Computers and Technology

Create a gpo that meets the following requirements:

1.set computer security policies that affect all computers as follows:

a. deny guests the ability to log on to computers from the network.
b. do not display the last username that logged on to a computer.
c. do not allow a system to be shut down unless somebody is logged on.
d. when logon hours expire, users should be logged off the system.

2. set the following additional policies that affect all computer accounts:

a. change the default group policy refresh interval to 45 minutes for computers, with the random time interval set to 15 minutes.
b. configure user profiles to be deleted after 90 consecutive days of nonuse.
c. configure windows update so that updates are downloaded and installed automatically every day at 3: 00 a. m

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 11:30, LindseyN1
One subtask in the game is to roll the dice. explain why is roll the dice an abstraction.
Answers: 3
image
Computers and Technology, 22.06.2019 19:20, mahaleyrenee1195
How might the success of your campaign be affected if you haven’t carefully completed all field data or if you accidentally insert the wrong merge field in the document?
Answers: 2
image
Computers and Technology, 23.06.2019 02:30, noah2o2o
These factors limit the ability to attach files to e-mail messages. location of sender recipient's ability to open file size of file type of operating system used
Answers: 2
image
Computers and Technology, 23.06.2019 04:31, mjweed3381
Cloud computing service providers manage different computing resources based on the services they offer. which resources do iaas and paas providers not manage? iaas providers do not manage the for the client, whereas paas providers usually do not manage the for their clients. iaas- storage server operating system network paas- applications interafce storage vertualiation
Answers: 2
Do you know the correct answer?
Create a gpo that meets the following requirements:

1.set computer security policies t...

Questions in other subjects:

Konu
Mathematics, 16.07.2020 18:01
Konu
Mathematics, 16.07.2020 18:01