ALL >> System-Network-Administration >> View Article
Viewing Security Analysis Results
In the details pane, the Security Configuration And Project+ Analysis console displays the analysis results organized by security area with visual flags to indicate problems. For each security policy in the security area, the current database and computer configuration settings are displayed.
To view security analysis results, complete the following steps:
1.In the Security Configuration And Analysis console, expand the Security Configuration And Analysis node.
2.Double-click a security policies node (such as Account Policies), and then click the security area (such as Password Policy) for which you want to view results.
In the details pane, shown in Figure 13-20, the Policy column indicates the policy name for the analysis results, the Database Setting column indicates the security value in your template, and the Computer Setting column indicates the current security level in the system.
black question mark indicates that the entry is not defined in the analysis database and, therefore, was not analyzed. If an entry is not analyzed, it might be that it was ...
... not defined in the analysis database or that the user who is amning comptia certification training the analysis might not have sufficient permission to perform analysis on the specific object or area.
A red exclamation point indicates that the entry is defined in the analysis database but does not exist on the actual system. For example, there might be a restricted group that is defined in the analysis database but does not actually exist on the analyzed system.
No icon indicates that the security policy was not included in your template and therefore not analyzed.
Viewing the Security Analysis Log File After completing a security analysis, you can also view the security analysis log file. The log file contains all of the information about the analysis. Look for the word "mismatch" to find the differences between the template and the current security settings on the local computer.
To view the security analysis log file, in the console tree, right-click the Security Configuration And Analysis node, and then click View Log File.
You can also view the security analysis log file in the location you specified in the Perform Analysis dialog box.
You can also use the Secedit /configure command prompt to configure system security. Refer to Windows Server 2003 Help for
social networking benefits further information.
Add Comment
System/Network Administration Articles
1. Importance Of Enterprise Identity Management For Large OrganizationsAuthor: adlerconway
2. Fiber Curing Oven: Ensuring Strong And Reliable Fiber Optic Connections
Author: Ryan
3. Dynamics 365 Finance Consultant Services
Author: brainbell10
4. Fiber Circulator: A Key Component In Optical Communication Systems
Author: Ryan
5. Edfa Amplifier: Powering Modern Optical Networks
Author: Ryan
6. How Online Safety Experts Help Businesses Stay Secure In A Connected World
Author: Deep Water
7. Roi Benefits Of Implementing The M-files Document Management System
Author: DocSmart Solutions
8. Mems Optical Switch: High-speed, Reliable Switching For Modern Fiber Optic Networks
Author: Ryan
9. Polarization Maintaining Fiber Cable: Ensuring Polarization Stability In Advanced Optical Systems
Author: Ryan
10. Optical Fiber Alignment System: The Foundation Of High-performance Fiber Optic Solutions
Author: Ryan
11. The Real Difference Between Ai Tools And Ai Systems
Author: Orson Amiri
12. Document Manager Software: Tools To Organize Business Files
Author: DocSmart Solutions
13. Best Online Cybersecurity Training Institute In India
Author: securium Academy
14. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan
15. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan






