| < Day Day Up > |
|
Before taking the exam, review the key topics and terms that are presented in this chapter. You need to know this information.
Understand the importance of security templates and Group Policy for establishing and maintaining the security of the computers on your network.
Be familiar with each of the tools used for configuring, deploying, and troubleshooting security templates.
Be able to describe the purpose of every security setting available within a security template.
Know the operating systems that can and cannot use Group Policy. Understand how to configure the security of systems that do not support Group Policy.
Be able to determine which Group Policy objects were applied to a computer from both a graphical interface and the command line.
Group Policy A mechanism for storing many types of policy data, for example, file deployment, application deployment, logon/logoff scripts and startup/shutdown scripts, domain security, and Internet Protocol security. The collections of policies are referred to as Group Policy objects (GPOs).
Group Policy object The Group Policy settings that administrators create are contained in GPOs, which are in turn associated with selected Active Directory containers: sites, domains, and OUs.
security template A physical file representation of a security configuration that can be applied to a local computer or imported to a GPO in Active Directory. When you import a security template to a GPO, Group Policy processes the template and makes the corresponding changes to the members of that GPO, which can be users or computers.
System Policy Used by system administrators to control user and computer configurations for operating systems prior to Windows 2000 from a single location on a network. System policies propagate registry settings to a large number of computers without requiring the administrator to have detailed knowledge of the registry.
| < Day Day Up > |
|