This chapter has covered a lot of ground; here are the main points: In this chapter, you learned what Security Policies are available in Windows Server 2003 and how to configure them. This includes how to apply them, when to apply them, and their effects in both standalone and domain environments. Next, you had an in-depth look at managing and configuring event logs, including knowing the types of event logs available on both a domain controller and a member server. You also learned how to configure, search, filter, delete, and archive the data contained in the event logs. You learned how to use auditing to monitor security-related events, and you worked with security templates that can be used to not only set the baseline security settings for an organization, but to determine what settings have been changed. Key Terms
|