ALL >> System-Network-Administration >> View Article
Understanding Software Restriction Policies

Software restriction policies, new in sy0-201 security and Windows Server 2003, were created to address the problem of regulating unknown or untrusted code. Software restriction policies are security settings in a GPO provided to identify software and control its ability to run on a local computer, site, domain, or OU. Most organizations employ a set of known and trusted programs. However, if users install and run other programs, these programs might conflict with or change configuration data in the known and trusted programs. Or, the newly installed user programs could contain a virus or Trojan horse. Software restriction policies protect your computer environment from unknown code by enabling you to identify and specify the applications allowed to run. These policies can apply to computers or users, depending on whether you choose to modify settings in User Configuration or Computer Configuration. When software restriction policies are set, end users must adhere to the guidelines set up by administrators when executing programs.
With software restriction policies, you ...
... can Control the ability of programs to run on your system. For example, you can apply a policy that does not allow certain file types to am in the e-mail attachment directory of your e-mail program if you are concerned about users receiving viruses through e-mail.
Permit users to run only specific files on multiuser computers. For example, if you have multiple users on your computers, you can set up software restriction policies and access control settings in such comptia security certification a way that users do not have access to any
software but those specific files that are necessary for their work.
Decide who can add trusted publishers to your computer.
Control whether software restriction policies affect all users or just certain users on a computer.
Prevent any files from running on your local computer, OU, site, or domain. For example, if you have a known virus, you can use software restriction policies to stop the computer from opening the file that contains the virus.
Software restriction policies should not be used as a replacement for antivirus software. Software restriction policies do not work on Microsoft Windows NT 4 or Windows 2000 systems.
You are preparing a package for deployment. Which of the following actions
should you perform if you receive the message Cannot Prepare Package For
Deployment?
a.Check your permissions for the GPO
b.Check connectivity with the SDP
c.Check your permissions for the SDP
d.Set the appropriate category for the package
e.Set the auto-install property for the package
The correct answer is b. If you are preparing a package for deployment and you receive the a Exams message Cannot Prepare Package For Deployment, one of the actions you should take is to check connectivity with the SDP
Add Comment
System/Network Administration Articles
1. Fiber Optic Polishing Machines: Types, Applications, And When They Are NeededAuthor: Ryan
2. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan
3. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan
4. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia
5. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore
6. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya
7. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan
8. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan
9. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine
10. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl
11. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle
12. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan
13. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan
14. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services
15. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare