ALL >> System-Network-Administration >> View Article
Understanding Active Directory Security
Active Directory security is determined by security groups, access control, delegation of MCSE Exam control, and Group Policy. This lesson briefly reviews security groups, access control, and delegation of control, which were covered in previous chapters. Then, this lesson introduces auditing, security logging, and security configuration and analysis and discusses the security settings in Group Policy.
Security groups simplify administration by allowing you to assign permissions and rights to a group of users rather than having to assign permissions to each individual user account. You implement security groups by using the Active Directory Users And Computers console. Security groups are discussed in Chapter 8, "Administering Groups." Access control is the granting or denial of permissions to security principals. Access control is implemented by using the object specific access control lists (ACL) in the Security tab of the Properties dialog box of each object. The list contains the names of user groups that have access to the object. Access control is discussed in Chapter 9, "Administering ...
... Active Directory Objects." You delegate administrative control of domains and containers in order to provide other administrators, groups, or users with the ability to manage functions according to their needs. Delegation of control is implemented by using the Delegation Of Control Wizard to automate and simplify the process of setting administrative permissions for a domain, OU, or container. Delegation of control is discussed in MCSE Certification "Implementing an OU Structure," and Chapter 9, "Administering Active Directory Objects."
How do you recommend resolving the issue that many users utilize different parts
of the Office XP suite of applications?
Transforms are files that end with an extension of .mst. These files are deployed along with the .msi file to alter the configuration. This is an option to address this complication. It could be quite an administrative burden to develop .mst files for each of the different configurations utilized, and then deploying multiple GPOs with each of the different configurations.
It is important to understand transforms and when their use is appropriate. In this case, however, there was no indication that having extra software simply available would cause trouble. Consider assigning Office XP to users at the domain level. This will make all file extension associations on the client systems and advertise the applications by making all of the Start menu shortcuts available. Essentially, all of the applications are set to install on first use. If some users never launch Excel, for example, then the program files to run Excel will simply not be brought down for that user. A complicated set of transforms in this 70-294 Exam case would seem to be a waste of administrative effort.
Add Comment
System/Network Administration Articles
1. Importance Of Enterprise Identity Management For Large OrganizationsAuthor: adlerconway
2. Fiber Curing Oven: Ensuring Strong And Reliable Fiber Optic Connections
Author: Ryan
3. Dynamics 365 Finance Consultant Services
Author: brainbell10
4. Fiber Circulator: A Key Component In Optical Communication Systems
Author: Ryan
5. Edfa Amplifier: Powering Modern Optical Networks
Author: Ryan
6. How Online Safety Experts Help Businesses Stay Secure In A Connected World
Author: Deep Water
7. Roi Benefits Of Implementing The M-files Document Management System
Author: DocSmart Solutions
8. Mems Optical Switch: High-speed, Reliable Switching For Modern Fiber Optic Networks
Author: Ryan
9. Polarization Maintaining Fiber Cable: Ensuring Polarization Stability In Advanced Optical Systems
Author: Ryan
10. Optical Fiber Alignment System: The Foundation Of High-performance Fiber Optic Solutions
Author: Ryan
11. The Real Difference Between Ai Tools And Ai Systems
Author: Orson Amiri
12. Document Manager Software: Tools To Organize Business Files
Author: DocSmart Solutions
13. Best Online Cybersecurity Training Institute In India
Author: securium Academy
14. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan
15. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan






