You are on page 1of 7
CND Lab Manual Network Security Policy Design and Implementation Module 04 TON KEY Vato Infoamiton AF Ten Yous —_Beowledge Web Brerise 2A Workbook Review "Module 04 - Network Security Policy Design and Implementation Implementing Policies using the Group Policy Management Console (GPMC) ‘The Group Policy Management Console (GPMC) is a scriptable Microsoft Management Console (MMC) snap-in, providing a single administrative too! for ‘managing Group Policy across the enterprise. GPMC 1s the standard tool for managing Group Policy. Lab Scenario Administrators use GPMC to pesfosm all Group Policy management tasks with, the exception of configusing individual policy settings in Group Policy Objects shemselves. This is done with Group Policy Object Editor. The scenasios below describe how an administrator uses GPMC to manage Group Policy. Lab Objectives This lab demonstrates how to use Group Policy Management. Lab Environment To casey out this lab, you need: A virtual machine maning Windows Server 2008 A vierwal machine maning Windows 10 Lab Duration ‘Time: 20 Mines Overview of the Lab Gronp Policy Preferences, introduced in Windows Server 2008, provide more than ‘sweaty Group Policy exteasions that expand the sage of configurable preference settings in a Group Policy object (GPO). Gsoup Policy lets you manage dsive (END Lab Maal Page 99 ‘Getifed Nerwork Defender Copy © by EC Counel ‘AU Rights Revd Repeehccon Stat Pete Modul 04 - Network Security Policy Design and implementation mappings, registry settings, local users and groups, services, files, and folders without ‘the need to leam a scripting language. Lab Tasks Before starting this lab make sure that the Windows 10 machine is turned on, 1. Launch the Windows Server 2008 machine and log in as a domain Task 4 Launch Group ne Policy administrator Management 2, Once you have logged in, close the Secver Manager window, if it appears. 3. To launch Group Policy Management, navigate to Start > Administrative Tools and click Group Policy Management as shown in the screenshot 4, Altematively you can also launch by typing gpme.mse in the Start Search field and press Enter to launch, “The GPMC uses Se hat ave ad, adi and dnl extensions to dapay ‘he fendy mans of peli rss when ‘eoecrtag HTML cepocs BieGPO» Grow Pokey Moding sod Group Policy Rem. These epson et yon conte tbe Teestion fom which he GPMC wads only adn oe FIGURE 1 Linch Geo Pee Manages ‘END Tab Mannal Figs 100 ‘Cabed Nework Defender Coprieit © by Ee Council (ALRigbts Reserved Repredcaon Stat Pred ‘Module 04 - Network Socurity Policy Design an! Implomontation 5. ‘The Group Policy Management main window appears as showa in the serceashot. Expand the Forest: CND.com domain tee wlio IES ‘wa rane “ro ciOsrt oi ny Woe [— FIGURE 1.5: Dent Donia Pokey 7. Click to expand the Policies, Windows Settings and Security Settings, right-click on Account Policies/Password Policy and click Edit from the contest memu as shown in the screenshot. ‘END Lab Mannal Fags 107 ‘Gaited Nerwok Defender Copii © by EE Counel (ALRigbts Reserved Repredcaon Stat Pred ‘Module 04 - Network Socurity Policy Design an! Implomontation 8. With this you can configure the password policies for domain users. mater Crip (Embed) FIGURE 14 ing count Pie /Pucoocd Poy 9. In this lab we are going to set the password policies for the domain users. The Group Policy Management Editor Window appears; expand Computer Coafiguration > Policies > Windows Settings > Secusity Settings > Account Policies and click Password Policy in the left pane. 10, As soon as you click on Password Policy in the left pane you will see the CSS Policy and its Policy Settings in the sieht pane as shown in the ‘Bese Dawson eiloay Mt oc ovis on tember seen Ifthe feosdeetrecamfetyietewts aie Socpmusirorgrenmsecnpen ned ‘END Tab Maal Page 103 ‘Gaited Nerwok Defender Copii © by EE Counel (ALRigbts Reserved Repredcaon Stat Pred FIGURE 1 6 Pasowoe Poses 12, The selected policy properties window appears; you can define the policy settings under the Secusity Policy Setting tab Sy ‘Thee poley seing ce ‘ed foc dona ot ea seer accomnts They ‘Geramstances to length ‘of ume that aa secon wi belockad omar he [FIGURE L7. apes of Poy 13, In the Explain tab yon will have a brief deseription of the selected policy, scad the explanation and edit the policy following your organization’s policy. ‘END Tab Maal Page 105 “Carined Nerwork Defender Copright © by EE Counell "AU Rights Reese. Repeedction Stacy Probate ‘Module 04 - Network Socurity Policy Design an! Implomontation 114, Click the OK button to close the policy properties window. plex reasrements Prove ‘Kasbesos Poke: These oe sein ae med or omain wer secon ‘They dersmine Kerbeor eked stung och 0 ‘eket Wetanes and ‘ofererent Keine policy stings do not exist info compte poly FIGURE 18: Paty Esplanon 15, Similarly, you can configure the Password Policies accosding to your organization's policies. Lab Analysis “Analyze and document the results of the lab exercise. Give your opinion on your ‘target's security postuse and exposure through free public information. PLEASE TALK TO YOUR INSTRUCTOR IF YOU HAVE QUESTIONS ‘ABOUT THIS LAB. ers ee) OYes Z Classroom ‘END Tab Manval Page 07 ‘Cored Neewonk Detar opr © by Ee Counell "AU Rights Reese. Repeedction Stacy Probate

You might also like