How to Configure and Use Administrative Templates

To configure and use administrative templates, open a online MCTS certification and navigate to the Administrative Templates section of the computer or user node of the GPO. The loca?tion is shown in Figure 11-10. Double-click a specific container in the template to change its settings. An open template container property page is shown in Figure 11-11. When the GPO is downloaded by the client, the settings will be applied. Admin?istrative template settings will be displayed in the Group Policy Management Console.
Consider the following security options, event log settings, restricted groups, services settings, and object permission settings in your security template design:
Consider limiting the number of logon credentials that are cached locally. These credentials are used when a domain controller is not available. Setting cached logon credentials to 0 prevents logon if no domain controller is available. This setting might be appropriate for highly sensitive client
computers, but it is not acceptable for laptop computers, as they will frequently be used where domain controllers are not available for logon. Consider setting sensitive laptops to 1. However, remember that the last logon is the one that will be MCTS benefits cached. If an administrator or technician logs on to the laptop for any reason, her or his credentials will be cached. Unless the authorized user of the laptop logs on and off before disconnecting from the network, the authorized user will not be able to log on to the laptop until it is connected to the network.
Consider enabling the security option Do Not Allow Storage Of Credentials Or .NET Passports For Network Authentication. If you enable this option, users will not be able to store Passport credentials and credentials used to log on to remote servers and workstations on their client computers, and therefore they will have to type them in each time they want to use them. Not storing cre?
dentials makes the access to applications, Web sites, databases, and so on safer.
However, when users have multiple passwords to remember, they are more likely to write them down, use a weak password, or both. You will have to evaluate which approach poses the most risk MCSE study guides free download for your organization.

Article Source

Related articles

Leave comment

You mast been loged for comments.