ALL >> System-Network-Administration >> View Article
Design Activity: Designing Technical Controls To Manage The Use Of Laptop Computers
In this activity, you must use what you learned in all three lessons and apply it to a real-world situation. Read the 70-620 Exam(http://www.mcitp-70-620.com)
and then complete the exercise that follows. You can find answers for the exercise in the "Questions and Answers" section at the end of this chapter.
Many employees spend part of their time at the office and part of their time traveling. Some employees work almost entirely from their homes or from various locations while they are traveling. All employees that must travel are issued company laptops with all the software necessary to do their jobs. Laptops are running either Windows 2000 or Windows XP Professional. Microsoft Office is installed on all laptops, as are personal firewalls and antivirus software. GPOs that contain restrictive administrative template settings are linked to OUs that contain user and computer accounts. There are some OUs that contain computer accounts for both laptops and desktops. All laptop computers are members of a Windows Server 2003 domain.
Interviews
Following is a list of company personnel interviewed and their ...
... statements:
Chief Security Officer "We have a very restrictive MCITP certification(http://www.mcitp-70-620.com)
desktop lockdown program. If there is a way to configure an application so that you must be an administrator to configure it, we do it. If there is a control that can be locked down and/or removed from the user interface, we do so. We have developed a large number of custom-written profiles that describe the tasks a user must do and how much his computer can be locked down and still allow him to do it. These have been trans-lated into GPOs and are applied to all desktop computers used at company offices. However, we cannot link these GPOs to OUs that contain laptop comput?ers because this prevents the laptop users from being able to do their job."
Network administrator "The laptop users have too much access to their computers' utilities and configuration. We are constantly seeing problems caused by the changes that they make. They delete software, reconfigure network settings, add software that causes problems, change settings in Control Panel, and generally are like young puppies to whom everything security+ certification(http://www.upcert.com)
is a chew bone. If a setting can be changed, I can guarantee you that some laptop user has changed it."
Add Comment
System/Network Administration Articles
1. Fbt Optical Fiber Splitter Vs. Plc Optical Fiber SplitterAuthor: Ryan
2. Know More About The Optical Fiber Alignment System
Author: Ryan
3. Fiber Optic Pigtail: What Is It And What Are Its Types?
Author: Ryan
4. Comprehensive Introduction Of Fiber Optic Splitter
Author: Ryan
5. Know About The Fiber Polishing Parameters
Author: Ryan
6. Basic Introduction To Ic Substrate China
Author: Ryan
7. Pcba Manufacturing In China: A Global Hub
Author: Ryan
8. You Can Get The Details Idea About Miniaturization In Csp Substrates
Author: Ryan
9. Fiber Fused Biconical Taper Systems And Fiber Cable Cutting Machine Potential
Author: Ryan
10. Understanding Polarization Maintaining Fiber Rotation Systems And Their Applications
Author: Ryan
11. Cat6a Patch Cable: The Best Preference For Comprehensive Cabling
Author: Ryan
12. A Brief Idea About The Mtp/mpo Cables And Their Use
Author: Ryan
13. 5 Reasons Why A Smart Bus Ticketing System Is The Future Of Public Transport
Author: Limon
14. How To Implement Technology In Your Inbound Call Center?
Author: DialDesk
15. How To Choose An Enterprise Help Desk It Support Company
Author: Entrust Network Services