SlideShare una empresa de Scribd logo
1 de 17
Implementing GPOs
Prepared by Pro. Hameda Hurmat
Objective
 Create User and join domain
 setup Roaming User Profile in Windows Server 2016
 Understanding Group Policy Settings
 Linking Existing GPOs to Active Directory
 configure within user and computer group policies
 Introducing Group Policy
 Configure software installation;
 configure folder redirection;
 configure administrative templates;
 import security templates;
Create User and join domain
 Joining computer to domain
 Login user
 Create local profile
setup Roaming User Profile in Windows
Server 2016
 Create OU
 Add several Users
 Create Security Group
 Create Share folder, how to hide share folder, assign permission to group users.
 Add share folder to roaming
 Check roaming profile in server and client
Introducing Group Policy
 Windows-based operating systems is their flexibility. End users and system
administrators can configure many different options to suit the network
environment and their personal tastes.
Group Policy Precedence
 Local GP -- gpedit.msc
 Site
 Domain
 Organization Unit
 Sub Organizational Unit
 Enforced Group policy Objects
LSDOE
Computer v.s. User
 Computer Configuration (Least important)
 User Configuration (Most important)
Understanding Group Policy Settings
 Group Policy settings are based on Group Policy administrative templates. These
templates provide a list of user-friendly configuration options and specify the
system settings to which they apply.
 Enabled Specifies that a setting for this GPO has been configured. Some settings
require values or options to be set.
 Disabled Specifies that this option is disabled for client computers. Note that
disabling an option is a setting. That is, it specifies that the system administrator
wants to disallow certain functionality.
 Not Configured Specifies that these settings have been neither enabled nor
disabled. Not Configured is the default option for most settings. It simply states
that this group policy will not specify an option and that other policy settings may
take precedence.
 Group Policy settings can apply to two types of Active Directory objects: User
objects and Computer objects. Because both users and computers can be placed
into groups and organized within OUs, this type of configuration simplifies the
management of hundreds, or even thousands, of computers.
 The main options you can configure within user and computer group policies are
as follows:
configure within user and computer group
policies
 Software Settings The Software Settings options apply to specific applications and software that
might be installed on the computer. System administrators can use these settings to make new
applications available to end users and to control the default configuration for these applications.
 Windows Settings The Windows Settings options allow system administrators to customize the
behavior of the Windows operating system. The specific options that are available here are divided
into two types: user and computer. User-specific settings let you configure Internet Explorer
(including the default home page and other settings). Computer settings include security options,
such as Account Policy and Event Log options.
 Administrative Templates Administrative templates are used to configure user and computer
settings further. In addition to the default options available, system administrators can create their
own administrative templates with custom options.
 Group Policy Preferences The Windows Server 2016 operating system includes Group Policy
preferences (GPPs), which give you more than 20 Group Policy extensions. These extensions, in turn,
give you a vast range of configurable settings within a Group Policy object. Included in the new
Group Policy preference extensions are settings for folder options, mapped drives, printers, the
Registry, local users and groups, scheduled tasks, services, and the Start menu.
 ADMX Central Store Another consideration in GPO settings is whether to set up
an ADMX Central Store. GPO administrative template files are saved as ADMX
(.admx) files and AMXL (.amxl) for the supported languages.
 Security Template Security templates are used to configure security settings
through a GPO. Some of the security settings that can be configured are settings
for account policies, local policies, event logs, restricted groups, system services,
and the Registry.
 Starter GPOs Starter Group Policy objects give administrators the ability to store a
collection of administrative template policy settings in a single object.
Administrators then have the ability to import and export starter GPOs to distribute
the GPOs easily to other environments.
Linking Existing GPOs to Active Directory
 Creating a GPO is the fi rst step in assigning group policies. The second step is to
link the GPO to a specifi c Active Directory object. As mentioned earlier in this
chapter, GPOs can be linked to sites, domains, and OUs.
 Open the Group Policy Management Console.
 Expand the Forest and Domain containers and right-click the Africa OU.
 Choose Link An Existing GPO.
 The Select GPO dialog box appears. Click Unlinked Test GPO and click OK.
 Close the Group Policy Management Console.
Password policy
 Group policy Management, Default domain controllers policy, computer
configuration , Windows setting, Security Settings
Mapping Network Drives/Shared Folders by
Group Policy on Win Server 2016
 Create security group and add users
 Share folder and add full permission in security add specific group and add full
access
 To MAP
 Open group policy
 Apply this policy in the root
 Create group policy Name, Edit, user setting, Reference , Windows setting, MAP,
add the location of share folder
Deploy Software using Group Policy
 Msi software should be share in hidden and has read only permission
 Open Group policy – Right click on OU – Create GPO – Assign Name – Edit –
Computer Configuration – Policies – software Settings – Software installation –
New – Package.
Thank you !
Any Question ?

Más contenido relacionado

La actualidad más candente

active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services202066
 
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in LinuxKnoldus Inc.
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administratorAisha Talat
 
Group policy preferences
Group policy preferencesGroup policy preferences
Group policy preferencesRob Dunn
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptxmasbulosoke
 
Configuring Domino To Be An Ldap Directory And To Use An Ldap Directory
Configuring Domino To Be An Ldap Directory And To Use An Ldap DirectoryConfiguring Domino To Be An Ldap Directory And To Use An Ldap Directory
Configuring Domino To Be An Ldap Directory And To Use An Ldap DirectoryEdson Oliveira
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linuxVarnnit Jain
 
Group policy Best Practices
Group policy Best PracticesGroup policy Best Practices
Group policy Best PracticesRob Dunn
 
2.1 users & groups
2.1 users & groups2.1 users & groups
2.1 users & groupsMuuluu
 
HPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideHPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideAndrey Karpov
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directorythoms1i
 
Administer Active Directory
Administer Active DirectoryAdminister Active Directory
Administer Active DirectoryHameda Hurmat
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptxsyedasadraza13
 
Server configuration
Server configurationServer configuration
Server configurationAisha Talat
 
HCL Sametime V11 installation - tips
HCL Sametime V11 installation - tipsHCL Sametime V11 installation - tips
HCL Sametime V11 installation - tipsAles Lichtenberg
 
Overview of Microsoft Exchange Server
Overview of Microsoft Exchange ServerOverview of Microsoft Exchange Server
Overview of Microsoft Exchange Serverbedekarpm
 

La actualidad más candente (20)

active-directory-domain-services
active-directory-domain-servicesactive-directory-domain-services
active-directory-domain-services
 
Users and groups in Linux
Users and groups in LinuxUsers and groups in Linux
Users and groups in Linux
 
User and groups administrator
User  and  groups administratorUser  and  groups administrator
User and groups administrator
 
Filepermissions in linux
Filepermissions in linuxFilepermissions in linux
Filepermissions in linux
 
Group policy preferences
Group policy preferencesGroup policy preferences
Group policy preferences
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
Configuring Domino To Be An Ldap Directory And To Use An Ldap Directory
Configuring Domino To Be An Ldap Directory And To Use An Ldap DirectoryConfiguring Domino To Be An Ldap Directory And To Use An Ldap Directory
Configuring Domino To Be An Ldap Directory And To Use An Ldap Directory
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linux
 
Group policy Best Practices
Group policy Best PracticesGroup policy Best Practices
Group policy Best Practices
 
Active Directory
Active Directory Active Directory
Active Directory
 
2.1 users & groups
2.1 users & groups2.1 users & groups
2.1 users & groups
 
HPE Data Protector Administrator's Guide
HPE Data Protector Administrator's GuideHPE Data Protector Administrator's Guide
HPE Data Protector Administrator's Guide
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
 
Administer Active Directory
Administer Active DirectoryAdminister Active Directory
Administer Active Directory
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptx
 
Server configuration
Server configurationServer configuration
Server configuration
 
HCL Sametime V11 installation - tips
HCL Sametime V11 installation - tipsHCL Sametime V11 installation - tips
HCL Sametime V11 installation - tips
 
Overview of Microsoft Exchange Server
Overview of Microsoft Exchange ServerOverview of Microsoft Exchange Server
Overview of Microsoft Exchange Server
 
Linux file system
Linux file systemLinux file system
Linux file system
 

Similar a 10 implementing GPOs

Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy ADsentmery5
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1denogx
 
User account policy
User account policyUser account policy
User account policyMuuluu
 
Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security FeaturesRaja Waseem Akhtar
 
Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11gameaxt
 
Ad msi-installation via Active Directory
Ad msi-installation via Active DirectoryAd msi-installation via Active Directory
Ad msi-installation via Active DirectoryKalai Mani
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUnidesk Corporation
 
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...Puppet
 
Win Connections Group Policy Changes (Harold W)
Win Connections   Group Policy Changes (Harold W)Win Connections   Group Policy Changes (Harold W)
Win Connections Group Policy Changes (Harold W)Harold Wong
 
