123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Using Wmi Queries To Filter Gpo Scope

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Windows Management Instrumentation (WMI) is a management infrastructure that allows Network+ certification administrators to monitor and control managed objects in the network. These abilities mean that the administrator can manage remote systems from a central location, controlling almost every aspect of all computers on the network. A new feature in Windows Server 2003, WMI filtering enables you to use a WMI query to filter the scope of a GPO, similar to the way security groups can be used to filter GPO scope. The GPO is applied based on properties available in WMI that are contained in the query. WMI queries are written using WMI query language (WQL). For more information about developing WMI queries for GPO filtering, see the Windows Management Instrumentation (WMI) software development kit (SDK).
Replace mode In this case, the GPO list for the user is replaced in its entirety by the GPO list already obtained for the computer at computer startup (during step 2 in "How Group Policy Affects Startup and Logging On"). The computer's comptia network ...
... replace the user GPOs normally applied to the user.
a Merge mode In this case, the GPO list is concatenated. The GPO list obtained for the computer at computer startup (step 2 in "How Group Policy Affects Startup and Logging On") is appended to the GPO list obtained for the user when logging on (step 7 in "How Group Policy Affects Startup and Logging On"). Because the GPO list obtained for the computer is applied later, it has precedence if it conflicts with settings in the user's list.
Delegating Control of GPOs
There are different GPO-related tasks for which you can delegate control: GPO editing, GPO creation, and GPO object linking. You delegate control of GPO editing by setting the Read and Write permissions for the selected user or groups to Allow. You delegate control of GPO creation by making users members of the Group Policy Creator Owners group and delegating to them control of GPO object linking. You delegate control of GPO object linking by setting the Manage Group Policy Links option in the Delegation Of Control Wizard for the domain or OU. For more information on delegating control of GPOs, refer to Lesson 3.

Group policies are collections of user and computer configuration settings that can be linked to computers, sites, domains, and OUs to specify the behavior of users'desktops. You use the Group Policy Object Editor to organize free practice tests and manage the Group Policy settings in each GPO.

Total Views: 446Word Count: 412See All articles From Author

Add Comment

System/Network Administration Articles

1. Roi Benefits Of Implementing The M-files Document Management System
Author: DocSmart Solutions

2. Mems Optical Switch: High-speed, Reliable Switching For Modern Fiber Optic Networks
Author: Ryan

3. Polarization Maintaining Fiber Cable: Ensuring Polarization Stability In Advanced Optical Systems
Author: Ryan

4. Optical Fiber Alignment System: The Foundation Of High-performance Fiber Optic Solutions
Author: Ryan

5. The Real Difference Between Ai Tools And Ai Systems
Author: Orson Amiri

6. Document Manager Software: Tools To Organize Business Files
Author: DocSmart Solutions

7. Best Online Cybersecurity Training Institute In India
Author: securium Academy

8. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan

9. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan

10. Fiber Cable Stripping Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan

11. 20% Off PmpĀ® Certification: Turn This Christmas Into A Career Milestone
Author: securium Academy

12. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic Cables
Author: Ryan

13. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan

14. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy

15. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: