CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY Chapter 8 CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SECURITY POLICIES
USER CONFIGURATION NODE SECURITY SETTINGS Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY USER CONFIGURATION NODE SECURITY SETTINGS
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY ACCOUNT POLICIES
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY PASSWORD POLICY
ACCOUNT LOCKOUT POLICY Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY ACCOUNT LOCKOUT POLICY
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY KERBEROS POLICY
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY LOCAL POLICIES
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY AUDIT POLICY
DEFAULT DOMAIN CONTROLLER AUDIT POLICY Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY DEFAULT DOMAIN CONTROLLER AUDIT POLICY
THE CRASHONAUDITFAIL SETTING Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY THE CRASHONAUDITFAIL SETTING
AUDITING BEST PRACTICES AND TIPS Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY AUDITING BEST PRACTICES AND TIPS Audit only pertinent items. Archive security logs to provide a documented history. Understand the following categories: System events Policy change Account management Logon event versus account logon event Configure the size of your security logs carefully.
USER RIGHTS ASSIGNMENT Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY USER RIGHTS ASSIGNMENT
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SECURITY OPTIONS
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY EVENT LOG POLICY
RESTRICTED GROUPS POLICY Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY RESTRICTED GROUPS POLICY
SYSTEM SERVICES POLICY Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SYSTEM SERVICES POLICY
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY REGISTRY POLICY
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY FILE SYSTEM POLICY
WIRELESS NETWORK (IEEE 802.11) POLICIES Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY WIRELESS NETWORK (IEEE 802.11) POLICIES
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY PUBLIC KEY POLICIES
SOFTWARE RESTRICTION POLICIES Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SOFTWARE RESTRICTION POLICIES
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY FOLDER REDIRECTION Allows you to redirect user folders to a central location Benefits: Centralized backup of user files Centralized access of user files when users change computers Works with roaming profiles
FOLDER REDIRECTION (continued) Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY FOLDER REDIRECTION (continued)
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY OFFLINE FILES
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY DISK QUOTAS
REFRESH INTERVALS FOR COMPUTERS Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY REFRESH INTERVALS FOR COMPUTERS
REFRESH INTERVALS FOR USERS Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY REFRESH INTERVALS FOR USERS
MANUALLY REFRESHING GROUP POLICY Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY MANUALLY REFRESHING GROUP POLICY
OPTIMIZING GROUP POLICY PROCESSING Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY OPTIMIZING GROUP POLICY PROCESSING
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SUMMARY Most security settings are in the Computer Configuration node of a GPO. Domain-wide policies should be made in the Default Domain Controllers GPO. Specifically, account policies such as Password, Account Lockout, and Kerberos belong here. Local policies are processed first and overwritten by all other policies in the hierarchy. Auditing can be done at any level, but should be configured carefully. Default Domain Controllers Policy has some default auditing configured. Results are posted to the security log in the Event Viewer.
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SUMMARY (continued) GPOs are refreshed every 90 minutes with a 30-minute offset, except on domain controllers, which refresh GPOs every five minutes. Disable the unneeded Group Policy portion, either User Settings or Computer Settings.