programming4us
programming4us
DESKTOP

Windows Server 2008 and Windows Vista : Item-Level Targeting (part 5) - Portable Computer,Processing Mode, Registry Match

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
Portable Computer

A Portable Computer targeting item, shown in Figure 15, allows a preference item to be applied to computers or users only if the processing computer is identified as a portable computer in the current hardware profile on the processing computer, or if the processing computer is identified as a portable computer with the docking state specified in the targeting item. Selecting a docking state in the targeting item is optional. If no states or all states are selected, the targeting item detects only whether the processing computer is a portable computer.

Figure 15. You can use a Portable Computer item in item-level targeting for Group Policy Preferences.

Best Practices

Using the Battery Present item and PCMCIA Present item in conjunction with the Portable Computer Query item can also be useful for targeting portable computers.


Processing Mode

A Processing Mode targeting item, shown in Figure 16, allows a preference item to be applied to computers or users only if the Group Policy processing mode or conditions on the processing computer match at least one of those specified in the targeting item. Table 4 defines each option for the Processing Mode item.

Figure 16. You can use a Processing Mode item in item-level targeting for Group Policy Preferences.

Table 4. Processing Mode Configuration Options
Processing Mode or ConditionDescription
SynchronousGPO processing is set to synchronous.
AsynchronousGPO processing is set to asynchronous.
BackgroundGPO processing is performed in the background, not foreground.
Forced refreshThe background refresh was forced.
Link transitionA change in link speed occurred between the current application and an earlier application of Group Policy.
No changesNo new Group Policy settings are applied to the computer or user.
RSoP transitionA change in Resultant Set of Policy (RSoP) logging occurred between the current application and an earlier application of Group Policy.
Slow linkGroup Policy is applying over a slow network connection.
Safe bootWindows is operating in safe mode.
Verbose loggingVerbose logging is enabled.

RAM

A RAM targeting item allows a preference item to be applied to computers or users only if the total amount of physical memory in the processing computer is greater than or equal to the amount specified in the targeting item. The MB list accepts preference processing variables. Press F3 to display the Select a Variable dialog box, which lists the system-defined variables from which you can select.

Registry Match

A Registry Match targeting item, shown in Figure 17, allows a preference item to be applied to computers or users only if the registry key or value specified in the targeting item exists, if the registry value contains the data specified in the targeting item, or if the version number in the registry value is within the range specified in the targeting item. If the targeting item allows the preference item and if Get Value Data is selected in the targeting item, the targeting item saves the value data of the specified registry value to the environment variable specified in the targeting item. The Key Path text box and Value Name text box accept preference processing variables. Press F3 to display the Select a Variable dialog box, which lists the system-defined variables from which you can select.

Figure 17. You can use a Registry Match item in item-level targeting for Group Policy Preferences.
Other  
  •  Windows Server 2008 and Windows Vista : Advanced Group Policy Preferences Settings - Action Modes, Common Tab
  •  The Gaming Mouse: Ozone Neon
  •  Windows 8 : Understanding product editions, architectures, and hardware requirements
  •  Windows 8 Architecture from a Developer’s Point of View : Picking the Appropriate Technology for Your Project
  •  Windows 8 Architecture from a Developer’s Point of View : .NET Framework 4.5
  •  Windows Server 2008 R2 Powershell Cmdlets (part 6) - Windows Server Backup cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 5) - Server Manager cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 4) - Group Policy cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 3) - Failover Cluster cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 2) - AppLocker cmdlets
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us