Overview

Introduction

The Configure Security Policies module provides you with the instruction and server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:

  • Configure User Rights Assignment
  • Configure Security Templates
  • Configure Local Users and Groups

Exercise 1 - Configure User Rights Assignment

In this exercise, you will perform the tasks required to configure security policies.

Exercise 2 - Configure Security Templates

Configuring security templates can be performed on local workstations as well especially on cases where you have a standalone computer being used in an isolated lab test environment. Mostly, you will prepare a security template and then save the template to be rolled out to the other workstations. This is done to keep consistency security across the workstations.

Exercise 3 - Configure Local Users and Groups

In this exercise, you will perform the tasks required to configure GPO’s in order to manage local users and groups.

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.