Group policy has many advantages and disadvantages. While reviewing the course material and looking on line for additional information, I found that the largest disadvantage is incorrect configuration having adverse effects on the user community and the security of the system. For instance, if a user is required to follow excessive rules for creating a password, it may sound good because harder passwords are also more challenging to crack. The opposite side of that is the user may forget the password more easily. This may result in more account lockouts or even more likely, the user will write the password down. This ends up having a decrease in security even though the intent was to increase security.
On the other hand, the advantages can be great. “This can be useful for locking down computers, restricting access to specific folders, control panel applets, and applications. It can also be used to change a variety of Windows settings, including ones that can’t be changed from the control panel or require registry tweaks to change. (Hoffman, 2012)” With GPOs properly configured, not only do you decrease the risk of someone being able to attack the system from the outside, you can also protect your system(s) from accidental or malicious actions from your user population.
Hoffman, C. (2012, 09 25). How-To Geek. Retrieved 09 18, 2015, from HTG Explains: What Group Policy Is and How You Can Use It: http://www.howtogeek.com/125171/htg-explains-what-group-policy-is-and-how-you-can-use-it/
Software Restriction Policies. These policies “allow an organization to control the applications that run in the environment” (TestOut). The nice thing about software restriction is that it allows the administrator to determine just what software they want to allow on the computers within the domain. Software Restriction Policies also let administrators select certain conditions that must be met for software to run.
Software restriction policies’ conditional restrictions are a great security benefit. Anything that makes a network more secure is vital to organizations these days. These types of policies would allow an administrator to determine whether or not to allow a type of software based upon things like their hash, certificates, network zones, and paths. To dive into those topics just slightly; a hash allows administrators to restrict software to only run if it matches the accepted hash value, which changes with each update of the software programs. Certificates allow administrators to restrict software to only run if the certificate of the publisher is trusted.They can also determine who can add or remove trusted publishers, such as managerial accounts.Network zone’s allow only software from specified, trusted zones to be run. Finally, a path restriction is just what it sounds like. Software is only allowed to run if it is located in an accepted location on the drive. All of these restrictions can be applied to every computer, domain, user, or OU, leaving all kinds of flexibility for the administrator and organization. (TestOut).
A large disadvantage to Software Restriction Policies would be using hash values to segregate the programs to run. These Hash values must be changed every time the program updates. I’m not sure about you but that would become real old real fast if it were my company. Path restrictions can cause many issues with Windows and smooth running features should an administrator forget to add system essential functions to an allowed path. (Posey)
Posey, B. (2004, September 1). Using Software Restriction Policies To Keep Games Off Of Your Network. Retrieved September 18, 2015, from http://www.windowsnetworking.com/articles-tutorials/netgeneral/Software-Restriction-Policies.html
Software Restriction Policies. (n.d.). Retrieved September 18, 2015, from https://technet.microsoft.com/en-us/library/hh831534.aspx
TestOut Corporation. (2015). LabSim for Windows Server Pro: Install and Configure (Instructor ed.). Pleasant Grove, Utah.
a. Functions of the nutrient Vitamin E – the main function of this vitamin in humans appear to be that of antioxidant. Vitamin E maintains the integrity of cell membranes throughout the body and protects the fats in low density from oxidation. It is suited to intercept free radicals and prevent a chain reaction of lipid destruction. There are there are several other functions that were found of Vitamin E, it is known to inhibit the activity of protein kinase C and affect the expression and activities of molecules and enzymes in immune and inflammatory cells. It has also shown to inhibit platelet aggregation to enhance vasodilation
b. Foods that are good sources of the nutrient: Olive oil, Soybean oil Corn oil, Canola oil,Safflower oil
Sunflower oil, Almonds, Hazelnut, Peanuts, Spinach, Carrot, Avocado (California)
c. What happens if a person is deficient in that nutrient (eg. the name of the deficiency, symptoms) severe Vitamin E deficiency is mainly neurological symptoms, impaired balance and coordination (ataxia), injury to sensory nerves (peripheral neuropathy), muscle weakness (myopathy), and damage to the retina of the eye (pigmented retinopathy).
d. Can the nutrient be toxic and if so at what amount, the studies that have been done on the sided effect and toxicity of Vitamin E has lasted only a few weeks to a months and the side effects occurring as a results of long term supplementation have not been adequately studied. The most possibility is that of impaired blood clotting which may increase hemorrhaging in some individuals. Any amount could be potentially harmful in causing hemorrhaging.
Please respond to the answers above with your thoughts