123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Using The Security Configuration And Analysis Feature

Profile Picture
By Author: fiona
Total Articles: 191
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The tasks for using the Security Configuration And CompTIA Security+ certification Analysis feature are the following:
1.Accessing the Security Configuration And Analysis console
2.Setting a security configuration and analysis database
Analyzing system security
4.Viewing security analysis results
5.Resolving security discrepancies
Exporting security database settings to a security template
Analyzing System Security
The Security Configuration And Analysis feature performs security analysis by comparing the current state of system security against a security template in the security configuration and analysis database. The local computer's security settings are queried for all security areas in the database configuration. Values found are compared to the database configuration. If the current system settings match the database configuration settings, they are assumed to be correct. If not, the policies in question are displayed as potential problems that need investigation.
To analyze system security, complete the following steps:
...
... 1.In the Security Configuration And Analysis console, set a security configuration and analysis database (if one is not currently set).
2.In the console tree, right-click the Security Configuration And Analysis node, and then click Analyze Computer Now.
3- In the Perform Analysis dialog box, verify or change the path for the log file generated from the analysis in the Error Log File Path box, and then click OK. The default path for the log file is: a certification cost. The different security areas are displayed as they are analyzed. When the security analysis completes, you can view the results.
Note You can also use the Secedit /analyze command prompt to analyze system security. Refer to Windows Server 2003 Help for further information. If you must frequently analyze a large number of computers, use Secedit.
The Security Configuration And Analysis feature is a tool for analyzing and configuring local system security. It compares the effects of one security template or the combined effects of a number of security templates with the currently defined security settings on a local computer.
The Security Configuration And Analysis console uses a database to perform configuration and analysis functions. This database contains the security template that you want to compare with the settings mcts windows server 2008 currently defined on the computer.

Total Views: 323Word Count: 345See All articles From Author

Add Comment

System/Network Administration Articles

1. Fiber Cable Cutting Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan

2. Evolution Of Ethernet And Fiber Optic Termination: A Look At Sc Vs. Lc Connectors
Author: Ryan

3. Understanding Mpo Cables: Essential Guide To Fiber Optic Connectivity
Author: Ryan

4. Oracle Erp Cloud Consulting Company - Rite
Author: Rite

5. Is On Grid Solar The Smartest Way To Cut Your Electricity Bills?
Author: Seo Globo

6. Understanding Boc Package Substrate: Revolutionizing Semiconductor Technology
Author: Ryan

7. Revolutionizing Connectivity: The Benefits And Applications Of Flexible Printed Circuits
Author: Ryan

8. A Comprehensive Guide To Al₂o₃ (alumina) Pcb
Author: Ryan

9. Your Information May Already Be On The Dark Web
Author: Reinfosec

10. Fbt Optical Fiber Splitter Vs. Plc Optical Fiber Splitter
Author: Ryan

11. Know More About The Optical Fiber Alignment System
Author: Ryan

12. Fiber Optic Pigtail: What Is It And What Are Its Types?
Author: Ryan

13. Comprehensive Introduction Of Fiber Optic Splitter
Author: Ryan

14. Know About The Fiber Polishing Parameters
Author: Ryan

15. Basic Introduction To Ic Substrate China
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: