ALL >> System-Network-Administration >> View Article
Understanding Active Directory Security
Active Directory security is determined by security groups, access control, delegation of MCSE Exam control, and Group Policy. This lesson briefly reviews security groups, access control, and delegation of control, which were covered in previous chapters. Then, this lesson introduces auditing, security logging, and security configuration and analysis and discusses the security settings in Group Policy.
Security groups simplify administration by allowing you to assign permissions and rights to a group of users rather than having to assign permissions to each individual user account. You implement security groups by using the Active Directory Users And Computers console. Security groups are discussed in Chapter 8, "Administering Groups." Access control is the granting or denial of permissions to security principals. Access control is implemented by using the object specific access control lists (ACL) in the Security tab of the Properties dialog box of each object. The list contains the names of user groups that have access to the object. Access control is discussed in Chapter 9, "Administering ...
... Active Directory Objects." You delegate administrative control of domains and containers in order to provide other administrators, groups, or users with the ability to manage functions according to their needs. Delegation of control is implemented by using the Delegation Of Control Wizard to automate and simplify the process of setting administrative permissions for a domain, OU, or container. Delegation of control is discussed in MCSE Certification "Implementing an OU Structure," and Chapter 9, "Administering Active Directory Objects."
How do you recommend resolving the issue that many users utilize different parts
of the Office XP suite of applications?
Transforms are files that end with an extension of .mst. These files are deployed along with the .msi file to alter the configuration. This is an option to address this complication. It could be quite an administrative burden to develop .mst files for each of the different configurations utilized, and then deploying multiple GPOs with each of the different configurations.
It is important to understand transforms and when their use is appropriate. In this case, however, there was no indication that having extra software simply available would cause trouble. Consider assigning Office XP to users at the domain level. This will make all file extension associations on the client systems and advertise the applications by making all of the Start menu shortcuts available. Essentially, all of the applications are set to install on first use. If some users never launch Excel, for example, then the program files to run Excel will simply not be brought down for that user. A complicated set of transforms in this 70-294 Exam case would seem to be a waste of administrative effort.
Add Comment
System/Network Administration Articles
1. Integrated Circuit Packaging Has Ic Substrate As Its FoundationAuthor: Ryan
2. Boc Package Substrate: The Pillar Of Semiconductor Packaging
Author: Ryan
3. What Are The Leading Brands Or Manufacturers Of Growing Rack Systems?
Author: doris zhang
4. Polarization Maintaining Fiber Coupler: A Basic High Precision Fiber Sensor Component
Author: Ryan
5. Know About The Optical Circulator In Optical Communication
Author: Ryan
6. Optical Fiber Alignment System And Optical Waveguide Alignment System
Author: Ryan
7. Why Smoad Networks Is The Best Choice For Sim-based Wifi Routers
Author: HubraSEO
8. The Value Of Canada Ul Pcbs: Ensuring Safety And Compliance
Author: Ryan
9. Sap And Msap In Flexible Circuit Fabrication
Author: Ryan
10. Get Deeper Into The Insights Of Aluminum Nitride Pcb (aln Pcb)
Author: Ryan
11. The Essential Guide To Multilayer Pcbs: Design, Manufacturing, And Benefits In Modern Electronics
Author: Ryan
12. Backplane Pcbs: Characteristics, And Design Considerations For High-speed Data Transmission
Author: Ryan
13. Fiber Polishing Film: Master Optical Connectivity
Author: James
14. Delve Into The Basics Of Armored Fiber Optic Patch Cords
Author: Ryan
15. An Overview Of Lc And Sc Fiber Optic Connectors
Author: Ryan