Win Connections Group Policy Changes ( Harold W)
Win  Connections    Group  Policy  Changes ( Harold W)Win  Connections    Group  Policy  Changes ( Harold W)
Win Connections Group Policy Changes ( Harold W)Harold Wong
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the networkWiliam Ferraciolli
 
FILE SPLITTER AND JOINER
FILE SPLITTER AND JOINERFILE SPLITTER AND JOINER
FILE SPLITTER AND JOINERRajesh Roky
 
Arcelor Mittal intern
Arcelor Mittal internArcelor Mittal intern
Arcelor Mittal internAnshul Jain
 
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesMark Skurla
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Sangeetha Rangarajan
 

Similar a 10 implementing GPOs (20)

Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy AD
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1
 
70 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 04100970 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 041009
 
User account policy
User account policyUser account policy
User account policy
 
Domain wide organisation policy
Domain wide organisation policyDomain wide organisation policy
Domain wide organisation policy
 
Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security Features
 
Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
 
Ad msi-installation via Active Directory
Ad msi-installation via Active DirectoryAd msi-installation via Active Directory
Ad msi-installation via Active Directory
 
Group Policy
Group PolicyGroup Policy
Group Policy
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune Desktops
 
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
 
Win Connections Group Policy Changes (Harold W)
Win Connections   Group Policy Changes (Harold W)Win Connections   Group Policy Changes (Harold W)
Win Connections Group Policy Changes (Harold W)
 
Win Connections Group Policy Changes ( Harold W)
Win  Connections    Group  Policy  Changes ( Harold W)Win  Connections    Group  Policy  Changes ( Harold W)
Win Connections Group Policy Changes ( Harold W)
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
70 271 Stu Chap03
70 271 Stu Chap0370 271 Stu Chap03
70 271 Stu Chap03
 
FILE SPLITTER AND JOINER
FILE SPLITTER AND JOINERFILE SPLITTER AND JOINER
FILE SPLITTER AND JOINER
 
Arcelor Mittal intern
Arcelor Mittal internArcelor Mittal intern
Arcelor Mittal intern
 
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 

Más de Hameda Hurmat

13 DHCP Configuration in Linux
13 DHCP Configuration in Linux13 DHCP Configuration in Linux
13 DHCP Configuration in LinuxHameda Hurmat
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCPHameda Hurmat
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IPHameda Hurmat
 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper vHameda Hurmat
 
3 configuring basic and dynamic disks
3 configuring basic and dynamic disks3 configuring basic and dynamic disks
3 configuring basic and dynamic disksHameda Hurmat
 
2 introduction of storage
2 introduction of storage2 introduction of storage
2 introduction of storageHameda Hurmat
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016Hameda Hurmat
 
12 introduction to Linux OS
12 introduction to Linux OS12 introduction to Linux OS
12 introduction to Linux OSHameda Hurmat
 

Más de Hameda Hurmat (20)

15 Setup BIND 9
15 Setup BIND 915 Setup BIND 9
15 Setup BIND 9
 
14 FILE Server
14 FILE Server14 FILE Server
14 FILE Server
 
13 DHCP Configuration in Linux
13 DHCP Configuration in Linux13 DHCP Configuration in Linux
13 DHCP Configuration in Linux
 
11-IIS server 2016
11-IIS server 201611-IIS server 2016
11-IIS server 2016
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
7 understanding DNS
7 understanding DNS7 understanding DNS
7 understanding DNS
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper v
 
3 configuring basic and dynamic disks
3 configuring basic and dynamic disks3 configuring basic and dynamic disks
3 configuring basic and dynamic disks
 
2 introduction of storage
2 introduction of storage2 introduction of storage
2 introduction of storage
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
 
12 introduction to Linux OS
12 introduction to Linux OS12 introduction to Linux OS
12 introduction to Linux OS
 
Flowers Album
Flowers AlbumFlowers Album
Flowers Album
 
Change management
Change managementChange management
Change management
 
ویندو7
ویندو7ویندو7
ویندو7
 
Interview skill
Interview skillInterview skill
Interview skill
 
Waste management
Waste managementWaste management
Waste management
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hacker
 
Rule of Work
Rule of WorkRule of Work
Rule of Work
 

Último

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

10 implementing GPOs

  • 1. Implementing GPOs Prepared by Pro. Hameda Hurmat
  • 2. Objective  Create User and join domain  setup Roaming User Profile in Windows Server 2016  Understanding Group Policy Settings  Linking Existing GPOs to Active Directory  configure within user and computer group policies  Introducing Group Policy  Configure software installation;  configure folder redirection;  configure administrative templates;  import security templates;
  • 3. Create User and join domain  Joining computer to domain  Login user  Create local profile
  • 4. setup Roaming User Profile in Windows Server 2016  Create OU  Add several Users  Create Security Group  Create Share folder, how to hide share folder, assign permission to group users.  Add share folder to roaming  Check roaming profile in server and client
  • 5. Introducing Group Policy  Windows-based operating systems is their flexibility. End users and system administrators can configure many different options to suit the network environment and their personal tastes.
  • 6. Group Policy Precedence  Local GP -- gpedit.msc  Site  Domain  Organization Unit  Sub Organizational Unit  Enforced Group policy Objects
  • 8. Computer v.s. User  Computer Configuration (Least important)  User Configuration (Most important)
  • 9. Understanding Group Policy Settings  Group Policy settings are based on Group Policy administrative templates. These templates provide a list of user-friendly configuration options and specify the system settings to which they apply.  Enabled Specifies that a setting for this GPO has been configured. Some settings require values or options to be set.  Disabled Specifies that this option is disabled for client computers. Note that disabling an option is a setting. That is, it specifies that the system administrator wants to disallow certain functionality.  Not Configured Specifies that these settings have been neither enabled nor disabled. Not Configured is the default option for most settings. It simply states that this group policy will not specify an option and that other policy settings may take precedence.
  • 10.  Group Policy settings can apply to two types of Active Directory objects: User objects and Computer objects. Because both users and computers can be placed into groups and organized within OUs, this type of configuration simplifies the management of hundreds, or even thousands, of computers.  The main options you can configure within user and computer group policies are as follows:
  • 11. configure within user and computer group policies  Software Settings The Software Settings options apply to specific applications and software that might be installed on the computer. System administrators can use these settings to make new applications available to end users and to control the default configuration for these applications.  Windows Settings The Windows Settings options allow system administrators to customize the behavior of the Windows operating system. The specific options that are available here are divided into two types: user and computer. User-specific settings let you configure Internet Explorer (including the default home page and other settings). Computer settings include security options, such as Account Policy and Event Log options.  Administrative Templates Administrative templates are used to configure user and computer settings further. In addition to the default options available, system administrators can create their own administrative templates with custom options.  Group Policy Preferences The Windows Server 2016 operating system includes Group Policy preferences (GPPs), which give you more than 20 Group Policy extensions. These extensions, in turn, give you a vast range of configurable settings within a Group Policy object. Included in the new Group Policy preference extensions are settings for folder options, mapped drives, printers, the Registry, local users and groups, scheduled tasks, services, and the Start menu.
  • 12.  ADMX Central Store Another consideration in GPO settings is whether to set up an ADMX Central Store. GPO administrative template files are saved as ADMX (.admx) files and AMXL (.amxl) for the supported languages.  Security Template Security templates are used to configure security settings through a GPO. Some of the security settings that can be configured are settings for account policies, local policies, event logs, restricted groups, system services, and the Registry.  Starter GPOs Starter Group Policy objects give administrators the ability to store a collection of administrative template policy settings in a single object. Administrators then have the ability to import and export starter GPOs to distribute the GPOs easily to other environments.
  • 13. Linking Existing GPOs to Active Directory  Creating a GPO is the fi rst step in assigning group policies. The second step is to link the GPO to a specifi c Active Directory object. As mentioned earlier in this chapter, GPOs can be linked to sites, domains, and OUs.  Open the Group Policy Management Console.  Expand the Forest and Domain containers and right-click the Africa OU.  Choose Link An Existing GPO.  The Select GPO dialog box appears. Click Unlinked Test GPO and click OK.  Close the Group Policy Management Console.
  • 14. Password policy  Group policy Management, Default domain controllers policy, computer configuration , Windows setting, Security Settings
  • 15. Mapping Network Drives/Shared Folders by Group Policy on Win Server 2016  Create security group and add users  Share folder and add full permission in security add specific group and add full access  To MAP  Open group policy  Apply this policy in the root  Create group policy Name, Edit, user setting, Reference , Windows setting, MAP, add the location of share folder
  • 16. Deploy Software using Group Policy  Msi software should be share in hidden and has read only permission  Open Group policy – Right click on OU – Create GPO – Assign Name – Edit – Computer Configuration – Policies – software Settings – Software installation – New – Package.
  • 17. Thank you ! Any Question ?