123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Active Directory Security Provided By Group Policy

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Details about Active Directory security provided by Group Policy have not yet been discussed in this free exam question papers training kit. There are three areas within Group Policy that handle Active Directory security. They are security settings, auditing and security logging, and security configuration and analysis.
Security Settings Security settings define the security behavior of the system. Through the use of GPOs in Active Directory directory service, administrators can apply security profiles to sites, domains, and OUs in the enterprise. Security settings are detailed later in this lesson and in Lesson 2.
Auditing and Security Logging Auditing in Windows Server 2003 is the process of tracking both user activities and system activities, called events, on a computer. You can specify that information about an event be written to the security log in the Event Viewer console whenever certain actions are performed. The security log helps to detect intrusion and provides legal evidence if an intruder is caught. In addition, security logging poses an additional time consuming ...
... task for the sophisticated intruder, making detection more likely. Auditing and administering the security log are covered in Lessons 3 and 4, respectively.
Security Configuration And Analysis The Security Configuration And Analysis feature offers the ability to compare the security settings of a computer to a security template, view the results, and resolve any discrepancies revealed by the free CompTIA practice tests analysis. A security template is a physical representation of a security configuration, a single file where a group of security settings is stored, designed to streamline security administration. In addition to using security templates in the Security Configuration And Analysis feature, you can also import a security template into a GPO and apply that security profile to many computers at once. Security templates and the Security Configuration And Analysis feature are covered in Lessons 5 and 6, respectively.
Max is concerned that it would be a huge burden for mobile users to deal with
software installation when they are connected to the network from remote locations. What must you do to alleviate Max's concerns?
Group Policy-based software deployment already includes the capability to detect slow links. When users are connected to the network over a slow link, software will not deploy. The users will get the software the next time they are in the office and they connect to the LAN. With Group Policy, we can control what constitutes a "slow" link. The default is 500 Kbps, which is often an acceptable setting. Most remote connections will fall below 500 Kbps, and certainly most LANs will be faster than 500 Kbps. However, perhaps you have some users that are able to Free A+ practice exams VPN into the office at 300 Kbps, and you would like that to be treated as a fast link. You could alter the Slow Link Detection setting such that any connection faster than 250 Kbps is not considered slow.

Total Views: 407Word Count: 480See All articles From Author

Add Comment

System/Network Administration Articles

1. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan

2. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan

3. Fiber Curing Oven: Working Principles, Features, And Applications
Author: Ryan

4. From Struggling Pipelines To Sustainable Growth: The Real Benefits Of Outsourcing Lead Generation
Author: Sophia

5. Smart Print Automation: Transforming The Way Print Shops Work
Author: Printstore

6. Reasons To Try Aura Scanning For Inner Healing
Author: vidhi vidhanya

7. Fiber Polishing Machines: Precision Technology For High-performance Optical Networks
Author: Ryan

8. Mtp Cables Are Meant For High-performance Fibre Optic Communication
Author: Ryan

9. The Rising Importance Of Email Security In A Digital-first World
Author: Impaakt Magazine

10. Arbeitszeit Berechnen Mit Arbeitszeitrechner-24.de
Author: Steffen Stahl

11. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?
Author: Julian Serle

12. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan

13. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan

14. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services

15. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: