Click OK. The selected server’s shares appear in the Net Watcher window, as shown in Click OK to close the Share dialog box.

Part VI ✦ Managing the Network

2. Click File ➪ AddRemove Snap-in. The AddRemove Snap-in dialog box appears, as

shown in Figure 23-6. Figure 23-6: Add a snap-in. 3. Click Add. The Add Standalone Snap-in dialog box appears. 4. Locate Security Configuration and Analysis, as shown in Figure 23-7, and click Add. Figure 23-7: Add the Standalone Snap-in. Chapter 23 ✦ Using Policies to Secure Windows 5. Click Close to close the Add Standalone Snap-in dialog box. 6. Click Security Configuration and Analysis in the AddRemove Snap-in dialog box and click OK. 7. Click File ➪ Save As. The Save As dialog box appears. 8. Name the console and save it to the Administrative Tools folder. Make sure to retain the .msc extension.

9. Right-click Security Configuration and Analysis in the left pane of the console. Click

Open Database.

10. In the Open Database dialog box, type a name, such as sec2 or secure2, in the File

Name text box. Click Open. The Import Template dialog box appears. You don’t want to save any database under its original name, so by renaming with a number, such as 2, you effectively create a new database.

11. Click the template you want to import and click Open. You can import multiple

databases to test and analyze.

12. To analyze the security configuration, right-click Security Configuration and Analysis

and click Analyze Computer Now. The Perform Analysis dialog box appears.

13. Click OK to enable the error log to be saved in the default folder. The Security

Configuration and Analysis analyzes your computer.

14. To view the analysis for each entry, click the plus sign in the left pane and view the pol-

icy in the right pane, as shown in Figure 23-8. Figure 23-8: Review policies. Note Part VI ✦ Managing the Network

15. Save the console by clicking File ➪ Save. 16. To quit the console, click File ➪ Exit.

If you want to edit the policy, you can do that from this console. Summary In this chapter, you learned about the setting policies to control users and computers on the network. Specifically, you learned about the following: ✦ Understanding the System Policy Editor ✦ Using the Group Policy Editor ✦ Using security configuration and analysis In the next chapter, you learn about working with the Registry. ✦ ✦ ✦ Note