Return to home page
Searching: Muskingum library catalog
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
EBOOK
Author Moskowitz, Jeremy.
Title Group policy : fundamentals, security, and the managed desktop / Jeremy Moskowitz.
Imprint Indianapolis, Ind. : Sybex/Wiley, 2013.
Edition Second edition.

LOCATION CALL # STATUS MESSAGE
 OHIOLINK SAFARI EBOOKS    ONLINE  
View online
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SAFARI EBOOKS    ONLINE  
View online
Series Sybex serious skills
Serious skills.
Subject Microsoft Windows (Computer file)
Operating systems (Computers)
Software configuration management.
Computer security.
Directory services (Computer network technology)
Description 1 online resource (1 volume) : illustrations.
Edition Second edition.
Contents Machine generated contents note: ch. 1 Group Policy Essentials -- Getting Ready to Use This Book -- Getting Started with Group Policy -- Group Policy Entities and Policy Settings -- Categories of Group Policy -- Active Directory and Local Group Policy -- Understanding Local Group Policy -- Group Policy and Active Directory -- Linking Group Policy Objects -- Final Thoughts on Local GPOs -- Example of Group Policy Application -- Examining the Resultant Set of Policy -- At the Site Level -- At the Domain Level -- At the OU Level -- Bringing It All Together -- Group Policy, Active Directory, and the GPMC -- Implementing the GPMC on Your Management Station -- Creating a One-Stop-Shop MMC -- Group Policy 101 and Active Directory -- Active Directory Users and Computers vs. GPMC -- Adjusting the View within the GPMC -- GPMC-centric View -- Our Own Group Policy Examples -- More about Linking and the Group Policy Objects Container -- Applying a Group Policy Object to the Site Level -- Applying Group Policy Objects to the Domain Level -- Applying Group Policy Objects to the OU Level -- Testing Your Delegation of Group Policy Management -- Understanding Group Policy Object Linking Delegation -- Granting OU Admins Access to Create New Group Policy Objects -- Creating and Linking Group Policy Objects at the OU Level -- Creating a New Group Policy Object Affecting Computers in an OU -- Moving Computers into the Human Resources Computers OU -- Verifying Your Cumulative Changes -- Final Thoughts -- ch. 2 Managing Group Policy with the GPMC -- Common Procedures with the GPMC -- Raising or Lowering the Precedence of Multiple Group Policy Objects -- Understanding GPMC's Link Warning -- Stopping Group Policy Objects from Applying -- Block Inheritance -- Enforced Function -- Security Filtering and Delegation with the GPMC -- Filtering the Scope of Group Policy Objects with Security -- User Permissions on Group Policy Objects -- Granting Group Policy Object Creation Rights in the Domain -- Special Group Policy Operation Delegations -- Who Can Create and Use WMI Filters? -- Performing RSoP Calculations with the GPMC -- What's-Going-On Calculations with Group Policy Results -- What-If Calculations with Group Policy Modeling -- Searching and Commenting Group Policy Objects and Policy Settings -- Searching for GPO Characteristics -- Filtering Inside a GPO for Policy Settings -- Comments for GPOs and Policy Settings -- Starter GPOs -- Creating a Starter GPO -- Editing a Starter GPO -- Leveraging a Starter GPO -- Delegating Control of Starter GPOs -- Wrapping Up and Sending Starter GPOs -- Should You Use Microsoft's Pre-created Starter GPOs? -- Back Up and Restore for Group Policy -- Backing Up Group Policy Objects -- Restoring Group Policy Objects -- Backing Up and Restoring Starter GPOs -- Backing Up and Restoring WMI Filters -- Backing Up and Restoring IPsec Filters -- Migrating Group Policy Objects between Domains -- Basic Interdomain Copy and Import -- Copy and Import with Migration Tables -- GPMC At-a-Glance Icon View -- Final Thoughts -- ch. 3 Group Policy Processing Behavior Essentials -- Group Policy Processing Principles -- Don't Get Lost -- Initial Policy Processing -- Background Refresh Policy Processing -- Security Background Refresh Processing -- Special Case: Moving a User or a Computer Object -- Windows 8 and Group Policy: Subtle Differences -- Policy Application via Remote Access, Slow Links, and after Hibernation -- Windows XP Group Policy over Slow Network Connections -- Windows 8 Group Policy over Slow Network Connections -- What Is Processed over a Slow Network Connection? -- Using Group Policy to Affect Group Policy -- Affecting the User Settings of Group Policy -- Affecting the Computer Settings of Group Policy -- Missing Group Policy Preferences' Policy Settings -- Final Thoughts -- ch. 4 Advanced Group Policy Processing -- WMI Filters: Fine-Tuning When and Where Group Policy Applies -- Tools (and References) of the WMI Trade -- WMI Filter Syntax -- Creating and Using a WMI Filter -- WMI Performance Impact -- Group Policy Loopback Processing -- Reviewing Normal Group Policy Processing -- Group Policy Loopback -- Merge Mode -- Group Policy Loopback -- Replace Mode -- Group Policy with Cross-Forest Trusts -- What Happens When Logging onto Different Clients across a Cross-Forest Trust? -- Disabling Loopback Processing When Using Cross-Forest Trusts -- Understanding Cross-Forest Trust Permissions -- Final Thoughts -- ch. 5 Group Policy Preferences -- Powers of the Group Policy Preferences -- Computer Configuration Preferences -- User Configuration Preferences -- Group Policy Preferences Concepts -- Preference vs. Policy -- Overlap of Group Policy vs. Group Policy Preferences and Associated Issues -- Lines and Circles and the CRUD Action Modes -- Common Tab -- Group Policy Preferences Tips, Tricks, and Troubleshooting -- Quick Copy, Drag and Drop, Cut and Paste, and Sharing of Settings -- Multiple Preference Items at a Level -- Temporarily Disabling a Single Preference Item or Extension Root -- Environment Variables -- Managing Group Policy Preferences: Hiding Extensions from Use -- Troubleshooting: Reporting, Logging, and Tracing -- Final Thoughts -- ch. 6 Managing Applications and Settings Using Group Policy -- Administrative Templates: A History and Policy vs. Preferences -- Administrative Templates: Then and Now -- Policy vs. Preference -- ADM vs. AD MX and ADML Files -- ADM File Introduction -- Updated GPMC's ADMX and ADML Files -- ADM vs. ADMX Files -- At a Glance -- ADMX and ADML Files: What They Do and the Problems They Solve -- Problem and Solution I: Tackling SYSVOL Bloat -- Problem 2: How Do We Deal with Multiple Languages? -- Problem 3: How Do We Deal with "Write Overlaps"? -- Problem 4: How Do We Distribute Updated Definitions to All Our Administrators? -- Central Store -- Windows ADMX/ADML Central Store -- Creating and Editing GPOs in a Mixed Environment -- Scenario 1 Start by Creating and Editing a GPO Using the Older GPMC Edit Using Another Older GPMC Management Station -- Scenario 2 Start by Creating and Editing a GPO with the Older GPMC Edit Using the Updated GPMC -- Scenario 3 Start by Creating and Editing a GPO Using the Updated GPMC Edit Using Another Updated GPMC Management Station -- Scenario 4 Start by Creating and Editing a GPO Using an Updated GPMC Management Station Edit Using an Older GPMC Management Station -- ADM and ADMX Templates from Other Sources -- Using ADM Templates with the Updated GPMC -- Using ADMX Templates from Other Sources -- ADMX Migrator and ADMX Editor Tools -- ADMX Migrator -- ADMX Creation and Editor Tools -- PolicyPak Community Edition and PolicyPak Professional -- PolicyPak Concepts and Installation -- PolicyPak Pregame Setup -- PolicyPak Quick Installation -- Getting Started Immediately with PolicyPak's Preconfigured Paks -- PolicyPak Final Thoughts and Wrap-Up -- Final Thoughts -- ch. 7 Troubleshooting Group Policy -- Under the Hood of Group Policy -- Inside Local Group Policy -- Inside Active Directory Group Policy Objects -- Birth, Life, and Death of a GPO -- How Group Policy Objects Are "Born" -- How a GPO "Lives" -- Death of a GPO -- How Client Systems Get Group Policy Objects -- Steps to Group Policy Processing -- Client-Side Extensions -- Where Are Administrative Templates Registry Settings Stored? -- Why Isn't Group Policy Applying? -- Reviewing the Basics -- Advanced Inspection -- Client-Side Troubleshooting -- RSoP for Windows Clients -- Advanced Group Policy Troubleshooting with Log Files -- Using the Event Viewer -- Turning On Verbose Logging -- Group Policy Processing Performance -- Final Thoughts -- ch. 8 Implementing Security with Group Policy -- Two Default Group Policy Objects -- GPOs Linked at the Domain Level -- Group Policy Objects Linked to the Domain Controllers OU -- Oops, the "Default Domain Policy" GPO and/or "Default Domain Controllers Policy" GPO Got Screwed Up! -- Strange Life of Password Policy -- What Happens When You Set Password Settings at an OU Level -- Fine-Grained Password Policy -- Inside Auditing with and without Group Policy -- Auditable Events Using Group Policy -- Auditing File Access -- Auditing Group Policy Object Changes -- Advanced Audit Policy Configuration -- Restricted Groups -- Strictly Controlling Active Directory Groups -- Strictly Applying Group Nesting -- Which Groups Can Go into Which Other Groups via Restricted Groups? -- Restrict Software: Software Restriction Policy and AppLocker -- Inside Software Restriction Policies -- Software Restriction Policies' "Philosophies" -- Software Restriction Policies' Rules -- Restricting Software Using AppLocker -- Controlling User Account Control with Group Policy -- Just Who Will See the UAC Prompts, Anyway? -- Understanding the Group Policy Controls for UAC -- UAC Policy Setting Suggestions -- Wireless (802.3) and Wired Network (802.11) Policies -- 802.11 Wireless Policy for Windows XP -- 802.11 Wireless Policy and 802.3 Wired Policy for Windows 8 -- Configuring Windows Firewall with Group Policy -- Manipulating the Windows XP Firewall -- Windows Firewall with Advanced Security (for Windows 8) -- WFAS -- IPsec (Now in Windows Firewall with Advanced Security) -- How Windows Firewall Rules Are Ultimately Calculated -- Final Thoughts -- ch. 9 Profiles: Local, Roaming, and Mandatory -- What Is a User Profile? -- NTUSER.DAT File -- Profile Folders for Type 1 Computers (Windows XP and Windows 2003 Server)
Note continued: Profile Folders for Type 2 Computers (Windows Vista and Later) -- Default Local User Profile -- Default Network User Profile -- Roaming Profiles -- Setting Up Roaming Profiles -- Testing Roaming Profiles -- Roaming and Nonroaming Folders -- Managing Roaming Profiles -- Manipulating Roaming Profiles with Computer Group Policy Settings -- Manipulating Roaming Profiles with User Group Policy Settings -- Mandatory Profiles -- Establishing Mandatory Profiles for Windows XP -- Establishing Mandatory Profiles for Windows 8 -- Mandatory Profiles -- Finishing Touches -- Forced Mandatory Profiles (Super-Mandatory) -- Final Thoughts -- ch. 10 Implementing a Managed Desktop, Part 1: Redirected Folders, Offline Files, and the Synchronization Manager -- Overview of Change and Configuration Management -- Redirected Folders -- Available Folders to Redirect -- Redirected Documents/My Documents -- Redirecting the Start Menu and the Desktop -- Redirecting the Application Data Folder -- Group Policy Setting for Folder Redirection -- Troubleshooting Redirected Folders -- Offline Files and Synchronization -- Making Offline Files Available -- Inside Windows 8 File Synchronization -- Handling Conflicts -- Client Configuration of Offline Files -- Using Folder Redirection and Offline Files over Slow Links -- Synchronizing over Slow Links with Redirected My Documents -- Synchronizing over Slow Links with Regular Shares -- Teaching Windows 7 and Windows 8 How to React to Slow Links -- Using Group Policy to Configure Offline Files (User and Computer Node) -- Troubleshooting Sync Center -- Turning Off Folder Redirection's Automatic Offline Caching for Desktops -- Final Thoughts -- ch. 11 Managed Desktop, Part 2: Software Deployment via Group Policy -- Group Policy Software Installation (GPSI) Overview -- Windows Installer Service -- Understanding .MSI Packages -- Utilizing an Existing MSI Package -- Assigning and Publishing Applications -- Assigning Applications -- Publishing Applications -- Rules of Deployment -- Package-Targeting Strategy -- Advanced Published or Assigned -- General Tab -- Deployment Tab -- Upgrades Tab -- Categories Tab -- Modifications Tab -- Security Tab -- Default Group Policy Software Installation Properties -- General Tab -- Advanced Tab -- File Extensions Tab -- Categories Tab -- Removing Applications -- Users Can Manually Change or Remove Applications -- Automatically Removing Assigned or Published MSI Applications -- Forcibly Removing Assigned or Published .MSI Applications -- Using Group Policy Software Installation over Slow Links -- MSI, the Windows Installer and Group Policy -- Inside the MSIEXEC Tool -- Patching a Distribution Point -- Affecting Windows Installer with Group Policy -- Deploying Office 2010 and Office 2013 Using Group Policy -- Steps to Office 2010/2013 Deployment Using Group Policy -- Result of Your Office Deploying Using Group Policy -- Systems Center Configuration Manager vs. Group Policy -- GPSI and Configuration Manager Coexistence -- Final Thoughts -- ch. 12 Finishing Touches with Group Policy: Scripts, Internet Explorer, Hardware Control, and Printer Deployment -- Scripts: Logon, Logoff, Startup, and Shutdown -- Non-PowerShell-Based Scripts -- Deploying PowerShell Scripts to Windows 7 and Later Clients -- Managing Internet Explorer with Group Policy -- Internet Explorer Maintenance -- Where Is It? -- Managing Internet Explorer with Group Policy Preferences -- Internet Explorer's Group Policy Settings -- Managing Internet Explorer using the IEAK -- Restricting Access to Hardware via Group Policy -- Group Policy Preferences Devices Extension -- Restricting Driver Access with Policy Settings for Windows Vista and Later -- Getting a Handle on Classes and IDs -- Restricting or Allowing Your Hardware via Group Policy -- Understanding the Remaining Policy Settings for Hardware Restrictions -- Assigning Printers via Group Policy -- Zapping Down Printers to Users and Computers (a Refresher) -- Final Thoughts for This Chapter and for the Book -- Appendix A Group Policy and VDI -- Why Is VDI Different? -- Tuning Your Images for VDI -- Specific Functions to Turn Off for VDI Machines -- Group Policy Settings to Set and Avoid for Maximum VDI Performance -- Group Policy Tweaks for Fast VDI Video -- Tweaking RDP Using Group Policy for VDI -- Tweaking RemoteFX using Group Policy for VDI -- Managing and Locking Down Desktop UI Tweaks -- Final Thoughts for VDI and Group Policy -- Appendix B Security Configuration Manager -- SCM: Installation -- SCM: Getting Around -- SCM: Usual Use Case -- Importing Existing GPOs -- Comparing and Merging Baselines -- LocalGPO Tool -- Installing SCM's LocalGPO Tool -- Using SCM's LocalGPO -- Final Thoughts on LocalGPO and SCM -- Appendix C Windows Intune (And What It Means to Group Policy Admins) -- Getting Started with Windows Intune -- Using Windows Intune -- Setting Up Windows Intune Groups -- Setting Up Policies Using Windows Intune -- Windows Intune and Group Policy Conflicts -- Final Thoughts on Windows Intune.
Summary The Ultimate Book on Group Policy Freshly updated to include Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft Group Policy MVP Jeremy Moskowitz covers it all-major Group Policy categories, what Windows 8 and Windows Server 2012 bring to the table, and smart ways to tackle tough desktop management problems.
Note Online resource; title from cover (Safari, viewed June 7, 2013).
ISBN 9781118331743
1118331745
1118289404
9781118289402
9781118289402
OCLC # 848899520