05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

F16us05<br />

16-9<br />

In the console window, Windows displays the Security Configuration And Analysis,<br />

as shown in Figure 16-5.<br />

Figure 16-5 Add the Security Configuration And Analysis snap-in to a console.<br />

7. In the console tree, right-click Security Configuration And Analysis, and then click<br />

Open Database.<br />

8. In the Open Database dialog box, type the name of a database to create, and then<br />

click Open.<br />

Windows displays the Import Template dialog box.<br />

9. In the Import Template dialog box, select the customized template you have created,<br />

and then click Open.<br />

Windows returns you to the console window. At this point, you can do two things<br />

with the template you have imported:<br />

❑ Right-click Security Configuration And Analysis, and then click Configure Computer<br />

Now to apply the settings in the template to your computer. You are<br />

asked to specify a location for an error log file (which contains any errors<br />

encountered during the configuration), and then Windows applies the settings.<br />

❑ Right-click Security Configuration And Analysis, and then click Analyze Computer<br />

Now to have Windows compare the current settings on your computer<br />

against the settings specified in the template. You can use this option to test<br />

your computer for weaknesses or security violations. After the analysis, you can<br />

browse through the policies in the Security Configuration And Analysis window<br />

to view the database setting and the computer setting for each policy.<br />

What Is Group Policy?<br />

Lesson 1 Overview of Security Policy<br />

Group Policy differs from Local Security Policy mainly in the way it is applied. Group<br />

Policy is available only in an Active Directory environment. When you create a GPO,<br />

you associate that object with a site, domain, or OU in Active Directory. All computers<br />

or users in that site, domain, or OU then have that policy applied to them.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!