123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Viewing Security Analysis Results

Profile Picture
By Author: Mike Jones
Total Articles: 256
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In the details pane, the Security Configuration And Project+ Analysis console displays the analysis results organized by security area with visual flags to indicate problems. For each security policy in the security area, the current database and computer configuration settings are displayed.
To view security analysis results, complete the following steps:
1.In the Security Configuration And Analysis console, expand the Security Configuration And Analysis node.
2.Double-click a security policies node (such as Account Policies), and then click the security area (such as Password Policy) for which you want to view results.
In the details pane, shown in Figure 13-20, the Policy column indicates the policy name for the analysis results, the Database Setting column indicates the security value in your template, and the Computer Setting column indicates the current security level in the system.
black question mark indicates that the entry is not defined in the analysis database and, therefore, was not analyzed. If an entry is not analyzed, it might be that it was ...
... not defined in the analysis database or that the user who is amning comptia certification training the analysis might not have sufficient permission to perform analysis on the specific object or area.
A red exclamation point indicates that the entry is defined in the analysis database but does not exist on the actual system. For example, there might be a restricted group that is defined in the analysis database but does not actually exist on the analyzed system.
No icon indicates that the security policy was not included in your template and therefore not analyzed.
Viewing the Security Analysis Log File After completing a security analysis, you can also view the security analysis log file. The log file contains all of the information about the analysis. Look for the word "mismatch" to find the differences between the template and the current security settings on the local computer.
To view the security analysis log file, in the console tree, right-click the Security Configuration And Analysis node, and then click View Log File.
You can also view the security analysis log file in the location you specified in the Perform Analysis dialog box.
You can also use the Secedit /configure command prompt to configure system security. Refer to Windows Server 2003 Help for
social networking benefits further information.

Total Views: 530Word Count: 373See All articles From Author

Add Comment

System/Network Administration Articles

1. Roi Benefits Of Implementing The M-files Document Management System
Author: DocSmart Solutions

2. Mems Optical Switch: High-speed, Reliable Switching For Modern Fiber Optic Networks
Author: Ryan

3. Polarization Maintaining Fiber Cable: Ensuring Polarization Stability In Advanced Optical Systems
Author: Ryan

4. Optical Fiber Alignment System: The Foundation Of High-performance Fiber Optic Solutions
Author: Ryan

5. The Real Difference Between Ai Tools And Ai Systems
Author: Orson Amiri

6. Document Manager Software: Tools To Organize Business Files
Author: DocSmart Solutions

7. Best Online Cybersecurity Training Institute In India
Author: securium Academy

8. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan

9. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan

10. Fiber Cable Stripping Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan

11. 20% Off PmpĀ® Certification: Turn This Christmas Into A Career Milestone
Author: securium Academy

12. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic Cables
Author: Ryan

13. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan

14. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy

15. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: