Solved

security tamplates

Posted on 2006-10-20
4
237 Views
Last Modified: 2010-03-19
I would like to know in which case should I use security templates?

thanks
0
Comment
Question by:jskfan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 15

Assisted Solution

by:Naser Gabaj
Naser Gabaj earned 100 total points
ID: 17771984
Greetings jskfan,

They are used to centralize security on many computers at one time.

Read more here:

http://www.windowsecurity.com/articles/Understanding-Windows-Security-Templates.html

Good Luck!
Naser
0
 
LVL 26

Expert Comment

by:Pber
ID: 17773404
We use them when we build our machines.  We have automated server builds (Normal file server, Domain Controller, DMZ server, etc) and part of the setup script is to template the box with the correct template to harden the server (File security/services/etc).

It's good for initial one time setup before you place the server into production.  Templating a box after it has been placed in production can cause problems since it can break things.  Install the OS/Configure/Template... ensure everything is working, if not fix it.   Then place into production.
0
 

Author Comment

by:jskfan
ID: 17781243
how do I l know which template should I install?
0
 
LVL 26

Accepted Solution

by:
Pber earned 150 total points
ID: 17795646
Depends on what you are doing:

See here for more info:
http://www.microsoft.com/technet/security/prodtech/windowsserver2003/w2003hg/sgch00.mspx
http://www.windowsecurity.com/articles/Hardening-Servers-Security-Templates.html
http://www.windowsecurity.com/articles/Baselining-Security-Templates.html

These are good places to start.  When we developed our custom templates for our servers it took several months.  the process is simple, but finding and fixing what the template broke can be time consuming.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question