123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Understanding Active Directory Security

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Active Directory security is determined by security groups, access control, delegation of MCSE Exam control, and Group Policy. This lesson briefly reviews security groups, access control, and delegation of control, which were covered in previous chapters. Then, this lesson introduces auditing, security logging, and security configuration and analysis and discusses the security settings in Group Policy.
Security groups simplify administration by allowing you to assign permissions and rights to a group of users rather than having to assign permissions to each individual user account. You implement security groups by using the Active Directory Users And Computers console. Security groups are discussed in Chapter 8, "Administering Groups." Access control is the granting or denial of permissions to security principals. Access control is implemented by using the object specific access control lists (ACL) in the Security tab of the Properties dialog box of each object. The list contains the names of user groups that have access to the object. Access control is discussed in Chapter 9, "Administering ...
... Active Directory Objects." You delegate administrative control of domains and containers in order to provide other administrators, groups, or users with the ability to manage functions according to their needs. Delegation of control is implemented by using the Delegation Of Control Wizard to automate and simplify the process of setting administrative permissions for a domain, OU, or container. Delegation of control is discussed in MCSE Certification "Implementing an OU Structure," and Chapter 9, "Administering Active Directory Objects."
How do you recommend resolving the issue that many users utilize different parts
of the Office XP suite of applications?
Transforms are files that end with an extension of .mst. These files are deployed along with the .msi file to alter the configuration. This is an option to address this complication. It could be quite an administrative burden to develop .mst files for each of the different configurations utilized, and then deploying multiple GPOs with each of the different configurations.
It is important to understand transforms and when their use is appropriate. In this case, however, there was no indication that having extra software simply available would cause trouble. Consider assigning Office XP to users at the domain level. This will make all file extension associations on the client systems and advertise the applications by making all of the Start menu shortcuts available. Essentially, all of the applications are set to install on first use. If some users never launch Excel, for example, then the program files to run Excel will simply not be brought down for that user. A complicated set of transforms in this 70-294 Exam case would seem to be a waste of administrative effort.

Total Views: 308Word Count: 438See All articles From Author

Add Comment

System/Network Administration Articles

1. Integrated Circuit Packaging Has Ic Substrate As Its Foundation
Author: Ryan

2. Boc Package Substrate: The Pillar Of Semiconductor Packaging
Author: Ryan

3. What Are The Leading Brands Or Manufacturers Of Growing Rack Systems?
Author: doris zhang

4. Polarization Maintaining Fiber Coupler: A Basic High Precision Fiber Sensor Component
Author: Ryan

5. Know About The Optical Circulator In Optical Communication
Author: Ryan

6. Optical Fiber Alignment System And Optical Waveguide Alignment System
Author: Ryan

7. Why Smoad Networks Is The Best Choice For Sim-based Wifi Routers
Author: HubraSEO

8. The Value Of Canada Ul Pcbs: Ensuring Safety And Compliance
Author: Ryan

9. Sap And Msap In Flexible Circuit Fabrication
Author: Ryan

10. Get Deeper Into The Insights Of Aluminum Nitride Pcb (aln Pcb)
Author: Ryan

11. The Essential Guide To Multilayer Pcbs: Design, Manufacturing, And Benefits In Modern Electronics
Author: Ryan

12. Backplane Pcbs: Characteristics, And Design Considerations For High-speed Data Transmission
Author: Ryan

13. Fiber Polishing Film: Master Optical Connectivity
Author: James

14. Delve Into The Basics Of Armored Fiber Optic Patch Cords
Author: Ryan

15. An Overview Of Lc And Sc Fiber Optic Connectors
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: