Preview

Unit 8 Lab 8

Powerful Essays
Open Document
Open Document
3405 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 8 Lab 8
Lab 8 answer key
Exploring group policy administration

This lab contains the following exercises:
Exercise 8.1 Configuring the Local Computer Policy
Exercise 8.2 Configuring Processing Order
Exercise 8.3 Configuring Priority Order
Exercise 8.4 Using Block Policy Inheritance and Enforce
Exercise 8.5 Cleanup for Exercise 8.6
Exercise 8.6 Configuring Account Policies
Post-Lab Cleanup

Estimated lab time: 130 minutes

Exercise 8.1
Configuring the Local Computer Policy
Overview

In this exercise you will be configuring Group Policy to see its effects on a Winodws 7 machine (Workstation##) that is a member of the domain. You will also test the implementation of a Local GPO before you move on to testing Group Policy Objects (GPOs.)
Completion time
20 minutes
 PART A: Configure the Workstation## Computer to Remove the Properties Option When Right-Clicking My Computer
1. Turn on the Server## computer and log on using your Administrator account and the password P@ssw0rd.
NOTE
You are opening your server machine in preperation for later exercises.

NOTE
Remember to use your domain adminstrator account and not the local administrator account.

2. Turn on the Workstation## (your Windows 7 machine) computer and log on using your Student## account for the local machine and the password P@ssw0rd.
NOTE
In order to log using a local machine account click switch user, then other user and enter Workstation##\Student## as the username.

3. Click the Start button. Key gpedit.msc and press Enter. The Group Policy Object Editor opens to the Local Computer Policy.

4. Under the User Configuration node, click Administrative Templates.

5. Click the Desktop node.

6. In the right window, double-click the Remove Properties From The Computer Icon Context Menu setting. The Remove Properties From The Computer Icon Context Menu dialog box is displayed.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 2130 Lab

    • 191 Words
    • 1 Page

    1. An amino acid consists of a carbon atom attached to a hydrogen atom, an amine group, a side group, and a _____________ group.…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NT2670 Lab1 2

    • 1472 Words
    • 7 Pages

    The classroom network consists of Windows Server 2008 student servers and the ServerDC connected to a local area network. ServerDC, the domain controller for the contoso##.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the same student server.…

    • 1472 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    12. From Explorer or the Computer window, right-click a file or folder and select Properties from the short cut menu.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    FunSec2 SLM Lab04 Final

    • 295 Words
    • 2 Pages

    There are many tools and suites designed to aid the security practitioner and the organization in…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The best way for the developer user information is for the company’s sales to sign in to the server; through your Windows 2000 desktop. After you have signed in, going directly to the Start Menu, go to the applications, and bring up the list alternatives which will incorporate what the other requires. Click on the active directory for users and computers to open the dialog box. After you have gotten the dialog box opened, it will be required that you find out under which domain the new user’s accounts will be open. There will be four different domains that will be open to enable, different users to have access for different programs on its own domain. Doing this will make it avoidable for users to access other programs that are on other domains. With the understanding that one requires the input to four different domain names: Sales, Education, Manufacturing, and Research each distinctly have a domain of their own in these categories.…

    • 282 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Which of the following is a GPO on a Vista computer (Choose all that apply)…

    • 1935 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    1176655671195Take a screen shot of the Group Policy Management console, showing the GPO you created, by pressing Alt+Prt Scr, and then paste the resulting image into the Lab10_worksheet file in the page provided by pressing Ctrl+V.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 2 labs

    • 465 Words
    • 2 Pages

    1. A network device is usually built in to the computer. A peripheral device is a device connected to the computer…

    • 465 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    Answer: Computer Name, OS, Security Settings for Windows Firewall, Drives, Running Programs, and Installed Programs and Versions.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    School

    • 629 Words
    • 3 Pages

    1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Signing on to my home page is simple. You just have to follow a few easy steps. With my computer on, I simply open the Google Chrome web browser. I then click into the URL box and enter the (website here) web address. Once the website loads I click on the student login button which takes me to a screen that allows me to input my user name and password and login. The website then directs me to my (Website here) home page.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The system asks the user to enter his/her username and password. If the administrator or faculty logs in, the Student Search Form appears. If the student logs in, the Grade Viewing Form appears. If the user doesn’t have an account yet, he/she can register by clicking the register button. After having registered, the user cannot have access with his account until the administrator confirms him/her as a student or faculty.…

    • 674 Words
    • 3 Pages
    Good Essays