Discussion: "Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings"
Please respond to the following:
• Determine one situation that can cause a breach of network security. Provide two examples to demonstrate the manner in which GPOs can be used to bolster network security to prevent the situation from occurring.
• Choose at least two Computer Configuration node security settings and, for each, specify a scenario whereby configuring the setting would provide security benefits. In each of your scenario descriptions, compare a pre-security configuration scenario with a post-security configuration scenario to demonstrate the potential security improvements.