programming4us
programming4us
DESKTOP

Windows Server 2008 and Windows Vista : Using .adm Template Language (part 1) - Structure of an .adm Template

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

1. Structure of an .adm Template

An .adm template has two functions. The first function is to create the interface within the GPME for the registry values that you want configured on users or machines targeted by a GPO. This formatting is the same for all .adm templates, so you can use existing .adm templates as a guide. The second function of the .adm template is to format the registry path, value, and data that will be updated in the target computer’s registry. Again, this syntax is the same for all .adm templates and is easy to follow.

Note

Although the syntax is easy to follow for the registry path in the .adm template, the path must be accurate to avoid potential corruption of the registry on the target computer.


Look at the following .adm template example. It allows the computer to log on without any user input by using a predetermined username and password.

CLASS MACHINE
CATEGORY "Microsoft Custom ADM Entries"
POLICY "Automatic Logon"
KEYNAME "SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"
PART "Enable Auto Logon? (1=Yes, 0=No)" NUMERIC REQUIRED TXTCONVERT
VALUENAME "AutoAdminLogon"
MIN 0 MAX 1 DEFAULT "0" SPIN 1
END PART
PART "What is the name of the user?" EDITTEXT
VALUENAME "defaultusername"
END PART
PART "What is the user's password?" EDITTEXT
VALUENAME "defaultpassword"
END PART
END POLICY
END CATEGORY

You can see that the structure of the .adm template is very methodical. If you look closely at the example, you can see that some rules must be followed. One such rule is the inclusion of an END syntax for PART, POLICY, and CATEGORY entries.

Review the structure of the example to evaluate the components that you need to fully understand:

  • CLASS MACHINE Specifies that the registry HKEY that we are modifying is under HKEY_LOCAL_MACHINE.

  • CATEGORY Specifies the name that will be given to the folder that will appear in the GPME. In our example, it is Microsoft Custom ADM Entries.

  • POLICY Specifies the name we are giving to the policy that will appear in the GPME. In our example, it is Automatic Logon.

  • KEYNAME Specifies the path in the registry where the value that will be modified exists. Notice that KEYNAME does not include the HKEY name or the name of the value.

  • PART Specifies to the GPME that input will be required from the GPO administrator.

  • EDITTEXT Specifies that a text box will be presented to allow the administrator to type text for the data of the registry value.

  • VALUENAME Specifies the exact registry value that is being modified. Notice that VALUENAME is not the specified data for the registry value (the string or setting associated with the registry value); rather, it is the name of the registry value. The data for the registry value will be input through the GPME.

  • END PART Indicates to the GPME that the syntax related to this PART is done.

  • END POLICY Indicates to the GPME that the syntax related to this POLICY is done.

  • END CATEGORY Indicates to the GPME that the syntax related to this CATEGORY is done.

If you were to create a shell depicting a standard .adm template structure, it would look something like this.

CLASS (GPME and Registry)
CATEGORY (GPME)
KEYNAME (Registry)
POLICY (GPME)
PART (GPME)
VALUENAME (Registry)

To create your own .adm templates, you must build on this structure and understand all of the syntax that can be placed in the .adm templates. We will do this by breaking down the syntax into two categories: the interface for the GPME and the registry path and value inputs.

Other  
  •  Windows Server 2008 and Windows Vista : Creating Custom .adm Templates - A Simple .adm Template
  •  Windows Server 2003 : Implementing Software Restriction Policies (part 5) - Optional Tasks for Implementing Software Restriction Policies
  •  Windows Server 2003 : Implementing Software Restriction Policies (part 4) - Implementing Software Restriction Policies - Creating a Path Rule, Designating File Types
  •  Windows Server 2003 : Implementing Software Restriction Policies (part 3) - Implementing Software Restriction Policies - Creating a Certificate Rule, Creating an Internet Zone Rule
  •  Windows Server 2003 : Implementing Software Restriction Policies (part 2) - Implementing Software Restriction Policies - Creating a Hash Rule
  •  Windows Server 2003 : Implementing Software Restriction Policies (part 1)
  •  Windows Server 2003 : Troubleshooting Software Deployed with Group Policy - Software Deployment Troubleshooting Scenarios
  •  Windows Server 2003 : Maintaining Software Deployed with Group Policy (part 2) - Removing Applications Deployed with Group Policy
  •  Windows Server 2003 : Maintaining Software Deployed with Group Policy (part 1) - Upgrading Applications Deployed with Group Policy
  •  Windows 7 : Using WDS for Multicast Deployments (part 2) - Creating a Multicast Deployment
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us