SlideShare a Scribd company logo
PRESENTED
BY
EMMANUEL AKPEOKHAI
Firstly, let’s define Organisation Policy
A policy is a course of action or guidelines to
be followed in an organisation.
Security policy is an organisations first line of
defence to start with.
 Active Directory
Active Directory Domain Services is Microsoft's
Directory Server. It provides authentication and
authorization mechanisms it uses LDAP,
KERBEROS & DNS
Access Control List
ACL is a list of permission assigned to an object. The
ACL is a list of each object and user access privileges
such as read, write or execute.
Domain and a Forest
 A domain is a management/administrative
boundary. Domains are part of a forest. The
first domain in a forest is known as the forest
root domain.
 forest is a security boundary
 A DC does authentication or authorization. In
most cases, a Domain Controller will hold a
copy of the global catalogue.
 A Global catalogue (GC) is a partial set of
objects in all domains in a forest. It is directly
searchable.
Group policy
Group Policy is an administrative tool for
managing user settings and computer settings
across a network.
It is an important administrative tool in
implementing an organisation policy.
Group Policy settings are contained in Group
Policy objects (GPOs), which are linked to the
following Active Directory service containers:
sites, domains, or organizational units (OUs).
Group Policy Management
 All policies should be applied quickly, so that
users do not feel a significant impact by their
processing.
 All policies should be as easy as possible to
administer and maintain.
 Documentation is very important
Combating Slowdown Due To Gpos
if you apply too many policies, there will be a
system slowdown.
But there are no good guidelines for how many
policies to apply.
 GPOs apply only to sites, domains, and
Organizational Units.
 A single GPO can be linked to multiple
locations in the tree.
 GPOs by default affect all of the users and
computers in a container.
1) Centrally Maintain – the settings only need to be
configured in active directory and it can apply for whole
network without configuring individual PC
2) Prevent users from changing sensitive settings –like
firewall, antivirus and proxy settings.
3) Rules can be applied for users or Computers – user
rules will apply for any pc he login in network.
4) Users will not be able to bypass the rules or edit
them – without permissions users will find it difficult to
change these policies in user level. Its hard to bypass as
well. So its more secure.
5) No changes needed if new users or computers are
added
6) security measures are put in place
Identifying Settings Related to Password Policies
Enforce password history determines the number of
unique new passwords a user must use before an old
password can be reused.
Maximum password age determines how many days a
password can be used before the user is required to
change it.
Minimum password age
Minimum password length determines how short
passwords can be.
Passwords must meet complexity requirements
The password is at least six characters long.:
English uppercase characters (A - Z)
English lowercase characters (a - z)
Base 10 digits (0 - 9)
Non-alphanumeric (For example: !, $, #, or %)
 Requirements
 Credentials: You must be logged on as a member of
the Domain Admins group.
 To implement Group policy on computer systems
that belong to an Active Directory domain
◦ Click Start,
◦ Click Control Panel,
◦ Double-click Administrative Tools,
◦ Then Double-click GROUP policy management.
◦ Right-click the root container for the domain:
◦ Right click the GPO then click on EDIT
Implementing group policy settings
 Individual GPOs can be linked to multiple sites, domains, and
Organizational Units in Active Directory as required.
 GPOs are inherited down the Organizational Unit hierarchy by
default.
 A number of things can slow down processing on a client,
including attempting to process many policies one after the
other. Use of loopback, especially in merge mode, can
significantly impact this. Attempting to apply GPOs across
domains can also lead to slowdowns depending on the network
speed between the domains.
 When policies are to be applied to a client, the system identifies
the entire list of policies to be applied before actually applying
them in order.
 Finally, both user profiles and policies can be applied across a
slow link, but the speed that the system uses to determine
whether a link is slow is configurable by the administrator within
an individual GPO.
 CONCLUSION
In conclusion, this presentation is to display the
effectiveness of An organization security policy
system in ensuring CIA ,
This policy is not meant to replace physical
security policies Rather it is meant to support it.
RECOMMENDATION
 Government
 Financial institutions
 Military
 Hospitals
 Other Business Organizations

More Related Content

Similar to Domain wide organisation policy

70 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 04100970 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 041009
Coffeyville Community College
 
10 implementing GPOs
10 implementing GPOs10 implementing GPOs
10 implementing GPOs
Hameda Hurmat
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1
denogx
 
User account policy
User account policyUser account policy
User account policy
Muuluu
 
Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy AD
sentmery5
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
Wiliam Ferraciolli
 
Group policy Best Practices
Group policy Best PracticesGroup policy Best Practices
Group policy Best Practices
Rob Dunn
 
2Windows Server Proposal for Dynamic SolarKelvin L.docx
2Windows Server Proposal for Dynamic SolarKelvin L.docx2Windows Server Proposal for Dynamic SolarKelvin L.docx
2Windows Server Proposal for Dynamic SolarKelvin L.docx
tamicawaysmith
 
Group Policy
Group PolicyGroup Policy
Group Policy
Chris Watson
 
Group policy preferences
Group policy preferencesGroup policy preferences
Group policy preferences
Rob Dunn
 
Group policy objects
Group policy objectsGroup policy objects
Group policy objects
MianMuhammadMuaz
 
Security Authorization Strategy
Security Authorization StrategySecurity Authorization Strategy
Security Authorization Strategy
Vicente Rodriguez Eguibar
 
Active directory job_interview_preparation_guide
Active directory job_interview_preparation_guideActive directory job_interview_preparation_guide
Active directory job_interview_preparation_guide
abdulkalamattari
 
A.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptxA.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptx
RosannaFranciscoFlor
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
MulunehBardadeYegeta
 
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, NokiaDeployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
mfrancis
 
Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
gameaxt
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
pabatan
 

Similar to Domain wide organisation policy (20)

70 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 04100970 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 041009
 
10 implementing GPOs
10 implementing GPOs10 implementing GPOs
10 implementing GPOs
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1
 
User account policy
User account policyUser account policy
User account policy
 
Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy AD
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
Group policy Best Practices
Group policy Best PracticesGroup policy Best Practices
Group policy Best Practices
 
2Windows Server Proposal for Dynamic SolarKelvin L.docx
2Windows Server Proposal for Dynamic SolarKelvin L.docx2Windows Server Proposal for Dynamic SolarKelvin L.docx
2Windows Server Proposal for Dynamic SolarKelvin L.docx
 
Group Policy
Group PolicyGroup Policy
Group Policy
 
Group policy preferences
Group policy preferencesGroup policy preferences
Group policy preferences
 
Group policy objects
Group policy objectsGroup policy objects
Group policy objects
 
Security Authorization Strategy
Security Authorization StrategySecurity Authorization Strategy
Security Authorization Strategy
 
Active directory job_interview_preparation_guide
Active directory job_interview_preparation_guideActive directory job_interview_preparation_guide
Active directory job_interview_preparation_guide
 
A.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptxA.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptx
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
 
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, NokiaDeployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
 
Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 

Recently uploaded

制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 

Recently uploaded (20)

制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 

Domain wide organisation policy

  • 2. Firstly, let’s define Organisation Policy A policy is a course of action or guidelines to be followed in an organisation. Security policy is an organisations first line of defence to start with.
  • 3.  Active Directory Active Directory Domain Services is Microsoft's Directory Server. It provides authentication and authorization mechanisms it uses LDAP, KERBEROS & DNS
  • 4.
  • 5. Access Control List ACL is a list of permission assigned to an object. The ACL is a list of each object and user access privileges such as read, write or execute.
  • 6. Domain and a Forest  A domain is a management/administrative boundary. Domains are part of a forest. The first domain in a forest is known as the forest root domain.  forest is a security boundary
  • 7.  A DC does authentication or authorization. In most cases, a Domain Controller will hold a copy of the global catalogue.  A Global catalogue (GC) is a partial set of objects in all domains in a forest. It is directly searchable.
  • 8. Group policy Group Policy is an administrative tool for managing user settings and computer settings across a network. It is an important administrative tool in implementing an organisation policy. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory service containers: sites, domains, or organizational units (OUs).
  • 10.  All policies should be applied quickly, so that users do not feel a significant impact by their processing.  All policies should be as easy as possible to administer and maintain.  Documentation is very important Combating Slowdown Due To Gpos if you apply too many policies, there will be a system slowdown. But there are no good guidelines for how many policies to apply.
  • 11.  GPOs apply only to sites, domains, and Organizational Units.  A single GPO can be linked to multiple locations in the tree.  GPOs by default affect all of the users and computers in a container.
  • 12. 1) Centrally Maintain – the settings only need to be configured in active directory and it can apply for whole network without configuring individual PC 2) Prevent users from changing sensitive settings –like firewall, antivirus and proxy settings. 3) Rules can be applied for users or Computers – user rules will apply for any pc he login in network. 4) Users will not be able to bypass the rules or edit them – without permissions users will find it difficult to change these policies in user level. Its hard to bypass as well. So its more secure. 5) No changes needed if new users or computers are added 6) security measures are put in place
  • 13. Identifying Settings Related to Password Policies Enforce password history determines the number of unique new passwords a user must use before an old password can be reused. Maximum password age determines how many days a password can be used before the user is required to change it. Minimum password age Minimum password length determines how short passwords can be. Passwords must meet complexity requirements The password is at least six characters long.: English uppercase characters (A - Z) English lowercase characters (a - z) Base 10 digits (0 - 9) Non-alphanumeric (For example: !, $, #, or %)
  • 14.  Requirements  Credentials: You must be logged on as a member of the Domain Admins group.  To implement Group policy on computer systems that belong to an Active Directory domain ◦ Click Start, ◦ Click Control Panel, ◦ Double-click Administrative Tools, ◦ Then Double-click GROUP policy management. ◦ Right-click the root container for the domain: ◦ Right click the GPO then click on EDIT
  • 16.
  • 17.  Individual GPOs can be linked to multiple sites, domains, and Organizational Units in Active Directory as required.  GPOs are inherited down the Organizational Unit hierarchy by default.  A number of things can slow down processing on a client, including attempting to process many policies one after the other. Use of loopback, especially in merge mode, can significantly impact this. Attempting to apply GPOs across domains can also lead to slowdowns depending on the network speed between the domains.  When policies are to be applied to a client, the system identifies the entire list of policies to be applied before actually applying them in order.  Finally, both user profiles and policies can be applied across a slow link, but the speed that the system uses to determine whether a link is slow is configurable by the administrator within an individual GPO.
  • 18.  CONCLUSION In conclusion, this presentation is to display the effectiveness of An organization security policy system in ensuring CIA , This policy is not meant to replace physical security policies Rather it is meant to support it. RECOMMENDATION  Government  Financial institutions  Military  Hospitals  Other Business Organizations