programming4us
programming4us
DESKTOP

Windows Server 2012 : Planning, implementing, and managing Group Policy (part 7) - Viewing infrastructure status, Creating GPOs

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

3. Managing Group Policy

Managing Group Policy in an Active Directory environment is a broad topic that has many different aspects. The upcoming sections cover a few of the following basic tasks:

  • Viewing infrastructure status

  • Creating GPOs

  • Managing GPO links

  • Configuring security filtering

  • Backing up and restoring GPOs


Viewing infrastructure status

A new feature of the GPMC in Windows Server 2012 is the Status tab shown in Figure 6, which provides information about the status of Active Directory and SYSVOL replication. The status information displayed on this tab can be either of the following:

  • The status for all GPOs if the node for the domain is selected

  • The status for a particular GPO if the node for that GPO is selected

Viewing the status of SYSVOL replication to monitor Group Policy health.
Figure 6. Viewing the status of SYSVOL replication to monitor Group Policy health.

Creating GPOs

By using the GPMC, you can create GPOs either from scratch or from a Starter GPO. You can also create a new GPO so that it is

  • Linked to an OU, a site, or the domain by right-clicking on the container and selecting New.

  • Unlinked to any container in Active Directory by right-clicking on the Group Policy Objects node and selecting New.

New GPOs are enabled by default, but afterward you can disable the GPO’s:

  • User Configuration settings

  • Computer Configuration settings

  • All settings

Once you create a GPO, you can open it in the Group Policy Management Editor and configure the GPO’s policies and preferences:

  • Policies These are settings that Group Policy enforces for users or computers targeted by the GPO. The types of policies include the following:

    • Administrative Templates, which are registry-based settings that are written to a special area of the registry on client computers

    • Windows Settings, which include the Security Settings described earlier in this lesson

    • Software Settings, which can be used to install applications for targeted users or computers

  • Preferences These are settings you can use to modify configuration settings for features of Windows operating systems or applications that are not Group Policy-aware.

Note

MORE INFO Group Policy settings reference

Windows 8 and Windows Server 2012 include hundreds of new Group Policy settings. For detailed information about all of the different Group Policy settings you can configure for these platforms, search the Microsoft Download Center for the Group Policy Settings Reference for Windows 8 and Windows Server 2012.

Other  
  •  Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 5) - Monitoring system resources by using Performance Monitor
  •  Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 4) - Configuring and analyzing event logs
  •  Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 3) - Using Windows Action Center
  •  Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 2) - App history, Startup, Services
  •  Windows 8 : Monitoring, optimizing, and troubleshooting system health and performance (part 1) - Processes, Performance
  •  Windows Server 2008 and Windows Vista : Common GPO Troubleshooting Tools (part 3) - GPResult, GPOTool
  •  Windows Server 2008 and Windows Vista : Common GPO Troubleshooting Tools (part 2) - GPMC
  •  Windows Server 2008 and Windows Vista : Common GPO Troubleshooting Tools (part 1) - GPLogView
  •  Windows Server 2008 and Windows Vista : Using Event Logging for Troubleshooting (part 4) - Summary of Group Policy Event IDs
  •  Windows Server 2008 and Windows Vista : Using Event Logging for Troubleshooting (part 3) - Divide the Custom View of the Log into Three Phases
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us