Complete project 2-3: Work with MMC and Group Policy p.101 Instructions: In this project, you use the Microsoft Management Console (MMC) and load a snap-in called Local Group Policy Editor. Group Policy is used to configure aspects of your system, including the working environment. In a Windows domain, the IT administrator can configure Group Policy on Windows Serves that are pushed down to all domain members to maintain consistent security and working environment for all client computers. 1. Logon to Windows. 2. Click the Search the web and Windows text box, type mmc, press Enter, click Yes. 3. In the console that opens, click File, click Add/Remove Snapin. In the Add or Remove Snap-ins dialog box, browse through the available snap-ins. Scroll down and click Group Policy Object Editor (part of the name might be cut off) and click Add. 4. In the Select Group Policy Object Window, click Finish, Click OK. 5. In the left pane of the console, click to expand Local Computer Policy, Computer Configuration, and Windows Settings. Then click Security settings. In the right pane, double-click Account Policies and the Password Policy. This is where policies are configured that control password and account lockout setting: 6. In the left pane, click to expand User Configuration and Administrative Templates, and the click Control Panel. The right pane displays a number of settings for Control Panel. The Control Panel can be completely disabled or customized with those settings. 7. Browse through some additional settings. In a domain environment, the administrator can configure any of these settings to affect selected users and computers in the domain. Close the console. When prompted to save the setting CLICK NO.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
11:22
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CurrentVersion\Authentication
and then click LoginU1. The right pane displays a number of values related to the
current user. (Figure 2-16 in book, pg 100).
5. In the left pane of the registry editor, navigate to
HKEY_CURRENT_USER\Control Panel. Right clickcontrol panel and click Find. In
the Find dialog box, click to uncheck Keys and Data, leaving only Values checked.
In the Find what box, type Wallpaper and click Next. The value shows the path to
the wallpaper used by the current user.
6. Close the Registry Editor.
Complete project 2-3: Work with MMC and Group Policy p.101
Instructions:
*NO 77%
In this project, you use the Microsoft Management Console (MMC) and load a
snap-in called Local Group Policy Editor. Group Policy is used to configure
aspects of your system, including the working environment. In a Windows
domain, the IT administrator can configure Group Policy on Windows Serves that
are pushed down to all domain members to maintain consistent security and
working
for all client compute
1. Logon to Windows.
2. Click the Search the web and Windows text box, type mmc, press Enter, click
Yes.
3. In the console that opens, click File, click Add/Remove Snapin. In the Add or
Remove Snap-ins dialog box, browse through the available snap-ins. Scroll down
and click Group Policy Object Editor (part of the name might be cut off) and click
Add.
4. In the Select Group Policy Object Window, click Finish, Click OK.
5. In the left pane of the console, click to expand Local Computer Policy,
Computer Configuration, and Windows Settings. Then click Security settings. In
the right pane, double-click Account Policies and the Password Policy. This is
where policies are configured that control password and account lockout settings.
6. In the left pane, click to expand User Configuration and Administrative
Templates, and the click Control Panel. The right pane displays a number of
settings for Control Panel. The Control Panel can be completely disabled or
customized with those settings.
7. Browse through some additional settings. In a domain environment, the
administrator can configure any of these settings to affect selected users and
computers in the domain. Close the console. When prompted to save the settings
CLICK NO.
Complete project 2-7: Find Files in Linux p.104 (note that terminal is space,
spelling, and punctuation sensitive)
Instructions:
In Linux, you can search for a file using the find command from the Terminal
vindar Alkarnativalu vou can in the search tool in the GNOME Activities
ips on GNOME interface with pictures
nome-help/stable/shell-introduction.html.en)
Submit
Cancel
Transcribed Image Text:11:22 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\CurrentVersion\Authentication and then click LoginU1. The right pane displays a number of values related to the current user. (Figure 2-16 in book, pg 100). 5. In the left pane of the registry editor, navigate to HKEY_CURRENT_USER\Control Panel. Right clickcontrol panel and click Find. In the Find dialog box, click to uncheck Keys and Data, leaving only Values checked. In the Find what box, type Wallpaper and click Next. The value shows the path to the wallpaper used by the current user. 6. Close the Registry Editor. Complete project 2-3: Work with MMC and Group Policy p.101 Instructions: *NO 77% In this project, you use the Microsoft Management Console (MMC) and load a snap-in called Local Group Policy Editor. Group Policy is used to configure aspects of your system, including the working environment. In a Windows domain, the IT administrator can configure Group Policy on Windows Serves that are pushed down to all domain members to maintain consistent security and working for all client compute 1. Logon to Windows. 2. Click the Search the web and Windows text box, type mmc, press Enter, click Yes. 3. In the console that opens, click File, click Add/Remove Snapin. In the Add or Remove Snap-ins dialog box, browse through the available snap-ins. Scroll down and click Group Policy Object Editor (part of the name might be cut off) and click Add. 4. In the Select Group Policy Object Window, click Finish, Click OK. 5. In the left pane of the console, click to expand Local Computer Policy, Computer Configuration, and Windows Settings. Then click Security settings. In the right pane, double-click Account Policies and the Password Policy. This is where policies are configured that control password and account lockout settings. 6. In the left pane, click to expand User Configuration and Administrative Templates, and the click Control Panel. The right pane displays a number of settings for Control Panel. The Control Panel can be completely disabled or customized with those settings. 7. Browse through some additional settings. In a domain environment, the administrator can configure any of these settings to affect selected users and computers in the domain. Close the console. When prompted to save the settings CLICK NO. Complete project 2-7: Find Files in Linux p.104 (note that terminal is space, spelling, and punctuation sensitive) Instructions: In Linux, you can search for a file using the find command from the Terminal vindar Alkarnativalu vou can in the search tool in the GNOME Activities ips on GNOME interface with pictures nome-help/stable/shell-introduction.html.en) Submit Cancel
Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY