DATA SECURITY MANAGEMENT. Melissa Yon INSIDE

Size: px
Start display at page:

Download "DATA SECURITY MANAGEMENT. Melissa Yon INSIDE"

Transcription

1 DATA SECURITY MANAGEMENT SYSTEM POLICIES TO GROUP POLICIES: ISSUES, IMPROVEMENTS, AND BEST PRACTICES, PART 2 Melissa Yon INSIDE Dealing with Existing NT4 System Policies; Comparing System Policy to Group Policy; Windows 2000 Clients Without Active Directory, or Active Directory with Downlevel Clients; Group Policy Best Practices INTRODUCTION Part 1 ( ) of this article series discussed the planning and designing of group policies. The goal was to make you aware of Group Policies, how to configure Group Policies, and how to link Group Policies to sites, domains, or organizational units (OUs) so they will be processed. This article is a continuation of Part 1 ( ) but addresses issues with clients who already process System Policies, applying a security policy to downlevel clients, and best practices when enabling Group Policies on Windows 2000 Active Directory. DEALING WITH EXISTING NT4 SYSTEM POLICIES NT4 System Policies are the precursor to Windows 2000 Group Policies. In NT4, there are greater than 70 different settings through System Policy to a machine, user, or a NT group of users. While this addition to Windows is a very big step in the right direction, it had many limitations. First, the System Policies are saved in a.pol file. This file must be in the NETLOGON directory on the Domain Controller that au- PAYOFF IDEA If one s company has never used System Policies, then one is starting with a clean slate. However, if implementing System Policies, there may be several things in the registry that no longer need to be there. You will need to evaluate your environment and decide if you want to implement Group Policies over the System Policies, or if you need a clean install of the operating system before applying Group Policies. When working with Group Policies, keep all of the best practices in mind. Think about Group Policy design while designing the Active Directory. The easiest Group Policy design is the design that follows the organizational unit structure.

2 thenticated the users. If the file does not exist on the machine that authenticated the user, then the System Policy is not applied. To ensure that System Policies are available on all Domain Controllers, administrators typically set up the File Replication Service in NT4. They then configure it so that the NETLOGON directory replicates to receive the latest System Policies. This works well, provided the file replication service works correctly, which it did not always do in the past. Once the System Policies reside on all Domain Controllers, the System Policies for the machines and users will be processed when the machine and users are authenticated. The machine policy loads at boot-up and the System Policy for the user or any groups the user is a member of processes at logon. As the System Policy processes, the registry is tattooed. This means that the registry settings are changed based on the System Policy for the machine and the user. The machine System Policies are set under HKEY_LOCAL_MACHINE and the user System Policies are set under HKEY_CURRENT_USER. The System Policies change the actual registry keys. The registry is tattooed because if the System Policy is deleted, it will not remove the settings from the machine s registry. If one wants to reset the client s registry, one needs to reconfigure the System Policy to the settings needed. The client s machine must be rebooted and the user needs to log in for the change to take place in the client s registry. COMPARING SYSTEM POLICY TO GROUP POLICY Many of the settings found in System Policies are also in Windows 2000 Group Policies. The interface to configure the policy, however, is different. System Policies are edited using the Sysedit tool from Windows NT4 (see Exhibit 1). Group Policies are edited by using the Group Policy tool in the Microsoft Management Console. System Policies (Exhibit 2) has more than 70 configurable settings, while Group Policy (Exhibit 3) has more than 680 configurable settings. System Policies are applied to machines, users, and groups of users. Group Policy, however, is applied at the site, domain, and OU levels. To EXHIBIT 1 System Policy Editor in Windows NT

3 EXHIBIT 2 Systems Policies Has More Than 70 Configurable Settings apply to only certain users or machines in a site, domain, or OU, one must filter the Group Policy. Because Group Policies are applied differently, one cannot upgrade the NT4 System Policies to Windows 2000 Group Policies; one must configure Windows 2000 Group Policies using the Group Policy Tool. Unlike System Policies, Group Policies do not tattoo the registry. If the Group Policy is unlinked or deleted, the machine s registry removes all the settings that were added to the registry by that Group Policy. System Policies are unable to do this because System Policies write directly to the registry under the specific key. Group Policies write to a specific key in the registry designed for Group Policies. It is located in: and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\ CurrentVersion\Group Policy

4 EXHIBIT 3 Group Policy Has More Than 680 Configurable Settings HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Group Policy Settings configured under these keys win over any other registry keys. This means if the user sets the background and Group Policy specifies the background under: HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Group Policy then the background under:

5 HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Group Policy takes precedence. If using System Policies to specify the background, the background would write to the same registry key whether the user or System Policies set it. There is no way, by just looking at the registry, to determine if the user or if System Policies set the setting. WINDOWS 2000 CLIENTS WITHOUT ACTIVE DIRECTORY, OR ACTIVE DIRECTORY WITH DOWN-LEVEL CLIENTS Unfortunately, one must have a Windows 2000 client that authenticates to Active Directory to use Group Policy. Therefore, if one has Windows 2000 Active Directory installed but the client is a Windows 98 or Windows NT4 workstation, or if one has a Windows 2000 client that authenticates to a Windows NT4 domain, one must use System Polices. One needs the Sysedit tool from the Windows NT4 Server to configure the System Polices. The System Policies will perform as explained above. Remember: System Policies tattoo the registry. To return the registry to its default state, set all System Policies to NOT CONFIGURED. The next time the machine is rebooted and the user logs on, the policy will be refreshed. GROUP POLICY BEST PRACTICES 1. Communicate One of the most important best practices when implementing Group Policies is to communicate. Users tend to believe that their personal computer on their desk is just that, their computer. When an administrator attempts to lock down that machine, users feel the company is trying to infringe on their property. It is important from the beginning to communicate the reason for Group Policies. The reasons could be: Group Policies will enable the company to run more efficiently. There will be X less number of workstation visits. There will be X less number of help desk calls. Users will have X more time to do work because the workstation will not need to be serviced as often. 2. Consider the Group Policies Needed When Designing the Active Directory Structure Because Group Policies are applied to site, domain, and OU levels, it is important to design the site, domain, and OU by the way Group Policy needs to be applied. For example, there may be different Group Policies for different departments. There may be different Group Policies for dif-

6 ferent types of users in those departments, such as User and Expert. The design could be either of the ones in Exhibit Use Descriptive Group Policy Names Create a naming scheme for the Group Policies. There should be a descriptive name for each Group Policy created, so that one knows the configuration of the Group Policy without having to traverse the Group Policy tree. Creating a New Group Policy with a Descriptive Name: 1. Click Start>Run. 2. Type mmc. 3. Press Enter. 4. Click Console>Add/Remove Snap-In. 5. Click Add. 6. Click AD Users and Computers. 7. Click OK. 8. Click Finish. 9. Click Close. 10. Expand the AD Users and Computers Snap-in. 11. Right-click the Domain or OU you are linking the GPO to. 12. Click Properties. 13. Click the Group Policy tab. 14. Click New. 15. Enter the New Group Policy Name. 16. Press Enter. 17. Click Edit to Configure the Group Policy. Changing the Group Policy Name: 18. Click Start>Run. 19. Type mmc. 20. Press Enter. 21. Click Console>Add/Remove Snap-in. 22. Click Add. 23. Click AD Users and Computers. 24. Click OK. 25. Click Finish. 26. Click Close. 27. Expand the AD Users and Computers Snap-in. 28. Right-click the Domain or OU you are linking the GPO to. 29. Click Properties. 30. Click the Group Policy Tab.

7 EXHIBIT 4 Group Policies for Different Departments and for Different Types of Users

8 EXHIBIT 5 Naming the Group Policy 31. Click twice slowly on the existing Group Policy. 32. Enter the New Group Policy Name. 33. Press Enter. Each Group Policy should have a descriptive name such as Auditing (see Exhibit 5). 4. Link a Default Group Policy to the Domain One can only configure some security settings in Group Policy at the domain level. For example, the password length will be defined for the entire domain. If this setting is set at the OU level, it will not be applied; it must be set at the domain level. Any Group Policy settings that should be applied to all users should be set at the domain level. Linking Group Policies: 1. Click Start>Run. 2. Type mmc.

9 3. Press Enter. 4. Click Console>Add/Remove Snap-in. 5. Click Add. 6. Click AD Users and Computers. 7. Click OK. 8. Click Finish. 9. Click Close. 10. Expand the AD Users and Computers Snap-in. 11. Right-click the Domain or OU to which the GPO is linked. 12. Click Properties. 13. Click the Group Policy Tab. 14. Click Add. 15. Click the GPO. 16. Click OK. Some security settings can only be configured at the domain level (see Exhibit 6). 5. Consider the Group Policy Design When There Are WAN Links When a Group Policy is created, it can be linked to multiple sites, domains, and OUs. If the company has WAN links to other locations, one will need to consider Group Policy links across the WAN links. When a Group Policy is created, the Group Policy resides in the Active Directory on the Domain Controller where it was created. Let s link Group Policy to a Domain that crosses a WAN link. Every time a machine boots or user logs into the linked domain, Active Directory must traverse the link to pull that machine s and user s Group Policy, which means additional traffic across the WAN link. 6. Limit the Use of No Override and Block Inheritance One can set No Override on a policy; this means settings defined in this Group Policy that are processed after the No Override Group Policy will not change (see Exhibit 7). One can also set a Block Inheritance, which will prevent applying any policies processed before this Group Policy. No Override and the Block Inheritance are specified on the Group Policy tab at the site, domain, and OU levels. If a Group Policy is not being processed, one will have to look at every site, domain, and OU to see if a No Override or Block Inheritance is enabled. Also, the more No Overrides and Block Inheritances that are configured, the more processing time is wasted. Setting No Override: 1. Click Start>Run. 2. Type mmc.

10 EXHIBIT 6 Security Settings at the Domain Level

11 EXHIBIT 7 Setting No Override

12 3. Press Enter. 4. Click Console>Add/Remove Snap-in. 5. Click Add. 6. Click AD Users and Computers. 7. Click OK. 8. Click Finish. 9. Click Close. 10. Expand the AD Users and Computers Snap-in. 11. Right-click the domain or OU to which the policy is linked. 12. Click Properties. 13. Click the Group Policy tab. 14. Click the Group Policy where you want to set the No Override option. 15. Click Option. 16. Click No Override (see Exhibit 8). 17. Click OK. 18. Click OK. EXHIBIT 8 Setting Default Domain Policy Options to No Override

13 Setting Block Inheritance: 1. Click Start>Run. 2. Type mmc. 3. Press Enter. 4. Click Console>Add/Remove Snap-in. 5. Click Add. 6. Click AD Users and Computers. 7. Click OK. 8. Click Finish. 9. Click Close. 10. Expand the AD Users and Computers Snap-in. 11. Right-click the domain or OU to which the policy is linked. 12. Click Properties. 13. Click the Group Policy tab. 14. Click the Group Policy where you want to set the Block Inheritance option. 15. Click Block Inheritance (Exhibit 9). 16. Click OK. EXHIBIT 9 Blocking Policy Inheritance

14 7. Limit the Use of Nested Group Policies Windows 2000 is very scaleable. One can nest many OUs inside of an OU. However, do not assign a Group Policy to the site, domain, and 20 nested OUs. Doing so could have a user in an OU that is nested 20 levels deep and a Group Policy is linked at every OU level. The Group Policy is executed at logon. The user will not be logged in until all 20 Group Policies for that user are processed. It is recommended to have no more than ten Group Polices for each machine or user. If the Active Directory has been configured correctly, this should not be a problem. 8. Limit Linking Multiple Group Policies to the Same Domain or OU Level Each Group Policy at a domain or OU level must be processed before a machine can boot up or a user can login. Keep in mind that Group Policies are processed from the bottom up in the list, so be sure to have them in the correct order. 9. When Delegating Group Policy Control, Use the Most Restrictive Control One big advantage to Windows 2000 is the granularity in administration. If one has a dispersed administration team in which each department has its own administrator, one may want to give that administrator rights to the Group Policy for their OU (see Exhibit 10). If one is giving rights, give the most restrictive rights, and only the rights they need to do their job (see Exhibit 11). 10. Create Group Policies in which only the User or Computer Configuration is Processed When designing an Active Directory, use OUs to organize the environment. Create an OU for users and a separate OU for computers. Then, when creating Group Policies, configure only the user or computer portion of that Group Policy. Also configure the Group Policy to process only that portion of Group Policy that was configured; otherwise, both sections of Group Policy will be processed. Configuring the Group Policy to only process the computer configuration: 1. Click Start>Run. 2. Type mmc. 3. Press Enter. 4. Click Console>Add/Remove Snap-in. 5. Click Add. 6. Click AD Users and Computers. 7. Click OK. 8. Click Finish. 9. Click Close. 10. Expand the AD Users and Computers Snap-in.

15 EXHIBIT 10 Granting Administrators Rights to the Group Policy for Their OU 11. Right-click the domain or OU to which the policy is linked. 12. Click Properties. 13. Click the Group Policy tab. 14. Click the Group Policy that should only process the computer configuration. 15. Click Properties. 16. Click Disable user configuration settings (see Exhibit 12). 17. Click OK. 18. Click OK. 11. Configure Loopback Processing for Kiosk Machines When an employee uses a Kiosk machine, one may not want their user settings applied to the machine (see Exhibit 13). Group Policy contains settings that will not process the user s configuration. There are two choic-

16 EXHIBIT 11 Assigning Only the Rights Needed for the Administrator s Jobs

17 EXHIBIT 12 Disabling User Configuration Settings es for Loopback processing: Enabled and Disabled. If Loopback processing is enabled, then one must choose Replace or Merge. Replace will replace any user s group policies with the computer policies. No user configurations are applied. Merge will merge the user s configuration with the computer s configuration. If the user s and the computer s configuration conflict, the computer s configuration is applied. Configuring the Loopback Feature: 1. Click Start>Run. 2. Type mmc. 3. Press Enter. 4. Click Console>Add/Remove Snap-in. 5. Click Add. 6. Click AD Users and Computers.

18 EXHIBIT 13 Loopback Configured on Kiosk Machines

19 7. Click OK. 8. Click Finish. 9. Click Close. 10. Expand the AD Users and Computers Snap-in. 11. Right-click the domain or OU to which the policy is linked. 12. Click Properties. 13. Click the Group Policy Tab. 14. Click the Group Policy that contains the computer configuration. 15. Click Edit. 16. Expand Administrative Templates under the Computer Configuration portion. 17. Expand System. 18. Click on Group Policy. 19. Double-click User Group Policy loopback processing mode. 20. Click Enable. 21. Click Replace or Merge in the drop-down list. 22. Click OK. 23. Close Group Policy. 12. Use Third-Party Group Policy Tools Group Policy is an important feature with Windows 2000 that should be implemented. However, it is very limited in what it can do. You cannot search on the Group Policy settings or even get the RSOP (Resultant Set of Policies). You cannot even back up Group Policies without backing up all of Active Directory. Third-party tools, such as Full Armor, can do all of this and more. If one s company has never used System Policies, one is starting with a clean slate. However, if System Policies has been implemented, one may have many things in the registry that do not need to be there anymore. One will need to evaluate the environment and decide whether to implement Group Policies over the System Policies or if there needs to be a clean install of the operating system before applying Group Policies. When working with Group Policies, keep all of the best practices in mind. Think about Group Policy design while designing the Active Directory. The easiest Group Policy design is the design that follows one s OU structure. Melissa Yon, MCSE, MCT, MCP+I, CTT, is currently a technical trainer for Lucent Technologies Worldwide Services. She has nine years of experience in designing and implementing desktop, server, and enterprise solutions and conducting training. In the last two years, she has designed training materials and delivered training and solutions for Lucent Technologies.

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

Guide to Deploy the AXIGEN Outlook Connector via Active Directory

Guide to Deploy the AXIGEN Outlook Connector via Active Directory Guide to Deploy the AXIGEN Outlook Connector via Active Directory Active Directory contains a very useful feature which allows system administrators to automatically deploy software onto machines or users

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm Page 1 of 17 Windows 2000 Server Step-by-Step Guide to Understanding the Group Policy Feature Set Operating System Abstract Group Policy is the central component of the Change and Configuration Management

More information

COPYRIGHTED MATERIAL. Configuring, Deploying, and Troubleshooting Security Templates. Chapter MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

COPYRIGHTED MATERIAL. Configuring, Deploying, and Troubleshooting Security Templates. Chapter MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 1 Configuring, Deploying, and Troubleshooting Security Templates MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Configure security templates. Configure registry and file system permissions.

More information

Force IE to default to your home page with multiple home pages. This was configured on a Windows Server 2008 and with IE8 on all of the desktops.

Force IE to default to your home page with multiple home pages. This was configured on a Windows Server 2008 and with IE8 on all of the desktops. Force IE to default to your home page with multiple home pages This was configured on a Windows Server 2008 and with IE8 on all of the desktops. It is highly recommended that you do not use the "Default

More information

Managing Group Policy application and infrastructure

Managing Group Policy application and infrastructure CHAPTER 5 Managing Group Policy application and infrastructure There is far more to managing Group Policy than knowing the location of specific policy items. After your environment has more than a couple

More information

Managing Group Policy application and infrastructure

Managing Group Policy application and infrastructure CHAPTER 5 Managing Group Policy application and infrastructure There is far more to managing Group Policy than knowing the location of specific policy items. After your environment has more than a couple

More information

Below is the list of Windows Server Group Policy Interview Questions Asked in Windows System Administrator / L1/l2/l3 Support Engineer Interviews.

Below is the list of Windows Server Group Policy Interview Questions Asked in Windows System Administrator / L1/l2/l3 Support Engineer Interviews. Below is the list of Windows Server Group Policy Interview Questions Asked in Windows System Administrator / L1/l2/l3 Support Engineer Interviews. What is group policy in active directory? What are Group

More information

Xcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0

Xcalibur Global Version Rev. 2 Administrator s Guide Document Version 1.0 Xcalibur Global Version 1.1 - Rev. 2 Administrator s Guide Document Version 1.0 September 2006 COPYRIGHT NOTICE 2006 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd. All rights reserved. This product

More information

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004

Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 Recent Operating System Class notes 04 Managing Users on Windows XP March 22, 2004 You log into a system to notify the system who you are. When you log off, any files you have opened are cleaned up, and

More information

Password Reset Utility. Configuration

Password Reset Utility. Configuration Password Reset Utility Configuration 1 Table of Contents 1. Uninstalling Legacy Password Reset... 2 2. Password Reset Utility: How to deploy and configure via Group Policy... 2 3. Configuring Group Policy

More information

Deploying Lightspeed User Agent v

Deploying Lightspeed User Agent v Deploying Lightspeed User Agent v2.01.14 The LS User Agent can be deployed via most application deployment utilities. This guide will focus on Group Policy Software installation policies. Please read over

More information

CISNTWK-11. Microsoft Network Server. Chapter 4

CISNTWK-11. Microsoft Network Server. Chapter 4 CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows

More information

Implementing and Troubleshooting Account Lockout

Implementing and Troubleshooting Account Lockout Page 1 of 7 Implementing and Troubleshooting Account Lockout Launched: Aug 31, 2004 Updated: Nov 18, 2004 Section: Articles :: Authentication, Access Control & Encryption Author: Mitch Tulloch Rating:

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

Exam : Title. : Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Exam : Title. : Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Exam : 070-293 Title : Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure QUESTION 1: You are the network administrator for Certkiller.com. The network consists of a single

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

Guide to Securing Microsoft Windows 2000 Group Policy

Guide to Securing Microsoft Windows 2000 Group Policy Report Number: C4-007R-01 Guide to Securing Microsoft Windows 2000 Group Policy Network Security Evaluations and Tools Division of the Systems and Network Attack Center (SNAC) Author: Julie M. Haney Updated:

More information

Managing Windows Environments with Group Policy

Managing Windows Environments with Group Policy Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course, you will learn how to reduce costs and increase efficiencies in your network. You will

More information

Server based Networking & Security IS375 Group 5 Project. The purpose of this project is to put into practice what we learned in classroom.

Server based Networking & Security IS375 Group 5 Project. The purpose of this project is to put into practice what we learned in classroom. Server based Networking & Security IS375 Group 5 Project The purpose of this project is to put into practice what we learned in classroom. Beatris M., Zim Y., Lawton P., Mike S. 12/13/2011 Document: Steps

More information

Policy and the Windows Server 2003 Group Policy Management Console

Policy and the Windows Server 2003 Group Policy Management Console Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Policy

More information

A guide to configure agents for log collection in Log360

A guide to configure agents for log collection in Log360 A guide to configure agents for log collection in Log360 Contents Introduction... 2 Agent-based log collection... 2 When can you go for agent-based log collection?... 2 Architecture of agent-based log

More information

MCSA Guide to Administering Microsoft Windows Server 2012/R2, Exam Chapter 10 Managing Group Policies

MCSA Guide to Administering Microsoft Windows Server 2012/R2, Exam Chapter 10 Managing Group Policies MCSA Guide to Administering Microsoft Windows Server 2012/R2, Exam 70-411 Chapter 10 Managing Group Policies Objectives Configure group policy scope, precedence, and inheritance Configure group policy

More information

Windows Server 2008 Active Directory Resource Kit

Windows Server 2008 Active Directory Resource Kit Windows Server 2008 Active Directory Resource Kit Stan Reimer, Mike Mulcare, Conan Kezema, Byron Wright w MS AD Team PREVIEW CONTENT This excerpt contains uncorrected manuscript from an upcoming Microsoft

More information

Likewise Enterprise Administrators Guide

Likewise Enterprise Administrators Guide Likewise Enterprise Administrators Guide v4 Information Services University of Oregon December 2010 Table of Contents Definitions... 4 opt/likewise... 4 AD... 4 Domain... 4 DuckID... 4 GPO... 4 UNIX Attributes...

More information

CTECS Connect 2.2 Release Notes December 10, 2009

CTECS Connect 2.2 Release Notes December 10, 2009 (Formerly VTECS) CTECS Connect 2.2 Release Notes December 10, 2009 This document contains information that supplements the CTECS Connect 2.2 documentation. Please visit the CTECS Connect Support area of

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Administrator Guide Software version 2.2 D14197.06 February 2011 Contents Contents... 2 Introduction... 4 Pre-Installation Information...

More information

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,

More information

x CH03 2/26/04 1:24 PM Page

x CH03 2/26/04 1:24 PM Page 03 078973107x CH03 2/26/04 1:24 PM Page 45 3............................................. Setting Up, Managing, and Troubleshooting Security Accounts and Policies 1. You re a help desk technician for your

More information

Evaluation Kit Manual

Evaluation Kit Manual Xcalibur Global 1.2 Evaluation Kit Manual Management Software Written By: Chip PC Training Dep. December 2007 www.chippc.com 1 2 Contents 1 General 4 2 DVD Content 5 3 Installation Prerequisites 5 4 Xcalibur

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

Centrify Suite Group Policy Guide. Centrify Corporation. June 2013

Centrify Suite Group Policy Guide. Centrify Corporation. June 2013 Centrify Suite 2013 Group Policy Guide June 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

Desktop Authority 8 Getting Started

Desktop Authority 8 Getting Started 8 Getting Started Copyright Copyright 1997-2009 ScriptLogic Corporation and its licensors. All Rights Reserved. Protected by U.S. Patents 6,871,221; 7,293,087; 7,353,262 and 7,469,278 with other patents

More information

ICVerify Installation Guide. For Help Call More information available at POSMicro.com

ICVerify Installation Guide. For Help Call More information available at POSMicro.com For Help Call 1.800.241.6264 ICVerify Installation Guide More information available at POSMicro.com QUESTIONS? Ask the experts at POSMicro.com. 1.800.241.6264 Live Chat Now support@posmicro.com Monday

More information

Vendor: Microsoft. Exam Code: Exam Name: Pro: Windows 7, Enterprise Desktop Administrator. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Pro: Windows 7, Enterprise Desktop Administrator. Version: Demo Vendor: Microsoft Exam Code: 70-686 Exam Name: Pro: Windows 7, Enterprise Desktop Administrator Version: Demo Question No : 1 You are planning to upgrade Internet Explorer. You have the following requirements:

More information

You need to make sure that branch office administrators are able to create and manage their own GPOs respectively.

You need to make sure that branch office administrators are able to create and manage their own GPOs respectively. Enforce settings, Block inheritance Deny apply group policy Child group also called shadow group Set security permissions on the group -------------------------------- You need to make sure that branch

More information

Windows 2012 Active Directory Schema Snap-in Is Not Connected To The Schema Operations Master

Windows 2012 Active Directory Schema Snap-in Is Not Connected To The Schema Operations Master Windows 2012 Active Directory Schema Snap-in Is Not Connected To The Schema Operations Master The Infrastructure Master role needs to run on a domain controller that is not a are still using Windows NT

More information

Windows 2000 System Administration Handbook, 1/e

Windows 2000 System Administration Handbook, 1/e Windows 2000 System Administration Handbook, 1/e Will Willis, Lewisville, Texas David Watts, Sugarland, Texas Tillman Strahan, Lewisville, Texas Copyright 2000, 721 pp. Paper format ISBN 0-13-027010-5

More information

Installing and Configuring DHCP with NetWare 5

Installing and Configuring DHCP with NetWare 5 BY JOHN E. JOHNSTON Installing and Configuring DHCP with NetWare 5 The Dynamic Host Configuration Protocol (DHCP) function and its options are essential in the creation of a TCP/IP environment. The DHCP

More information

Identity with Windows Server 2016 (742)

Identity with Windows Server 2016 (742) Identity with Windows Server 2016 (742) Install and Configure Active Directory Domain Services (AD DS) Install and configure domain controllers This objective may include but is not limited to: Install

More information

Windows Server 2003, MCSA Security Specialization Skills Update. Exam.

Windows Server 2003, MCSA Security Specialization Skills Update. Exam. Microsoft 70-699 Windows Server 2003, MCSA Security Specialization Skills Update Exam TYPE: DEMO http://www.examskey.com/70-699.html Examskey Microsoft70-699 exam demo product is here for you to test the

More information

TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN. Revised

TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN. Revised TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN Revised 2018-01-30 2 Table of Contents Introduction Section 1.1: Windows as a Server... 5 Section 1.2: Windows Server 2012 Interface

More information

Specops Password Policy

Specops Password Policy Specops Software. All right reserved. For more information about Specops Password Policy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Policy is a trademark

More information

Network Identity Manager with SN-Gina Outlook Web Access

Network Identity Manager with SN-Gina Outlook Web Access 1 System requirements... 1 2 NIM.exe Installation Packages... 2 2.1 Nim_setup.exe Installation on the Domain Controller... 2 2.2 SAVERNOVA GINA.dll installation... 3 2.2.1 gina_setup.exe Manually installation

More information

DIGIPASS Authentication for F5 BIG-IP

DIGIPASS Authentication for F5 BIG-IP DIGIPASS Authentication for F5 BIG-IP With VASCO VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 37 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

Copyright Tools4ever B.V. All rights reserved.

Copyright Tools4ever B.V. All rights reserved. Copyright Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means without the written permission of Tools4ever. DISCLAIMER

More information

1. All domain user accounts, and who can change the security permissions protecting them

1. All domain user accounts, and who can change the security permissions protecting them Gold Finger The World s Only Accurate Resultant-Access and Security Assessment, Audit and Reporting Solution for Active Directory The Top-100 Reports that Gold Finger can generate, on-demand, in real-time,

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

AUTHORIZED DOCUMENTATION

AUTHORIZED DOCUMENTATION Administration Guide AUTHORIZED DOCUMENTATION Novell SecureLogin 6.1 SP1 June, 2009 www.novell.com Novell SecureLogin 6.1 SP1 Administration Guide Legal Notices Novell, Inc. makes no representations or

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the

More information

Eaglesoft 18.1 Installation Instructions

Eaglesoft 18.1 Installation Instructions Eaglesoft 18.1 Installation Instructions NOTE: We recommend using a static IP address on your Eaglesoft database server machine. 1. Eaglesoft Version 18.1 will require all users to have a password with

More information

INUVIKA TECHNICAL GUIDE

INUVIKA TECHNICAL GUIDE Version 1.6 December 13, 2018 Passing on or copying of this document, use and communication of its content not permitted without Inuvika written approval PREFACE This document describes how to integrate

More information

Q&As. Identity with Windows Server Pass Microsoft Exam with 100% Guarantee

Q&As. Identity with Windows Server Pass Microsoft Exam with 100% Guarantee 70-742 Q&As Identity with Windows Server 2016 Pass Microsoft 70-742 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance

More information

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable

More information

How to create a cluster with failover functionality on Windows 2008 Server Enterprise Edition

How to create a cluster with failover functionality on Windows 2008 Server Enterprise Edition How to create a cluster with failover functionality on Windows 2008 Server Enterprise Edition Software Version: DSS ver. 6.00 up10 Presentation updated: November 2009 TO CONFIGURE A CLUSTER WITH FAILOVER

More information

Exam Questions

Exam Questions Exam Questions 70-685 Pro: Windows 7, Enterprise Desktop Support Technician https://www.2passeasy.com/dumps/70-685/ 1.Portable computer users report that they can use Internet Explorer to browse Internet

More information

PROXY Pro Deployment Tool v10.0. User Guide October 2017

PROXY Pro Deployment Tool v10.0. User Guide October 2017 PROXY Pro Deployment Tool v10.0 User Guide October 2017 Table of contents 1. System Requirements...3 2. Target Computer Requirements...4 3. Deployment Tool Operation...5 3.1 Loading a Host Install File...6

More information

ProfileUnity with FlexApp Technology

ProfileUnity with FlexApp Technology ProfileUnity with FlexApp Technology Quick Start & Evaluation Guide Introduction This guide has been authored by experts at Liquidware in order to provide information and guidance concerning the evaluation

More information

Required privileges and permissions

Required privileges and permissions Required privileges and permissions Table of contents Document summary ADSelfService Plus overview Required permissions Configuring permissions To delegate full control in ADUC to access all ADSelfService

More information

Exam Questions

Exam Questions Exam Questions 70-686 Pro: Windows https://www.2passeasy.com/dumps/70-686/ 1.u are designing a Windows 7 virtual desktop infrastructure. You have the following requirements:. Provide access to Remote Desktop

More information

Autodesk DirectConnect 2010

Autodesk DirectConnect 2010 Autodesk DirectConnect 2010 Contents Chapter 2 Installing and Licensing...................... 3 Installing Autodesk DirectConnect..................... 3 Software deployment using group policies for Windows.........

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Exam Questions Demo Microsoft. Exam Questions Windows Server Administration Fundamentals

Exam Questions Demo   Microsoft. Exam Questions Windows Server Administration Fundamentals Microsoft Exam Questions 98-365 Windows Server Administration Fundamentals Version:Demo 1.Distributed File System (DFS) is used to: A. Delegate permissions to a global distribution group. B. Implement

More information

Vendor: Microsoft. Exam Code: Exam Name: Administering Windows Server Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: Administering Windows Server Version: Demo Vendor: Microsoft Exam Code: 70-411 Exam Name: Administering Windows Server 2012 Version: Demo DEMO QUESTION 1 You have a server named Server1 that runs Windows Server 2012 R2. You need to configure Server1

More information

Configuring Remote Access using the RDS Gateway

Configuring Remote Access using the RDS Gateway Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...

More information

7 Managing and Maintaining Group Policy

7 Managing and Maintaining Group Policy 7 Managing and Maintaining Group Policy CERTIFICATION OBJECTIVES 7.01 Troubleshoot Issues Related to Group Policy Application and Deployment 7.02 Troubleshoot Group Policy Software Installation Issues

More information

ProfileUnity with FlexApp Technology

ProfileUnity with FlexApp Technology ProfileUnity with FlexApp Technology Best Practices for Highly Secured Desktop Environments Introduction This guide has been authored by experts at Liquidware in order to provide information and guidance

More information

INF204x Module 1, Lab 3 - Configure Windows 10 VPN

INF204x Module 1, Lab 3 - Configure Windows 10 VPN INF204x Module 1, Lab 3 - Configure Windows 10 VPN Estimated Time: 40 minutes Your organization plans to allow Windows 10 users to connect to the internal network by using the VPN client built into the

More information

Installation of LAPS Password Management Demo Deployment

Installation of LAPS Password Management Demo Deployment Installation of LAPS Password Management Demo Deployment Version: 1.0 Last Modified: 2017.11.2 Installation The content of this document is property of Omni Technology Solutions, Inc. All Rights Reserved.

More information

ManageEngine EventLog Analyzer. Installation of agent via Group Policy Objects (GPO)

ManageEngine EventLog Analyzer. Installation of agent via Group Policy Objects (GPO) ManageEngine EventLog Analyzer Installation of agent via Group Policy Objects (GPO) Document Summary This document briefly describes the steps to install EventLog Analyzer agent software via Group Policy

More information

Securewireless Windows 7 Setup Guide

Securewireless Windows 7 Setup Guide Securewireless Windows 7 Setup Guide 1. Click on the wireless icon in the lower right-hand corner of the taskbar and then click on Open Network and Sharing Center. 2. From the Network and Sharing Center

More information

Microsoft Windows Server Administration Fundamentals. Download Full Version :

Microsoft Windows Server Administration Fundamentals. Download Full Version : Microsoft 98-365 Windows Server Administration Fundamentals Download Full Version : http://killexams.com/pass4sure/exam-detail/98-365 installation from a master computer to the destination computers. The

More information

The benefits of synchronizing G Suite and Active Directory passwords

The benefits of synchronizing G Suite and Active Directory passwords The benefits of synchronizing G Suite and Active Directory passwords www.adselfserviceplus.com Enterprises are adopting more and more applications to enhance productivity and improve employees' user experience.

More information

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services 6425 - Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Microsoft Windows Server

More information

ADSelfService Plus Client Software Installation via Group Policy Objects (GPOs)

ADSelfService Plus Client Software Installation via Group Policy Objects (GPOs) ADSelfService Plus Client Software Installation via Group Policy Objects (GPOs) Contents Document Summary:... 3 ADSelfService Plus Client Software:... 3 ADSelfService Plus Client Software Installation

More information

Course Outline. Pearson: MCSA Cert Guide: Identity with Windows Server

Course Outline. Pearson: MCSA Cert Guide: Identity with Windows Server Course Outline Pearson: MCSA 70-742 Cert Guide: Identity with 20 Aug 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

IT222 Microsoft Network Operating Systems II

IT222 Microsoft Network Operating Systems II 1 ITT Technical Institute IT222 Microsoft Network Operating Systems II Unit 1: Chapters 1 & 2 2 Chapter 1 OVERVIEW OF ACTIVE DIRECTORY Chapter 1: Overview of Active Directory, pp. 1 23 Chapter 2, Implementing

More information

Configure advanced audit policies

Configure advanced audit policies 7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy

More information

Quest Knowledge Portal Installation Guide

Quest Knowledge Portal Installation Guide Quest Knowledge Portal 2.11 Installation Guide 2018 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is

More information

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

2015 Optima Healthcare Solutions Page 2

2015 Optima Healthcare Solutions Page 2 Viewing Documents Logging into Rehab Optima 1. To log onto Rehab Optima, go to www.rehaboptima.com. To place an icon on your desktop for future use, right click in the light blue box and choose create

More information

Exam Identity with Windows Server 2016

Exam Identity with Windows Server 2016 MCSA / MCSE for Windows Server 2016 Exam 70-742 Identity with Windows Server 2016 Version 15.35 (198 Questions) (70-742) Identify with Windows Server 2016 QUESTION 1 You have a server named Server1 that

More information

Practical 23 Manage Desktop Configuration using group policy and remote installation services.

Practical 23 Manage Desktop Configuration using group policy and remote installation services. Practical 23 Manage Desktop Configuration using group policy and remote installation services. Group Policy Collection:- Group Policy is an infrastructure that allows you to implement specific configurations

More information

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements

Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise

More information

DOWNLOAD PDF REDIRECT FOR WINDOWS 7

DOWNLOAD PDF REDIRECT FOR WINDOWS 7 Chapter 1 : Deploy Folder Redirection with Offline Files Microsoft Docs From your description, it sounds as if you cannot access the redirection path in Windows Explorer, is that correct? before folder

More information

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0 NetIQ Advanced Authentication Framework FIDO U2F Authentication Provider Installation Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona

More information

Configuring Directories in an ICVERIFY Master / Substation Setup

Configuring Directories in an ICVERIFY Master / Substation Setup Configuring Directories in an ICVERIFY Master / Substation Setup An ICVERIFY, Inc. Technical Document June 16, 2006 Disclaimer: The information contained herein is intended to apply to the ICVERIFY, Inc.

More information

Knowledge Portal 2.6. Installation and Configuration Guide

Knowledge Portal 2.6. Installation and Configuration Guide Knowledge Portal 2.6 Installation and Configuration Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

... WinINSTALL 10 Desktop Management Suite and Desktop Availability Suite. Installation Guide ...

... WinINSTALL 10 Desktop Management Suite and Desktop Availability Suite. Installation Guide ... ..... WinINSTALL 10 Desktop Management Suite and Desktop Availability Suite Installation Guide.................................................................... ..... 2008 Scalable Software, Inc. All

More information

ReACT New User Setup, Password Reset and Account Unlock Instructions

ReACT New User Setup, Password Reset and Account Unlock Instructions ReAct is a tool that will replace the current password reset system. In order to use ReAct you have to enroll and setup your challenge questions. Once enrolled you will have easy access to reset your password

More information

Implementing Messaging Security for Exchange Server Clients

Implementing Messaging Security for Exchange Server Clients Implementing Messaging Security for Exchange Server Clients Objectives Scenario At the end of this lab, you will be able to: Protect e-mail messages using S/MIME signing and encryption Manage e-mail attachment

More information

Manually Grant Allow Logon Through Terminal Services Right

Manually Grant Allow Logon Through Terminal Services Right Manually Grant Allow Logon Through Terminal Services Right In the wyse side, I used the rdp add-on to connect with server address of domain you must be granted the Allow log on through Terminal Services

More information

How To Reset Local Group Policy Objects To Default Settings Windows 7

How To Reset Local Group Policy Objects To Default Settings Windows 7 How To Reset Local Group Policy Objects To Default Settings Windows 7 more information. Group policy unable to apply firewall change on Windows 7 cilent - blocked Try to reset GPO settings to default values

More information

Manual Ftp Windows Server 2008 Firewall Settings Group Policy

Manual Ftp Windows Server 2008 Firewall Settings Group Policy Manual Ftp Windows Server 2008 Firewall Settings Group Policy 应用到 : Windows 7, Windows Server 2008, Windows Server 2008 R2, This step-by-step guide describes how to deploy Group Policy objects (GPOs) to

More information

EventTracker Manual Agent Deployment User Manual Version 7.x

EventTracker Manual Agent Deployment User Manual Version 7.x EventTracker Manual Agent Deployment User Manual Version 7.x Publication Date: Nov 12, 2013 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract EventTracker Agent deployment

More information

Quest GPOADmin 5.6. User Guide

Quest GPOADmin 5.6. User Guide Quest GPOADmin 5.6 User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Lesson 3: Identifying Key Characteristics of Workgroups and Domains 1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users

More information

2 Administering Microsoft Windows Server 2003

2 Administering Microsoft Windows Server 2003 2 Administering Microsoft Windows Server 2003 Exam Objectives in this Chapter: Manage servers remotely Manage a server by using Remote Assistance Manage a server by using Terminal Services remote administration

More information