nt1330 week 8, unit 8 exercise 8

Upload: mahlikbrown

Post on 12-Oct-2015

1.059 views

Category:

Documents


0 download

TRANSCRIPT

  • 5/21/2018 NT1330 Week 8, Unit 8 Exercise 8

    1/3

    Davonte Brown

    ITT Technical Institute3825 West Cheyenne Avenue, Suite 600

    North Las Veas, Neva!a 8"032

    NT#330 Client$Server Net%or&in II

    Wee& 8, 'nit 8 ( Intro!uction to )rou* +olicy Con-iurin the 'ser Co.*uter /nviron.ent 'sin )rou* +olicy

    Exercise

    or this /1ercise

    Please evaluate the information provided and after reading in the lessons for this week, answer the scenario deliverablThis exercise is due at the beginning of the next class meeting.

    Unit 8. Exercise 1. Administrative Control versus Trust: Research/Scenario

    Course 4ectives an! Learnin utco.es

    In this Exercise, ou will recommend policies to control user!computer configuration.

    Assin.ent euire.ents

    "eview the following scenario#

    $ou are an IT consultant and receive the following email from a client#

    %%%To# IT &onsultant

    'e have an existing network consisting of approximatel () workstations in a 'indows 'orkgroup environment. 'e d

    not currentl take advantage of local policies to control user!computer configuration, as it is too cumbersome to manageon each individual computer. 'e are implementing an *ctive Director Domain and are excited about the possibilit ofbeing able to control user and computer settings particularl from a securit perspective.

    'e understand that there are hundreds and hundreds of options for things we can control and are hoping ou can helpb recommending the most important initial policies+ sers have had complete control of their desktops up to this pointso we would like to strike a balance between trust and control-

    Thank ou

    %%

    "espond with recommendations.

    Su.ission euire.ents

    %/ pages, 0icrosoft 'ord

    Double%spaced

    Times 1ew "oman, / pt. font

    tili2e *P* 3 formatting

    Ensure that ou include a cover page and reference page.

    1T44) &lient%5erver 1etworking II Page of 4 'eek 6, 7)%3() 8essons 7 a5teve Todd

  • 5/21/2018 NT1330 Week 8, Unit 8 Exercise 8

    2/3

    Davonte Brown

    A number of special issues affect Group Policy software installation. For example, network connectivit

    issues can disrupt access to the software installation packages. Software installation processing is never

    performed while the user is logged on because doing so could disrupt work and result in data loss. his

    has implications when Group Policy is configured to run asynchronously.

    Software !nstallation is managed by the Software !nstallation "S#, which appears as the source

    Application $anager on the Policy #vents tab in Group Policy %esults reports. !f you need additional

    logging information, enable verbose logging for the Software !nstallation "S# and $icrosoft&

    'indows& !nstaller, as described under roubleshooting Group Policy (sing )og Files.

    he Software !nstallation *iagnostics tool +addiag.exe provides detailed information about the

    applications visible in Active *irectory and installed for the current user, as well as general diagnostic

    information and related #vent )og entries. !t is available in the 'indows - Server %esource /it. !n

    'indows 0P Professional, the Fast )ogon 1ptimi2ation feature is set by default for both domain and

    workgroup members. As a result, 'indows 0P does not wait for the network to be fully initiali2ed at

    startup and logon. #xisting users are logged on using cached credentials. his results in shorter logon

    times. Group Policy is applied in the background after the network becomes available. 3ote that becau

    this is a background refresh, extensions such as Software !nstallation and Folder %edirection take two

    logons to apply changes.

    Software !nstallation processing occurs only during computer startup or when the user logs on. his is

    because processing periodically could cause undesirable results. For example, if an application is no

    longer assigned, it is removed. !f a user were using the application while Group Policy tries to uninstall

    or if an assigned application upgrade takes place while someone is using the application, errors would

    occur.

    !f the software installation settings are applied through computer configuration, they are applied at

    startup. !f software installation settings are applied through user configuration, they are applied at logo

    1T44) &lient%5erver 1etworking II Page / of 4 'eek 6, 7)%3() 8essons 7 a5teve Todd

  • 5/21/2018 NT1330 Week 8, Unit 8 Exercise 8

    3/3

    Davonte Brown

    !f the computer is running 'indows 0P with logon optimi2ation enabled, the user will need to log on

    after Group Policy refresh. his can entail logging on two or three times.

    Administrators can turn off Fast )ogon 1ptimi2ation, by using the Always wait for the network at

    computer startup and logonpolicy setting in the Computer Configuration\Administrative

    Templates\System\Logonnode of Group Policy 1b4ect #ditor. 5ope this helped that was my essay thank

    you for reading.

    1T44) &lient%5erver 1etworking II Page 4 of 4 'eek 6, 7)%3() 8essons 7 a5teve Todd