Local Security
Local Security Quiz
This quiz covers the the training module “Local Security”. This module contains five lessons. Here is a summary of the previous lessons. Security Overview Local Security Policies Local Group Policies Security Templates Configuring Services [mtouchquiz 12]
Read MoreConfiguring services
There are a great many services within the Windows operating system. Services are normally accessed from other applications e.g. When the computer needs an IP address from a DHCP server a call is made to the DHCP client service to contact a DHCP server and request an IP address. Use the buttons below to navigate…
Read MoreSecurity Templates in Windows Server 2003
Security settings can be set through predefined Security Templates. There are various grades of these of increasingly restrictive security. Each of them can be customised, and saved to be used in various group policies for local machines and domains. This is such a handy and much-used facility that there is an MMC Snap in just…
Read MoreLocal Group Policy
Group Policies are a convenient way for an administrator to prescribe the behaviour of computers, and the rights and permissions of users, from a single console. Group Policies can be applied to single computer and its users, or to wider groups such as domains. A local computer can have only one group policy (a Group…
Read MoreLocal Security Policies
A local security policy specifies various security settings on the local machine. These can include password and account lockout policies, audit policies and user rights assignments. Domain security policies will override local security policies so care should be taken when applying local policies on a domain. The Local Security Snap In is not available in…
Read MoreSecurity Overview
The object of security is to protect data and it’s availability being compromised by malice or by accident. In Windows there are two main strands to security – specific access permissions and authentication. Specific permissions can be applied to users, groups, or resources. Authentication confirms to the machine or network that a user has an…
Read More