ALL >> System-Network-Administration >> View Article
Using The Security Configuration And Analysis Feature

The tasks for using the Security Configuration And CompTIA Security+ certification Analysis feature are the following:
1.Accessing the Security Configuration And Analysis console
2.Setting a security configuration and analysis database
Analyzing system security
4.Viewing security analysis results
5.Resolving security discrepancies
Exporting security database settings to a security template
Analyzing System Security
The Security Configuration And Analysis feature performs security analysis by comparing the current state of system security against a security template in the security configuration and analysis database. The local computer's security settings are queried for all security areas in the database configuration. Values found are compared to the database configuration. If the current system settings match the database configuration settings, they are assumed to be correct. If not, the policies in question are displayed as potential problems that need investigation.
To analyze system security, complete the following steps:
...
... 1.In the Security Configuration And Analysis console, set a security configuration and analysis database (if one is not currently set).
2.In the console tree, right-click the Security Configuration And Analysis node, and then click Analyze Computer Now.
3- In the Perform Analysis dialog box, verify or change the path for the log file generated from the analysis in the Error Log File Path box, and then click OK. The default path for the log file is: a certification cost. The different security areas are displayed as they are analyzed. When the security analysis completes, you can view the results.
Note You can also use the Secedit /analyze command prompt to analyze system security. Refer to Windows Server 2003 Help for further information. If you must frequently analyze a large number of computers, use Secedit.
The Security Configuration And Analysis feature is a tool for analyzing and configuring local system security. It compares the effects of one security template or the combined effects of a number of security templates with the currently defined security settings on a local computer.
The Security Configuration And Analysis console uses a database to perform configuration and analysis functions. This database contains the security template that you want to compare with the settings mcts windows server 2008 currently defined on the computer.
Add Comment
System/Network Administration Articles
1. Fiber Optic Polishing Machines: Types, Applications, And When They Are NeededAuthor: Ryan
2. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan
3. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan
4. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia
5. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore
6. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya
7. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan
8. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan
9. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine
10. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl
11. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle
12. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan
13. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan
14. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services
15. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare