Free

Enterprise Group Policy for Security - Lab Report Example

Comments (0) Cite this document
Summary
(GPOs) group policy objects are used in configuring group policies that are subjected to domains, organizational units (OUs) and sites. Group policy maybe set or blocked to prevent it…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Enterprise Group Policy for Security
Read TextPreview

Extract of sample "Enterprise Group Policy for Security"

Administrators make use of group policies to control and configure user environment settings. (GPOs) group policy objects are used in configuring group policies that are subjected to domains, organizational units (OUs) and sites. Group policy maybe set or blocked to prevent it from being overridden.
Control local administrators group membership
Local administrative access granted to an end user is one of the most insecure settings. Even if the network is configured to deny access, the user can be able to perform nearly any action. Some of the actions that the user can be able to perform when allowed access to local administrative includes the following: Modification of any registry setting, modification permissions on any file or folder, modification of any settings of the system, including setting stored in files in the system folder and many others. Allowing users to run as administrators can lead to potential security attacks and breaches (Dean 97).
User configuration
From control panel right click on local groups and users and from the menu, click on new-local group and from the dialogue box that appears, into the group text box type administrators, then select “remove the current user” check box. Then select apply (Dean 107).
Reset local administrator password
It is essential to reset the administrator password since the user had the privileges of an administrative before restricting them from the local administrators group. If the password is reset simultaneously with the extraction of user account the user may never have a chance alter or know the new local administrator password (Thilagam 79).
How to configure
From the control panel right click on groups and local users. On the menu select new-local user and from the dialogue box that appears into the user name text box type in administrator then into password text box type in new password and confirm in password confirm text box. Then select apply (Thilagam 99).
UAC
User account control (UAC) offers a chance to facilitate security of the computer when an administrator and a user are logged in. It enhances protection against any virus or application that tries to write to protected/restricted areas of the computer (Rocha 123).
How to configure
Open network configuration/policies then select windows settings/security setting then local policies and select security options (Rocha 133).
Conclusion
Computer security is in a local network is very essential since it prevents both the computers and the user or administrator. The GPOs are in the frontline to ensure that the computers are fully protected against viruses and alteration of system files and folders by the users.
Works Cited
Dean, Tamara. Network+ Guide to Networks. Boston: Course technology/cengage learning, 2013. Print.
Rocha, Álvaro. Advances in Information Systems and Technologies. Berlin: Springer, 2013. Print.
Thilagam, P S. Advanced Computing, Networking and Security: International Conference, Adcons 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers. Berlin: Springer, 2012. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Enterprise Group Policy for Security Lab Report Example | Topics and Well Written Essays - 250 words”, n.d.)
Enterprise Group Policy for Security Lab Report Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1680898-enterprise-group-policy-for-security
(Enterprise Group Policy for Security Lab Report Example | Topics and Well Written Essays - 250 Words)
Enterprise Group Policy for Security Lab Report Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1680898-enterprise-group-policy-for-security.
“Enterprise Group Policy for Security Lab Report Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1680898-enterprise-group-policy-for-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Enterprise Group Policy for Security

Enterprise Networking and Security

...D will also be compromised. Moreover, if any employee or personnel plugs in the suspicious USB drive in one of the system, there is no mechanism or tools to monitor internal network threats, as it has been proved that internal threats are relatively more probable than external threats. Furthermore, there are no tools for demonstrating events and alerts associated with violation logs. In addition, there are no logical controls linked with the database, as SQL injection techniques have proven to exploit data from the database. Furthermore, for logical vulnerability there is an absence of Virtual local area networks. VLAN’s provide adequate security, “Virtual LAN (VLAN) refers to a logical network in which a...
12 Pages(3000 words)Assignment

Terrorist Group Profile and Homeland Security Policy

...?Running Head: Terrorist Group Profile and Homeland Security Policy Terrorist Group Profile and Homeland Security Policy Sulman Danyal Syed Introduction to Homeland Security, HMLS 302 Professor Mark Landahl April 01, 2011 Abstract This research paper provides a comprehensive account of a well-known terrorist group that goes by the name of Al-Qaeda. Discussion will focus primarily on the modus operandi of the said terrorist group and how they became notoriously known worldwide after the 9/11 incident. The data presented is based on the researches and studies made by experts in the field of terrorism. And this will be followed by policies established by the United States National Homeland Security regarding terrorism. The policies... that will...
11 Pages(2750 words)Term Paper

Database and Enterprise Application Security

...Database and Enterprise Application Security Latest developments in internet have evolved to an elevated standard of technology. At the present, more and more corporations are making use of the internet in order to carry out their business related tasks. Additionally, the web based systems and business applications have offered better support and facilities for the business and personal level. However, these facilities have also created some concerns regarding web based security and privacy. In this scenario, there is an awful need for implementing proper and appropriate mechanisms in order to ensure internet security. In this paper I will present a deep analysis of...
7 Pages(1750 words)Essay

Enterprise Info Security

...enterprise and considerate to cost to make management and administration easy. It’s very appropriate and easy for an organization to use an authentication system that is very scaleable that fits the financial and management capabilities of the entire organization. > An authentication system must be capable of implementing and enforcing security policies regarding password parameters (password aging, alphanumeric characters, character length, limitations, non-dictionary passwords, and so on). > It should also be mechanism independent and have the ability of authorize interfacing activities of the user and administration logins. This means that they should be able to authorize activities...
5 Pages(1250 words)Essay

Homeland Security-Policy Analysis

...as appropriate. The policy for common identification standard for contractors and federal workers based on HSPD-12 has its legal basis encompassed under five strategic objectives. These include: Prevention of Terrorist Attacks The prevention of terrorist attacks refocuses on terrorist groups such al Qaeda and the radical Islamist movements which have been a threat to the United States. It also focuses on enhancing domestic intellect capabilities while safeguarding civil liberties through the strengthening of the policies legal basis. In such conditions the HSPD-12 is capable of keeping most risky and illegally used technologies out of hands of terrorists as suggested by Forest (2008)....
7 Pages(1750 words)Essay

INTEREST GROUP AND POLICY

...groups comprises of the people with vested interests on how the government is planning to address a particular issue. They express engage the government on all phases of policy making by submitting proposals, participating in legislation, enlightening the beneficiaries on how the policy will impact on their lives and even demonstration and engaging the government in litigation if they feel aggrieved by the government actions regarding the policy issue being addressed. The policy issue of focus in this case is health care. Health care issue According to Steffen et al, social security is redistributive policy as it aims at...
3 Pages(750 words)Essay

Social Policy (Group Work)

...Full Social Policy (Group Work) Introduction Importance of a Group and Knowledge in Group Dynamics This paper aims to show the importance of a Group in every individual’s personal and social well-being (Myers: 597). The social policy of Group work and the theory of Group Dynamics are also the highlights of this paper as they are the main focus of discussion. Moreover, this paper aims to recommend applying the knowledge of the mentioned theories into practice. The Aims of a Group To understand the essence or the meaning of ‘Group work’, the concept of a ‘Group’ must first be defined. In so doing, a group refers to “2 or more individuals” whom by their social relationships are considered to be “connected to each other (Myers: 286... ).” This...
6 Pages(1500 words)Essay

Enterprise Info Security

...of authentication and login process. > An authentication service must scaleable to the entire enterprise and considerate to cost to make management and administration easy. It’s very appropriate and easy for an organization to use an authentication system that is very scaleable that fits the financial and management capabilities of the entire organization. > An authentication system must be capable of implementing and enforcing security policies regarding password parameters (password aging, alphanumeric characters, character length, limitations, non-dictionary passwords, and so on). > It should also be mechanism independent and have the ability of authorize interfacing activities...
8 Pages(2000 words)Essay

Enterprise security plan

...Enterprise Security Plan al Affiliation) The paper is a preparation of MEMATECH Solutions Limited security plan proposal. The proposal covers and discusses the ten areas of ISCBK (Information Security Common Body of Knowledge) that incorporates the various groups of information security. It also touches on the success principles and the information security. In addition, the proposal outlines the planning guidelines towards the aims, security policies, and standard taxonomy. The set policies and guidelines comply with rules and standards of HIPAA...
5 Pages(1250 words)Research Paper

Group Policy

...Group Policy Question one Group policy is a feature that is found in the Microsoft Windows NT operating systems to enhance the working environment of various user accounts and their systems’ accounts. Organizations can benefit from group policy in various ways: Ensures that there is ease of management in the organization: it becomes easy to manage a network when the users are connected through a given group policy. For instance, in the event that the employees in an organization are using various websites, which are costly for the organization, the organization can come up with policies to restrict access to such websites. Security: due to the various security breaches evident, it is important to use the group policy to curb... that. For...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Lab Report on topic Enterprise Group Policy for Security for FREE!

Contact Us