ALL >> System-Network-Administration >> View Article
Design Activity: Designing Technical Controls To Manage The Use Of Laptop Computers
In this activity, you must use what you learned in all three lessons and apply it to a real-world situation. Read the 70-620 Exam(http://www.mcitp-70-620.com)
and then complete the exercise that follows. You can find answers for the exercise in the "Questions and Answers" section at the end of this chapter.
Many employees spend part of their time at the office and part of their time traveling. Some employees work almost entirely from their homes or from various locations while they are traveling. All employees that must travel are issued company laptops with all the software necessary to do their jobs. Laptops are running either Windows 2000 or Windows XP Professional. Microsoft Office is installed on all laptops, as are personal firewalls and antivirus software. GPOs that contain restrictive administrative template settings are linked to OUs that contain user and computer accounts. There are some OUs that contain computer accounts for both laptops and desktops. All laptop computers are members of a Windows Server 2003 domain.
Interviews
Following is a list of company personnel interviewed and their ...
... statements:
Chief Security Officer "We have a very restrictive MCITP certification(http://www.mcitp-70-620.com)
desktop lockdown program. If there is a way to configure an application so that you must be an administrator to configure it, we do it. If there is a control that can be locked down and/or removed from the user interface, we do so. We have developed a large number of custom-written profiles that describe the tasks a user must do and how much his computer can be locked down and still allow him to do it. These have been trans-lated into GPOs and are applied to all desktop computers used at company offices. However, we cannot link these GPOs to OUs that contain laptop comput?ers because this prevents the laptop users from being able to do their job."
Network administrator "The laptop users have too much access to their computers' utilities and configuration. We are constantly seeing problems caused by the changes that they make. They delete software, reconfigure network settings, add software that causes problems, change settings in Control Panel, and generally are like young puppies to whom everything security+ certification(http://www.upcert.com)
is a chew bone. If a setting can be changed, I can guarantee you that some laptop user has changed it."
Add Comment
System/Network Administration Articles
1. Fiber Fused Biconical Taper Systems And Fiber Cable Cutting Machine PotentialAuthor: Ryan
2. Understanding Polarization Maintaining Fiber Rotation Systems And Their Applications
Author: Ryan
3. Cat6a Patch Cable: The Best Preference For Comprehensive Cabling
Author: Ryan
4. A Brief Idea About The Mtp/mpo Cables And Their Use
Author: Ryan
5. 5 Reasons Why A Smart Bus Ticketing System Is The Future Of Public Transport
Author: Limon
6. How To Implement Technology In Your Inbound Call Center?
Author: DialDesk
7. How To Choose An Enterprise Help Desk It Support Company
Author: Entrust Network Services
8. Cost-effective Network Solutions For Offices In Singapore
Author: Entrust Network Services
9. Choosing Between Uv Light And Heat Ovens For Superior Performance
Author: James
10. The Right Tools And The Right Radius Are Vital In A Fiber Optic Polishing Process
Author: James
11. Lc And Sc Connectors Explained: Which Fiber Connection Is Right For You?
Author: James
12. A Closer Look At Armored Fiber Patch Cables
Author: James
13. The Essential Guide To Fiber Connectors: Sc, Fc, Lc, And St Explained
Author: Ryan
14. Wireless Network Setup Solutions For Offices By Entrust Network
Author: Entrust Network Services
15. Pcb Manufacturing: Understanding The Burn-in Test Process
Author: Ryan