nt1330 week 8, unit 8 exercise 8
Post on 12-Oct-2015
1.059 Views
Preview:
TRANSCRIPT
-
5/21/2018 NT1330 Week 8, Unit 8 Exercise 8
1/3
Davonte Brown
ITT Technical Institute3825 West Cheyenne Avenue, Suite 600
North Las Veas, Neva!a 8"032
NT#330 Client$Server Net%or&in II
Wee& 8, 'nit 8 ( Intro!uction to )rou* +olicy Con-iurin the 'ser Co.*uter /nviron.ent 'sin )rou* +olicy
Exercise
or this /1ercise
Please evaluate the information provided and after reading in the lessons for this week, answer the scenario deliverablThis exercise is due at the beginning of the next class meeting.
Unit 8. Exercise 1. Administrative Control versus Trust: Research/Scenario
Course 4ectives an! Learnin utco.es
In this Exercise, ou will recommend policies to control user!computer configuration.
Assin.ent euire.ents
"eview the following scenario#
$ou are an IT consultant and receive the following email from a client#
%%%To# IT &onsultant
'e have an existing network consisting of approximatel () workstations in a 'indows 'orkgroup environment. 'e d
not currentl take advantage of local policies to control user!computer configuration, as it is too cumbersome to manageon each individual computer. 'e are implementing an *ctive Director Domain and are excited about the possibilit ofbeing able to control user and computer settings particularl from a securit perspective.
'e understand that there are hundreds and hundreds of options for things we can control and are hoping ou can helpb recommending the most important initial policies+ sers have had complete control of their desktops up to this pointso we would like to strike a balance between trust and control-
Thank ou
%%
"espond with recommendations.
Su.ission euire.ents
%/ pages, 0icrosoft 'ord
Double%spaced
Times 1ew "oman, / pt. font
tili2e *P* 3 formatting
Ensure that ou include a cover page and reference page.
1T44) &lient%5erver 1etworking II Page of 4 'eek 6, 7)%3() 8essons 7 a5teve Todd
-
5/21/2018 NT1330 Week 8, Unit 8 Exercise 8
2/3
Davonte Brown
A number of special issues affect Group Policy software installation. For example, network connectivit
issues can disrupt access to the software installation packages. Software installation processing is never
performed while the user is logged on because doing so could disrupt work and result in data loss. his
has implications when Group Policy is configured to run asynchronously.
Software !nstallation is managed by the Software !nstallation "S#, which appears as the source
Application $anager on the Policy #vents tab in Group Policy %esults reports. !f you need additional
logging information, enable verbose logging for the Software !nstallation "S# and $icrosoft&
'indows& !nstaller, as described under roubleshooting Group Policy (sing )og Files.
he Software !nstallation *iagnostics tool +addiag.exe provides detailed information about the
applications visible in Active *irectory and installed for the current user, as well as general diagnostic
information and related #vent )og entries. !t is available in the 'indows - Server %esource /it. !n
'indows 0P Professional, the Fast )ogon 1ptimi2ation feature is set by default for both domain and
workgroup members. As a result, 'indows 0P does not wait for the network to be fully initiali2ed at
startup and logon. #xisting users are logged on using cached credentials. his results in shorter logon
times. Group Policy is applied in the background after the network becomes available. 3ote that becau
this is a background refresh, extensions such as Software !nstallation and Folder %edirection take two
logons to apply changes.
Software !nstallation processing occurs only during computer startup or when the user logs on. his is
because processing periodically could cause undesirable results. For example, if an application is no
longer assigned, it is removed. !f a user were using the application while Group Policy tries to uninstall
or if an assigned application upgrade takes place while someone is using the application, errors would
occur.
!f the software installation settings are applied through computer configuration, they are applied at
startup. !f software installation settings are applied through user configuration, they are applied at logo
1T44) &lient%5erver 1etworking II Page / of 4 'eek 6, 7)%3() 8essons 7 a5teve Todd
-
5/21/2018 NT1330 Week 8, Unit 8 Exercise 8
3/3
Davonte Brown
!f the computer is running 'indows 0P with logon optimi2ation enabled, the user will need to log on
after Group Policy refresh. his can entail logging on two or three times.
Administrators can turn off Fast )ogon 1ptimi2ation, by using the Always wait for the network at
computer startup and logonpolicy setting in the Computer Configuration\Administrative
Templates\System\Logonnode of Group Policy 1b4ect #ditor. 5ope this helped that was my essay thank
you for reading.
1T44) &lient%5erver 1etworking II Page 4 of 4 'eek 6, 7)%3() 8essons 7 a5teve Todd
top related