123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Using The Security Configuration And Analysis Feature

Profile Picture
By Author: fiona
Total Articles: 191
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The tasks for using the Security Configuration And CompTIA Security+ certification Analysis feature are the following:
1.Accessing the Security Configuration And Analysis console
2.Setting a security configuration and analysis database
Analyzing system security
4.Viewing security analysis results
5.Resolving security discrepancies
Exporting security database settings to a security template
Analyzing System Security
The Security Configuration And Analysis feature performs security analysis by comparing the current state of system security against a security template in the security configuration and analysis database. The local computer's security settings are queried for all security areas in the database configuration. Values found are compared to the database configuration. If the current system settings match the database configuration settings, they are assumed to be correct. If not, the policies in question are displayed as potential problems that need investigation.
To analyze system security, complete the following steps:
...
... 1.In the Security Configuration And Analysis console, set a security configuration and analysis database (if one is not currently set).
2.In the console tree, right-click the Security Configuration And Analysis node, and then click Analyze Computer Now.
3- In the Perform Analysis dialog box, verify or change the path for the log file generated from the analysis in the Error Log File Path box, and then click OK. The default path for the log file is: a certification cost. The different security areas are displayed as they are analyzed. When the security analysis completes, you can view the results.
Note You can also use the Secedit /analyze command prompt to analyze system security. Refer to Windows Server 2003 Help for further information. If you must frequently analyze a large number of computers, use Secedit.
The Security Configuration And Analysis feature is a tool for analyzing and configuring local system security. It compares the effects of one security template or the combined effects of a number of security templates with the currently defined security settings on a local computer.
The Security Configuration And Analysis console uses a database to perform configuration and analysis functions. This database contains the security template that you want to compare with the settings mcts windows server 2008 currently defined on the computer.

Total Views: 376Word Count: 345See All articles From Author

Add Comment

System/Network Administration Articles

1. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan

2. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan

3. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan

4. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia

5. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore

6. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya

7. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan

8. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan

9. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine

10. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl

11. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle

12. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan

13. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan

14. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services

15. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: