Group Policy: Fundamentals, Security, and the Managed Desktop (2nd Edition)

Group Policy: Fundamentals, Security, and the Managed Desktop (2nd Edition)

Jeremy Moskowitz

Language: English

Pages: 740

ISBN: 1119035589

Format: PDF / Kindle (mobi) / ePub


The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft Group Policy MVP Jeremy Moskowitz covers it all-major Group Policy categories, what Windows 8 and Windows Server 2012 bring to the table, and smart ways to tackle tough desktop management problems. Topics include troubleshooting, security, scripting, using Windows PowerShell when necessary, and much more.

Inside this book, you'll learn to:
Master all Group Policy functions of Windows, including Windows XP through Windows 8 and Windows Server 2003 through Windows Server 2012
Enhance your Group Policy reach with the Group Policy Preferences, ADMX files, and additional add-ons
Use every feature of the GPMC and become a top-notch administrator
Troubleshoot Group Policy using tools, logs, Resource Kit utilities, Registry hacks, and third-party tools
Manage printers, restrict hardware, and configure Internet Explorer
Deploy software to your desktops, set up roaming profiles, and configure Offline Files for all your Windows clients-and manage it all with Group Policy settings
Secure your desktops and servers with AppLocker, Windows Firewall with Advanced Security, and the Security Configuration Manager
Download bonus chapters and:
Script complex GPMC operations with PowerShell, including linking, backup, restore, permissions changes, and more
Create a "change management" system with Advanced Group Policy Management (AGPM v4)
Understand Windows Intune service and its relationship to Group Policy
Coverage Includes:
Updated GPMC
New Windows 8 GPMC Features
ADMX/ADML Files
Group Policy Preferences
Item-Level Targeting
The Central Store
AppLocker
Fine-Grained Password Policy
Offline Files Updates
Inheritance Blocking
Prioritization
Linking
Loopback Policy Processing
Security Policy Processing
Enforcing
WMI Filters
Third-Party Tools
Cross-Forest Trusts
Filters
Commenting
Searching
Advanced Logging and Troubleshooting
Advanced Auditing Controls
Group Policy and VDI
Security Configuration Manager
Windows Intune

GPU Pro 7: Advanced Rendering Techniques

Using OpenMP: Portable Shared Memory Parallel Programming (Scientific and Engineering Computation Series)

Robot Motion and Control: Recent Developments (Lecture Notes in Control and Information Sciences)

Understanding and Applying Machine Vision (2nd Edition) (Manufacturing Engineering and Materials Processing)

Apprendre Java Et C++ en Parallèle

 

 

 

 

 

 

 

 

 

 

 

sites and print publications, is a contributing editor at Petri.com, a Pluralsight author, and a frequent speaker at technology conferences and user groups. His latest book is PowerShell In Depth: An Administrator's Guide, Second Edition, with Don Jones and Richard Siddaway (Manning Publications, 2013). You can keep up with Jeff on Twitter (http://twitter.com/JeffHicks) and on his blog (http://jdhitsolutions.com/blog). Alan Burchill   works as a manager for Avanade Australia based in Brisbane. He

Group Policy objects processing. Just remember to ensure that your computers are in the OU where this GPO is targeted to take effect. Disabling the Link Enabled Status Remember that all GPOs are contained in the Group Policy Objects container. To use them at a level in Active Directory (site, domain, or OU), you link back to the GPO. So, the quickest way to prevent a GPO’s contents from applying is to remove its Link Enabled status. If you right-click a GPO link at a level, you can immediately

Templates settings along with comments inside any Administrative Templates settings. This is a real bummer; most people think (and rightly so) that Starter GPOs should encompass all the areas, not just Administrative Templates. The ability to use all areas, however, is possible, if you step up to Microsoft’s pay Group Policy management tool— Advanced Group Policy Management (which we’ll talk about in Appendix C). That feature is called Templates. It’s like Starter GPOs, but all areas are

when both domains were online and accessible. But take a look at a different example, say, in Figure 2.65. In this example, the two domains, Corp.com and Testlab.internal.com, have no connectivity. Testlab.internal.com could be in a closet somewhere, completely isolated from the real live production network. F I G U R E   2 . 6 5     GPOs can still be migrated between unrelated domains. Corp.com Testlab.internal.com Migrating Group Policy Objects between Domains 159 So, how, then, do

Server 2012 R2, Windows 10, and Windows Server 2016 are ludicrously close brothers. They look alike, throw the same temper tantrums, and enjoy the same kinds of movies. But they’re not identical. They are, in fact, different, but in most cases, they’re super-duper similar and will react the same way when poked. For this edition of the book, we decided to make a conscious choice about how to present Group Policy. Most of the walk-throughs, examples, and screen shots in the book will be of

Download sample

Download