security tamplates

Posted on 2006-10-20
Medium Priority
Last Modified: 2010-03-19
I would like to know in which case should I use security templates?

Question by:jskfan
  • 2
LVL 15

Assisted Solution

by:Naser Gabaj
Naser Gabaj earned 400 total points
ID: 17771984
Greetings jskfan,

They are used to centralize security on many computers at one time.

Read more here:


Good Luck!
LVL 27

Expert Comment

ID: 17773404
We use them when we build our machines.  We have automated server builds (Normal file server, Domain Controller, DMZ server, etc) and part of the setup script is to template the box with the correct template to harden the server (File security/services/etc).

It's good for initial one time setup before you place the server into production.  Templating a box after it has been placed in production can cause problems since it can break things.  Install the OS/Configure/Template... ensure everything is working, if not fix it.   Then place into production.

Author Comment

ID: 17781243
how do I l know which template should I install?
LVL 27

Accepted Solution

Pber earned 600 total points
ID: 17795646
Depends on what you are doing:

See here for more info:

These are good places to start.  When we developed our custom templates for our servers it took several months.  the process is simple, but finding and fixing what the template broke can be time consuming.

Featured Post

Never miss a deadline with monday.com

The revolutionary project management tool is here!   Plan visually with a single glance and make sure your projects get done.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
LinkedIn blogging is great for networking, building up an audience, and expanding your influence as well. However, if you want to achieve these results, you need to work really hard to make your post worth liking and sharing. Here are 4 tips that ca…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

597 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question