mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
Fixed alt text suggestion
This commit is contained in:
@ -386,7 +386,7 @@ In this procedure, the workstations are dedicated to domain administrators. By s
|
||||
|
||||
> **Note** You might have to delegate permissions to join computers to the domain if the account that joins the workstations to the domain does not already have them. For more information, see [Delegation of Administration in Active Directory](https://social.technet.microsoft.com/wiki/contents/articles/20292.delegation-of-administration-in-active-directory.aspx).
|
||||
|
||||

|
||||

|
||||
|
||||
3. Close Active Directory Users and Computers.
|
||||
|
||||
@ -394,13 +394,13 @@ In this procedure, the workstations are dedicated to domain administrators. By s
|
||||
|
||||
5. Right-click the new OU, and > **Create a GPO in this domain, and Link it here**.
|
||||
|
||||

|
||||

|
||||
|
||||
6. Name the GPO, and > **OK**.
|
||||
|
||||
7. Expand the GPO, right-click the new GPO, and > **Edit**.
|
||||
|
||||

|
||||

|
||||
|
||||
8. Configure which members of accounts can log on locally to these administrative workstations as follows:
|
||||
|
||||
@ -419,7 +419,7 @@ In this procedure, the workstations are dedicated to domain administrators. By s
|
||||
|
||||
5. Click **Add User or Group**, type **Administrators**, and > **OK**.
|
||||
|
||||

|
||||

|
||||
|
||||
9. Configure the proxy configuration:
|
||||
|
||||
@ -427,7 +427,7 @@ In this procedure, the workstations are dedicated to domain administrators. By s
|
||||
|
||||
2. Double-click **Proxy Settings**, select the **Enable proxy settings** check box, type **127.0.0.1** (the network Loopback IP address) as the proxy address, and > **OK**.
|
||||
|
||||

|
||||

|
||||
|
||||
10. Configure the loopback processing mode to enable the user Group Policy proxy setting to apply to all users on the computer as follows:
|
||||
|
||||
@ -459,11 +459,11 @@ In this procedure, the workstations are dedicated to domain administrators. By s
|
||||
|
||||
1. Right-click **Windows Firewall with Advanced Security LDAP://path**, and > **Properties**.
|
||||
|
||||

|
||||

|
||||
|
||||
2. On each profile, ensure that the firewall is enabled and that inbound connections are set to **Block all connections**.
|
||||
|
||||

|
||||

|
||||
|
||||
3. Click **OK** to complete the configuration.
|
||||
|
||||
@ -501,11 +501,11 @@ For this procedure, do not link accounts to the OU that contain workstations for
|
||||
|
||||
3. Right-click **Group Policy Objects**, and > **New**.
|
||||
|
||||

|
||||

|
||||
|
||||
4. In the **New GPO** dialog box, name the GPO that restricts administrators from signing in to workstations, and > **OK**.
|
||||
|
||||

|
||||

|
||||
|
||||
5. Right-click **New GPO**, and > **Edit**.
|
||||
|
||||
@ -519,7 +519,7 @@ For this procedure, do not link accounts to the OU that contain workstations for
|
||||
|
||||
3. Click **Add User or Group**, click **Browse**, type **Domain Admins**, and > **OK**.
|
||||
|
||||

|
||||

|
||||
|
||||
**Note**
|
||||
You can optionally add any groups that contain server administrators who you want to restrict from signing in to workstations.
|
||||
@ -541,7 +541,7 @@ For this procedure, do not link accounts to the OU that contain workstations for
|
||||
|
||||
3. Click **Add User or Group** > **Browse**, type **Domain Admins**, and > **OK**.
|
||||
|
||||

|
||||

|
||||
|
||||
**Note**
|
||||
You can optionally add any groups that contain server administrators who you want to restrict from signing in to workstations.
|
||||
@ -554,7 +554,7 @@ For this procedure, do not link accounts to the OU that contain workstations for
|
||||
|
||||
6. Click **Add User or Group** > **Browse**, type **Domain Admins**, and > **OK**.
|
||||
|
||||

|
||||

|
||||
|
||||
**Note**
|
||||
You can optionally add any groups that contain server administrators who you want to restrict from signing in to workstations.
|
||||
@ -567,11 +567,11 @@ For this procedure, do not link accounts to the OU that contain workstations for
|
||||
|
||||
1. Right-click the workstation OU, and then > **Link an Existing GPO**.
|
||||
|
||||

|
||||

|
||||
|
||||
2. Select the GPO that you just created, and > **OK**.
|
||||
|
||||

|
||||

|
||||
|
||||
10. Test the functionality of enterprise applications on workstations in the first OU and resolve any issues caused by the new policy.
|
||||
|
||||
@ -594,7 +594,7 @@ It is a best practice to configure the user objects for all sensitive accounts i
|
||||
|
||||
As with any configuration change, test this enabled setting fully to ensure that it performs correctly before you implement it.
|
||||
|
||||

|
||||

|
||||
|
||||
## <a href="" id="sec-secure-manage-dcs"></a>Secure and manage domain controllers
|
||||
|
||||
|
Reference in New Issue
Block a user