programming4us
programming4us
DESKTOP

Windows Server 2008 and Windows Vista : Item-Level Targeting (part 6) - Security Group,WMI Query

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
Security Group

A Security Group targeting item, shown in Figure 18, allows a preference item to be applied to computers or users only if the processing computer or user is a member of the group specified in the targeting item and, optionally, only if the specified group is the primary group for the processing computer or user. The group’s security identifier is used to determine group membership, not the display name of the group. The types of groups that are supported include:

  • Domain groups

    • Global groups

    • Universal groups

  • Local groups

    • Local groups (including built-in groups)

    • Domain local groups

    • Well-known groups

Figure 18. You can use a Security Group item in item-level targeting for Group Policy Preferences.

Site

A Site targeting item allows a preference item to be applied to computers or users only if the processing computer is in the site in Active Directory specified in the targeting item. The Site box accepts preference processing variables. Press F3 to display the Select a Variable dialog box, which lists the system-defined variables from which you can select.

Terminal Session

A Terminal Session targeting item allows a preference item to be applied to users only if the processing user is logged on to a terminal services session with the settings specified in the targeting item.

Time Range

A Time Range targeting item allows a preference item to be applied to computers or users only if the current time on the end user’s computer is within the time range specified in the targeting item.

User

A User targeting item, shown in Figure 19, allows a preference item to be applied to users only if the processing user is the user specified in the targeting item. When the Match by SID option is enabled, you must browse to select the user. If you do not select Match by SID, a string match is performed. Although the domain and user name of that user at the time of selection are displayed, the targeting item saves the user’s SID for comparison to that of the processing user. The User text box accepts preference processing variables. Press F3 to display the Select a Variable dialog box, which lists the system-defined variables from which you can select.

Figure 19. You can use a User item in item-level targeting for Group Policy Preferences.

Note

User targeting is available only for preference items under User Configuration.


WMI Query

A WMI Query targeting item, shown in Figure 20, allows a preference item to be applied to computers or users only if the processing computer evaluates the WMI query as true. If any of the value is returned from the query, the filter will return true.

Figure 20. You can use a WMI Query item in item-level targeting for Group Policy Preferences.


Note

For all of the item-level targeting items, text boxes for Computer Name (NetBIOS only), Domain, Site, Terminal Session, and User (if not matched by SID) accept single-character (?) and multiple-character (*) wildcards.

Other  
  •  Windows Server 2008 and Windows Vista : Advanced Group Policy Preferences Settings - Action Modes, Common Tab
  •  The Gaming Mouse: Ozone Neon
  •  Windows 8 : Understanding product editions, architectures, and hardware requirements
  •  Windows 8 Architecture from a Developer’s Point of View : Picking the Appropriate Technology for Your Project
  •  Windows 8 Architecture from a Developer’s Point of View : .NET Framework 4.5
  •  Windows Server 2008 R2 Powershell Cmdlets (part 6) - Windows Server Backup cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 5) - Server Manager cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 4) - Group Policy cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 3) - Failover Cluster cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 2) - AppLocker cmdlets
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us