SlideShare a Scribd company logo
Implementing GPOs
Prepared by Pro. Hameda Hurmat
Objective
 Create User and join domain
 setup Roaming User Profile in Windows Server 2016
 Understanding Group Policy Settings
 Linking Existing GPOs to Active Directory
 configure within user and computer group policies
 Introducing Group Policy
 Configure software installation;
 configure folder redirection;
 configure administrative templates;
 import security templates;
Create User and join domain
 Joining computer to domain
 Login user
 Create local profile
setup Roaming User Profile in Windows
Server 2016
 Create OU
 Add several Users
 Create Security Group
 Create Share folder, how to hide share folder, assign permission to group users.
 Add share folder to roaming
 Check roaming profile in server and client
Introducing Group Policy
 Windows-based operating systems is their flexibility. End users and system
administrators can configure many different options to suit the network
environment and their personal tastes.
Group Policy Precedence
 Local GP -- gpedit.msc
 Site
 Domain
 Organization Unit
 Sub Organizational Unit
 Enforced Group policy Objects
LSDOE
Computer v.s. User
 Computer Configuration (Least important)
 User Configuration (Most important)
Understanding Group Policy Settings
 Group Policy settings are based on Group Policy administrative templates. These
templates provide a list of user-friendly configuration options and specify the
system settings to which they apply.
 Enabled Specifies that a setting for this GPO has been configured. Some settings
require values or options to be set.
 Disabled Specifies that this option is disabled for client computers. Note that
disabling an option is a setting. That is, it specifies that the system administrator
wants to disallow certain functionality.
 Not Configured Specifies that these settings have been neither enabled nor
disabled. Not Configured is the default option for most settings. It simply states
that this group policy will not specify an option and that other policy settings may
take precedence.
 Group Policy settings can apply to two types of Active Directory objects: User
objects and Computer objects. Because both users and computers can be placed
into groups and organized within OUs, this type of configuration simplifies the
management of hundreds, or even thousands, of computers.
 The main options you can configure within user and computer group policies are
as follows:
configure within user and computer group
policies
 Software Settings The Software Settings options apply to specific applications and software that
might be installed on the computer. System administrators can use these settings to make new
applications available to end users and to control the default configuration for these applications.
 Windows Settings The Windows Settings options allow system administrators to customize the
behavior of the Windows operating system. The specific options that are available here are divided
into two types: user and computer. User-specific settings let you configure Internet Explorer
(including the default home page and other settings). Computer settings include security options,
such as Account Policy and Event Log options.
 Administrative Templates Administrative templates are used to configure user and computer
settings further. In addition to the default options available, system administrators can create their
own administrative templates with custom options.
 Group Policy Preferences The Windows Server 2016 operating system includes Group Policy
preferences (GPPs), which give you more than 20 Group Policy extensions. These extensions, in turn,
give you a vast range of configurable settings within a Group Policy object. Included in the new
Group Policy preference extensions are settings for folder options, mapped drives, printers, the
Registry, local users and groups, scheduled tasks, services, and the Start menu.
 ADMX Central Store Another consideration in GPO settings is whether to set up
an ADMX Central Store. GPO administrative template files are saved as ADMX
(.admx) files and AMXL (.amxl) for the supported languages.
 Security Template Security templates are used to configure security settings
through a GPO. Some of the security settings that can be configured are settings
for account policies, local policies, event logs, restricted groups, system services,
and the Registry.
 Starter GPOs Starter Group Policy objects give administrators the ability to store a
collection of administrative template policy settings in a single object.
Administrators then have the ability to import and export starter GPOs to distribute
the GPOs easily to other environments.
Linking Existing GPOs to Active Directory
 Creating a GPO is the fi rst step in assigning group policies. The second step is to
link the GPO to a specifi c Active Directory object. As mentioned earlier in this
chapter, GPOs can be linked to sites, domains, and OUs.
 Open the Group Policy Management Console.
 Expand the Forest and Domain containers and right-click the Africa OU.
 Choose Link An Existing GPO.
 The Select GPO dialog box appears. Click Unlinked Test GPO and click OK.
 Close the Group Policy Management Console.
Password policy
 Group policy Management, Default domain controllers policy, computer
configuration , Windows setting, Security Settings
Mapping Network Drives/Shared Folders by
Group Policy on Win Server 2016
 Create security group and add users
 Share folder and add full permission in security add specific group and add full
access
 To MAP
 Open group policy
 Apply this policy in the root
 Create group policy Name, Edit, user setting, Reference , Windows setting, MAP,
add the location of share folder
Deploy Software using Group Policy
 Msi software should be share in hidden and has read only permission
 Open Group policy – Right click on OU – Create GPO – Assign Name – Edit –
Computer Configuration – Policies – software Settings – Software installation –
New – Package.
Thank you !
Any Question ?

More Related Content

What's hot

Group policy preferences
Group policy preferencesGroup policy preferences
Group policy preferences
Rob Dunn
 
Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019
Diana Carolina Torres Viasus
 
Course 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsCourse 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and Permissions
Ahmed El-Arabawy
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
Hameda Hurmat
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
Timothy Moffatt
 
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Edureka!
 
2.1 users & groups
2.1 users & groups2.1 users & groups
2.1 users & groupsMuuluu
 
Linux Directory Structure
Linux Directory StructureLinux Directory Structure
Linux Directory Structure
Kevin OBrien
 
Windows server
Windows serverWindows server
Windows server
Hideo Amezawa
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2
IGZ Software house
 
Server configuration
Server configurationServer configuration
Server configuration
Aisha Talat
 
Chapter Two.pptx
Chapter Two.pptxChapter Two.pptx
Chapter Two.pptx
ssuser8347a1
 
Chapter07 Advanced File System Management
Chapter07      Advanced  File  System  ManagementChapter07      Advanced  File  System  Management
Chapter07 Advanced File System ManagementRaja Waseem Akhtar
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
masbulosoke
 
User Administration in Linux
User Administration in LinuxUser Administration in Linux
User Administration in Linux
SAMUEL OJO
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
Mark Wilson
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
Henry Osborne
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
Muhibullah Malyar
 

What's hot (20)

Group policy preferences
Group policy preferencesGroup policy preferences
Group policy preferences
 
Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019
 
Course 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsCourse 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and Permissions
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
 
Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...
 
2.1 users & groups
2.1 users & groups2.1 users & groups
2.1 users & groups
 
Linux Directory Structure
Linux Directory StructureLinux Directory Structure
Linux Directory Structure
 
Windows server
Windows serverWindows server
Windows server
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2
 
Server configuration
Server configurationServer configuration
Server configuration
 
Chapter Two.pptx
Chapter Two.pptxChapter Two.pptx
Chapter Two.pptx
 
Chapter07 Advanced File System Management
Chapter07      Advanced  File  System  ManagementChapter07      Advanced  File  System  Management
Chapter07 Advanced File System Management
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
User Administration in Linux
User Administration in LinuxUser Administration in Linux
User Administration in Linux
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Windows Server 2012
Windows Server 2012Windows Server 2012
Windows Server 2012
 
Linux
Linux Linux
Linux
 

Similar to 10 implementing GPOs

Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy ADsentmery5
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1
denogx
 
A.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptxA.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptx
RosannaFranciscoFlor
 
User account policy
User account policyUser account policy
User account policyMuuluu
 
Domain wide organisation policy
Domain wide organisation policyDomain wide organisation policy
Domain wide organisation policy
Emmanuel Oshogwe Akpeokhai
 
Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security FeaturesRaja Waseem Akhtar
 
Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
gameaxt
 
Ad msi-installation via Active Directory
Ad msi-installation via Active DirectoryAd msi-installation via Active Directory
Ad msi-installation via Active DirectoryKalai Mani
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune Desktops
Unidesk Corporation
 
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
Puppet
 
Win Connections Group Policy Changes (Harold W)
Win Connections   Group Policy Changes (Harold W)Win Connections   Group Policy Changes (Harold W)
Win Connections Group Policy Changes (Harold W)
Harold Wong
 
Win Connections Group Policy Changes ( Harold W)
Win  Connections    Group  Policy  Changes ( Harold W)Win  Connections    Group  Policy  Changes ( Harold W)
Win Connections Group Policy Changes ( Harold W)Harold Wong
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
MulunehBardadeYegeta
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the networkWiliam Ferraciolli
 
70 271 Stu Chap03
70 271 Stu Chap0370 271 Stu Chap03
70 271 Stu Chap03
Gene Carboni
 
FILE SPLITTER AND JOINER
FILE SPLITTER AND JOINERFILE SPLITTER AND JOINER
FILE SPLITTER AND JOINERRajesh Roky
 
Arcelor Mittal intern
Arcelor Mittal internArcelor Mittal intern
Arcelor Mittal internAnshul Jain
 
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Mark Skurla
 

Similar to 10 implementing GPOs (20)

Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy AD
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1
 
70 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 04100970 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 041009
 
A.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptxA.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptx
 
User account policy
User account policyUser account policy
User account policy
 
Domain wide organisation policy
Domain wide organisation policyDomain wide organisation policy
Domain wide organisation policy
 
Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security Features
 
Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
 
Ad msi-installation via Active Directory
Ad msi-installation via Active DirectoryAd msi-installation via Active Directory
Ad msi-installation via Active Directory
 
Group Policy
Group PolicyGroup Policy
Group Policy
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune Desktops
 
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
Puppet Camp East, Converting Group Policy settings to Puppet manifests, Shane...
 
Win Connections Group Policy Changes (Harold W)
Win Connections   Group Policy Changes (Harold W)Win Connections   Group Policy Changes (Harold W)
Win Connections Group Policy Changes (Harold W)
 
Win Connections Group Policy Changes ( Harold W)
Win  Connections    Group  Policy  Changes ( Harold W)Win  Connections    Group  Policy  Changes ( Harold W)
Win Connections Group Policy Changes ( Harold W)
 
Presentation gggffggggg.pdf
Presentation                     gggffggggg.pdfPresentation                     gggffggggg.pdf
Presentation gggffggggg.pdf
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
70 271 Stu Chap03
70 271 Stu Chap0370 271 Stu Chap03
70 271 Stu Chap03
 
FILE SPLITTER AND JOINER
FILE SPLITTER AND JOINERFILE SPLITTER AND JOINER
FILE SPLITTER AND JOINER
 
Arcelor Mittal intern
Arcelor Mittal internArcelor Mittal intern
Arcelor Mittal intern
 
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
 

More from Hameda Hurmat

15 Setup BIND 9
15 Setup BIND 915 Setup BIND 9
15 Setup BIND 9
Hameda Hurmat
 
14 FILE Server
14 FILE Server14 FILE Server
14 FILE Server
Hameda Hurmat
 
13 DHCP Configuration in Linux
13 DHCP Configuration in Linux13 DHCP Configuration in Linux
13 DHCP Configuration in Linux
Hameda Hurmat
 
11-IIS server 2016
11-IIS server 201611-IIS server 2016
11-IIS server 2016
Hameda Hurmat
 
Administer Active Directory
Administer Active DirectoryAdminister Active Directory
Administer Active Directory
Hameda Hurmat
 
Active Directory
Active DirectoryActive Directory
Active Directory
Hameda Hurmat
 
7 understanding DNS
7 understanding DNS7 understanding DNS
7 understanding DNS
Hameda Hurmat
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
Hameda Hurmat
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
Hameda Hurmat
 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper v
Hameda Hurmat
 
3 configuring basic and dynamic disks
3 configuring basic and dynamic disks3 configuring basic and dynamic disks
3 configuring basic and dynamic disks
Hameda Hurmat
 
2 introduction of storage
2 introduction of storage2 introduction of storage
2 introduction of storage
Hameda Hurmat
 
12 introduction to Linux OS
12 introduction to Linux OS12 introduction to Linux OS
12 introduction to Linux OS
Hameda Hurmat
 
Flowers Album
Flowers AlbumFlowers Album
Flowers Album
Hameda Hurmat
 
Change management
Change managementChange management
Change management
Hameda Hurmat
 
ویندو7
ویندو7ویندو7
ویندو7
Hameda Hurmat
 
Interview skill
Interview skillInterview skill
Interview skill
Hameda Hurmat
 
Waste management
Waste managementWaste management
Waste management
Hameda Hurmat
 
Rule of Work
Rule of WorkRule of Work
Rule of Work
Hameda Hurmat
 

More from Hameda Hurmat (20)

15 Setup BIND 9
15 Setup BIND 915 Setup BIND 9
15 Setup BIND 9
 
14 FILE Server
14 FILE Server14 FILE Server
14 FILE Server
 
13 DHCP Configuration in Linux
13 DHCP Configuration in Linux13 DHCP Configuration in Linux
13 DHCP Configuration in Linux
 
11-IIS server 2016
11-IIS server 201611-IIS server 2016
11-IIS server 2016
 
Administer Active Directory
Administer Active DirectoryAdminister Active Directory
Administer Active Directory
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
7 understanding DNS
7 understanding DNS7 understanding DNS
7 understanding DNS
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
5 configuring TCP/IP
5 configuring TCP/IP5 configuring TCP/IP
5 configuring TCP/IP
 
4. install and configure hyper v
4. install and configure hyper v4. install and configure hyper v
4. install and configure hyper v
 
3 configuring basic and dynamic disks
3 configuring basic and dynamic disks3 configuring basic and dynamic disks
3 configuring basic and dynamic disks
 
2 introduction of storage
2 introduction of storage2 introduction of storage
2 introduction of storage
 
12 introduction to Linux OS
12 introduction to Linux OS12 introduction to Linux OS
12 introduction to Linux OS
 
Flowers Album
Flowers AlbumFlowers Album
Flowers Album
 
Change management
Change managementChange management
Change management
 
ویندو7
ویندو7ویندو7
ویندو7
 
Interview skill
Interview skillInterview skill
Interview skill
 
Waste management
Waste managementWaste management
Waste management
 
Ethical Hacker
Ethical HackerEthical Hacker
Ethical Hacker
 
Rule of Work
Rule of WorkRule of Work
Rule of Work
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

10 implementing GPOs

  • 1. Implementing GPOs Prepared by Pro. Hameda Hurmat
  • 2. Objective  Create User and join domain  setup Roaming User Profile in Windows Server 2016  Understanding Group Policy Settings  Linking Existing GPOs to Active Directory  configure within user and computer group policies  Introducing Group Policy  Configure software installation;  configure folder redirection;  configure administrative templates;  import security templates;
  • 3. Create User and join domain  Joining computer to domain  Login user  Create local profile
  • 4. setup Roaming User Profile in Windows Server 2016  Create OU  Add several Users  Create Security Group  Create Share folder, how to hide share folder, assign permission to group users.  Add share folder to roaming  Check roaming profile in server and client
  • 5. Introducing Group Policy  Windows-based operating systems is their flexibility. End users and system administrators can configure many different options to suit the network environment and their personal tastes.
  • 6. Group Policy Precedence  Local GP -- gpedit.msc  Site  Domain  Organization Unit  Sub Organizational Unit  Enforced Group policy Objects
  • 8. Computer v.s. User  Computer Configuration (Least important)  User Configuration (Most important)
  • 9. Understanding Group Policy Settings  Group Policy settings are based on Group Policy administrative templates. These templates provide a list of user-friendly configuration options and specify the system settings to which they apply.  Enabled Specifies that a setting for this GPO has been configured. Some settings require values or options to be set.  Disabled Specifies that this option is disabled for client computers. Note that disabling an option is a setting. That is, it specifies that the system administrator wants to disallow certain functionality.  Not Configured Specifies that these settings have been neither enabled nor disabled. Not Configured is the default option for most settings. It simply states that this group policy will not specify an option and that other policy settings may take precedence.
  • 10.  Group Policy settings can apply to two types of Active Directory objects: User objects and Computer objects. Because both users and computers can be placed into groups and organized within OUs, this type of configuration simplifies the management of hundreds, or even thousands, of computers.  The main options you can configure within user and computer group policies are as follows:
  • 11. configure within user and computer group policies  Software Settings The Software Settings options apply to specific applications and software that might be installed on the computer. System administrators can use these settings to make new applications available to end users and to control the default configuration for these applications.  Windows Settings The Windows Settings options allow system administrators to customize the behavior of the Windows operating system. The specific options that are available here are divided into two types: user and computer. User-specific settings let you configure Internet Explorer (including the default home page and other settings). Computer settings include security options, such as Account Policy and Event Log options.  Administrative Templates Administrative templates are used to configure user and computer settings further. In addition to the default options available, system administrators can create their own administrative templates with custom options.  Group Policy Preferences The Windows Server 2016 operating system includes Group Policy preferences (GPPs), which give you more than 20 Group Policy extensions. These extensions, in turn, give you a vast range of configurable settings within a Group Policy object. Included in the new Group Policy preference extensions are settings for folder options, mapped drives, printers, the Registry, local users and groups, scheduled tasks, services, and the Start menu.
  • 12.  ADMX Central Store Another consideration in GPO settings is whether to set up an ADMX Central Store. GPO administrative template files are saved as ADMX (.admx) files and AMXL (.amxl) for the supported languages.  Security Template Security templates are used to configure security settings through a GPO. Some of the security settings that can be configured are settings for account policies, local policies, event logs, restricted groups, system services, and the Registry.  Starter GPOs Starter Group Policy objects give administrators the ability to store a collection of administrative template policy settings in a single object. Administrators then have the ability to import and export starter GPOs to distribute the GPOs easily to other environments.
  • 13. Linking Existing GPOs to Active Directory  Creating a GPO is the fi rst step in assigning group policies. The second step is to link the GPO to a specifi c Active Directory object. As mentioned earlier in this chapter, GPOs can be linked to sites, domains, and OUs.  Open the Group Policy Management Console.  Expand the Forest and Domain containers and right-click the Africa OU.  Choose Link An Existing GPO.  The Select GPO dialog box appears. Click Unlinked Test GPO and click OK.  Close the Group Policy Management Console.
  • 14. Password policy  Group policy Management, Default domain controllers policy, computer configuration , Windows setting, Security Settings
  • 15. Mapping Network Drives/Shared Folders by Group Policy on Win Server 2016  Create security group and add users  Share folder and add full permission in security add specific group and add full access  To MAP  Open group policy  Apply this policy in the root  Create group policy Name, Edit, user setting, Reference , Windows setting, MAP, add the location of share folder
  • 16. Deploy Software using Group Policy  Msi software should be share in hidden and has read only permission  Open Group policy – Right click on OU – Create GPO – Assign Name – Edit – Computer Configuration – Policies – software Settings – Software installation – New – Package.
  • 17. Thank you ! Any Question ?