Chennai And How To Avoid Them
Author: bharathi

5. Bpo Projects For Startup Company: Grow With Zoetic Bpo Services
Author: mohan

6. Scorpio Technologies – The Leading Responsive Web Design Company In Chennai
Author: scorpiotechnologies

7. Scorpio Technologies: The Best Web Design Service In Chennai
Author: scorpiotechnologies

8. Latest Indo Western Dress – Elegant Fusion Fashion
Author: le concept

9. Top Logo Designer In Ahmedabad: Crafting Unique Brand Identities That Speak Volumes
Author: Kymin Creation

10. What Types Of Noise Barriers Are Used To Lessen Noise Pollution?
Author: O'Neill Engineered Systems, Inc

11. Why Are Container Inspections Important For Safety?
Author: TIC

12. 10 Essential Tips For During Production Inspection
Author: TIC

13. What Is A Pre Production Inspection And Why Is It Important?
Author: TIC

14. How Does Quality Inspection Impact Product Quality?
Author: TIC

15. 8 Benefits Of Regular Quality Inspections
Author: TIC

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: