123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Practice: Using Security Configuration And Analysis

Profile Picture
By Author: fiona
Total Articles: 191
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this practice, you access the Security Configuration And Analysis console, set a security Network+ certification configuration and analysis database, analyze system security, and then view the results.
Exercise 1: Accessing the Security Configuration And Analysis Console
In this exercise, you access the Security Configuration And Analysis console, the main tool for using the Security Configuration and Analysis tool.
You are a computer consultant. Lisa Jacobson, the Chief Information Officer of Tailspin Toys, has several security concerns that she's contracted you to help her solve. The Tailspin Toys network consists of two Active Directory domains: tailspintoys.com and dev.tailspintoys.com. The tailspintoys.com domain consists of six domain controllers running Windows Server 2003 and nine member servers, some of which are running Windows 2000 and some of which are running Windows Server 2003. There are 1,300 employees with user accounts in the tailspintoys.com domain, and each employee has a desktop computer running Windows XP Professional.
Lisa has ...
... identified two areas of concern she would like you to address:
1.She has seen many employees execute e-mail attachments directly from their e-mail messages. While the company keeps its antivirus software up-to-date, Lisa wants to know if there is a way to help prevent e-mail attachments from comptia network running on client computers.
2.The three file servers contain Tailspin Toys confidential information. She wants to ensure that she can track users who access or attempt to access documents stored on these servers. She plans to keep a running log of all this information and never wants to miss even one successful or unsuccessful attempt to access this data.
Given the concerns of Tailspin Toys as outlined above, answer the following questions:
1. What type of setting within Group Policy will assist you in addressing the company's concerns regarding the execution of e-mail attachments?
2. Where in Active Directory should this Group Policy be linked?
A security template is a physical representation of a security configuration, a single file where a group of security settings is stored. You can use security templates to define the Account Policies, Local Policies, Event Log, Restricted Groups, Registry,and File System settings in a GPO.
The Security Configuration And Analysis feature is a tool for analyzing and configuring local system security. It compares the effects of one security template or the combined effects of a number of security templates with the currently mcts windows server 2008 defined security settings on a local computer.

Total Views: 385Word Count: 393See All articles From Author

Add Comment

System/Network Administration Articles

1. When Every Access Decision Matters, How Smart Identity Can Make Hipaa Compliance A Reality
Author: Tushar Pansare

2. Fibre Optic Pigtail Cables: Designs, Connectors, And Use Cases
Author: Ryan

3. Exploring Optical Circulators: Categories, Functionality, And Benefits
Author: Ryan

4. Precision In Fiber Optics: Polarization Maintaining Axis And Fiber Rotation Systems
Author: Ryan

5. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan

6. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan

7. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan

8. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia

9. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore

10. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya

11. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan

12. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan

13. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine

14. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl

15. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: