You are on page 1of 1

Tracey Ezzard-Pickett POS 421 Week 2 Communication and Security in Windows Server 2008 Discussion Questions

1. The steps for securing authentication are Design an authentication strategy, create account, secure the authentication process and train users. 2. To secure Active Directory accounts an Account Lockout Policy and Password Policy will have to be used for Group Policy security. 3. Delegated Authentication transpires when network service recognizes a request from a user and takes on the users identity. It would be used to start a new connection to a second network service. 4. Organizational Units are Active Directory containers that a person can put users, groups, computers and other organizational units. 5. Delegating permissions to a group is preferable because it is easier to update membership in a delegation group if someone leaves or a computer becomes inoperable.

You might also like