Cover image for Group Policy : Fundamentals, Security, and the Managed Desktop.
Group Policy : Fundamentals, Security, and the Managed Desktop.
Title:
Group Policy : Fundamentals, Security, and the Managed Desktop.
Author:
Moskowitz, Jeremy.
ISBN:
9781118333921
Personal Author:
Edition:
2nd ed.
Physical Description:
1 online resource (914 pages)
Contents:
Group Policy -- Contents -- Introduction -- Group Policy Defined -- This Book and Beyond -- Chapter 1: Group Policy Essentials -- Getting Ready to Use This Book -- Getting Started with Group Policy -- Group Policy Entities and Policy Settings -- The Categories of Group Policy -- Active Directory and Local Group Policy -- Understanding Local Group Policy -- Group Policy and Active Directory -- Linking Group Policy Objects -- Final Thoughts on Local GPOs -- An Example of Group Policy Application -- Examining the Resultant Set of Policy -- At the Site Level -- At the Domain Level -- At the OU Level -- Bringing It All Together -- Group Policy, Active Directory, and the GPMC -- Implementing the GPMC on Your Management Station -- Creating a One-Stop-Shop MMC -- Group Policy 101 and Active Directory -- Active Directory Users and Computers vs. GPMC -- Adjusting the View within the GPMC -- The GPMC-centric View -- Our Own Group Policy Examples -- More about Linking and the Group Policy Objects Container -- Applying a Group Policy Object to the Site Level -- Applying Group Policy Objects to the Domain Level -- Applying Group Policy Objects to the OU Level -- Testing Your Delegation of Group Policy Management -- Understanding Group Policy Object Linking Delegation -- Granting OU Admins Access to Create New Group Policy Objects -- Creating and Linking Group Policy Objects at the OU Level -- Creating a New Group Policy Object Affecting Computers in an OU -- Moving Computers into the Human Resources Computers OU -- Verifying Your Cumulative Changes -- Final Thoughts -- Chapter 2: Managing Group Policy with the GPMC -- Common Procedures with the GPMC -- Raising or Lowering the Precedence of Multiple Group Policy Objects -- Understanding GPMC's Link Warning -- Stopping Group Policy Objects from Applying -- Block Inheritance -- The Enforced Function.

Security Filtering and Delegation with the GPMC -- Filtering the Scope of Group Policy Objects with Security -- User Permissions on Group Policy Objects -- Granting Group Policy Object Creation Rights in the Domain -- Special Group Policy Operation Delegations -- Who Can Create and Use WMI Filters? -- Performing RSoP Calculations with the GPMC -- What's-Going-On Calculations with Group Policy Results -- What-If Calculations with Group Policy Modeling -- Searching and Commenting Group Policy Objects and Policy Settings -- Searching for GPO Characteristics -- Filtering Inside a GPO for Policy Settings -- Comments for GPOs and Policy Settings -- Starter GPOs -- Creating a Starter GPO -- Editing a Starter GPO -- Leveraging a Starter GPO -- Delegating Control of Starter GPOs -- Wrapping Up and Sending Starter GPOs -- Should You Use Microsoft's Pre-created Starter GPOs? -- Back Up and Restore for Group Policy -- Backing Up Group Policy Objects -- Restoring Group Policy Objects -- Backing Up and Restoring Starter GPOs -- Backing Up and Restoring WMI Filters -- Backing Up and Restoring IPsec Filters -- Migrating Group Policy Objects between Domains -- Basic Interdomain Copy and Import -- Copy and Import with Migration Tables -- GPMC At-a-Glance Icon View -- Final Thoughts -- Chapter 3: Group Policy Processing Behavior Essentials -- Group Policy Processing Principles -- Don't Get Lost -- Initial Policy Processing -- Background Refresh Policy Processing -- Security Background Refresh Processing -- Special Case: Moving a User or a Computer Object -- Windows 8 and Group Policy: Subtle Differences -- Policy Application via Remote Access, Slow Links, and after Hibernation -- Windows XP Group Policy over Slow Network Connections -- Windows 8 Group Policy over Slow Network Connections -- What Is Processed over a Slow Network Connection?.

