Local Security Quiz

This quiz covers the the training module “Local Security”. This module contains five lessons. Here is a summary of the previous lessons. Security Overview Local Security Policies Local Group Policies Security Templates Configuring Services [mtouchquiz 12]

Read More

Configuring services

There are a great many services within the Windows operating system. Services are normally accessed from other applications e.g. When the computer needs an IP address from a DHCP server a call is made to the DHCP client service to contact a DHCP server and request an IP address. Use the buttons below to navigate…

Read More

Security Templates in Windows Server 2003

Security settings can be set through predefined Security Templates. There are various grades of these of increasingly restrictive security. Each of them can be customised, and saved to be used in various group policies for local machines and domains. This is such a handy and much-used facility that there is an MMC Snap in just…

Read More

Local Group Policy

Group Policies are a convenient way for an administrator to prescribe the behaviour of computers, and the rights and permissions of users, from a single console. Group Policies can be applied to single computer and its users, or to wider groups such as domains. A local computer can have only one group policy (a Group…

Read More

Local Security Policies

A local security policy specifies various security settings on the local machine. These can include password and account lockout policies, audit policies and user rights assignments. Domain security policies will override local security policies so care should be taken when applying local policies on a domain. The Local Security Snap In is not available in…

Read More

Security Overview

The object  of security is to protect data and it’s availability being compromised by malice or by accident.  In Windows there are two main strands to security – specific access permissions and authentication.  Specific permissions can be applied to users, groups, or resources.  Authentication confirms to the machine or network that a user has an…

Read More