ALL >> System-Network-Administration >> View Article
Viewing Security Analysis Results

In the details pane, the Security Configuration And Project+ Analysis console displays the analysis results organized by security area with visual flags to indicate problems. For each security policy in the security area, the current database and computer configuration settings are displayed.
To view security analysis results, complete the following steps:
1.In the Security Configuration And Analysis console, expand the Security Configuration And Analysis node.
2.Double-click a security policies node (such as Account Policies), and then click the security area (such as Password Policy) for which you want to view results.
In the details pane, shown in Figure 13-20, the Policy column indicates the policy name for the analysis results, the Database Setting column indicates the security value in your template, and the Computer Setting column indicates the current security level in the system.
black question mark indicates that the entry is not defined in the analysis database and, therefore, was not analyzed. If an entry is not analyzed, it might be that it was ...
... not defined in the analysis database or that the user who is amning comptia certification training the analysis might not have sufficient permission to perform analysis on the specific object or area.
A red exclamation point indicates that the entry is defined in the analysis database but does not exist on the actual system. For example, there might be a restricted group that is defined in the analysis database but does not actually exist on the analyzed system.
No icon indicates that the security policy was not included in your template and therefore not analyzed.
Viewing the Security Analysis Log File After completing a security analysis, you can also view the security analysis log file. The log file contains all of the information about the analysis. Look for the word "mismatch" to find the differences between the template and the current security settings on the local computer.
To view the security analysis log file, in the console tree, right-click the Security Configuration And Analysis node, and then click View Log File.
You can also view the security analysis log file in the location you specified in the Perform Analysis dialog box.
You can also use the Secedit /configure command prompt to configure system security. Refer to Windows Server 2003 Help for
social networking benefits further information.
Add Comment
System/Network Administration Articles
1. When Every Access Decision Matters, How Smart Identity Can Make Hipaa Compliance A RealityAuthor: Tushar Pansare
2. Fibre Optic Pigtail Cables: Designs, Connectors, And Use Cases
Author: Ryan
3. Exploring Optical Circulators: Categories, Functionality, And Benefits
Author: Ryan
4. Precision In Fiber Optics: Polarization Maintaining Axis And Fiber Rotation Systems
Author: Ryan
5. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan
6. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan
7. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan
8. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia
9. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore
10. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya
11. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan
12. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan
13. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine
14. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl
15. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle