ALL >> System-Network-Administration >> View Article
Understanding Software Restriction Policies

Software restriction policies, new in sy0-201 security and Windows Server 2003, were created to address the problem of regulating unknown or untrusted code. Software restriction policies are security settings in a GPO provided to identify software and control its ability to run on a local computer, site, domain, or OU. Most organizations employ a set of known and trusted programs. However, if users install and run other programs, these programs might conflict with or change configuration data in the known and trusted programs. Or, the newly installed user programs could contain a virus or Trojan horse. Software restriction policies protect your computer environment from unknown code by enabling you to identify and specify the applications allowed to run. These policies can apply to computers or users, depending on whether you choose to modify settings in User Configuration or Computer Configuration. When software restriction policies are set, end users must adhere to the guidelines set up by administrators when executing programs.
With software restriction policies, you ...
... can Control the ability of programs to run on your system. For example, you can apply a policy that does not allow certain file types to am in the e-mail attachment directory of your e-mail program if you are concerned about users receiving viruses through e-mail.
Permit users to run only specific files on multiuser computers. For example, if you have multiple users on your computers, you can set up software restriction policies and access control settings in such comptia security certification a way that users do not have access to any
software but those specific files that are necessary for their work.
Decide who can add trusted publishers to your computer.
Control whether software restriction policies affect all users or just certain users on a computer.
Prevent any files from running on your local computer, OU, site, or domain. For example, if you have a known virus, you can use software restriction policies to stop the computer from opening the file that contains the virus.
Software restriction policies should not be used as a replacement for antivirus software. Software restriction policies do not work on Microsoft Windows NT 4 or Windows 2000 systems.
You are preparing a package for deployment. Which of the following actions
should you perform if you receive the message Cannot Prepare Package For
Deployment?
a.Check your permissions for the GPO
b.Check connectivity with the SDP
c.Check your permissions for the SDP
d.Set the appropriate category for the package
e.Set the auto-install property for the package
The correct answer is b. If you are preparing a package for deployment and you receive the a Exams message Cannot Prepare Package For Deployment, one of the actions you should take is to check connectivity with the SDP
Add Comment
System/Network Administration Articles
1. Why Cybersecurity Should Be A Priority For Every Business In 2025Author: Reinfosec
2. Why Is Cyber Network Security Important?
Author: GIGABITTechnologies
3. Fiber Cable Cutting Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan
4. Evolution Of Ethernet And Fiber Optic Termination: A Look At Sc Vs. Lc Connectors
Author: Ryan
5. Understanding Mpo Cables: Essential Guide To Fiber Optic Connectivity
Author: Ryan
6. Oracle Erp Cloud Consulting Company - Rite
Author: Rite
7. Is On Grid Solar The Smartest Way To Cut Your Electricity Bills?
Author: Seo Globo
8. Understanding Boc Package Substrate: Revolutionizing Semiconductor Technology
Author: Ryan
9. Revolutionizing Connectivity: The Benefits And Applications Of Flexible Printed Circuits
Author: Ryan
10. A Comprehensive Guide To Al₂o₃ (alumina) Pcb
Author: Ryan
11. Your Information May Already Be On The Dark Web
Author: Reinfosec
12. Fbt Optical Fiber Splitter Vs. Plc Optical Fiber Splitter
Author: Ryan
13. Know More About The Optical Fiber Alignment System
Author: Ryan
14. Fiber Optic Pigtail: What Is It And What Are Its Types?
Author: Ryan
15. Comprehensive Introduction Of Fiber Optic Splitter
Author: Ryan