123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Active Directory Security Provided By Group Policy

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Details about Active Directory security provided by Group Policy have not yet been discussed in this free exam question papers training kit. There are three areas within Group Policy that handle Active Directory security. They are security settings, auditing and security logging, and security configuration and analysis.
Security Settings Security settings define the security behavior of the system. Through the use of GPOs in Active Directory directory service, administrators can apply security profiles to sites, domains, and OUs in the enterprise. Security settings are detailed later in this lesson and in Lesson 2.
Auditing and Security Logging Auditing in Windows Server 2003 is the process of tracking both user activities and system activities, called events, on a computer. You can specify that information about an event be written to the security log in the Event Viewer console whenever certain actions are performed. The security log helps to detect intrusion and provides legal evidence if an intruder is caught. In addition, security logging poses an additional time consuming ...
... task for the sophisticated intruder, making detection more likely. Auditing and administering the security log are covered in Lessons 3 and 4, respectively.
Security Configuration And Analysis The Security Configuration And Analysis feature offers the ability to compare the security settings of a computer to a security template, view the results, and resolve any discrepancies revealed by the free CompTIA practice tests analysis. A security template is a physical representation of a security configuration, a single file where a group of security settings is stored, designed to streamline security administration. In addition to using security templates in the Security Configuration And Analysis feature, you can also import a security template into a GPO and apply that security profile to many computers at once. Security templates and the Security Configuration And Analysis feature are covered in Lessons 5 and 6, respectively.
Max is concerned that it would be a huge burden for mobile users to deal with
software installation when they are connected to the network from remote locations. What must you do to alleviate Max's concerns?
Group Policy-based software deployment already includes the capability to detect slow links. When users are connected to the network over a slow link, software will not deploy. The users will get the software the next time they are in the office and they connect to the LAN. With Group Policy, we can control what constitutes a "slow" link. The default is 500 Kbps, which is often an acceptable setting. Most remote connections will fall below 500 Kbps, and certainly most LANs will be faster than 500 Kbps. However, perhaps you have some users that are able to Free A+ practice exams VPN into the office at 300 Kbps, and you would like that to be treated as a fast link. You could alter the Slow Link Detection setting such that any connection faster than 250 Kbps is not considered slow.

Total Views: 334Word Count: 480See All articles From Author

Add Comment

System/Network Administration Articles

1. 5 Reasons Why A Smart Bus Ticketing System Is The Future Of Public Transport
Author: Limon

2. How To Implement Technology In Your Inbound Call Center?
Author: DialDesk

3. How To Choose An Enterprise Help Desk It Support Company
Author: Entrust Network Services

4. Cost-effective Network Solutions For Offices In Singapore
Author: Entrust Network Services

5. Choosing Between Uv Light And Heat Ovens For Superior Performance
Author: James

6. The Right Tools And The Right Radius Are Vital In A Fiber Optic Polishing Process
Author: James

7. Lc And Sc Connectors Explained: Which Fiber Connection Is Right For You?
Author: James

8. A Closer Look At Armored Fiber Patch Cables
Author: James

9. The Essential Guide To Fiber Connectors: Sc, Fc, Lc, And St Explained
Author: Ryan

10. Wireless Network Setup Solutions For Offices By Entrust Network
Author: Entrust Network Services

11. Pcb Manufacturing: Understanding The Burn-in Test Process
Author: Ryan

12. Know About The Fiber Optic Cabling Solutions
Author: Ryan

13. Choosing The Perfect Cat6a Cable For Your 10g Networks
Author: Ryan

14. Pm Plc Splitter: Boost Efficiency Of Optical Network
Author: Ryan

15. Integrated Circuit Packaging Has Ic Substrate As Its Foundation
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: