ALL >> Business >> View Article
How To Configure And Use Administrative Templates
To configure and use administrative templates, open a online MCTS certification and navigate to the Administrative Templates section of the computer or user node of the GPO. The loca?tion is shown in Figure 11-10. Double-click a specific container in the template to change its settings. An open template container property page is shown in Figure 11-11. When the GPO is downloaded by the client, the settings will be applied. Admin?istrative template settings will be displayed in the Group Policy Management Console.
Consider the following security options, event log settings, restricted groups, services settings, and object permission settings in your security template design:
Consider limiting the number of logon credentials that are cached locally. These credentials are used when a domain controller is not available. Setting cached logon credentials to 0 prevents logon if no domain controller is available. This setting might be appropriate for highly sensitive client
computers, but it is not acceptable for laptop computers, as they will frequently be used where domain ...
... controllers are not available for logon. Consider setting sensitive laptops to 1. However, remember that the last logon is the one that will be MCTS benefits cached. If an administrator or technician logs on to the laptop for any reason, her or his credentials will be cached. Unless the authorized user of the laptop logs on and off before disconnecting from the network, the authorized user will not be able to log on to the laptop until it is connected to the network.
Consider enabling the security option Do Not Allow Storage Of Credentials Or .NET Passports For Network Authentication. If you enable this option, users will not be able to store Passport credentials and credentials used to log on to remote servers and workstations on their client computers, and therefore they will have to type them in each time they want to use them. Not storing cre?
dentials makes the access to applications, Web sites, databases, and so on safer.
However, when users have multiple passwords to remember, they are more likely to write them down, use a weak password, or both. You will have to evaluate which approach poses the most risk MCSE study guides free download for your organization.
Add Comment
Business Articles
1. Sus 321h Tubes With Superior Heat Resistance And StabilityAuthor: Leoscor
2. Hammock Swing Manufacturers: Delivering Comfort, Style, And Durability
Author: sarkar
3. Hammock Chair Manufacturers: Hand-crafting Quality And Stylish Comfort
Author: sarkar
4. Corporate Iban Account: Streamlining Global Payments For Enterprises
Author: finrate
5. Zoetic Bpo Services: Building Stronger Businesses Through Reliable Outsourcing
Author: kajal
6. Zoetic Bpo Services: A Reliable Name In The Bpo Industry
Author: simon
7. Improve Data Quality With Data Entry Outsourcing | Zoetic Bpo Services
Author: naina
8. 2026 Local Seo & Digital Marketing Trends: How Kondapur And Gachibowli Businesses Are Scaling Faster
Author: Sanbrains Seo
9. How Do Non-voice Bpo Projects Improve Data Management And Organization?
Author: EKAT AGARWAL
10. Understand The Connection Between Iso/iec 27001 And Iso/iec 27002
Author: Sqccertification
11. Personal Branding Or Corporate Branding: What Should Come First In 2026?
Author: Pawan Reddy
12. Reliable Long Beach Laundry Service For Busy Lives And Fresh Clothes
Author: Lucy's Laundry & Dry Cleaning
13. Tips To Find The Best Fencing Contractors In Melbourne, Australia
Author: adlerconway
14. Lucintel Forecasts The Global Pe Geomembrane Market To Reach $3,133 Million By 2035
Author: Lucintel LLC
15. The Right Summer Carpet For Us Homes: Pet-friendly Choices And Cleaning Hacks
Author: Vikram Kumar






