123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Accessing The Security Configuration And Analysis Console

Profile Picture
By Author: Mike Jones
Total Articles: 256
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The Security Configuration And Analysis console is the main tool for using CompTIA Security+ the Security Configuration And Analysis feature. This procedure shows you how to add the Security Configuration And Analysis console to a Microsoft Management Console (MMC) that is accessible from the Administrative Tools menu.
To access the Security Configuration And Analysis console, complete the following steps:
1.Do one of the following:
To add the Security Configuration And Analysis console to a new console, click Start, click Run, type mmc, and then click OK.
To acid the Security Configuration And Analysis console to an existing console, go directly to step 2.
2.On the Console menu, click Add/Remove Snap-In, and then click Add.
3.In the Add Standalone Snap-In dialog box, select Security Configuration And Analysis and click Add.
4.Click Close, and then click OK.
5.On the Console menu, click Save.
6.Type the name to assign to this console and click Save. The console appears on the Administrative Tools menu.
Setting a Security ...
... Configuration And Analysis Database
The Security Configuration And Analysis console uses a database to perform SY0-201 configuration and analysis functions. This database contains the security template that you want to compare with the settings currently defined on the computer. Before you can analyze or configure security, you must determine the database to use.
To set a security configuration and analysis database, complete the following steps:
1.In the Security Configuration And Analysis console, right-click Security Configuration And Analysis.
2.Click Open Database.
3.In the Open Database dialog box, do one of the following:
If you want to use an existing database for the analysis or configuration, click the database, and then click Open. This database is now the security configuration and analysis database. The template or templates contained in this database are used for the analysis or configuration you will perform.
a If you want to create a new database for the analysis or configuration, type a filename in the File Name list, and then click Open. In the Import Template dialog box, shown in MCSE exams, select the security template to load into the new security configuration and analysis database, and then click Open. This database is now the security configuration and analysis database. The template(s) contained in this database are used for the analysis or configuration you will perform.

Total Views: 472Word Count: 368See All articles From Author

Add Comment

System/Network Administration Articles

1. When Every Access Decision Matters, How Smart Identity Can Make Hipaa Compliance A Reality
Author: Tushar Pansare

2. Fibre Optic Pigtail Cables: Designs, Connectors, And Use Cases
Author: Ryan

3. Exploring Optical Circulators: Categories, Functionality, And Benefits
Author: Ryan

4. Precision In Fiber Optics: Polarization Maintaining Axis And Fiber Rotation Systems
Author: Ryan

5. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan

6. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan

7. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan

8. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia

9. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore

10. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya

11. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan

12. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan

13. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine

14. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl

15. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: