ANALYZING A COMPUTER IN THIS PROCEDURE, YOU USE THE SECURITY CONFIGURA...

1. Why is it not common practice to apply security templates to Active Directory

domain objects?