Security: due to the various security breaches evident, it is important to use the group policy to curb that. For instance, an organization can experience security breach due to the employees using very weak passwords. With the group policy, it is easy for an organization to set certain requirements for the users to follow when setting passwords.
Cost and time: it enables installation or upgrading of software from one location and ensures that every machine is serviced simultaneously (Moskowitz, Hicks, & Burchill, 2013). Moreover, it is also possible to conduct the upgrade outside the business hours to avoid disruption of the work schedule.
There are various potential pitfalls. One, because the SQL server is configured for windows authentication only, it becomes difficult to manage data in all the other relational databases. Moreover, the database can only be accessed from within the local area network. Beyond that, it becomes inaccessible. Lack of firewalls between the servers and the applications of the client becomes difficult to get into the client’s database and gather the additional information required. The types of data elements that will be difficult to capture are the compound data elements. These are data elements consisting of three field’s control, component count field together with the total length of the required data elements. The reason is due to lack of firewall between the server and the applications of the clients. It is able to establish a boundary between a trusted and un-trusted network (Moraes, 2011). Thus, the user is not restricted by any set of rules applicable and can therefore conceal the compound data elements in such a way that it becomes difficult for them to be found.
The main considerations include enhancing security. Among the 120 end users, there can be some using some practices that can lead to breach of security for the organization.