More About the Author "Shirley"

Author Nick: Shirley
Name: Shirley Green
Site:
About the Author: All Merrell Shoes ordered at Merrellshoesdiscount.com have guaranteed fast service, shipping and delivery.


Articles by Shirley :

Sort by:

Revise a Security Plan to Add Security for Domain Controllers

1.What areas must be addressed to CompTIA the baseline server template so that domain controllers will be able to function? Services, password policy, Kerberos policy, audit policy, event logs, security options, and user rights. Additional services will need to be set to Automatic. Because the password policy for the domain is controlled by the default […]

Exercise:Design Additional Server Security Based on Role

In this exercise, you will provide your plan for providing additional MCSE 2003 security based on role. To do so, answer the following question. 1. What additional security elements should be addressed for server roles? Chapter Summary Security templates should be designed to apply security based on the role that a server will perform on […]

Practice: Using a Security Policy to Define the Baseline Template

In this practice, you will examine parts of a fictitious company’s MCTS Certification and identify whether or not these parts can be implemented in the baseline template. You will also identify -whether these parts of the security policy should be implemented and, if they should, where in the template you can do so. Read the […]

Guidelines for Selecting the Implementation Process for Security by Server Role

You might need more than one process to ensure that the correct security settings are applied to all MCSE 2003. Follow these guidelines to select which implementation process to use: If servers are members of an Active Directory Domain, use Group Policy to apply the template security settings. If servers are not members of an […]

How to Use Security Configuration and Analysis

Security Configuration and Analysis is a tool that can be used to apply a security 70-291 template. When two templates are applied, the result is similar to that achieved with Group Policy. Where the settings do not conflict, they are merged. If settings conflict, the last one applied wins. To use Security Configuration and Analysis […]