Free

Group Policy - Coursework Example

Comments (0) Cite this document
Summary
Group policy is a feature that is found in the Microsoft Windows NT operating systems to enhance the working environment of various user accounts and their systems’ accounts. Organizations can benefit from group policy in various ways:
Ensures that there is ease of management…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Group Policy
Read TextPreview

Extract of sample "Group Policy"

Group Policy Question one Group policy is a feature that is found in the Microsoft Windows NT operating systems to enhance the working environment of various user accounts and their systems’ accounts. Organizations can benefit from group policy in various ways:
Ensures that there is ease of management in the organization: it becomes easy to manage a network when the users are connected through a given group policy. For instance, in the event that the employees in an organization are using various websites, which are costly for the organization, the organization can come up with policies to restrict access to such websites.
Security: due to the various security breaches evident, it is important to use the group policy to curb that. For instance, an organization can experience security breach due to the employees using very weak passwords. With the group policy, it is easy for an organization to set certain requirements for the users to follow when setting passwords.
Cost and time: it enables installation or upgrading of software from one location and ensures that every machine is serviced simultaneously (Moskowitz, Hicks, & Burchill, 2013). Moreover, it is also possible to conduct the upgrade outside the business hours to avoid disruption of the work schedule.
References
Moskowitz, J., Hicks, J., & Burchill, A. (2013). Group policy . Chichester: John Wiley and Sons.
Question two
There are various potential pitfalls. One, because the SQL server is configured for windows authentication only, it becomes difficult to manage data in all the other relational databases. Moreover, the database can only be accessed from within the local area network. Beyond that, it becomes inaccessible. Lack of firewalls between the servers and the applications of the client becomes difficult to get into the client’s database and gather the additional information required. The types of data elements that will be difficult to capture are the compound data elements. These are data elements consisting of three field’s control, component count field together with the total length of the required data elements. The reason is due to lack of firewall between the server and the applications of the clients. It is able to establish a boundary between a trusted and un-trusted network (Moraes, 2011). Thus, the user is not restricted by any set of rules applicable and can therefore conceal the compound data elements in such a way that it becomes difficult for them to be found.
References
Moraes, A. M. (2011). Cisco Firewalls. New York: Cisco Press.
Question three
The main considerations include enhancing security. Among the 120 end users, there can be some using some practices that can lead to breach of security for the organization. This can be quite costly since the organization can lose the confidentiality of its data in the process. Thus, enhancing security would be the first consideration by coming up with a set of guidelines which the users have to follow in the process of using the computer systems. Moreover, other users use the organizational systems for their own personal gain. This, as a result, adds into the cost of the organization (Stanek, 2009). While implementing the group policy, I would ensure that all the users follow the required guidelines on website restrictions. That is in regard to what websites that they are restricted to open.
References
Stanek, W. R. (2009). Windows® Group Policy Administrators Pocket Consultant. New York: OReilly Media, Inc. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Group Policy Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Group Policy Coursework Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1674254-group-policy
(Group Policy Coursework Example | Topics and Well Written Essays - 500 Words)
Group Policy Coursework Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1674254-group-policy.
“Group Policy Coursework Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1674254-group-policy.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Group Policy

Terrorist Group Profile and Homeland Security Policy

...?Running Head: Terrorist Group Profile and Homeland Security Policy Terrorist Group Profile and Homeland Security Policy Sulman Danyal Syed Introduction to Homeland Security, HMLS 302 Professor Mark Landahl April 01, 2011 Abstract This research paper provides a comprehensive account of a well-known terrorist group that goes by the name of Al-Qaeda. Discussion will focus primarily on the modus operandi of the said terrorist group and how they became notoriously known worldwide after the 9/11 incident. The data presented is based on the researches and studies made by experts in the field of terrorism. And this will be followed by policies established by the United States National Homeland Security regarding terrorism. The policies... that will...
11 Pages(2750 words)Term Paper

Planning Group Policy Software Deployments

...Planning Group Policy Software Deployments Question 2 (a) Any software developer is aware of system development life cycle. The process whereby security measure is included in every phase of system development life cycle makes the whole development process holistic. It assists in ensuring that the cost that the company incurs is relatively low since the procedures that already exist in the company are utilized. The confidentiality of information There are four security features that can be integrated to ensure that there is effective risk management that is based on system development life cycle. These are independencies, deliverables, milestones and control gates. The four features ensure that there is...
10 Pages(2500 words)Term Paper

United Health Group and the Health Reform Policy

...? United Health Group and the Health Reform Policy United Health Group and the Health Reform Policy United health group dominates the insurance company in the united sates with branches across all the states and additional 33 countries. The group ranks among the largest three insurance companies in the United States that offer health insurance. The group strives to provide all people an access to quality health care. The passing of the health care reform act is one of the events that have had measurable effects on the majority of American health insurance industry. This paper will analyze the activities of the group, its strengths, and weaknesses and highlight how health insurance reforms will affect the group’s standing. Business... in the...
6 Pages(1500 words)Essay

INTEREST GROUP AND POLICY

...? of Interest Group and Policy Essay Domestic policy refers to the procedures and actions that a nation through its government of the day uses to sort out its internal affairs (Steffen Schmidt et al 2012-2013). The domestic policy will range from how to solve insignificantly simple problems to how to handle a n issue of a huge magnitude to the nation. In a nut shell, domestic policy entails setting laws and regulations to govern the internal affairs of the nation (Steffen Schmidt et al 2012-2013). The domestic policies are regulatory, redistributive and promotional policy. In setting the policies a...
3 Pages(750 words)Essay

Planning Group Policy Software Deployments

...? Planning Group Policy Software Deployment [Pick the Installation and Maintenance is an important part of Information Technology functions for architectural and system maintenance. Since installations are approved under administration privileges, advanced software installations bring along the capacity of utilizing extra abilities. The framework of development abridges and governs the software for modifying existing packages (Sun, Sekar, Liang, Venkatakrishnan, 2009). Software Installation can be used in combination with operating systems which is a convenient option for end user (Chien, 2005). And as the systems advance, so do their working limits. 1. Efficient Installation of Software Using Each Phase...
15 Pages(3750 words)Assignment

Social Policy (Group Work)

...Full Social Policy (Group Work) Introduction Importance of a Group and Knowledge in Group Dynamics This paper aims to show the importance of a Group in every individual’s personal and social well-being (Myers: 597). The social policy of Group work and the theory of Group Dynamics are also the highlights of this paper as they are the main focus of discussion. Moreover, this paper aims to recommend applying the knowledge of the mentioned theories into practice. The Aims of a Group To understand the essence or the meaning of ‘Group work’, the concept of a ‘Group’ must first be defined. In so doing, a group refers to “2 or more individuals” whom by their social relationships are considered to be “connected to each other (Myers: 286... ).” This...
6 Pages(1500 words)Essay

Critically examine the characteristics,tactics, opponents and policy impact of the NRA(National Riffle Assoc) - interest group operating in the USA today

...guns and this reason has made the organization to set up policies meant to go against the amendment. NRA also required that people who own guns at home should either unload or keep it away from children. As an interest group, NRA has several impacts on elections. The empirical evidence shows some direct and measurable effects. This was first detected in the 1994 elections where the organization had special list of names about who was to posses a gun legally. These published names were also meant to show that the kind of leader they supported in the election had to address the issue of possession of guns in the country. The results of the elections showed that many of the leaders that NRA supported won...
9 Pages(2250 words)Essay

Identify a lobbying group and critically evaluate the impact they have had on either a specific tourism initiative or general tourism policy

...Identify A Lobbying Group And Critically Evaluate The Impact They Have Had On Either A Specific Tourism Initiative Or General Tourism Policy. Table of Contents Critical Evaluation of the Impact 3 Sustainable Tourism Policy of ABTA 4 “Travelife” Certified 4 Role of ABTA in the Expansion of Tourism 5 Animal Welfare Programs by ABTA 6 Conclusion 6 References 8 Introduction Association of British Travel Agents (ABTA) is one of the prominent lobbying group and they are playing a major role in the tourism industry of the United Kingdom. It is considered as the largest association of travel and tourism in the United Kingdom. It acts as a representative of the travel industry to...
4 Pages(1000 words)Essay

Enterprise Group Policy for Security

...Administrators make use of group policies to control and configure user environment settings. (GPOs) group policy objects are used in configuring group policies that are subjected to domains, organizational units (OUs) and sites. Group policy maybe set or blocked to prevent it from being overridden. Control local administrators group membership Local administrative access granted to an end user is one of the most insecure settings. Even if the network is configured to deny access, the user can be able to perform nearly any action. Some of the actions that the user can be able to perform...
1 Pages(250 words)Lab Report

Practical Aspects in Early Drug Development

20 Pages(5000 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Group Policy for FREE!

Contact Us