One of the primary aims of Group Policy is to provide centralized management of security settings for users and computers. Most of the settings that pertain to security are found in the Windows Settings folder within the Computer Configuration node of a GPO. You can use security settings to govern how users are authenticated to the network, the resources they are permitted to use, group membership policies, and events related to user and group actions recorded in the event logs. Policy settings in the Computer Configuration node apply to a computer; it does not matter who is logging on to it. There are more Computer
Configuration security settings than settings you can apply to a specific user.

Following are points which will cover in coming sections

Defining local policies

Local policies enable administrators to set user privileges on the local computer that govern what users can do on the ...
Read More

Using security templates

A security template is a collection of configuration settings stored as a text file with an .inf extension. Security templates ...
Read More

Configuring local users and groups

Windows Server 2012 R2 provides two separate interfaces for creating and managing local user accounts: the User Accounts control panel ...
Read More

Understanding User Account Control (UAC)

One of the most common Windows security problems arises from the fact that many users perform their everyday computing tasks ...
Read More