Der Artikel ist weiterhin als ^^OTHERCONDITION^^ verfügbar.
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Group Policy

Fundamentals, Security, and the Managed Desktop
Sofort lieferbar | Lieferzeit:3-5 Tage I
Jeremy Moskowitz
eBook Typ:
eBook Format:
Adobe DRM [Hard-DRM]

The Ultimate Book on Group Policy
Freshly updated to include Windows 7, Windows 8 and WindowsServer 2012, Group Policy: Fundamentals, Security, and theManaged Desktop, Second Edition is the book for learningeverything you need to know about Group Policy, no matter whichversion of Windows you use. Microsoft Group Policy MVP JeremyMoskowitz covers it all--major Group Policy categories, whatWindows 8 and Windows Server 2012 bring to the table, and smartways to tackle tough desktop management problems. Topics includetroubleshooting, security, scripting, using Windows PowerShell whennecessary, and much more.

Inside this book, you'll learn to:
* Master all Group Policy functions of Windows, including WindowsXP through Windows 8 and Windows Server 2003 through Windows Server2012
* Enhance your Group Policy reach with the Group PolicyPreferences, ADMX files, and additional add-ons
* Use every feature of the GPMC and become a top-notchadministrator
* Troubleshoot Group Policy using tools, logs, Resource Kitutilities, Registry hacks, and third-party tools
* Manage printers, restrict hardware, and configure InternetExplorer
* Deploy software to your desktops, set up roaming profiles, andconfigure Offline Files for all your Windows clients--andmanage it all with Group Policy settings
* Secure your desktops and servers with AppLocker, WindowsFirewall with Advanced Security, and the Security ConfigurationManager

Download bonus chapters and:
* Script complex GPMC operations with PowerShell, includinglinking, backup, restore, permissions changes, and more
* Create a "change management" system with Advanced Group PolicyManagement (AGPM v4)
* Understand Windows Intune service and its relationship to GroupPolicy

Coverage Includes:
Updated GPMC
New Windows 8 GPMC Features
Group Policy Preferences
Item-Level Targeting
The Central Store
Fine-Grained Password Policy
Offline Files Updates
Inheritance Blocking
Loopback Policy Processing
Security Policy Processing
WMI Filters
Third-Party Tools
Cross-Forest Trusts
Advanced Logging and Troubleshooting
Advanced Auditing Controls
Group Policy and VDI
Security Configuration Manager
Windows Intune
InhaltsangabeIntroduction xxv

Chapter 1 Group Policy Essentials 1

Getting Ready to Use This Book 2

Getting Started with Group Policy 7

Group Policy Entities and Policy Settings 7

The Categories of Group Policy 9

Active Directory and Local Group Policy 13

Understanding Local Group Policy 14

Group Policy and Active Directory 17

Linking Group Policy Objects 20

Final Thoughts on Local GPOs 25

An Example of Group Policy Application 26

Examining the Resultant Set of Policy 27

At the Site Level 28

At the Domain Level 29

At the OU Level 29

Bringing It All Together 29

Group Policy, Active Directory, and the GPMC 31

Implementing the GPMC on Your Management Station 32

Creating a One-Stop-Shop MMC 36

Group Policy 101 and Active Directory 38

Active Directory Users and Computers vs. GPMC 38

Adjusting the View within the GPMC 39

The GPMC-centric View 41

Our Own Group Policy Examples 43

More about Linking and the Group Policy Objects Container 44

Applying a Group Policy Object to the Site Level 47

Applying Group Policy Objects to the Domain Level 50

Applying Group Policy Objects to the OU Level 52

Testing Your Delegation of Group Policy Management 58

Understanding Group Policy Object Linking Delegation 59

Granting OU Admins Access to Create New Group Policy Objects 61

Creating and Linking Group Policy Objects at the OU Level 61

Creating a New Group Policy Object Affecting Computers in an OU 66

Moving Computers into the Human Resources Computers OU 67

Verifying Your Cumulative Changes 69

Final Thoughts 71

Chapter 2 Managing Group Policy with the GPMC 73

Common Procedures with the GPMC 74

Raising or Lowering the Precedence of Multiple Group Policy Objects 78

Understanding GPMC’s Link Warning 79

Stopping Group Policy Objects from Applying 80

Block Inheritance 87

The Enforced Function 88

Security Filtering and Delegation with the GPMC 90

Filtering the Scope of Group Policy Objects with Security 91

User Permissions on Group Policy Objects 100

Granting Group Policy Object Creation Rights in the Domain 102

Special Group Policy Operation Delegations 103

Who Can Create and Use WMI Filters? 104

Performing RSoP Calculations with the GPMC 106

What’s-Going-On Calculations with Group Policy Results 107

What-If Calculations with Group Policy Modeling 113

Searching and Commenting Group Policy Objects and Policy Settings 116

Searching for GPO Characteristics 116

Filtering Inside a GPO for Policy Settings 118

Comments for GPOs and Policy Settings 129

Starter GPOs 135

Creating a Starter GPO 136

Editing a Starter GPO 136

Leveraging a Starter GPO 137

Delegating Control of Starter GPOs 139

Wrapping Up and Sending Starter GPOs 140

Should You Use Microsoft’s Pre-created Starter GPOs? 141

Back Up and Restore for Group Policy 142

Backing Up Group Policy Objects 143

Restoring Group Policy Objects 146

Backing Up and Restoring Starter GPOs 148Windows 8 Group Policy over Slow Network Connections 190

What Is Processed over a Slow Network Connection? 192

Using Group Policy to Affect Group Policy 197

Affecting the User Settings of Group Policy 197

Affecting the Computer Settings of Group Policy 199

The Missing Group Policy Preferences’ Policy Settings 211

Final Thoughts 212

Chapter 4 Advanced Group Policy Processing 215

WMI Filters: Fine-Tuning When and Where Group Policy Applies 215

Tools (and References) of the WMI Trade 217

WMI Filter Syntax 218

Creating and Using a WMI Filter 219

WMI Performance Impact 220

Group Policy Loopback Processing 221

Reviewing Normal Group Policy Processing 222

Group Policy Loopback—Merge Mode 223

Group Policy Loopback—Replace Mode 223

Group Policy with Cross-Forest Trusts 229

What Happens When Logging onto Different Clients across a Cross-Forest Trust? 229

Disabling Loopback Processing When Using Cross-Forest Trusts 232

Understanding Cross-Forest Trust Permissions 232

Final Thoughts 234

Chapter 5 Group Policy Preferences 235

Powers of the Group Policy Preferences 237

Computer Configuration a Preferences 238

User Configuration a Preferences 249

Group Policy Preferences Concepts 258

Preference vs. Policy 259

The Overlap of Group Policy vs. Group Policy

Preferences and Associated Issues 261

The Lines and Circles and the CRUD Action Modes 275

Common Tab 282

Group Policy Preferences Tips, Tricks, and Troubleshooting 294

Quick Copy, Drag and Drop, Cut and Paste, and Sharing of Settings 294

Multiple Preference Items at a Level 296

Temporarily Disabling a Single Preference Item or Extension Root 298

Environment Variables 298

Managing Group Policy Preferences: Hiding Extensions from Use 301

Troubleshooting: Reporting, Logging, and Tracing 302

Final Thoughts 310

Chapter 6 Managing Applications and Settings Using Group Policy 311

Administrative Templates: A History and Policy vs. Preferences 312

Administrative Templates: Then and Now 312

Policy vs. Preference 313

ADM vs. ADMX and ADML Files 318

ADM File Introduction 318

Updated GPMC’s ADMX and ADML Files 318

ADM vs. ADMX Files—At a Glance 320

ADMX and ADML Files: What They Do and the Problems They Solve 321

Problem and Solution 1: Tackling SYSVOL Bloat 321

Problem 2: How Do We Deal with Multiple Languages? 321

Problem 3: How Do We Deal with “Write Overlaps”? 323

Problem 4: How Do We Distribute Updated Definitions to All Our Administrators? 324

The Central Store 325

The Windows ADMX/ADML Central Store 327

Creating and Editing GPOs in a Mixed Environment 331

Scenario 1: Start by Creating and Editing a GPO Using the Older GPMC. Edit Using Another Older GPMC

Management Station. 331

Scenario 2: Start by Creating and Editing a GPO with the Older GPMC. Edit Using the Updated GPMC. 332

Scenario 3: Start by Creating and Editing a GPO Using the Updated GPMC. Edit Using Another Updated GPMC Management Station. 334

Scenario 4: Start by Creating and Editing a GPO Using

Inside Local Group Policy 357

Inside Active Directory Group Policy Objects 360

The Birth, Life, and Death of a GPO 362

How Group Policy Objects Are “Born” 362

How a GPO “Lives” 364

Death of a GPO 391

How Client Systems Get Group Policy Objects 392

The Steps to Group Policy Processing 392

Client-Side Extensions 395

Where Are Administrative Templates Registry Settings Stored? 403

Why Isn’t Group Policy Applying? 405

Reviewing the Basics 406

Advanced Inspection 408

Client-Side Troubleshooting 418

RSoP for Windows Clients 419

Advanced Group Policy Troubleshooting with Log Files 428

Using the Event Viewer 428

Turning On Verbose Logging 429

Group Policy Processing Performance 443

Final Thoughts 444

Chapter 8 Implementing Security with Group Policy 447

The Two Default Group Policy Objects 448

GPOs Linked at the Domain Level 449

Group Policy Objects Linked to the Domain Controllers OU 453

Oops, the “Default Domain Policy” GPO and/or “Default Domain Controllers Policy” GPO Got Screwed Up! 455

The Strange Life of Password Policy 456

What Happens When You Set Password Settings at an OU Level 457

Fine-Grained Password Policy 458

Inside Auditing with and without Group Policy 463

Auditable Events Using Group Policy 464

Auditing File Access 470

Auditing Group Policy Object Changes 470

Advanced Audit Policy Configuration 475

Restricted Groups 480

Strictly Controlling Active Directory Groups 481

Strictly Applying Group Nesting 484

Which Groups Can Go into Which Other Groups via Restricted Group

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.