123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

How To Configure And Use Administrative Templates

Profile Picture
By Author: Mike Jones
Total Articles: 256
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

To configure and use administrative templates, open a online MCTS certification and navigate to the Administrative Templates section of the computer or user node of the GPO. The loca?tion is shown in Figure 11-10. Double-click a specific container in the template to change its settings. An open template container property page is shown in Figure 11-11. When the GPO is downloaded by the client, the settings will be applied. Admin?istrative template settings will be displayed in the Group Policy Management Console.
Consider the following security options, event log settings, restricted groups, services settings, and object permission settings in your security template design:
Consider limiting the number of logon credentials that are cached locally. These credentials are used when a domain controller is not available. Setting cached logon credentials to 0 prevents logon if no domain controller is available. This setting might be appropriate for highly sensitive client
computers, but it is not acceptable for laptop computers, as they will frequently be used where domain ...
... controllers are not available for logon. Consider setting sensitive laptops to 1. However, remember that the last logon is the one that will be MCTS benefits cached. If an administrator or technician logs on to the laptop for any reason, her or his credentials will be cached. Unless the authorized user of the laptop logs on and off before disconnecting from the network, the authorized user will not be able to log on to the laptop until it is connected to the network.
Consider enabling the security option Do Not Allow Storage Of Credentials Or .NET Passports For Network Authentication. If you enable this option, users will not be able to store Passport credentials and credentials used to log on to remote servers and workstations on their client computers, and therefore they will have to type them in each time they want to use them. Not storing cre?
dentials makes the access to applications, Web sites, databases, and so on safer.
However, when users have multiple passwords to remember, they are more likely to write them down, use a weak password, or both. You will have to evaluate which approach poses the most risk MCSE study guides free download for your organization.

Total Views: 313Word Count: 363See All articles From Author

Add Comment

Business Articles

1.  hastelloy C4 Scrap Exporters In India
Author: Omkar

2. Planning Free Garden Buildings: Rules You Should Know
Author: Pecasa Home

3. Biometric Access Control Device | Sathya Online Shopping
Author: Sathya Online Shopping

4. Biometric Access Control Device | Biometric Device Price | Sathya
Author: Sathya Online Shopping

5. Compression Socks Market Size & Share, Analysis 2031
Author: Andy

6. Lucintel Forecasts The Global Thermoplastic Unidirectional Tape Market Grow With A Cagr Of 7% From 2023-2030
Author: Lucintel LLC

7. Granite In Jaipur: Affordable And Luxurious Stone Choices
Author: Pahariya Stones

8. Top Reasons Why Enterprise Voip Solutions Are Essential Today
Author: Jack Morris

9. Lucintel Forecasts The Global Telecom Cable Market To Reach $82 Billion By 2030
Author: Lucintel LLC

10. Pressure Relief Devices
Author: precimeasure

11. Crafting Dream Homes: Leading Home Designers In Chennai Area
Author: oddsarchitect

12. Lucintel Forecasts The Global Siding Market To Reach $150 Billion By 2030
Author: Lucintel LLC

13. Transforming Spaces: Architect In Chennai
Author: oddsarchitect

14. Expert Speech & Language Therapy Care For Children
Author: pavitra

15. Amazon Guide For E-commerce Strategy: Unlocking Success In Online Sales
Author: Sam

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: