ALL >> System-Network-Administration >> View Article
Viewing Security Analysis Results

In the details pane, the Security Configuration And Project+ Analysis console displays the analysis results organized by security area with visual flags to indicate problems. For each security policy in the security area, the current database and computer configuration settings are displayed.
To view security analysis results, complete the following steps:
1.In the Security Configuration And Analysis console, expand the Security Configuration And Analysis node.
2.Double-click a security policies node (such as Account Policies), and then click the security area (such as Password Policy) for which you want to view results.
In the details pane, shown in Figure 13-20, the Policy column indicates the policy name for the analysis results, the Database Setting column indicates the security value in your template, and the Computer Setting column indicates the current security level in the system.
black question mark indicates that the entry is not defined in the analysis database and, therefore, was not analyzed. If an entry is not analyzed, it might be that it was ...
... not defined in the analysis database or that the user who is amning comptia certification training the analysis might not have sufficient permission to perform analysis on the specific object or area.
A red exclamation point indicates that the entry is defined in the analysis database but does not exist on the actual system. For example, there might be a restricted group that is defined in the analysis database but does not actually exist on the analyzed system.
No icon indicates that the security policy was not included in your template and therefore not analyzed.
Viewing the Security Analysis Log File After completing a security analysis, you can also view the security analysis log file. The log file contains all of the information about the analysis. Look for the word "mismatch" to find the differences between the template and the current security settings on the local computer.
To view the security analysis log file, in the console tree, right-click the Security Configuration And Analysis node, and then click View Log File.
You can also view the security analysis log file in the location you specified in the Perform Analysis dialog box.
You can also use the Secedit /configure command prompt to configure system security. Refer to Windows Server 2003 Help for
social networking benefits further information.
Add Comment
System/Network Administration Articles
1. Top Dns Security Services Provider In India!Author: GIGABITTechnologies
2. Cloud Backup For Business: Ensuring Data Protection With Offsite Solutions
Author: Entrust Network Services
3. Level Up Your Connection: Best Internet Plans For Gaming
Author: Jamesanderson
4. Boc Package Substrate: Advancing Semiconductor Packaging Technology
Author: Ryan
5. Enhance Fiber Optic Precision With Advanced Cable Cutting Machines
Author: Ryan
6. The Ultimate Guide To Fiber Optic Cable Production: Indoor Vs. Outdoor Lines
Author: Ryan
7. Optimizing Fiber Array Alignment With Precision Fiber Alignment Stages
Author: Ryan
8. Why Cybersecurity Should Be A Priority For Every Business In 2025
Author: Reinfosec
9. Why Is Cyber Network Security Important?
Author: GIGABITTechnologies
10. Fiber Cable Cutting Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan
11. Evolution Of Ethernet And Fiber Optic Termination: A Look At Sc Vs. Lc Connectors
Author: Ryan
12. Understanding Mpo Cables: Essential Guide To Fiber Optic Connectivity
Author: Ryan
13. Oracle Erp Cloud Consulting Company - Rite
Author: Rite
14. Is On Grid Solar The Smartest Way To Cut Your Electricity Bills?
Author: Seo Globo
15. Understanding Boc Package Substrate: Revolutionizing Semiconductor Technology
Author: Ryan