Using Group Policy to Affect Group Policy -- Affecting the User Settings of Group Policy -- Affecting the Computer Settings of Group Policy -- The Missing Group Policy Preferences' Policy Settings -- Final Thoughts -- Chapter 4: Advanced Group Policy Processing -- WMI Filters: Fine-Tuning When and Where Group Policy Applies -- Tools (and References) of the WMI Trade -- WMI Filter Syntax -- Creating and Using a WMI Filter -- WMI Performance Impact -- Group Policy Loopback Processing -- Reviewing Normal Group Policy Processing -- Group Policy Loopback-Merge Mode -- Group Policy Loopback-Replace Mode -- Group Policy with Cross-Forest Trusts -- What Happens When Logging onto Different Clients across a Cross-Forest Trust? -- Disabling Loopback Processing When Using Cross-Forest Trusts -- Understanding Cross-Forest Trust Permissions -- Final Thoughts -- Chapter 5: Group Policy Preferences -- Powers of the Group Policy Preferences -- Computer Configuration a Preferences -- User Configuration a Preferences -- Group Policy Preferences Concepts -- Preference vs. Policy -- The Overlap of Group Policy vs. Group Policy Preferences and Associated Issues -- The Lines and Circles and the CRUD Action Modes -- Common Tab -- Group Policy Preferences Tips, Tricks, and Troubleshooting -- Quick Copy, Drag and Drop, Cut and Paste, and Sharing of Settings -- Multiple Preference Items at a Level -- Temporarily Disabling a Single Preference Item or Extension Root -- Environment Variables -- Managing Group Policy Preferences: Hiding Extensions from Use -- Troubleshooting: Reporting, Logging, and Tracing -- Final Thoughts -- Chapter 6: Managing Applications and Settings Using Group Policy -- Administrative Templates: A History and Policy vs. Preferences -- Administrative Templates: Then and Now -- Policy vs. Preference -- ADM vs. ADMX and ADML Files -- ADM File Introduction.

Updated GPMC's ADMX and ADML Files -- ADM vs. ADMX Files-At a Glance -- ADMX and ADML Files: What They Do and the Problems They Solve -- Problem and Solution 1: Tackling SYSVOL Bloat -- Problem 2: How Do We Deal with Multiple Languages? -- Problem 3: How Do We Deal with "Write Overlaps"? -- Problem 4: How Do We Distribute Updated Definitions to All Our Administrators? -- The Central Store -- The Windows ADMX/ADML Central Store -- Creating and Editing GPOs in a Mixed Environment -- Scenario 1: Start by Creating and Editing a GPO Using the Older GPMC. Edit Using Another Older GPMC Management Station. -- Scenario 2: Start by Creating and Editing a GPO with the Older GPMC. Edit Using the Updated GPMC. -- Scenario 3: Start by Creating and Editing a GPO Using the Updated GPMC. Edit Using Another Updated GPMC Management Station. -- Scenario 4: Start by Creating and Editing a GPO Using an Updated GPMC Management Station. Edit Using an Older GPMC Management Station. -- ADM and ADMX Templates from Other Sources -- Using ADM Templates with the Updated GPMC -- Using ADMX Templates from Other Sources -- ADMX Migrator and ADMX Editor Tools -- ADMX Migrator -- ADMX Creation and Editor Tools -- PolicyPak Community Edition and PolicyPak Professional -- PolicyPak Concepts and Installation -- PolicyPak Pregame Setup -- PolicyPak Quick Installation -- Getting Started Immediately with PolicyPak's Preconfigured Paks -- PolicyPak Final Thoughts and Wrap-Up -- Final Thoughts -- Chapter 7: Troubleshooting Group Policy -- Under the Hood of Group Policy -- Inside Local Group Policy -- Inside Active Directory Group Policy Objects -- The Birth, Life, and Death of a GPO -- How Group Policy Objects Are "Born" -- How a GPO "Lives" -- Death of a GPO -- How Client Systems Get Group Policy Objects -- The Steps to Group Policy Processing -- Client-Side Extensions.

