What should you configure in the GPO?

HOTSPOT
Your network contains an Active Directory domain named adatum.com. All domain controllers run
Windows Server 2012 R2.All client computers run Windows 7. The computer accounts for all of the
client computers are located in an organizational unit (OU) named OU1.
An administrator links a Group Policy object (GPO) to OU1. The GPO contains several application
control policies.
You discover that the application control policies are not enforced on the client computers.
You need to modify the GPO to ensure that the application control policies are enforced on the
client computers.
What should you configure in the GPO?
To answer, select the appropriate service in the answer area.

HOTSPOT
Your network contains an Active Directory domain named adatum.com. All domain controllers run
Windows Server 2012 R2.All client computers run Windows 7. The computer accounts for all of the
client computers are located in an organizational unit (OU) named OU1.
An administrator links a Group Policy object (GPO) to OU1. The GPO contains several application
control policies.
You discover that the application control policies are not enforced on the client computers.
You need to modify the GPO to ensure that the application control policies are enforced on the
client computers.
What should you configure in the GPO?
To answer, select the appropriate service in the answer area.

Answer:

Explanation:

Does AppLocker use any services for its rule enforcement?
Yes, AppLocker uses the Application Identity service (AppIDSvc) for rule enforcement. For AppLocker
rules to be enforced, this service must be set to start automatically in the GPO.
Before you can enforce AppLocker policies, you must start the Application Identity service by using
the Services snap-in console.
Membership in the local Administrators group, or equivalent, is the minimum required to complete
this procedure.
To start the Application Identity service
Click Start, click Administrative Tools, and then click Services.
In the Services snap-in console, double-click Application Identity.
In the Application Identity Properties dialog box, click Automatic in the Startup type list, click Start,
and then click OK.
http://technetHYPERLINK “http://technet.microsoft.com/enus/library/dd759130.aspx#_blank”.HYPERLINK “http://technet.microsoft.com/enus/library/dd759130.aspx#_blank”microsoftHYPERLINK “http://technet.microsoft.com/enus/library/dd759130.aspx#_blank”.comHYPERLINK “http://technet.microsoft.com/enus/library/dd759130.aspx#_blank”/en-us/library/dd759130HYPERLINK
“http://technet.microsoft.com/en-us/library/dd759130.aspx#_blank”.HYPERLINK
“http://technet.microsoft.com/en-us/library/dd759130.aspx#_blank”aspx



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Silvio

Silvio

I don’t get the explanations. There is no mention of BitLocker in the question, why mention it ? BitLocker is for Disk Encryption, the question here is about application control policies.
The links all refer to Application Identity service, but the reason is not clear. Thanks.

Silvio

Silvio

Please delete my comment above. IT makes sense once i read correctly. AppLocker, and not BitLocker. Sorry for the confusion.