StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Group Policy - Coursework Example

Cite this document
Summary
Group policy is a feature that is found in the Microsoft Windows NT operating systems to enhance the working environment of various user accounts and their systems’ accounts. Organizations can benefit from group policy in various ways:
Ensures that there is ease of management…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Group Policy
Read Text Preview

Extract of sample "Group Policy"

Group Policy Question one Group policy is a feature that is found in the Microsoft Windows NT operating systems to enhance the working environment of various user accounts and their systems’ accounts. Organizations can benefit from group policy in various ways: Ensures that there is ease of management in the organization: it becomes easy to manage a network when the users are connected through a given group policy. For instance, in the event that the employees in an organization are using various websites, which are costly for the organization, the organization can come up with policies to restrict access to such websites.

Security: due to the various security breaches evident, it is important to use the group policy to curb that. For instance, an organization can experience security breach due to the employees using very weak passwords. With the group policy, it is easy for an organization to set certain requirements for the users to follow when setting passwords.Cost and time: it enables installation or upgrading of software from one location and ensures that every machine is serviced simultaneously (Moskowitz, Hicks, & Burchill, 2013).

Moreover, it is also possible to conduct the upgrade outside the business hours to avoid disruption of the work schedule.ReferencesMoskowitz, J., Hicks, J., & Burchill, A. (2013). Group policy . Chichester: John Wiley and Sons.Question two There are various potential pitfalls. One, because the SQL server is configured for windows authentication only, it becomes difficult to manage data in all the other relational databases. Moreover, the database can only be accessed from within the local area network.

Beyond that, it becomes inaccessible. Lack of firewalls between the servers and the applications of the client becomes difficult to get into the client’s database and gather the additional information required. The types of data elements that will be difficult to capture are the compound data elements. These are data elements consisting of three field’s control, component count field together with the total length of the required data elements. The reason is due to lack of firewall between the server and the applications of the clients.

It is able to establish a boundary between a trusted and un-trusted network (Moraes, 2011). Thus, the user is not restricted by any set of rules applicable and can therefore conceal the compound data elements in such a way that it becomes difficult for them to be found. ReferencesMoraes, A. M. (2011). Cisco Firewalls. New York: Cisco Press.Question three The main considerations include enhancing security. Among the 120 end users, there can be some using some practices that can lead to breach of security for the organization.

This can be quite costly since the organization can lose the confidentiality of its data in the process. Thus, enhancing security would be the first consideration by coming up with a set of guidelines which the users have to follow in the process of using the computer systems. Moreover, other users use the organizational systems for their own personal gain. This, as a result, adds into the cost of the organization (Stanek, 2009). While implementing the group policy, I would ensure that all the users follow the required guidelines on website restrictions.

That is in regard to what websites that they are restricted to open.ReferencesStanek, W. R. (2009). Windows® Group Policy Administrators Pocket Consultant. New York: OReilly Media, Inc.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Group Policy Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Group Policy Coursework Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1674254-group-policy
(Group Policy Coursework Example | Topics and Well Written Essays - 500 Words)
Group Policy Coursework Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1674254-group-policy.
“Group Policy Coursework Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1674254-group-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Group Policy

Windows 7 Ultimate Deployment

Creating Group Policy objects for the network administrator is provided for by the group console management console and local Group Policy editor features on windows that enables an administrator to edit Group Policy objects, work with Group Policy objects as well as delegate them, Windows 7 Ultimate provides a troubleshooter for fixing IT problems.... Group Policy Management for IT pros.... He also needs to know of the ease of creation of a network and connections of additional hardware such as printers using the home group feature....
7 Pages (1750 words) Assignment

Network Infrastructure Planning

Traverse Folder Permission only takes place when user or group lacks Bypass Traverse Checking right in the Group Policy snap-in (Bruce & Smith, 2011).... NTFS has Everyone group that has permission for Bypass Checking user right.... Network Infrastructure Planning Name Institution Date Network Infrastructure Planning Permissions are the core component of server security architecture that can be applied to manage the process of authenticating groups, users and computers to have access to files in a network (Bruce & Smith, 2011)....
3 Pages (750 words) Research Paper

Managing Disk and Object Security and Users and Groups

That's why the easiest way for both administrators and users, is to use the Group Policy software installation to assign/publish Office 2003 installation files.... The paper "Managing Disk and Object Security and Users and Groups" tells us about installing office 2003 and proprietary applications....
5 Pages (1250 words) Essay

U5 Research Project

Group Policy is one of the characteristics of Windows operating system which enables the user to control the work domain of computer accounts (Technet.... This feature is used to centralize the management of operating system, applications and user settings in… In Windows, all the settings that define and govern the behavior for a particular group are altogether known as Group Policy object (GPO) An overview to Group policies and GPO, and comparison to Encrypting File System (EFS) and BitLocker drive encryption Institute Group Policyand GPOGroup policy is one of the characteristics of Windows operating system which enables the user to control the work domain of computer accounts (Technet....
1 Pages (250 words) Coursework

Enterprise Group Policy for Security

(GPOs) Group Policy objects are used in configuring group policies that are subjected to domains, organizational units (OUs) and sites.... Group Policy maybe set or blocked to prevent it… Local administrative access granted to an end user is one of the most insecure settings.... (GPOs) Group Policy objects are used in configuring group policies that are subjected to domains, organizational units (OUs) and sites.... Group Policy maybe set or blocked to prevent it from being overridden....
1 Pages (250 words) Lab Report

Group Policy Software Deployments and GPOs, and Active Directory Maintenance and Disaster Recovery

The paper "Group Policy Software Deployments and GPOs, and Active Directory Maintenance and Disaster Recovery" discusses that the process of restoring a deleted file in windows 2008 is simplified in such a way that the procedures that are tedious in the previous versions of windows are eliminated....
10 Pages (2500 words) Assignment

Building a Secure Computer System

Group Policy objectives assist the user or an administrator to a system to keep the system secure such that no irresponsible or malicious individuals get access to the data.... In this section, we will dwell on how the use of Group Policy objectives has been used to achieve various security entities in the computer networks of the spark computer industry.... Group Policy objectives have been used in the computer industry to help get some windows users to control the registry of the target object, the security of the new technology file system, security and audit policy, installation of software, scripts for logon and logoff and so much more....
9 Pages (2250 words) Lab Report

Basic Operating System Security for Spark Computer

Group Policy objectives in the windows environment usually assist the user or the administrator to a system to keep the system secure such that no irresponsible or malicious individuals get access to the data.... Section I Report on the application of GPOs (Group Policy Objects) AbstractBeing the core of the industry today, computers and computer use have been on the verge of increase by the day.... System securityThis segment focuses on how the implementation of Group Policy objectives has constantly been used in the Windows environment to achieve various security units in the world of computer networks in many industries....
12 Pages (3000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us