Where Are Administrative Templates Registry Settings Stored? -- Why Isn't Group Policy Applying? -- Reviewing the Basics -- Advanced Inspection -- Client-Side Troubleshooting -- RSoP for Windows Clients -- Advanced Group Policy Troubleshooting with Log Files -- Using the Event Viewer -- Turning On Verbose Logging -- Group Policy Processing Performance -- Final Thoughts -- Chapter 8: Implementing Security with Group Policy -- The Two Default Group Policy Objects -- GPOs Linked at the Domain Level -- Group Policy Objects Linked to the Domain Controllers OU -- Oops, the "Default Domain Policy" GPO and/or "Default Domain Controllers Policy" GPO Got Screwed Up! -- The Strange Life of Password Policy -- What Happens When You Set Password Settings at an OU Level -- Fine-Grained Password Policy -- Inside Auditing with and without Group Policy -- Auditable Events Using Group Policy -- Auditing File Access -- Auditing Group Policy Object Changes -- Advanced Audit Policy Configuration -- Restricted Groups -- Strictly Controlling Active Directory Groups -- Strictly Applying Group Nesting -- Which Groups Can Go into Which Other Groups via Restricted Groups? -- Restrict Software: Software Restriction Policy and AppLocker -- Inside Software Restriction Policies -- Software Restriction Policies' "Philosophies" -- Software Restriction Policies' Rules -- Restricting Software Using AppLocker -- Controlling User Account Control with Group Policy -- Just Who Will See the UAC Prompts, Anyway? -- Understanding the Group Policy Controls for UAC -- UAC Policy Setting Suggestions -- Wireless (802.3) and Wired Network (802.11) Policies -- 802.11 Wireless Policy for Windows XP -- 802.11 Wireless Policy and 802.3 Wired Policy for Windows 8 -- Configuring Windows Firewall with Group Policy -- Manipulating the Windows XP Firewall.

Windows Firewall with Advanced Security (for Windows 8)-WFAS.
Abstract:
The Ultimate Book on Group Policy Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft Group Policy MVP Jeremy Moskowitz covers it all-major Group Policy categories, what Windows 8 and Windows Server 2012 bring to the table, and smart ways to tackle tough desktop management problems. Topics include troubleshooting, security, scripting, using Windows PowerShell when necessary, and much more. Inside this book, you'll learn to: Master all Group Policy functions of Windows, including Windows XP through Windows 8 and Windows Server 2003 through Windows Server 2012 Enhance your Group Policy reach with the Group Policy Preferences, ADMX files, and additional add-ons Use every feature of the GPMC and become a top-notch administrator Troubleshoot Group Policy using tools, logs, Resource Kit utilities, Registry hacks, and third-party tools Manage printers, restrict hardware, and configure Internet Explorer Deploy software to your desktops, set up roaming profiles, and configure Offline Files for all your Windows clients-and manage it all with Group Policy settings Secure your desktops and servers with AppLocker, Windows Firewall with Advanced Security, and the Security Configuration Manager Download bonus chapters and: Script complex GPMC operations with PowerShell, including linking, backup, restore, permissions changes, and more Create a "change management" system with Advanced Group Policy Management (AGPM v4) Understand Windows Intune service and its relationship to Group Policy Coverage Includes: Updated GPMC New Windows 8 GPMC Features ADMX/ADML Files Group Policy Preferences Item-Level Targeting The Central Store AppLocker

Fine-Grained Password Policy Offline Files Updates Inheritance Blocking Prioritization Linking Loopback Policy Processing Security Policy Processing Enforcing WMI Filters Third-Party Tools Cross-Forest Trusts Filters Commenting Searching Advanced Logging and Troubleshooting Advanced Auditing Controls Group Policy and VDI Security Configuration Manager Windows Intune.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: