Here's the recent articles submitted by zhui meng
Articles By zhui meng
Software Installation Extension
Submitted as: Mike Jones
In Microsoft Windows Server 2003, the network location can include SDPs located in other forests in which two-way forests trusts have been established.You assign required or mandatory software to users or to computers.(read
entire article)
View : 314 Times
Category : System/Network Administration
Understanding Software Deployment With Group Policy
Submitted as: Mike Jones
This situation is perfectly suited to the use of Folder Redirection. Group Policy offers the ability to redirect many different special folders on a client system to an alternate location. In this case, redirecting users' My Documents folders to a network share.(read
entire article)
View : 311 Times
Category : System/Network Administration
Wide World Importers Network Structure
Submitted as: Mike Jones
Ensure that MBSA is selected in the Domain Controllers Properties dialog box.Click Properties. Then, select the Disable Computer Configuration Settings check box. In the Confirm Disable message box, click Yes. Click OK.(read
entire article)
View : 373 Times
Category : System/Network Administration
Maintaining Software Deployed With Group Policy
Submitted as: Mike Jones
You can redeploy an application previously deployed with Group Policy if there are small changes that need to be made to the original software deployment configuration. For example, you might have deployed only Word and Excel in your original Microsoft Office software deployment.(read
entire article)
View : 309 Times
Category : System/Network Administration
Software Deployment Troubleshooting Scenarios
Submitted as: Mike Jones
Modifications enable you to customize Windows Installer packages. Modifications can be transform (,mst) or patch (.msp) files. You cannot deploy .mst or .msp files alone. They must modify an existing Windows Installer package.(read
entire article)
View : 307 Times
Category : System/Network Administration
How Software Restriction Policies Work
Submitted as: Mike Jones
After software is identified by using a rule, you can decide whether or not to allow it to run by setting a security level (Disallowed or Unre?stricted) for the program associated with the rule.(read
entire article)
View : 347 Times
Category : System/Network Administration
Default Security Levels
Submitted as: Mike Jones
security level for a GPO, but when a GPO is created, the default security level is Unrestricted.Setting the Default Security Level to Disallowed Disallowed, which does not allow the software to run, regardless of the access rights of the user who is logged on to the computer(read
entire article)
View : 381 Times
Category : System/Network Administration
Setting The Default Security Level
Submitted as: Mike Jones
Rules identify and control the running of software and override the default security level. You can create four types of rules: hash rules, certificate rules, path Riles, and Internet zone rules.(read
entire article)
View : 300 Times
Category : System/Network Administration
Resolving Security Discrepancies
Submitted as: Mike Jones
Importing a template that is more appropriate (for the role of that computer) into the security configuration and analysis database as the new database configuration and applying it to the system. Refer to the section "Importing Additional Security Templates into a Database" for details.(read
entire article)
View : 362 Times
Category : System/Network Administration
Viewing Security Analysis Results
Submitted as: Mike Jones
In the details pane, shown in Figure 13-20, the Policy column indicates the policy name for the analysis results, the Database Setting column indicates the security value in your template, and the Computer Setting column indicates the current security level in the system.(read
entire article)
View : 416 Times
Category : System/Network Administration