Project #42197 - Windows Server Discussion Questions #2

NO PLAGIARISM

 

#1Answer in AT LEAST 200 words:

What is an Access Control List (ACL)? What does it do?

 

#2 Reply to other classmates response to the question #1 (Say you agree or disagree and elaborate on the response):

Access Control Lists are a security mechanism that is used to list those that have access to the resources that the list applies to. This list can determine whether or not network traffic is allowed to pass if it matches a certain criteria. The criteria can be a particular IP address, subnet, port number or any other criteria that the administrator requires.  For example, at my company we have a list of available pairs that we can use to move someone's phone line to if we are authorized to see that list. Then there is a second of protection that is involved that also requires that you have the necessary level of authority that will allow you to actually make the change. This is a perfect example of the type of list that also uses firewalls to allow certain users to have access to some portions of the files, while others have complete access. However, one article that I was reading stated that if ACL was the only type of security that was in place it would be a pretty weak security measure.

 

#3  Reply to other classmates response to the question #1 (Say you agree or disagree and elaborate on the response):

What is an Access Control List (ACL)? What does it do? An Access Control List (ACL) is a table that tells a computer operating system, which access rights each user has to a particular system object for ex: a file directory or an individual file. Every object has a security attribute that identifies its access control list; this list has an entry for each system user with access privileges. An (ACL) is basically a network filter that is utilized by routers and switches that permits and restricts the flow of data in and out of network interfaces. There are several reasons why ACLs are used; a major and common reason is to provide the security for a network at the basic level. Even though ACLs are not as complex as a firewall they often provide a better sense of protection on high-speed interfaces. They also offer a significant amount of firewall capability. ACLs are also used to prevent updates in regards to routing from network peers, basically defining the control of flow on network traffic. There are certain situations when ACLs should be used, the ideal scenario would be to place it on external routers in order to filter traffic against the least desirable networks

 

#4 Answer in AT LEAST 200 words:

What is a Group Policy Object (GPO)? What does it contain?

 

#5 Reply to other classmates response to the question #4 (Say you agree or disagree and elaborate on the response):

A Group Policy Object (GPO) is a collection of settings that define what a system will look like and how it will behave for a defined group of users.  It is mainly used to restrict the user activity by allowing or denying software programs to deploy the software in network to apply Folder Redirection. Group Policy Objects (GPO) has more than 3000 different settings. Creating GPO, you can enable or disable restrictions on your Server.  It also allows an administrator to perform functions such as disabling a specific drive on your system while still allowing access to others on a network.  A Group Policy Object (GPO) also can provide some forms of security features.  It can limit the access to a specific drive to prevent information from being accessed by unauthorized users on the network.  Group Policy Objects are actually composed of two parts, the Group Policy Container (GPC) which exists in Active Directory and the Group Policy Template (GPT) where the actual content of your GPOs resides.  A third component, which is known as the Client-Side Extensions (CSEs), can be found on client devices and are necessary for them to properly process the Group Policies that are assigned to them.

 

#6 Reply to other classmates response to the question #4 (Say you agree or disagree and elaborate on the response):

Group Policy is an infrastructure that allows you to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory directory service containers: sites, domains, or organizational units (OUs). The settings within GPOs are then evaluated by the affected targets, using the hierarchical nature of Active Directory. Consequently, Group Policy is one of the top reasons to deploy Active Directory because it allows you to manage user and computer objects. You can use the Group Policy Management Console (GPMC) to create and edit Group Policy objects (GPOs).

 

 

 

A Group Policy Object (GPO) is a collection of settings that define what a system will look like and how it will behave for a defined group of users. One of the most insecure settings that can be granted to an end user is local administrative access. By adding the user account to the local Administrators group, the user is being granted nearly ultimate control over their desktop. The user can perform almost any action, even if the network is configured to deny this access. With Windows server 2008 Group Policy, the current user can be removed from the local Administrators group with just one simple policy.

 

Subject Computer
Due By (Pacific Time) 10/05/2014 04:00 pm
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy