ALL >> System-Network-Administration >> View Article
Disabling Unused Group Policy Settings
If the Computer Configuration or User Configuration node for a sy0-201 security has only settings that are Not Configured, then you can avoid processing those settings by disabling the node. Disabling unused Group Policy settings is recommended because it expedites startup and logging on for those users and computers subject to the GPO.
To disable the computer configuration or user configuration settings for a GPO, complete the following steps:
1.Access the Group Policy Object Editor for the GPO.
2.Right-click the root node, and then click Properties.
3.In the General tab in the Properties dialog box for the GPO, do one of the following:
To disable the computer configuration settings, select the Disable Computer Configuration Settings check box.
To disable the user configuration settings, select the Disable User Configura?tion Settings check box.
4.Click OK.
To specify the Block Policy Inheritance option, complete the following steps:
1.Open the Active Directory Users And Computers console to specify the Block Policy Inheritance ...
... option for a domain or OU, or open the Active Directory Sites And Services console to specify the Block Policy Inheritance option for a Security+ exam site.
2.In the console, right-click the site, domain, or OU for which you want to specify the Block Policy Inheritance option, click Properties, and then click the Group Policy tab.
3.In the Properties dialog box for the object, in the Group Policy tab, select the Block Policy Inheritance check box. By checking this box, you specify that all GPOs linked to higher level sites, domains, or OUs should be blocked from linking to this site, domain, or OU. You cannot block GPOs that use the No Override option.
You've been asked to configure five public access computers that run the Windows XP Professional operating system in the Humongous Insurance lobby. You configure a GPO called LockDown that restricts the options that people have in operating these systems. However, you are concerned that some of your domain users might log on to these systems, which would change the appearance of the desktop. You want to be sure that the user settings that you've configured for the LockDown GPO apply to anyone who logs on to the public computers. What can you do?
Create a new OU named Public and link the LockDown GPO to that OU. Move the computer accounts for each of those computers to the LockDown OU. Then, on the LockDown OU, enable the Computer Configuration, Administrative Templates, System, Group Policy, User Group Policy Loopback Processing Mode policy for Replace mode. This will ensure 70-640 that everyone receives an identical desktop configuration.
Add Comment
System/Network Administration Articles
1. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic CablesAuthor: Ryan
2. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan
3. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy
4. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech
5. Ethical Hacking Training Institute Building Future Ready Cybersecurity Experts
Author: Hanna Vahab
6. How Oscp Certification Opens Doors To Global Cybersecurity Roles?
Author: securium Academy
7. Fiber Optic Cable Production Line: The Backbone Of Modern Connectivity
Author: Ryan
8. Fiber Cable Production Line: Revolutionizing Connectivity
Author: Ryan
9. The Role Of Optical Waveguide Alignment Systems In Precision Optics And Telecommunications
Author: Ryan
10. When Every Access Decision Matters, How Smart Identity Can Make Hipaa Compliance A Reality
Author: Tushar Pansare
11. Fibre Optic Pigtail Cables: Designs, Connectors, And Use Cases
Author: Ryan
12. Exploring Optical Circulators: Categories, Functionality, And Benefits
Author: Ryan
13. Precision In Fiber Optics: Polarization Maintaining Axis And Fiber Rotation Systems
Author: Ryan
14. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan
15. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan






