ALL >> System-Network-Administration >> View Article
Disabling Unused Group Policy Settings
If the Computer Configuration or User Configuration node for a sy0-201 security has only settings that are Not Configured, then you can avoid processing those settings by disabling the node. Disabling unused Group Policy settings is recommended because it expedites startup and logging on for those users and computers subject to the GPO.
To disable the computer configuration or user configuration settings for a GPO, complete the following steps:
1.Access the Group Policy Object Editor for the GPO.
2.Right-click the root node, and then click Properties.
3.In the General tab in the Properties dialog box for the GPO, do one of the following:
To disable the computer configuration settings, select the Disable Computer Configuration Settings check box.
To disable the user configuration settings, select the Disable User Configura?tion Settings check box.
4.Click OK.
To specify the Block Policy Inheritance option, complete the following steps:
1.Open the Active Directory Users And Computers console to specify the Block Policy Inheritance ...
... option for a domain or OU, or open the Active Directory Sites And Services console to specify the Block Policy Inheritance option for a Security+ exam site.
2.In the console, right-click the site, domain, or OU for which you want to specify the Block Policy Inheritance option, click Properties, and then click the Group Policy tab.
3.In the Properties dialog box for the object, in the Group Policy tab, select the Block Policy Inheritance check box. By checking this box, you specify that all GPOs linked to higher level sites, domains, or OUs should be blocked from linking to this site, domain, or OU. You cannot block GPOs that use the No Override option.
You've been asked to configure five public access computers that run the Windows XP Professional operating system in the Humongous Insurance lobby. You configure a GPO called LockDown that restricts the options that people have in operating these systems. However, you are concerned that some of your domain users might log on to these systems, which would change the appearance of the desktop. You want to be sure that the user settings that you've configured for the LockDown GPO apply to anyone who logs on to the public computers. What can you do?
Create a new OU named Public and link the LockDown GPO to that OU. Move the computer accounts for each of those computers to the LockDown OU. Then, on the LockDown OU, enable the Computer Configuration, Administrative Templates, System, Group Policy, User Group Policy Loopback Processing Mode policy for Replace mode. This will ensure 70-640 that everyone receives an identical desktop configuration.
Add Comment
System/Network Administration Articles
1. Fiber Fused Biconical Taper Systems And Fiber Cable Cutting Machine PotentialAuthor: Ryan
2. Understanding Polarization Maintaining Fiber Rotation Systems And Their Applications
Author: Ryan
3. Cat6a Patch Cable: The Best Preference For Comprehensive Cabling
Author: Ryan
4. A Brief Idea About The Mtp/mpo Cables And Their Use
Author: Ryan
5. 5 Reasons Why A Smart Bus Ticketing System Is The Future Of Public Transport
Author: Limon
6. How To Implement Technology In Your Inbound Call Center?
Author: DialDesk
7. How To Choose An Enterprise Help Desk It Support Company
Author: Entrust Network Services
8. Cost-effective Network Solutions For Offices In Singapore
Author: Entrust Network Services
9. Choosing Between Uv Light And Heat Ovens For Superior Performance
Author: James
10. The Right Tools And The Right Radius Are Vital In A Fiber Optic Polishing Process
Author: James
11. Lc And Sc Connectors Explained: Which Fiber Connection Is Right For You?
Author: James
12. A Closer Look At Armored Fiber Patch Cables
Author: James
13. The Essential Guide To Fiber Connectors: Sc, Fc, Lc, And St Explained
Author: Ryan
14. Wireless Network Setup Solutions For Offices By Entrust Network
Author: Entrust Network Services
15. Pcb Manufacturing: Understanding The Burn-in Test Process
Author: Ryan