123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Removing Applications Deployed With Group Policy

Profile Picture
By Author: fiona
Total Articles: 191
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

At some point, users might no longer require an application, so you might need to remove it. In 70-686 exam, you learned to terminate the effects of a GPO by unlinking or deleting the GPO. However, if you delete a GPO that deploys a software application, the application cannot be uninstalled with Group Policy. If the application cannot be uninstalled with Group Policy, you (or the users) must manually uninstall the application from each client computer. To avoid this hazard, you must remove applications deployed with Group Policy in three steps:
1.Choose the software removal method you want to implement.
2.Allow the software removal to be processed.
3.Delete the GPO.
Because a great number of users and their computers can be affected by the removal of applications deployed with Group Policy, you should carefully consider the effects of removing these applications.
Software Removal Methods
There are two options for removing software deployed with Group Policy. You can immediately uninstall the software from users and computers (known as a forced removal), ...
... or you can allow users to continue to use the software, but prevent new installations (known as an optional removal).
You should choose a forced removal if a software application is no longer used. After the software is deleted, users will not be able to install or run the software. Although you specify that you want to "immediately" uninstall the software in this option, the software is actually deleted in the following fashion:
Software assigned to computers is automatically deleted from the computer the next time Windows 7 certificate the computer is rebooted or turned on.
Software assigned to computers that are not attached to the network is automatically deleted the next time the computer is connected to the network and
rebooted or turned on when the computer account logs on to Active Directory.
Software assigned or published to users is automatically deleted from the computer the next time the user logs on.
Software assigned or published to users on computers that are not attached to the network is automatically deleted the next time the user logs on to Active Directory.
Because the software is not "immediately" deleted, do not delete the GPO until there has been sufficient time for the software removal to be processed.
You should choose an optional removal if a version of a software application is no longer supported. The software is removed from deployment without forcing the (physical) removal of the software from the computers of users who are still using the software. Users can continue to use the software until they remove it themselves. How?ever, no user is able to install the mcse training software (from the Start menu, from Add Or Remove Programs in Control Panel, or by document invocation).

Total Views: 481Word Count: 446See All articles From Author

Add Comment

System/Network Administration Articles

1. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic Cables
Author: Ryan

2. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan

3. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy

4. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech

5. Ethical Hacking Training Institute Building Future Ready Cybersecurity Experts
Author: Hanna Vahab

6. How Oscp Certification Opens Doors To Global Cybersecurity Roles?
Author: securium Academy

7. Fiber Optic Cable Production Line: The Backbone Of Modern Connectivity
Author: Ryan

8. Fiber Cable Production Line: Revolutionizing Connectivity
Author: Ryan

9. The Role Of Optical Waveguide Alignment Systems In Precision Optics And Telecommunications
Author: Ryan

10. When Every Access Decision Matters, How Smart Identity Can Make Hipaa Compliance A Reality
Author: Tushar Pansare

11. Fibre Optic Pigtail Cables: Designs, Connectors, And Use Cases
Author: Ryan

12. Exploring Optical Circulators: Categories, Functionality, And Benefits
Author: Ryan

13. Precision In Fiber Optics: Polarization Maintaining Axis And Fiber Rotation Systems
Author: Ryan

14. Fiber Optic Polishing Machines: Types, Applications, And When They Are Needed
Author: Ryan

15. Fiber Optic Pigtails: Types, Specifications, And Applications Explained
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: