This is a mirror of official site: http://jasper-net.blogspot.com/

Step-by-Step Guide to Using the Security Configuration Tool Set

| Tuesday, March 8, 2011
This step-by-step guide describes how to view, configure, and analyze local security policy and local security settings using various components of the Security Configuration Tool Set included with the Windows® 2000 operating system.

On This Page

Introduction 
Viewing and Modifying Local Security Policy 
Working with Security Templates 
Performing a Security Analysis 
Configuring System Security 
Command-line Configuration and Analysis 
Pre-defined Security Templates 

...
...

Performing a Security Analysis

You can analyze current system settings against a baseline template at anytime. Performing an analysis is useful for several different reasons:
  • To identify security holes that may exist in a current configuration.
  • To identify changes that a potential security policy may impart to a system, before actually deploying the security policy.
  • To identify deviations from a policy that is currently imposed on a system.
During this part of the guide, you will analyze the current system settings against the custom security template you created in the previous section. If you assume that the custom security template defines a more secure configuration, this analysis should identify security holes that may exist in the current system configuration, and can also identify changes that will take place if this template is used to configure the system.

To load the Security Configuration and Analysis MMC snap-in:

  1. On the Start menu, click Run and type: MMC /s
  2. From the Console menu, select Add\Remove Snap-in, and click Add.
  3. Select Security Configuration and Analysis.
  4. Click Add and then click Close. Click OK.

Posted via email from Jasper-net

0 comments: