123ArticleOnline Logo
Welcome to 123ArticleOnline.com!

ALL >> System-Network-Administration >> View Article

A Common Misconception Is That Group Policies Can Be Applied To Groups. Although Group Policies Do N

By Author: Jasmine
Total Articles: 286

Before attempting to implement Group Policy, you must be familiar with CompTIA A+ certification concepts that affect Group Policy operations. This lesson defines Group Policy, explains how GPOs work, and provides an overview of the settings in a GPO. It also shows you how Group Policy affects startup and logging on, how it is applied, and how security groups are used to filter Group Policy.
Group policies are collections of user and computer configuration settings that specify how programs, network resources, and the operating system work for users and computers in an organization. Group Policy can be set up for computers, sites, domains, and OUs. For example, using group policies, you can determine the programs that are available to users, the programs that appear on the user's desktop, and Start menu options. Although the name "Group Policy" suggests that you might set policies for global, domain local, or global groups, this is not the case. Instead, think of Group Policy as groupings of policy settings that are linked to computers, sites, domains, and OUs.
Off the Record As stated in this A+ Exams section, group policies apply to computer and user accounts. A common misconception is that group policies can be applied to groups. Although group policies do not apply to groups, group membership can affect the application of Group Policy. For example, if a user or computer account belongs to a group that is specifically denied the ability to apply Group Policy, that account will not receive the Group Policy. This concept is known as filtering GPO scope with security groups, and is discussed in Lesson 3.
You can see a mapping of the Group Policy GUID and name in the Active Directory Replication Monitor (Replmon.exe). To see this, add a domain controller as the monitored server, and then right-click that domain controller and select Show Group Policy Object Status.
You can determine which administrative groups can administer (create, modify, delete) GPOs by defining permissions for each GPO in the GPO's Security tab, just like you would for any other object. Planning administrative control of GPOs is discussed in Lesson 2.
To open the Group Policy Object Editor from the Active Directory Users And Computers console, complete the following steps:
1.Click Start, point to Administrative Tools, and then click Active Directory Users And Computers.
2.In the console tree, right-click the domain or OU you want to set Group Policy for,and then click Properties.
3.Click the Group Policy tab, click an entry in the Group Policy Object Links list to select an mcsa existing GPO, and then click Edit. (Or, click New to create a new GPO, and then click Edit.)The Group Policy Object Editor for the domain or OU GPO is now available.

Total Views: 141Word Count: 452See All articles From Author

System/Network Administration Articles

1. Best Places To Buy Backconnect Proxy
Author: microleaves

2. The Application Delivery Network Load Balancer Market Supercharge Your Network To
Author: Pamela Sun

3. Avanu Webmux Application Delivery Load Balancing Solution
Author: Pamela Sun

4. Conflict In The Workplace: A Waste Of Time & Energy
Author: Nick Wells

5. Get Asset Management Solution Software
Author: Shophia Pena

6. Digital Library Management System - A Collection Of Content In Digital Format
Author: Anika Ahuja

7. How To Choose Employee Performance Software
Author: Engagedly Inc

8. Ccnp Training, Cisco Certified Network Professional Security Training Hyderabad - Golarsnetworks
Author: GolarsNetworks

9. Croyant Software Technologies |smart Choice For Your Business , Call Us: 7036775091
Author: sales Croyanttech

10. Ensure Better Economical End User Experience With Snmp
Author: James J. Adams

11. Browser Support Phone Number+1-844-622-1670
Author: Brendan Diamond

12. Guidelines Of Enhanced Cybersecurity And It Security Services
Author: Singhvarinder

13. Why Custom Mobile App Development Service In Texas Is The Best Bet
Author: ayokasystems

14. Check Server Health Using Snmp - In Search Of The Preeminent Tools
Author: James J. Adams

15. Want Enhanced Business Communication? Make Use Of Hosted Voip Telephony
Author: Hosted VoIP, Vertical Telephone System

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: