123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

Planning Administrative Control Of Gpos

Profile Picture
By Author: fiona
Total Articles: 191
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

When you plan the Group Policy settings and GPOs to be used in your Network+ certification organization, you should also plan who will manage them. The appropriate level of administrative control can be delegated by using a centralized, decentralized, or task-based administrative control design.
You are a domain administrator for Contoso Pharmaceuticals. One of the desktop administrators calls to report some peculiar results with four user accounts. Users are not supposed to have the Run command in their Start menus, but three out of four have it. The desktop administrator is puzzled. You investigate the issue and document your results, as shown in Table 10-5.
You learn that the GPO that doesn't seem to be working is named GPLabRemoveRun. You discover that someone has explicitly denied GPLabGroup2 the permission to Apply Group Policy for the GPLabRemoveRun policy. You also determined that GPLabRemoveRun is linked to the GPLab OU.
When you create the user accounts in this lab, set their passwords to comptia network. ...
... Clear the User Must Change Password At Next Logon box. Check the Password Never Expires box. (In a real-world environment, of course, you should make sure users follow proper password procedures, such as creating complex passwords with a combination of uppercase and lowercase letters, numbers, and symbols.)
Group Policy is applied to Active Directory components in the following order: local computer, site, domain, and then OU.
Group Policy is passed down from parent to child containers within a domain. If you have assigned a separate Group Policy setting to a parent container, shat Group Policy setting applies to all containers beneath the parent container, including the user and computer objects in the container. However, if you specify a Group Policy setting for a child container, the child container's Group Policy setting overrides the setting inherited from the parent container.
The default order for the application of Group Policy settings is subject to the following exceptions: No Override, Block Policy Inheritance, the Loopback setting, and a computer that is a member of a workgroup.
There are three parts to planning Group Policy: plan the Group Policy settings, plan GPOs, and plan administrative control of GPOs.
Computer Configuration node A node in the Group Policy Object Editor which contains the settings used to set group policies applied to computers, regardless of who logs on to them. Computer configuration settings free test questions are applied when the operating system initializes.

Total Views: 306Word Count: 395See All articles From Author

Add Comment

System/Network Administration Articles

1. Fbt Optical Fiber Splitter Vs. Plc Optical Fiber Splitter
Author: Ryan

2. Know More About The Optical Fiber Alignment System
Author: Ryan

3. Fiber Optic Pigtail: What Is It And What Are Its Types?
Author: Ryan

4. Comprehensive Introduction Of Fiber Optic Splitter
Author: Ryan

5. Know About The Fiber Polishing Parameters
Author: Ryan

6. Basic Introduction To Ic Substrate China
Author: Ryan

7. Pcba Manufacturing In China: A Global Hub
Author: Ryan

8. You Can Get The Details Idea About Miniaturization In Csp Substrates
Author: Ryan

9. Fiber Fused Biconical Taper Systems And Fiber Cable Cutting Machine Potential
Author: Ryan

10. Understanding Polarization Maintaining Fiber Rotation Systems And Their Applications
Author: Ryan

11. Cat6a Patch Cable: The Best Preference For Comprehensive Cabling
Author: Ryan

12. A Brief Idea About The Mtp/mpo Cables And Their Use
Author: Ryan

13. 5 Reasons Why A Smart Bus Ticketing System Is The Future Of Public Transport
Author: Limon

14. How To Implement Technology In Your Inbound Call Center?
Author: DialDesk

15. How To Choose An Enterprise Help Desk It Support Company
Author: Entrust Network Services

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: