CISNTWK-11 Microsoft Windows 2003 Server

Size: px
Start display at page:

Download "CISNTWK-11 Microsoft Windows 2003 Server"

Transcription

1 Microsoft Windows 2003 Server 1

2 Group Policy Microsoft s description of Group Policy: Group Policy allows you to stipulate users environments only once, and to rely on the operating system to enforce them thereafter Group Policy is a key component of Active Directory It was introduced with Windows 2000 Server Additional capabilities have been added to Windows Server 2003 although it is virtually 100% backwards compatible with Windows 2000 Group Policy It is stored on Active Directory Domain Controllers only It only affects computers running Windows Server 2003, Windows XP Professional, and Windows 2000 not Windows NT or 9x By default, Group Policy affects all computers and all users in an Active Directory Site Domain Organizational Unit (OU) 2

3 Group Policy (continued) Contrary to what the name implies, Group Policy does not affect security Groups Although this can be accomplished with an Access Control List (ACL) Windows 2003/XP/2000 computers also have a Local Policy that defines behavior and/or restrictions for that computer only A Local Policy exists in a Domain environment and a non-domain environment These Local Policies are handled in a special way on Domain Controllers they exist within the Domain Controller Security Settings on Domain Controllers Most of the capabilities of Group Policy requires Active Directory Although some of the capabilities of Group Policy are available outside of a Domain environment on Windows 2000, XP Professional, and Windows Server 2003 the features are available by entering GPEDIT.MSC from a command line Although some of the capabilities can be achieved with System Policy 1 1 System Policy is part of Windows NT and has been replaced by Group Policy in Windows 2000 (and later) 3

4 Group Policy Control Group Policy allows Administrators to control computers and users with/for Administrative Templates Registry based policy, known as System Policy in Windows NT Server 4 controls Registry settings for the user (HKEY_CURRENT_USER) controls Registry settings for the computer (HKEY_LOCAL_MACHINE) Group Policy Registry settings are not permanent they will be backed out when a Group Policy no longer applies Folder Redirection (beneath Windows Settings) allows the location of folders (directories) to be specified anywhere in the network for Application i Data Desktop My Documents My Pictures Start Menu Internet Explorer Maintenance (beneath Windows Settings) allows Internet Explorer to be managed after it has been deployed Remote Installation Services (beneath Windows Settings) assists in the deployment of Windows 2003/XP/2000 4

5 Group Policy Control (continued) Group Policy allows Administrators to control computers and users with/for Security settings (beneath Windows Settings) controls security settings for domains, computers and users they include Account Policies Password Policy Account Lockout Policy Local Policies Audit Policy User Rights Assignment Security Options Event Log Restricted Groups System Services Registry (keys security) File System (security) access control, audit, and ownership Public Key Policies IP Security Policies on Active Directory 5

6 Group Policy Control (continued) Group Policy allows Administrators to control computers and users with/for Security settings (beneath Windows Settings) [continued] controls security settings for domains, computers and users they include Software Restriction Policies introduced with Windows XP Professional included with Windows Server 2003 not available on Windows 2000 Domains Wireless Network (IEEE ) Policies introduced with Windows Server 2003 not available on Windows 2000 Domains 6

7 Group Policy Control (continued) Group Policy allows Administrators to control computers and users with/for Scripts (beneath Windows Settings) that run when the computer starts up and/or when the computer shuts down that run when a user logs on and/or when a user logs off examples of scripts include Windows Scripting Host (WSH) files, such as Visual Basic (.VBS) scripts Java (.JS) scripts batch files with the.bat extension command files with the.cmd extension executable programs with the.exe extension Software Installation (beneath Software Settings) 1 used for application deployment, software updates, patches, etc. this is implemented using the Windows Installer technology which is based on a Microsoft Software Installation (MSI) package file 1 This topic is outside of scope of this course 7

8 Group Policy Concepts Group Policy allows the creation of one or more policies at each of the following Active Directory hierarchies Site Domain Organizational Unit (OU) Child OU(s) (an OU can be nested) Not all Group Policy options are available at each of the hierarchies The collection of settings that is manipulated as a unit is referred to as a Group Policy Object, or GPO Each individual policy setting can usually be specified with one of the following settings Not Configured / Not Defined Generally the default the policy will not be changed (it will remain as is ) Enabled the policy is in effect (is to be applied) Disabled the policy is not in effect (will not be applied) 8

9 Group Policy Concepts (continued) User Accounts and Computer Accounts are the only types of Active Directory objects that receive Group Policy Computer policies are obtained when a computer starts up or shuts down User policies are obtained when a user logs on or logs off A Group Policy Object has two halves A Computer Configuration half (also known as Computer policies) which affects only computer accounts A User Configuration half (also known as User policies) which affects only user accounts Computer policies affect all users who logon to the computer 1 User policies affect the user, regardless of which computer he/she logs on to 1 There are some individual policies located in both the Computer Configuration half and the User Configuration half If both halves are defined, then the GPO in the Computer Configuration usually takes precedence 1 See slide titled Group Policy Application Order for an example 9

10 Group Policy Processing Group Policy is processed hierarchically in the following order First - Local Second - Site users are affected by Site Policies only when they logon to computers located at a specific Site 1 Third - Domain Fourth - Organizational Unit (OU) Fifth (...) - Child OU (any nesting is done top to bottom ) By default, Group Policy is inherited Note: AG Group Policy Object tin a parent tdomain is not inherited it by a child Domain A Group Policy Object set at the Site will be in effect at the Domain or OU A Group Policy Object set at the Domain will be in effect at the OU A Group Policy Object set at an OU will be in effect at a child OU By default, for any conflicting policies, the one done last wins An OU will win over both the Domain and the Site A child OU will win over a parent OU The Domain will win over the Site 1 See slide titled Group Policy Site Processing for details 10

11 Group Policy Processing (continued) The Group Policy objects are applied based on the path leading to the 1 Computer object in Active Directory User object in Active Directory users receive the Site User polices based on the Site location of the computer they logon from The following table shows the events and actions that initiate Group Policy Action or Event Corresponding Group Policy That Gets Applied Computer configuration settings Startup scripts User configuration settings Based on the location in Active Directory of the Computer object Computer starts up Computer configuration settings Computer object User logs on User object Logon scripts User logs off Logoff scripts User object Computer shuts down Shutdown scripts Computer object 1 See slide titled Group Policy Order of Evaluation for details 11

12 Group Policy Processing (continued) At each Group Policy hierarchy, the following option exists No Override This takes precedence an administrator can set this at a higher level in the hierarchy to prevent administrators at a lower level of the hierarchy from overriding enterprise policy decisions this will prevent lower level Group Policy Objects from overriding a policy set at this level right click on item, and select Properties -> Group Policy -> Options... At the Domain and Organizational Unit, the following option exists Block Policy Inheritance this prevents higher h level l Group Policy Objects from affecting policies i set at this level right click on item, and check Properties -> Group Policy -> Block Policy Inheritance The No Override takes precedence over Block Policy Inheritance if the two are in conflict 12

13 Group Policy Application Order Group Policy processing order for Computer Configuration Site 1 Group Policy processing order for User Configuration Domain X OU A OU B Location of Computer Account OU C OU D Location of User Account 13

14 Group Policy Site Processing Group Policy at the Site is determined by the location of the computer account The Site Policy is applied from the Site that the computer is located in which is based on the TCP/IP subnet of the computer The Computer Configuration for the Site GPO is used when the computer is started The User Configuration for the Site GPO is used when a user logs onto that computer For example, if User Joe logs onto computer x in Site A The Computer Configuration s GPO for Site A is used when computer x is started The User Configuration s GPO for Site A is used when User Joe logs onto computer x Computer x User Joe s Account Site A Site Link Site B Domain 14

15 Group Policy Order of Evaluation Fullerton Site Group Policy Object GPO A acme.com Domain GPO B User Sally OU Engineering GPO C Computer \\HW4 Marketing OU OU Hardware GPO D GPO E Active Directory Object Location In Active Directory Order that Group Policy Object is Applied Computer \\HW4 OU Hardware A then B then C then D User Sally OU Marketing A then B then E 15

16 Group Policy Example Group Policy order of evaluation Site A Domain X OU 1 OU 2 Policy - Disable and Remove links to Windows Update Policy - Disable Changing gwallpaper p (No Override) No Screen Saver Policy - Enable Changing Wallpaper Screen Saver Policy - (Block Policy Inheritance) Policy Site A Domain X OU 1 OU 2 Windows Update Disabled Disabled Disabled Enabled Changing g Wallpaper p Enabled Disabled Disabled Disabled Screen Saver Enabled Disabled Enabled Enabled Policy in Effect For illustrative purposes only. The user receives these policies based on the computer location within the Site 16

17 Group Policy Objects in a Domain When a Domain is created, two Group Policy Objects are automatically created To simplify diagnosing ggroup Policy, they should be left unchanged Create additional Group Policy Objects at that level if you need additional policies The following table shows where Group Policy can be applied and default GPOs Active Directory Object Name Active Directory Group Policy Name of Default Group Policy Object Visible only with Advanced Object Supported? Features? <Name of Domain> Domain Yes Default Domain Policy 1 No Builtin Container No No Computers Container No No Domain Controllers OU Yes Default Domain No Controllers Policy 2 3 ForeignSecurityPrincipals Container No No LostAndFound Container No Yes Program Data 4 Container No Yes System Container No Yes Users Container No No 1 Same as Start Menu -> Programs -> Administrative Tools -> Domain Security Policy 2 Same as Start Menu -> Programs -> Administrative Tools -> Domain Controller Security Policy 3 The Domain Controller(s) must not be moved outside control of this GPO. Active Directory will fail if they are 4 Introduced with Windows Server

18 SYSVOL Share Is used to support some Active Directory infrastructure features, such as Logon scripts utilized by Potentially any public files available for the Domain Exists only on Windows 2003/2000 Domain Controllers %SystemRoot%\SYSVOL\sysvol (This is the default directory) This share is read only for end-users The NETLOGON share is located within the SYSVOL share on Windows 2003/2000 The SYSVOL share (indirectly) supports the same features provided by the NETLOGON share When a user logs on (authenticates to a Domain Controller), the SYSVOL share for that computer (Domain Controller) is used Windows automatically keeps the SYSVOL shares synchronized for all the Domain Controllers within a Domain using File Replication Service (FRS) The SYSVOL Share must be located on an NTFS partition/volume Due to the way FRS functions Because the SYSVOL share is implemented with NTFS Junction Points 18

19 The Group Policy Editor Administrators manage Group Policy by using a series of Microsoft Management Console (MMC) snap-ins These MMC snap-ins are available on Domain Controllers via Start Menu -> Programs -> Administrative Tools ->... You can install Group Policy Management Console (GPMC) to manage all aspects of Group Policy It was made available after the release of Windows Server 2003, and must be downloaded and installed separately 1 It can be used to manage Group Policy in Windows 2000 Domains Windows 2003 Domains It can be installed on a Windows 2003 Server It can be installed tlldon a Windows Wid XPProfessional computer 2 1 Refer to Resources slide for more details 2 You must have Service Pack 1 (or later) installed on the Windows XP Professional system 19

20 The Group Policy Editor (continued) You can install Windows Server 2003 Administration Tools to remotely manage Windows 2003 Domains and Windows 2000 Domains from Windows XP Professional computers 1 The Windows Server 2003 Administration Tools are included with the Windows Server 2003 family You can access the tools using the following methods from the \I386 directory on the Windows Server 2003 media, run the ADMINPAK.MSI installation program from the %SystemRoot%\system32 directory on the Windows 2003 Server, run the ADMINPAK.MSI MSI installation program You can install Windows 2000 Administration Tools to remotely manage Windows 2000 Domains from Windows 2000 Professional computers The Windows 2000 Administration Tools are included with Windows 2000 Server (family) From the \I386 directory on the Windows 2000 Server media, run the ADMINPAK.MSI installation program 1 You must have Service Pack 1 (or later) installed on the Windows XP Professional system 20

21 The Group Policy Editor (continued) The following MMC snap-ins are available for managing Group Policy for a Domain Active Directory Sites and Services this is used to manage Group Policy at the Site level right click on a Site, and select -> Properties -> Group Policy Active Directory Users and Computers this is used to manage Group Policy at the Domain and OU level right click on a Domain or OU, and select -> Properties -> Group Policy To edit the appropriate policies User policies are defined underneath User Configuration within Group Policy Computer policies are defined underneath Computer Configuration within Group Policy The following MMC snap-ins are available for managing g the local Security Policy on an individual computer or on Domain Controllers Local Security Policy this is used to manage the local Security Policy on non-domain Controllers Domain Controller Security Policy this is used to manage the local Security Policy on Domain Controllers 21

22 Resources Microsoft Knowledge Base (KB) pp (select Search Knowledge Base with Search For set to Article ID ) A Malicious User May Circumvent User Policy Article ID: Best tpractices for Sysvol lmaintenance Article ID: Default Behavior for Group Policy Extensions with Slow Link Article ID: Description of the Windows XP Professional Fast Logon Optimization Feature Article ID: Domain Security Policy in Windows 2000 Article ID: Expected System and Group Policy Behavior with Windows 2000 Clients Article ID: for Windows 2000 Professional Clients in Windows NT 4.0 Domain or Workgroups Article ID:

23 Resources (continued) Microsoft Knowledge Base (KB) pp (select Search Knowledge Base with Search For set to Article ID ) Group Policy Application Rules for Domain Controllers Article ID: How a Slow Link kis Detected t dfor Processing User Profiles and dgroup Policy Article ID: HOW TO: Delegate Administration of Article ID: HOW TO: Delegate Authority for Editing a Group Policy Object (GPO) Article ID: How to Enable User Environment Debug Logging in Retail Builds of Windows Article ID: How to Give Users Access to Group Policy Objects Article ID: HOW TO: How to Modify the Default Group Policy Refresh Interval Article ID:

24 Resources (continued) Microsoft Knowledge Base (KB) pp (select Search Knowledge Base with Search For set to Article ID ) How to Secure Windows in a Non-Domain Environment Article ID: HOW TO: Use the Group Policy Results Tool in Windows 2000 Article ID: Loopback Processing of Group Policy Article ID: Overview of Logon, Logoff, Startup, and Shutdown Scripts in Windows 2000 Article ID: Registry Settings for Folder Redirection in Windows Article ID: TechNet Support WebCast: Troubleshooting Group Policy and profile issues in a domain environment by using Userenv logging Article ID: Troubleshooting Group Policy Application Problems Article ID:

25 Resources (continued) Microsoft Knowledge Base (KB) pp (select Search Knowledge Base with Search For set to Article ID ) Troubleshooting Group Policy Client-Side Extension Behavior Article ID: Troubleshooting h Missing i SYSVOL and NETLOGON Shares on Windows 2000 Domain Controllers Article ID: Updates to Restricted Groups Behavior of User-Defined Local Groups Article ID: Upgrading Windows 2000 Group Policy for Windows XP Article ID: Using Secedit.exe to Force Group Policy to Be Applied Again Article ID:

26 Resources (continued) Microsoft Windows Server 2003 resources (select Technical Resources -> Technical Overviews, then choose Index of Windows Server 2003 Technical Articles ) Administering Group Policy with Group Policy Management Console select the section Management Services Introducing the Group Policy Management Console select the section Management Services Managing Windows XP Service Pack 2 Features Using Group Policy select the section Management Services Migrating GPOs Across Domains with GPMC select the section Management Services 26

27 Resources (continued) Microsoft Windows Server 2003 resources GPMC Scripting; Automate GPO management tasks F2DEC0C5A&displaylang=en User Data and Settings Management f e1bb98ac2d61&DisplayLang=en Using Administrative Template Files with Registry-Based Group Policy 927D-572A64DF844B&displaylang=en Windows Server 2003 Group Policy Infrastructure 27

28 Resources (continued) Microsoft Windows 2000 Server resources Implementing Registry-Based Group Policy white paper select Technical Resources -> How it Works -> Management Introduction to Windows 2000 Group Policy select Technical Resources -> >How itw Works -> >Management Step-by-Step Guide to Understanding the Group Policy Feature Set select Technical Resources -> Step-by-Step Guides -> Management Services Troubleshooting Group Policy in Windows 2000 white paper select Technical Resources -> How it Works -> Management User Data and Settings Management select Technical Resources -> Administration -> Management Services Windows 2000 Group Policy select Technical Resources -> How it Works -> Management 28

29 Resources (continued) Tools for Windows Server 2003 (and Windows XP Professional) Group ppolicy Management Console with Service Pack 1 (gpmc.msi) Group Policy Settings Reference (for Windows Server 2003 with Service Pack 1) (PolicySettings.xls) Microsoft Windows 2000 Server Resource Kit Group Policy Reference file name GP.CHM (compiled HTML Help file) this is a fully searchable help file with appropriate documentation links to Group Policy this helps out when you know there s a Group Policy that does what you want, but you just can t find the thing in the maze of 29

PLANNING AND DESIGNING GROUP POLICY, PART 1

PLANNING AND DESIGNING GROUP POLICY, PART 1 84-02-06 DATA SECURITY MANAGEMENT PLANNING AND DESIGNING GROUP POLICY, PART 1 Melissa Yon INSIDE What Is Group Policy?; Software Settings; Windows Settings; Administrative Templates; Requirements for Group

More information

Module 8: Implementing Group Policy

Module 8: Implementing Group Policy Module 8: Implementing Group Policy Contents Overview 1 Lesson: Implementing Group Policy Objects 2 Lesson: Implementing GPOs in a Domain 12 Lesson: Managing the Deployment of Group Policy 21 Lab: Implementing

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

Group Policy 21/05/2013

Group Policy 21/05/2013 Group Policy Group Policy is not a new technology for Active Directory, but it has grown and improved with every iteration of the operating system and service pack since it was first introduced in Windows

More information

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price. MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor

More information

Managing Windows Environments with Group Policy

Managing Windows Environments with Group Policy 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C

More information

Group Policy Infrastructure

Group Policy Infrastructure Group Policy Infrastructure Microsoft Corporation Published: April 2003 Updated: November 2004 Abstract Administrators use Group Policy to specify managed configurations for groups of computers and users.

More information

Fundamentals, Security, and the Managed Desktop

Fundamentals, Security, and the Managed Desktop Fundamentals, Security, and the Managed Desktop Second Edition Jeremy GVflostowit WILEY John Wiley & Sons, Inc. Contents Introduction xxv Chapter 1 Group Policy Essentials 1 Getting Ready to Use This Book

More information

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign

More information

THE POWER OF GROUP POLICY

THE POWER OF GROUP POLICY Specops Software presents: THE POWER OF GROUP POLICY By Danielle Ruest and Nelson Ruest The Power of Group Policy... 3 The Inner Workings of GPOs... 4 The Ideal Tool for Systems Management... 7 Your Next

More information

How To Write A Gpmc Script For A Gpc (Windows 2003) On A Windows 2000 (Windows 2000) On Your Computer Or Your Computer (Windows 3) On An Ipad Or Ipad (Windows 2) On The Macbook

How To Write A Gpmc Script For A Gpc (Windows 2003) On A Windows 2000 (Windows 2000) On Your Computer Or Your Computer (Windows 3) On An Ipad Or Ipad (Windows 2) On The Macbook Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000 Jeremy Moskowitz SVBEX" San Francisco London Introduction xviii Chapter 1 Group Policy Essentials 1 Getting Started

More information

MS 50255B: Managing Windows Environments with Group Policy (4 Days)

MS 50255B: Managing Windows Environments with Group Policy (4 Days) www.peaklearningllc.com MS 50255B: Managing Windows Environments with Group Policy (4 Days) Introduction In course you will learn how to reduce costs and increase efficiencies in your network. You will

More information

Group Policy Explained

Group Policy Explained Group Policy Explained Paul Semple psemple@rm.com *Group Policy is+ the ability for the Administrator to state a wish about the state of their Users environment once, and then rely on the system to enforce

More information

Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led

Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover

More information

Active Directory Software Deployment

Active Directory Software Deployment APPLICATION N0TE ST-0128 March 24, 2006 Product: Active Directory / PCM Deployment System version: ShoreTel 6 Active Directory Software Deployment Courtesy of: Dylan Moser with LANtelligence Inc. This

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

Module 5: Implementing Group Policy

Module 5: Implementing Group Policy Module 5: Implementing Group Policy Contents Overview 1 Lesson: Creating and Configuring GPOs 2 Lesson: Configuring Group Policy Refresh Rates and Group Policy Settings 16 Lesson: Managing GPOs 27 Lesson:

More information

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing MCTS Guide to Microsoft Windows 7 Chapter 13 Enterprise Computing Objectives Understand Active Directory Use Group Policy to control Windows 7 Control device installation with Group Policy settings Plan

More information

How To Implement A Group Policy Object (Gpo)

How To Implement A Group Policy Object (Gpo) IT Influencer Series Implementing Group Policy Objects 2004 GPO Introduction Your in-depth guide to understanding GPOs and how to implement them in your organization. Contents Group Policy Fundamentals

More information

Windows GPO Deep Dive

Windows GPO Deep Dive Windows GPO Deep Dive General Information on Group Policy Objects: The term Group Policy Object refers to the Group Policy, not the AD Object (Site, Domain, Organizational Unit) against which the policy

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

Windows Boston. Group Policy Group Policy Basics. Published 2007 Clyde G. Johnson, MCSE, A+

Windows Boston. Group Policy Group Policy Basics. Published 2007 Clyde G. Johnson, MCSE, A+ Windows Boston Group Policy Group Policy Basics Published 2007 Clyde G. Johnson, MCSE, A+ What can Group Policy manage Deploy software Security Settings Assign startup/shutdown and logon/logoff scripts

More information

MailStore Outlook Add-in Deployment

MailStore Outlook Add-in Deployment MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.

More information

Objectives. At the end of this chapter students should be able to:

Objectives. At the end of this chapter students should be able to: NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2

More information

50255: Managing Windows Environments with Group Policy

50255: Managing Windows Environments with Group Policy 50255: Managing Windows Environments with Group Policy Microsoft - Servidores Localidade: Lisboa Data: 01 Oct 2015 Preço: 1520 ( Os valores apresentados não incluem IVA. Oferta de IVA a particulares e

More information

Administering Group Policy with Group Policy Management Console

Administering Group Policy with Group Policy Management Console Administering Group Policy with Group Policy Management Console By Jim Lundy Microsoft Corporation Published: April 2003 Abstract In conjunction with Windows Server 2003, Microsoft has released a new Group

More information

Outpost Office Firewall

Outpost Office Firewall Technical Reference Outpost Office Firewall Office Firewall Software from Agnitum Abstract This document provides advanced technical information on administering Outpost Office Firewall in a corporate

More information

Expert Reference Series of White Papers. In the Trenches: Eight Tips-n-Tricks For Microsoft Windows Group Policy

Expert Reference Series of White Papers. In the Trenches: Eight Tips-n-Tricks For Microsoft Windows Group Policy Expert Reference Series of White Papers In the Trenches: Eight Tips-n-Tricks For Microsoft Windows Group Policy 1-800-COURSES www.globalknowledge.com In the Trenches: Eight Tips-n-Tricks for Microsoft

More information

WINDOWS 2000 Training Division, NIC

WINDOWS 2000 Training Division, NIC WINDOWS 2000 Active TE Directory Services WINDOWS 2000 Training Division, NIC Active Directory Stores information about objects on the network and makes this information easy for administrators and users

More information

Index. Special Characters

Index. Special Characters Index Special Characters 32-bit applications 367 64-bit applications 367 A Access Control Entry (ACE) 141 Access Control List (ACL) 254 account lockout policies 183 184 account security policies 183 184

More information

Active Directory. Users & Computers. Group Policies

Active Directory. Users & Computers. Group Policies Active Directory Users & Computers Policies Users & Computers domains domain trusted domains, trusting domains subdomains tree of domains forest of trees s s in Active Directory are directory objects that

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Desktop Authority and Group Policy Preferences

Desktop Authority and Group Policy Preferences Desktop Authority and Group Policy Preferences A ScriptLogic Product Positioning Paper 1.800.813.6415 www.scriptlogic.com Desktop Authority and Group Policy Preferences Introduction Group Policy Preferences

More information

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Partie Serveur 2008. Lab : Implement Group Policy. Create, Edit and Link GPOs. Lab : Explore Group Policy Settings and Features

Partie Serveur 2008. Lab : Implement Group Policy. Create, Edit and Link GPOs. Lab : Explore Group Policy Settings and Features Partie Serveur 2008 Implement a Group Policy Infrastructure This module explains what Group Policy is, how it works, and how best to implement Group Policy in your organization. Understand Group Policy

More information

How to monitor AD security with MOM

How to monitor AD security with MOM How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of

More information

Group Policy for Beginners

Group Policy for Beginners Group Policy for Beginners Microsoft Corporation Published: April 2011 Abstract Group Policy is the essential way that most organizations enforce settings on their computers. This white paper introduces

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Contacting ScriptLogic Contacting ScriptLogic ScriptLogic may be contacted about any questions, problems or concerns you might have at: ScriptLogic Corporation 6000 Broken Sound Parkway

More information

Log Management and Intrusion Detection

Log Management and Intrusion Detection Log Management and Intrusion Detection Dr. Guillermo Francia,, III Jacksonville State University Prerequisites Understand Event Logs Understand Signs of Intrusion Know the Tools Log Parser (Microsoft)

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows Server

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services About this Course This five-day instructor-led course provides to teach Active Directory Technology Specialists

More information

ms-help://ms.technet.2005mar.1033/winnetsv/tnoffline/prodtechnol/winnetsv/maintain...

ms-help://ms.technet.2005mar.1033/winnetsv/tnoffline/prodtechnol/winnetsv/maintain... Implementing Common Desktop Management Scenarios with the Group Policy Manage... Page 1 of 21 Windows Server 2003 Implementing Common Desktop Management Scenarios with the Group Policy Management Console

More information

SHARING FILE SYSTEM RESOURCES

SHARING FILE SYSTEM RESOURCES 1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions

More information

Module 7 Management. Section 7.1: WSUS. CIST2414 Microsoft Server Administrator. Summary. Windows Server 2008 Server Administrator

Module 7 Management. Section 7.1: WSUS. CIST2414 Microsoft Server Administrator. Summary. Windows Server 2008 Server Administrator Module 7 Management In Module 7 students will learn how to manage the server by implementing a patch management, optimizing server performance, and configuring event logs. They will also learn about using

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425C Course Length: 5 Days Course Overview This five-day course provides in-depth training on implementing,

More information

Guide to Securing Microsoft Windows 2000 Group Policy

Guide to Securing Microsoft Windows 2000 Group Policy Report Number: C4-007R-01 Guide to Securing Microsoft Windows 2000 Group Policy Network Security Evaluations and Tools Division of the Systems and Network Attack Center (SNAC) Author: Julie M. Haney Updated:

More information

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol... Page 1 of 16 Security How to Configure Windows Firewall in a Small Business Environment using Group Policy Introduction This document explains how to configure the features of Windows Firewall on computers

More information

Configuring the Windows XP SP2/Vista Firewall for UserLock

Configuring the Windows XP SP2/Vista Firewall for UserLock Configuring the Windows XP SP2/Vista Firewall for UserLock Due to the modification of the Firewall s activation setting, that occurs when Service Pack 2 is deployed on a XP workstation, all incoming network

More information

NetWrix Password Manager. Quick Start Guide

NetWrix Password Manager. Quick Start Guide NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...

More information

Group Policy Object. Heng Sovannarith heng_sovannarith@yahoo.com

Group Policy Object. Heng Sovannarith heng_sovannarith@yahoo.com Group Policy Object Heng Sovannarith heng_sovannarith@yahoo.com Group Policy is a method of controlling se?ng across your network. Group Policy consists of user and computer se?ng on all version of Windows

More information

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01 Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Details Course Outline Module 1: Introducing Active Directory Domain Services This module provides

More information

Windows 2008 Server DIRECTIVAS DE GRUPO. Administración SSII

Windows 2008 Server DIRECTIVAS DE GRUPO. Administración SSII Windows 2008 Server DIRECTIVAS DE GRUPO Administración SSII Group Policy A centralized approach to applying one or more changes to one or more users or computers Setting: Definition of a change or configuration

More information

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure (Exam 70-294) Table of Contents Course Overview... 2 Section 1.1: Introduction to Active Directory... 3 Section

More information

Policy and the Windows Server 2003 Group Policy Management Console

Policy and the Windows Server 2003 Group Policy Management Console Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Policy

More information

Implementing and Supporting Microsoft Windows XP Professional

Implementing and Supporting Microsoft Windows XP Professional Implementing and Supporting Microsoft Windows XP Professional Key Data Course #: 2272C Number of Days: 5 Format: Instructor-led The purpose of this course is to address the implementation and desktop support

More information

Configuring, Managing and Maintaining Windows Server 2008 Servers

Configuring, Managing and Maintaining Windows Server 2008 Servers Configuring, Managing and Maintaining Windows Server 2008 Servers MOC6419 About this Course This five-day instructor-led course combines five days worth of instructor-led training content from the Network

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Length: 5 Days Published: June 02, 2011 Language(s): English Audience(s): IT Professionals Level: 200

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course Number: 6425B Course Length: 5 Days Course Overview This five-day course provides to teach Active Directory Technology

More information

Quick Start Guide. IT Management On-Demand

Quick Start Guide. IT Management On-Demand 1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote

More information

Installation Guide - Client. Rev 1.5.0

Installation Guide - Client. Rev 1.5.0 Installation Guide - Client Rev 1.5.0 15 th September 2006 Introduction IntraNomic requires components to be installed on each PC that will use IntraNomic. These IntraNomic Client Controls provide advanced

More information

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6

More information

PC Power Down. MSI Deployment Guide

PC Power Down. MSI Deployment Guide PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install

More information

These guidelines can dramatically improve logon and startup performance.

These guidelines can dramatically improve logon and startup performance. Managing Users with Local Security and Group Policies 573. Disable user or computer settings in GPOs Each GPO consists of a user and a computer section. If there are no settings in either of those sections,

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers) Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 (Domain Member Servers and Domain Controllers) Symantec Enterprise Security Manager Baseline Policy

More information

Configuring and Troubleshooting Windows 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows 2008 Active Directory Domain Services About this Course Configuring and Troubleshooting Windows This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting Active Directory Domain

More information

6425C - Windows Server 2008 R2 Active Directory Domain Services

6425C - Windows Server 2008 R2 Active Directory Domain Services Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Introduction This five-day instructor-led course provides in-depth training on configuring Active Directory Domain Services

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Active Directory About this Course This five-day instructor-led course provides in-depth training on implementing, configuring, managing and troubleshooting (AD DS) in and R2 environments. It covers core

More information

70-640 R4: Configuring Windows Server 2008 Active Directory

70-640 R4: Configuring Windows Server 2008 Active Directory 70-640 R4: Configuring Windows Server 2008 Active Directory Course Introduction Course Introduction Chapter 01 - Installing the Active Directory Role Lesson: What is IDA? What is Active Directory Identity

More information

Understanding Group Policy Part 1

Understanding Group Policy Part 1 Understanding Group Policy Part 1 What Will We Cover? Group Policy concepts Creating test and staging environments Group Policy tools Helpful Experience Experience supporting Windows servers Experience

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

2. Using Notepad, create a file called c:\demote.txt containing the following information:

2. Using Notepad, create a file called c:\demote.txt containing the following information: Unit 4 Additional Projects Configuring the Local Computer Policy You need to prepare your test lab for your upcoming experiments. First, remove a child domain that you have configured. Then, configure

More information

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services www.etidaho.com (208) 327-0768 Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services 5 Days About this Course This five-day instructor-led course provides in-depth

More information

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS SonicOS User Identification Using the Domain Controller Security Log Contents Supported Platforms... 1 Event Viewer... 1 Configuring Group Policy to Enable Logon Audit... 2 Events in Security Log... 4

More information

ExecuTrain Course Outline Configuring & Troubleshooting Windows Server 2008 Active Directory Domain Services MOC 6425C 5 Days

ExecuTrain Course Outline Configuring & Troubleshooting Windows Server 2008 Active Directory Domain Services MOC 6425C 5 Days ExecuTrain Course Outline Configuring & Troubleshooting Windows Server 2008 Active Directory Domain Services MOC 6425C 5 Days Introduction This five-day instructor-led course provides in-depth training

More information

Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)

Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Who Should Attend This course is intended for Windows Server administrators who operate Windows Servers on a daily basis and want

More information

MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services

MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

Technical documentation: SPECOPS PASSWORD POLICY

Technical documentation: SPECOPS PASSWORD POLICY Technical documentation: SPECOPS PASSWORD POLICY By Johan Eklund, Product Manager, April 2011 Table of Contents 1 Overview... 1 1.1 Group Based Policy... 1 1.2 Extended password requirements... 2 1.3 Components...

More information

Stellar Active Directory Manager

Stellar Active Directory Manager Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly

More information

MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008

MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008 1 of 6 1/6/2010 3:23 PM MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008 This five-day instructor-led course combines five days worth of instructor-led training content from the Network

More information

Lesson Plans LabSim for Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans LabSim for Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans LabSim for Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Course Overview... 3 Section 0.1: Introduction... 5 Section 0.2:

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425 Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425 Course Outline Module 1: Introducing Active Directory Domain Services This module provides an overview of Active Directory

More information

Group Policy for. Healthcare Desktop Management. Prepared by Microsoft Version 1.0.0.0 Baseline

Group Policy for. Healthcare Desktop Management. Prepared by Microsoft Version 1.0.0.0 Baseline Group Policy for Healthcare Desktop Management Prepared by Microsoft First published 27 September 2007 Copyright This document and/or software ( this Content ) has been created in partnership with the

More information

Deployment of Keepit for Windows

Deployment of Keepit for Windows Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome

More information

Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials

Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials 2433: Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials (3 Days) About this Course

More information

Installing, Configuring, and Managing a Microsoft Active Directory

Installing, Configuring, and Managing a Microsoft Active Directory Installing, Configuring, and Managing a Microsoft Active Directory Course Outline Part 1: Configuring and Managing Active Directory Domain Services Installing Active Directory Domain Services Managing

More information

WORKING WITH COMPUTER ACCOUNTS

WORKING WITH COMPUTER ACCOUNTS 1 Chapter 8 WORKING WITH COMPUTER ACCOUNTS Chapter 8: WORKING WITH COMPUTER ACCOUNTS 2 CHAPTER OVERVIEW Describe the process of adding a computer to an Active Directory domain Create and manage computer

More information

6419: Configuring, Managing, and Maintaining Server 2008

6419: Configuring, Managing, and Maintaining Server 2008 6419: Configuring, Managing, and Maintaining Server 2008 Course Number: 6419 Category: Technical Duration: 5 days Course Description This five-day instructor-led course combines five days worth of instructor-led

More information

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2

The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2 Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Introduction to Administering Accounts and Resources Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives

More information

Setting Up, Managing, and Troubleshooting Security Accounts and Policies

Setting Up, Managing, and Troubleshooting Security Accounts and Policies 3 Setting Up, Managing, and Troubleshooting Security Accounts and Policies............................................... Terms you ll need to understand: Local user account Local group Complex password

More information

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Advanced Audit Policy Configurations for LT Auditor+ Reference Guide Contents WINDOWS AUDIT POLICIES REQUIRED FOR LT AUDITOR+....3 ACTIVE DIRECTORY...3 Audit Policy for the Domain...3 Advanced Auditing

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information