AL-DELEIMI'S+WIKI


 * Configure and Administer a Network operating system **
 * Formative Assessment Part-1 **

=
Q1. Review the network policies of Metropolitan South TAFE—when you log in into support in lab a301, a set of Internet and Network usage policies are downloaded to your machine. Make critical comment on each one of those policies i.e whether it is appropriate in today’s academic context (is it restrictive in the performance of student tasks), is it relevant with student network behaviour etc which computers we are using. =====

It can be access by teachers and other students. They have lots of work on that computer. Everyone wants to save his work nobody can access that work. That policy is same for teachers and students. The rights of all to be safe practices that comply relevant legislation. this policy provide quality learning opportunities. When are you using the network or facilities you must be honest and act all time lawfully. Follow the rules that apply to you. For example the TAFE students have some rules. Those are here on this web address [|http://www.tafe.qld.gov.au/resources/pdf/studentrules .pdf] if unauthorized person can access this facility may be result in disciplinary and action be taken against that person. The code of school behavior give you instructions for student behavior if you do good behavior it give you better learning environment and providing quality learning opportunities. [].

=
Q2. Investigate and describe network administration tools both built into the network operating system and third party tools that can be used to enforce organizational policies. =====

Local security policy set the security for local host computer. There are some policies are following as:

1 Account polices

3 Window farewell with advanced security

4 Public key polices

5 Software restrictions polices


 * 1) Account polices: account policy have password policy. It give information about password policy. Password age and how many characters length you want for your password or in character or in numbers etc.
 * 2) Local police: apply for the local host computer security policy like do you want star your compute without log in password or not. Do you want to give permission to another person to installing printer device etc. local polices have security polices under this policy you can change account name and rename administrator account and protect the organization from loss of data, loss of software, hardwares.

Q3. Determine and document settings and parameters that should be used in order to meet policies and procedures

The password policy have some polices or some instructions. Its depend on you. do you want instructions or not.In Enforced password history. its check which password are you using its not old password. You cannot you reused password.do you want your password in charters or numbers or combination of both. password do you want apply for how many days. If you set the password by 0 age so your password never expire. Passwork maximum age is 1 to 999 days.. How many maximum or minimum charters lengh you want or you don’t want any instruction for your local computer. The maximum password length is 1 to 14. If no password is required set by 0 value.



Q4. Make necessary recommendations to appropriate person for ways of overcoming weaknesses in administration tools.

In administration tools there is all control in your boss hand for example who’s working on server. All the administration tools working good.

1. Services: service policy looks ok



2. Window firewell with advanced security. It has inbound rules, outbound rules,connection security rules and monitoring.

Inbound rules looks loke fine. They have not any problem.

Outbound rules:



Task shedules are local and libarys

Local task shedules are here



Library task shedules are apple, games,microsoft,office sogtware protect and wpd



Performance monitor ; its also work right.