StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Enterprise Group Policy for Security - Lab Report Example

Cite this document
Summary
(GPOs) group policy objects are used in configuring group policies that are subjected to domains, organizational units (OUs) and sites. Group policy maybe set or blocked to prevent it…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Enterprise Group Policy for Security
Read Text Preview

Extract of sample "Enterprise Group Policy for Security"

Administrators make use of group policies to control and configure user environment settings. (GPOs) group policy objects are used in configuring group policies that are subjected to domains, organizational units (OUs) and sites. Group policy maybe set or blocked to prevent it from being overridden.Control local administrators group membershipLocal administrative access granted to an end user is one of the most insecure settings. Even if the network is configured to deny access, the user can be able to perform nearly any action.

Some of the actions that the user can be able to perform when allowed access to local administrative includes the following: Modification of any registry setting, modification permissions on any file or folder, modification of any settings of the system, including setting stored in files in the system folder and many others. Allowing users to run as administrators can lead to potential security attacks and breaches (Dean 97). User configurationFrom control panel right click on local groups and users and from the menu, click on new-local group and from the dialogue box that appears, into the group text box type administrators, then select “remove the current user” check box.

Then select apply (Dean 107). Reset local administrator passwordIt is essential to reset the administrator password since the user had the privileges of an administrative before restricting them from the local administrators group. If the password is reset simultaneously with the extraction of user account the user may never have a chance alter or know the new local administrator password (Thilagam 79).How to configureFrom the control panel right click on groups and local users. On the menu select new-local user and from the dialogue box that appears into the user name text box type in administrator then into password text box type in new password and confirm in password confirm text box.

Then select apply (Thilagam 99).UACUser account control (UAC) offers a chance to facilitate security of the computer when an administrator and a user are logged in. It enhances protection against any virus or application that tries to write to protected/restricted areas of the computer (Rocha 123).How to configureOpen network configuration/policies then select windows settings/security setting then local policies and select security options (Rocha 133). ConclusionComputer security is in a local network is very essential since it prevents both the computers and the user or administrator.

The GPOs are in the frontline to ensure that the computers are fully protected against viruses and alteration of system files and folders by the users.Works CitedDean, Tamara. Network+ Guide to Networks. Boston: Course technology/cengage learning, 2013. Print.Rocha, Álvaro. Advances in Information Systems and Technologies. Berlin: Springer, 2013. Print.Thilagam, P S. Advanced Computing, Networking and Security: International Conference, Adcons 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers.

Berlin: Springer, 2012. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Enterprise Group Policy for Security Lab Report Example | Topics and Well Written Essays - 250 words”, n.d.)
Enterprise Group Policy for Security Lab Report Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1680898-enterprise-group-policy-for-security
(Enterprise Group Policy for Security Lab Report Example | Topics and Well Written Essays - 250 Words)
Enterprise Group Policy for Security Lab Report Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1680898-enterprise-group-policy-for-security.
“Enterprise Group Policy for Security Lab Report Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1680898-enterprise-group-policy-for-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Enterprise Group Policy for Security

W4-Policy, Team, and Information Technology Differences

This essay declares that designing a new set of information systems for an organization is a real challenge in today's highly complex and diverse manner in which most companies operate, trying to maximize on customer satisfaction and enhancing profits.... hellip; According to the report companies constantly lay emphasis on smoothing several areas of work and emphasize the need to streamline organizational policies and procedures such that every individual responsibility within an organization can be performed in a clear and concise fashion using the least possible resources, effort and time....
7 Pages (1750 words) Essay

Some Macroeconomic Issues

Spillover benefits refer to both costs and/or benefits that individuals or groups of people reap through the production or consumption of goods and serves, although they are these person(s) do not take part in decisions that aid the process of production or consumption.... These… ts and benefits result from both over or under-consumption of goods and services and over or underproduction of goods and services (Gupta, Mandal & Gupta, 2008)....
5 Pages (1250 words) Essay

Social Capital and Political Fantasy

hellip; The author states that these were the green jobs for green growth policy, small business bond scheme policy, and apprenticeship for the modern economic policy.... This is to be done through prioritizing the budget and fiscal policy in maintaining a stable monetary value and a governable budget deficit in the country.... The trade policy under this macro-level was said to have promoted active integration either by general or selective liberalization of imports....
4 Pages (1000 words) Assignment

Department of Homeland Security Issues

For those who deal with the private enterprises, security concerns plays a major role for the protection of critical infrastructure and key resources (CIKR).... hellip; The paper will discuss how Department of Homeland security address state, local, tribal, and territorial (SLTT) government, private enterprises, and Many private enterprises partner with the Department of Homeland security to make sure that mitigation of threats is achieved as well as to defend themselves against threats....
3 Pages (750 words) Essay

Importance of Information Security Policy

This coursework "Importance of Information security Policy" focuses on Information security policy that ensures the credibility of information by safeguarding it from unauthorized infiltration.... The importance of information security policy is essential to all business models.... nbsp;… Information security policy is a compilation of guidelines, procedures and processes, which ensure the safety of information in a business or an organization....
9 Pages (2250 words) Coursework

The Reason for a Company to go to an Enterprise Solution

Enterprise Solutions enable business enterprises and companies to retrieve and disseminate data throughout the organization, as well as use application servers, software solutions, and data management solutions to control flow of data, manage security of data, and monitor network services.... usiness solutions for implementing an inherently distributed system revolve around an application server or servers that provide copious services, including distributed transactions, state tracking, database services, fault tolerance management, load balancing and clustering, directory and naming services, and security (Robinson, 2011)....
11 Pages (2750 words) Literature review

Policy, Team and Information Technology

This case study "policy, Team and Information Technology" is intended to discuss the differences that exist among policy, team and information technology in the departmental and enterprise information systems groups in an organization.... nbsp;The policy refers to the principles formulated by the management entities of an organization to be followed by everyone.... The policy enforcement may be jeopardized because the changes in question may seem necessary to the top management, but the individuals down at the departmental levels may be out of touch with them....
7 Pages (1750 words) Case Study

The Global Communication Enterprises Strategy on Information Security

The paper "The Global Communication Enterprises Strategy on Information security" aims to share the GCE strategy on information security.... The main concern is on how information security within GCE will help the organization give protection to its newly developed product from its competitors.... The organization's administration should be structured in such a way that a relationship with external parties promotes an effective management policy to all information security aspects in the organization....
11 Pages (2750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us