This work provides useful information for administrators who need to manage and secure their Windows 2000 networks. It teaches readers how to integrate Windows 2000 security into their existing Windows NT and legacy networking environments.Configuration 3 ^ Software Settings ffl Cj Wndow* Settings B Cj Admnstfetrve To ac _J Windows C a LJ System Q Logon CJ ... Pokey slow knk detection Regretry pokey processing H Internet Explorer Maintenance pokey processing fW Software Instalahon ... Much like the inheritance of ACLs, GPO settings flow from the top down, or may be better described as from furthest to ... Chapter 8: Group Policies 6.
|Title||:||Windows 2000 Security Handbook|
|Author||:||Philip Cox, Thomas Sheldon|
|Publisher||:||McGraw-Hill Osborne Media - 2001|