123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Security Configuration And Analysis Troubleshooting

Profile Picture
By Author: fiona
Total Articles: 191
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Table 13-9 describes some troubleshooting scenarios related to security configuration and analysis.
Use RSoP to check what GPO is affecting the computer.
Check the log file, located in CompTIA Security+, to identify specific errors that occur during policy propagation to the computer.
Find out which accounts are invalid. Open Microsoft Notepad and open the file at %6ystemroo^°/o\Security\Logs\Winl-ogon.log. The Windows Server 2003 family and Windows XI3 create this file by default during policy propagation. Search for error 1332, which indicates the account names that could not be resolved. Then remove the unresolved account names from policies in your domain. If the accounts are in the Default Domain or Domain Con?troller GPOs, you can edit the policies in the Security Set-tings node of Group Policy to remove these account names. If the accounts exist elsewhere, you might have to browse through all GPOs defined in the domain and remove them individually.
Exercise 3: Analyzing System Security and Viewing the Results
In this exercise, you analyze ...
... system security, comparing the settings in the security template Securedc.inf with the security settings currently running on your system. Then, you view the security analysis results.
To analyze system security and view the results
1.Use the procedure provided earlier in this Security+ certification lesson to analyze system security.
2.Double-click the Account Policies node, and then click the Password Policy security area.
In the details pane, what is indicated in the Policy column? In the Database Setting column? In the Computer Setting column?
The Policy column indicates the policy name for the analysis results. The Database Setting col?umn indicates the security value in your template. The Computer Setting column indicates the current security level in the system.
In the Policy column, what does the red X indicate? What does the green check mark indicate?
A red X indicates a difference from the database configuration. A green check mark indicates consistency with the database configuration.
Security configuration applies the stored template configuration in the security configuration and analysis database to the local computer.
You are about to cause an automated shutdown of Server2 by running the script inside the Secure folder. The script simply creates, copies, and deletes two files 500 times. This may take a few seconds, so be patient. The activity is more than enoughNetwork+ certification to fill the 64 KB security log. Once that log is full, the server will shut down.

Total Views: 437Word Count: 385See All articles From Author

Add Comment

System/Network Administration Articles

1. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic Cables
Author: Ryan

2. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan

3. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy

4. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech

5. Ethical Hacking Training Institute Building Future Ready Cybersecurity Experts
Author: Hanna Vahab

6. How Oscp Certification Opens Doors To Global Cybersecurity Roles?
Author: securium Academy

7. Fiber Optic Cable Production Line: The Backbone Of Modern Connectivity
Author: Ryan

8. Fiber Cable Production Line: Revolutionizing Connectivity
Author: Ryan

9. The Role Of Optical Waveguide Alignment Systems In Precision Optics And Telecommunications
Author: Ryan

10. When Every Access Decision Matters, How Smart Identity Can Make Hipaa Compliance A Reality
Author: Tushar Pansare

11. Fibre Optic Pigtail Cables: Designs, Connectors, And Use Cases
Author: Ryan

12. Exploring Optical Circulators: Categories, Functionality, And Benefits
Author: Ryan

13. Precision In Fiber Optics: Polarization Maintaining Axis And Fiber Rotation Systems
Author: Ryan

14. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan

15. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: