ALL >> System-Network-Administration >> View Article
Viewing Security Analysis Results

In the details pane, the Security Configuration And Project+ Analysis console displays the analysis results organized by security area with visual flags to indicate problems. For each security policy in the security area, the current database and computer configuration settings are displayed.
To view security analysis results, complete the following steps:
1.In the Security Configuration And Analysis console, expand the Security Configuration And Analysis node.
2.Double-click a security policies node (such as Account Policies), and then click the security area (such as Password Policy) for which you want to view results.
In the details pane, shown in Figure 13-20, the Policy column indicates the policy name for the analysis results, the Database Setting column indicates the security value in your template, and the Computer Setting column indicates the current security level in the system.
black question mark indicates that the entry is not defined in the analysis database and, therefore, was not analyzed. If an entry is not analyzed, it might be that it was ...
... not defined in the analysis database or that the user who is amning comptia certification training the analysis might not have sufficient permission to perform analysis on the specific object or area.
A red exclamation point indicates that the entry is defined in the analysis database but does not exist on the actual system. For example, there might be a restricted group that is defined in the analysis database but does not actually exist on the analyzed system.
No icon indicates that the security policy was not included in your template and therefore not analyzed.
Viewing the Security Analysis Log File After completing a security analysis, you can also view the security analysis log file. The log file contains all of the information about the analysis. Look for the word "mismatch" to find the differences between the template and the current security settings on the local computer.
To view the security analysis log file, in the console tree, right-click the Security Configuration And Analysis node, and then click View Log File.
You can also view the security analysis log file in the location you specified in the Perform Analysis dialog box.
You can also use the Secedit /configure command prompt to configure system security. Refer to Windows Server 2003 Help for
social networking benefits further information.
Add Comment
System/Network Administration Articles
1. Fiber Cable Cutting Machine: Precision And Efficiency In Fiber Optic ProcessingAuthor: Ryan
2. Evolution Of Ethernet And Fiber Optic Termination: A Look At Sc Vs. Lc Connectors
Author: Ryan
3. Understanding Mpo Cables: Essential Guide To Fiber Optic Connectivity
Author: Ryan
4. Oracle Erp Cloud Consulting Company - Rite
Author: Rite
5. Is On Grid Solar The Smartest Way To Cut Your Electricity Bills?
Author: Seo Globo
6. Understanding Boc Package Substrate: Revolutionizing Semiconductor Technology
Author: Ryan
7. Revolutionizing Connectivity: The Benefits And Applications Of Flexible Printed Circuits
Author: Ryan
8. A Comprehensive Guide To Al₂o₃ (alumina) Pcb
Author: Ryan
9. Your Information May Already Be On The Dark Web
Author: Reinfosec
10. Fbt Optical Fiber Splitter Vs. Plc Optical Fiber Splitter
Author: Ryan
11. Know More About The Optical Fiber Alignment System
Author: Ryan
12. Fiber Optic Pigtail: What Is It And What Are Its Types?
Author: Ryan
13. Comprehensive Introduction Of Fiber Optic Splitter
Author: Ryan
14. Know About The Fiber Polishing Parameters
Author: Ryan
15. Basic Introduction To Ic Substrate China
Author: Ryan