StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Windows PowerShell and Security Configuration Wizard - Coursework Example

Cite this document
Summary
The paper "Windows PowerShell and Security Configuration Wizard" is a brilliant example of coursework on information technology. Windows PowerShell is a .NET-based framework from Microsoft that is used for automating and configuring management tasks. It is essentially a replacement for command prompt and VBScript…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Windows PowerShell and Security Configuration Wizard
Read Text Preview

Extract of sample "Windows PowerShell and Security Configuration Wizard"

The paper "Windows PowerShell and Security Configuration Wizard" is a brilliant example of coursework on information technology. Windows PowerShell is a .NET-based framework from Microsoft that is used for automating and configuring management tasks. It is essentially a replacement for command prompt and VBScript. It comprises a command-line shell with accompanying scripting language (Wilson, 2013). Some of the functions of PowerShell include accessing USB devices installed on multiple computers within one network, running time-consuming tasks in the background, and terminating programs that take long to respond. In addition, it can be used to find specific information from other computers in the same network (Microsoft Corporation, 2013).

Windows PowerShell is used in administrative roles that require the elimination of repetitive tasks, which are tedious to carry out on several computers. The program allows users to automate and simplify tiresome and repetitive tasks through the creation of scripts and a combination of multiple commands. PowerShell is beneficial because it displays useful information that may not be available on a typical user interface. It is also helpful because it can accomplish mundane tasks quickly (Microsoft Corporation, 2013).
Security Configuration Wizard
Security Configuration Wizard (SCW) is a wizard that enables a computer administrator to create security policies in Windows. The security policy created is typically an XML file; it configures network security, services, audit policy, and specific registry values. Because SCW is a role-based tool, consumers can use it to create policies that enable firewall rules, services, and customized settings that can allow selected servers to perform specific roles. For instance, SCW can function as a domain controller (Garfias, 2005).
There are four major benefits of using SCW. First, it has advanced security features that enhance the functionality of the Windows firewall. Second, it disables unnecessary services in a system. Third, it does not interfere with the essential components of a server, which can affect how a server performs specific roles. Lastly, it allows users to deploy SCW-generated security policies using Group Policy (Microsoft Corporation, n.d.). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Windows PowerShell and Security Configuration Wizard Coursework, n.d.)
Windows PowerShell and Security Configuration Wizard Coursework. https://studentshare.org/information-technology/1885895-u2-research-project
(Windows PowerShell and Security Configuration Wizard Coursework)
Windows PowerShell and Security Configuration Wizard Coursework. https://studentshare.org/information-technology/1885895-u2-research-project.
“Windows PowerShell and Security Configuration Wizard Coursework”. https://studentshare.org/information-technology/1885895-u2-research-project.
  • Cited: 0 times

CHECK THESE SAMPLES OF Windows PowerShell and Security Configuration Wizard

Windows System Admin Assignment

Also look for data swap files, unallocated space and other this is called carving files with windows.... o enable the RDP service on windows Server 2003 follow the next steps:1.... … $strusr1 = "Seinfeld"$strusr2 = "Barry"$strusr3 = "Steve"$strusr4 = "Judith"$newuser1 = $target....
10 Pages (2500 words) Math Problem

Security Breaches in UCLA

… Historical AnalysisDefinition of termsWhen we talk about information security breaches, we look at various important aspects and factors that can amount to a security breach.... In the analysis of information security breaches we have to define these Historical AnalysisDefinition of termsWhen we talk about information security breaches, we look at various important aspects and factors that can amount to a security breach....
18 Pages (4500 words) Assignment

Activities for Systems Security

As a consequence, a number of issues with respect computer and data/information security are becoming imminent coupled by the efficiency of these IT resources.... It is therefore worth to note that computer systems security controls are important in today's world of computing.... As earlier mentioned, the security IT security issues of concern revolves around three main areas; physical, human, and electronic.... Physical security comes into focus as the computer equipment and other resources may be stolen by the staff, students, and/or other employees within the institution....
11 Pages (2750 words) Essay

Loganville Window Treatments: Fundamentals Supply Chain Operations

… The paper “Fundamentals Supply Chain Operations and the Effects of Customization in Loganville Window Treatment Company”  is a  convincing example of the case study on management.... Faced with stiff competition from cheaper China products imported into the country, Loganville Window Treatments had to rethink their operations in order to continue competing in the market....
8 Pages (2000 words) Case Study

Basic Defense Methods in Information Systems

This paper will analyze two network security tools i.... Although studies on how to boost security are being conducted including investigations on complex methods of authentication, Application of password methods continue to be the main technique of validating Information system users.... espite both reported and unreported security breaches in computer networks, Validation and authentication of individuals using networks continue to trouble network and information security experts....
8 Pages (2000 words) Coursework

Microsofts Windows 8 Big Secret

… The paper "Microsoft's windows 8 Big Secret" is a great example of a Marketing Case Study.... I have chosen a recently released operating system by the company; windows 8.... nbsp;   The paper "Microsoft's windows 8 Big Secret" is a great example of a Marketing Case Study.... I have chosen a recently released operating system by the company; windows 8.... It is very different in looks and functionality as compared to its predecessor; windows &....
12 Pages (3000 words) Case Study

Wizard Home Loans Company's Insurance

… The paper "wizard Home Loans Company's Insurance" is a good example of a marketing case study.... wizard Home Loans was established by Mark Bouris in 1986 as a non-bank mortgage lender.... By 2006, wizard had become the leading non-bank mortgage lender in Australia, with around 250 branches across the country.... The paper "wizard Home Loans Company's Insurance" is a good example of a marketing case study.... wizard Home Loans was established by Mark Bouris in 1986 as a non-bank mortgage lender....
12 Pages (3000 words) Case Study

Culture Change at Heinz Australia under Widdows Leadership

… The paper "Culture Change at Heinz Australia under Widdows Leadership" is a perfect example of a management case study.... nbsp;Connecting the situation with the cultural web, the paradigm culture of the company can be described to encapsulate low morale among employees as a result of low motivation....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us