123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

How To Configure And Use Administrative Templates

Profile Picture
By Author: Mike Jones
Total Articles: 256
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

To configure and use administrative templates, open a online MCTS certification and navigate to the Administrative Templates section of the computer or user node of the GPO. The loca?tion is shown in Figure 11-10. Double-click a specific container in the template to change its settings. An open template container property page is shown in Figure 11-11. When the GPO is downloaded by the client, the settings will be applied. Admin?istrative template settings will be displayed in the Group Policy Management Console.
Consider the following security options, event log settings, restricted groups, services settings, and object permission settings in your security template design:
Consider limiting the number of logon credentials that are cached locally. These credentials are used when a domain controller is not available. Setting cached logon credentials to 0 prevents logon if no domain controller is available. This setting might be appropriate for highly sensitive client
computers, but it is not acceptable for laptop computers, as they will frequently be used where domain ...
... controllers are not available for logon. Consider setting sensitive laptops to 1. However, remember that the last logon is the one that will be MCTS benefits cached. If an administrator or technician logs on to the laptop for any reason, her or his credentials will be cached. Unless the authorized user of the laptop logs on and off before disconnecting from the network, the authorized user will not be able to log on to the laptop until it is connected to the network.
Consider enabling the security option Do Not Allow Storage Of Credentials Or .NET Passports For Network Authentication. If you enable this option, users will not be able to store Passport credentials and credentials used to log on to remote servers and workstations on their client computers, and therefore they will have to type them in each time they want to use them. Not storing cre?
dentials makes the access to applications, Web sites, databases, and so on safer.
However, when users have multiple passwords to remember, they are more likely to write them down, use a weak password, or both. You will have to evaluate which approach poses the most risk MCSE study guides free download for your organization.

Total Views: 421Word Count: 363See All articles From Author

Add Comment

Business Articles

1. Single Piece Flanged End Ball Valve Manufacturers In Ahmedabad, India – Mnc Valves
Author: mnc valves

2. A Simple Guide To Pitra Dosh And Kaal Sarp Puja At Trimbakeshwar
Author: Manoj Guruji

3. The Evolution Of Cnc Machined Components: What Oem
Author: Arrow Off-Road

4. How To Design A Step And Repeat Backdrop That Looks Professional?
Author: Steve Morgan

5. Spartan Jetter For Sale | Professional Hydro Jetting Equipment In Utah
Author: HotJet USA

6. Top 5 Factors To Consider When Selecting A Gasket
Author: Gasco Inc

7. Hiring In Mumbai Without The Chaos: A Practical Guide
Author: Digirecruitx

8. Bpo Outsourcing Company
Author: kajal

9. Renewable Energy Companies And The Challenge Of Grid Integration
Author: Hartek Group

10. How Freight Claims Management Works [2026 Updated]
Author: ArgusLogistics

11. Byst: Setting A New Standard In Business Mentorship Excellence
Author: Byst Youth

12. Voice And Visual Search: What Researchers Must Know
Author: Philomath Research

13. Let’s Build Your Bpo Business Together!
Author: Zoetic BPO Services

14. How To Spot Fake Copper And Brass Cookware At The Market
Author: Copper Brazier

15. Why More Industries Are Turning To Kyc Projects Right Now
Author: mohan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: