Reply to Alfred
To add onto the definition given on the instructions, service accounts are majorly the
operational systems implementing organizational presentations maybe in the framework of
the system account or rather a user account which is specific. It can be created physically or
at the time of installation of software (Cheverton 88). The management of such accounts is
sometimes overlooked but just as you had mentioned, it is very tricky. Apart from the vital
steps of management given in the instructions, the password to these accounts should also be
monitored as their access with unauthorized people can lead to bad practices. Changing them
by the administrators frequently is also not recommended as that can tamper with given
information in the accounts. However, failing to change the passwords after a long period of
time puts the organization at a significant risk of the access of its sensitive data by people
who are not supposed to.
Reply to Carlos
The option of a loopback in group policy is significant since it can limit specific
computers within a given radius. It contains a selected of processing type that is available in
the computer configuration type of the GPO which is the useful too in setting the loop to only
stated computers (Moskowitz 12). Ultimately, the loopback processing alters the standard
policy of a group in that it allows operator configuration to be used based on the computers
PEER RESPONSES AND ESSAY 2
scope of GPO at the time of login. Meaning, the configuration selections of varied operators
can be applied to the users who log into the same computer. The policy can be used in
different public places, for instance; in machines which are acting as kiosks for the public, in
the public terminuses and in any environment where the account of the operator should be
accessed by the computer and not the user account.
Server configuration depends entirely on the kind of information and the features that
one has chosen to install. Beginner accounts can start as domain user accounts, or local
operator accounts, or managed service accounts or even build-in system accounts. There are
options on configuring service. One can decide either to configure each service account as an
individual or configure it to a given server or services. One can as well make a decision
whether the services are to start automatically, or on manual basis or even sometimes
disabled. However, the default account in many instances is recommended for most of the
installations (Cristea et al. 43). The configuration manager is able to manage the group
membership in an automated way. The administrative operators in hierarchy and in the site of
the server of the computer account have their names written as admins of the group and this
comes with certain privileges that enhances easy management.
PEER RESPONSES AND ESSAY 3
Cheverton, Peter. Key Account Management: Tools and Techniques for Achieving Profitable
Key Supplier Status. London: Kogan Page, 2015. Print.
Cristea, Valentin, Ciprian Dobre, Corina Stratan, and F. Pop. "Data Storage, Retrieval and
Management." (2010). Print.
Moskowitz, Jeremy. Group Policy: Fundamentals, Security, and the Managed Desktop, 2nd
Edition. 2013. Internet resource.