123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Using The Security Configuration And Analysis Feature

Profile Picture
By Author: fiona
Total Articles: 191
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The tasks for using the Security Configuration And CompTIA Security+ certification Analysis feature are the following:
1.Accessing the Security Configuration And Analysis console
2.Setting a security configuration and analysis database
Analyzing system security
4.Viewing security analysis results
5.Resolving security discrepancies
Exporting security database settings to a security template
Analyzing System Security
The Security Configuration And Analysis feature performs security analysis by comparing the current state of system security against a security template in the security configuration and analysis database. The local computer's security settings are queried for all security areas in the database configuration. Values found are compared to the database configuration. If the current system settings match the database configuration settings, they are assumed to be correct. If not, the policies in question are displayed as potential problems that need investigation.
To analyze system security, complete the following steps:
...
... 1.In the Security Configuration And Analysis console, set a security configuration and analysis database (if one is not currently set).
2.In the console tree, right-click the Security Configuration And Analysis node, and then click Analyze Computer Now.
3- In the Perform Analysis dialog box, verify or change the path for the log file generated from the analysis in the Error Log File Path box, and then click OK. The default path for the log file is: a certification cost. The different security areas are displayed as they are analyzed. When the security analysis completes, you can view the results.
Note You can also use the Secedit /analyze command prompt to analyze system security. Refer to Windows Server 2003 Help for further information. If you must frequently analyze a large number of computers, use Secedit.
The Security Configuration And Analysis feature is a tool for analyzing and configuring local system security. It compares the effects of one security template or the combined effects of a number of security templates with the currently defined security settings on a local computer.
The Security Configuration And Analysis console uses a database to perform configuration and analysis functions. This database contains the security template that you want to compare with the settings mcts windows server 2008 currently defined on the computer.

Total Views: 309Word Count: 345See All articles From Author

Add Comment

System/Network Administration Articles

1. Fiber Fused Biconical Taper Systems And Fiber Cable Cutting Machine Potential
Author: Ryan

2. Understanding Polarization Maintaining Fiber Rotation Systems And Their Applications
Author: Ryan

3. Cat6a Patch Cable: The Best Preference For Comprehensive Cabling
Author: Ryan

4. A Brief Idea About The Mtp/mpo Cables And Their Use
Author: Ryan

5. 5 Reasons Why A Smart Bus Ticketing System Is The Future Of Public Transport
Author: Limon

6. How To Implement Technology In Your Inbound Call Center?
Author: DialDesk

7. How To Choose An Enterprise Help Desk It Support Company
Author: Entrust Network Services

8. Cost-effective Network Solutions For Offices In Singapore
Author: Entrust Network Services

9. Choosing Between Uv Light And Heat Ovens For Superior Performance
Author: James

10. The Right Tools And The Right Radius Are Vital In A Fiber Optic Polishing Process
Author: James

11. Lc And Sc Connectors Explained: Which Fiber Connection Is Right For You?
Author: James

12. A Closer Look At Armored Fiber Patch Cables
Author: James

13. The Essential Guide To Fiber Connectors: Sc, Fc, Lc, And St Explained
Author: Ryan

14. Wireless Network Setup Solutions For Offices By Entrust Network
Author: Entrust Network Services

15. Pcb Manufacturing: Understanding The Burn-in Test Process
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: