123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Designing Technical Controls To Manage The Use Of Laptop Computers

Profile Picture
By Author: unknownmem
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Exercise 1: Create a Preliminary List of Technical Controls to Manage Designing exam(http://www.mcse-70-297.com)
the Use of Laptop Computers
1. What should Humongous Insurance do to control the use of laptop computers? Prepare a list of recommendations and provide supporting evidence or reasons why you have included each item.
Answers may vary. Recommendations:
Make laptop users members of the Network Configuration Operators group so that they can make changes as necessary to their network configuration.
Make laptop users members of the Print Operators group so that they can manage a printer connected to their laptop.
Remove laptop user accounts, both user and computer, from general OUs. The goal is to be able to manage them differently. Create a new OU, and place laptop accounts in it.
Design software restriction policies that allow only approved software on the laptop computers. This will keep users from installing or running unauthorized software.
Create IEAK profiles to manage Security Zones and other aspects of Internet Explorer MCSE 2003 exams(http://www.mcse-70-297.com)
...
... configuration and block user access to these configurations. Controlling Security Zone configuration is a good way to protect systems. Tight controls for Internet sites and relaxed controls for intranet sites can be established.
Review the current administrative template settings for computers and users that do not travel. Determine changes that will be needed to relax control so that users can do their job while away from the office.
This chapter presents the skills and concepts related to creating a security design framework. This training kit presumes that you have a minimum of 1 year experience implementing and administering desktop operating systems and network operating systems in environments that have:
At least 250 supported users
Three or more physical locations
Typical network services such as messaging, database, file and print, proxy server or firewall, Internet and intranet, remote access, and client computer management
Three or more domain controllers
Connectivity needs that include connecting branch offices and individual users in remote locations to the
Free Security+ practice exams(http://www.examshots.com/certification/Security+-67.html)
corporate network, and connecting corporate networks to the Internet
In addition, you should have experience designing a network infrastructure.

Total Views: 338Word Count: 334See All articles From Author

Add Comment

Education Articles

1. From Gst Compliance To Financial Command: Why A Cfo Dashboard Is Becoming Essential
Author: Ruhika

2. Microsoft Fabric Training | Microsoft Fabric Online Course
Author: gollakalyan

3. Analytics For It Pros: Next Big Career Upgrade
Author: anu

4. Data Science Training | Data Science Online Courses
Author: Vamsi

5. Top Sap Btp Cap Training Online| Sap Fiori Course
Author: Pravin

6. Why Surat Is Emerging As Gujarat’s New Hub For Data Science Talent
Author: Abijith

7. Autocad Course
Author: SukritiEDU

8. Devops And Ai: Exploring The Shift In 2026
Author: Sagar

9. Best Icse Schools Near Me
Author: sanjana122

10. Real Problems Data Analysts Solve Daily
Author: Datamites

11. Quality Childcare In New Albany: Building Strong Early Learning Foundations
Author: Learning To Flourish

12. Vietnam As A Premier Destination For Mbbs Affordable And English-medium Education
Author: vijay

13. Mbbs In Vietnam For Indian Medical Enthusiasts!
Author: vijay

14. Don't Get Scammed: Process To Check Online Certificates
Author: intinstitute

15. Best Private School In Khordha With Modern Infrastructure & Smart Classes
Author: Asha International School

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: