Preview

Unit 9 Assignment 1

Satisfactory Essays
Open Document
Open Document
113 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 9 Assignment 1
Baldeo Persaud
NT 1330
Unit 9 Assignment 1
During the design phase:
Define the scope of application of Group Policy.
Determine the policy settings that are applicable to all corporate users.
Classify users and computers based on their roles and locations.
Plan desktop configurations based on the user and computer requirements.
A well-planned design will help ensure a successful Group Policy deployment.
The deployment phase begins with staging in a test environment. This process includes:
Creating standard desktop configurations.
Filtering the scope of application of GPOs.
Specifying exceptions to default inheritance of Group Policy.
Delegating administration of Group Policy.
Evaluating effective policy settings by using Group Policy Modeling.
Evaluating the results by using Group Policy Results.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1330lab8worksheet

    • 1017 Words
    • 6 Pages

    Do you see the Properties menu option? Based on the results, what does this tell you about how Group Policy Objects are processed?…

    • 1017 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 Assignment 1

    • 228 Words
    • 1 Page

    1. How much data has been modified between the last back and the time of failure?…

    • 228 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This lab walks the student through the steps required to define Active Directory Group Policy Objects (GPO) as well as to deploy GPOs to domain computers. It also demonstrates how to use MBSA to profile a Windows system. Group…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 261 Words
    • 2 Pages

    2. A pretest loop is a loop tests the conditions before performing the iteration. A posttest loop performs the iteration then test the condition.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS 3340 FINAL EXAM QUESTIONS

    • 1651 Words
    • 13 Pages

    4. Which among the following is the best reason to define security groups while configuring access…

    • 1651 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Final Exam Review

    • 1306 Words
    • 5 Pages

    Know the different tabs within the group policy management console: scope, details, settings and delegations and what they do.…

    • 1306 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.)…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Lesson 10

    • 672 Words
    • 3 Pages

    1. Which Resultant Set of Policy mode queries existing GPOs linked to sites, domains, and OUs to report…

    • 672 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab notes

    • 251 Words
    • 2 Pages

    Group Policy allows for special policies and permissions on a Windows network via role-based access.…

    • 251 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    1. Knowledge Assessment: Lesson 8 - Managing Users and Computers (50 points). a. Fill in the Blank: Complete the following sentences by entering the correct word or words in the blanks: 1. In a case where multiple PSOs are configured for a particular user, Active Directory will determine which one to apply by using the PSO's…

    • 1374 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 351 Words
    • 2 Pages

    Depending on the individuals position and job requirements, they should only be able to access the information that they need to do their job and nothing more.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Currently, system administrators create Ken 7 users in each computer where users need access. In the Active Directory, the system admins will create Organizational Groups (OU). These OU’s can then can have restriction or Group Policy Objects (GPOs) put in to place that will restrict what a user can and can’t access. An organizational unit is the smallest scope or unit to which you can assign Group Policy settings or delegate administrative authority. Using organizational units, you can create containers within a domain that represent the hierarchical, logical structures within your organization. You can then manage the configuration and use of accounts and resources based on your organizational model (techNet, 2005).…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    hash rule Software restriction rule applied to an application executable that will check the file’s hash value and prevent the application from running if the hash value is incorrect.…

    • 6312 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    taken to safeguard those assets. Policies can be drafted in many ways. One example is a draft policy for different sets of assets, including e-mail policies, password policies, Internet access policies, and remote access policies, acceptable use policies, physical security policies and incident response policies. Policies can be defined for any area of security. It is up to the security administrator and IT manager to classify what policies need to be defined and who should plan the policies. There could be policies for the whole company or policies for various sections within the company. In the next paragraphs I will be discussing the following policies; email, acceptable use, physical…

    • 1383 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Manage Configurations Identify and Involve Relevant Stakeholders Monitor and Control the Process Collect Improvement Information Review Status with Higher-Level Management Determine Causes of Defects 5.12.1 Select Defect Data for Analysis 5.12.2 Analyze Causes…

    • 1580 Words
    • 7 Pages
    Satisfactory Essays