Preview

Unit 9 Assignment 1

Satisfactory Essays
Open Document
Open Document
113 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 9 Assignment 1
Baldeo Persaud
NT 1330
Unit 9 Assignment 1
During the design phase:
Define the scope of application of Group Policy.
Determine the policy settings that are applicable to all corporate users.
Classify users and computers based on their roles and locations.
Plan desktop configurations based on the user and computer requirements.
A well-planned design will help ensure a successful Group Policy deployment.
The deployment phase begins with staging in a test environment. This process includes:
Creating standard desktop configurations.
Filtering the scope of application of GPOs.
Specifying exceptions to default inheritance of Group Policy.
Delegating administration of Group Policy.
Evaluating effective policy settings by using Group Policy Modeling.
Evaluating the results by using Group Policy Results.

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 9 Assignment SC121

    • 907 Words
    • 9 Pages

    a. Values of maximal depolarization of membrane potential (mV) at different stimulation voltages, by location.…

    • 907 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1330lab8worksheet

    • 1017 Words
    • 6 Pages

    In this exercise you will be configuring Group Policy to see its effects on a Winodws 7 machine (Workstation##) that is a member of the domain. You will also test the implementation of a Local GPO before you move on to testing Group Policy Objects (GPOs.)…

    • 1017 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 6 Assignment 1

    • 228 Words
    • 1 Page

    1. How much data has been modified between the last back and the time of failure?…

    • 228 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This lab walks the student through the steps required to define Active Directory Group Policy Objects (GPO) as well as to deploy GPOs to domain computers. It also demonstrates how to use MBSA to profile a Windows system. Group…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 261 Words
    • 2 Pages

    2. A pretest loop is a loop tests the conditions before performing the iteration. A posttest loop performs the iteration then test the condition.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 9 Assignment 1

    • 582 Words
    • 2 Pages

    - Ensure compliance requirements of this policy concerning data at rest and role-holders access to managed networks, systems and servers…

    • 582 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    IS 3340 FINAL EXAM QUESTIONS

    • 1651 Words
    • 13 Pages

    4. Which among the following is the best reason to define security groups while configuring access…

    • 1651 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.)…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Lesson 10

    • 672 Words
    • 3 Pages

    ____i___ 4. This method of controlling GPO application uses filters written in the WMI Query Language (WQL) to determine whether a particular computer should have a GPO applied to it…

    • 672 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab notes

    • 251 Words
    • 2 Pages

    Group Policy allows for special policies and permissions on a Windows network via role-based access.…

    • 251 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 351 Words
    • 2 Pages

    Depending on the individuals position and job requirements, they should only be able to access the information that they need to do their job and nothing more.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1. Knowledge Assessment: Lesson 8 - Managing Users and Computers (50 points). a. Fill in the Blank: Complete the following sentences by entering the correct word or words in the blanks: 1. In a case where multiple PSOs are configured for a particular user, Active Directory will determine which one to apply by using the PSO's…

    • 1374 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    hash rule Software restriction rule applied to an application executable that will check the file’s hash value and prevent the application from running if the hash value is incorrect.…

    • 6312 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    taken to safeguard those assets. Policies can be drafted in many ways. One example is a draft policy for different sets of assets, including e-mail policies, password policies, Internet access policies, and remote access policies, acceptable use policies, physical security policies and incident response policies. Policies can be defined for any area of security. It is up to the security administrator and IT manager to classify what policies need to be defined and who should plan the policies. There could be policies for the whole company or policies for various sections within the company. In the next paragraphs I will be discussing the following policies; email, acceptable use, physical…

    • 1383 Words
    • 6 Pages
    Good Essays