Summary

This chapter was all about applying and filtering your GPOs. We explained link order precedence and showcased the areas of GPMC where link priority can be viewed and manipulated. We also discussed some need-to-know features such as blocking inheritance, and enforcement of GPO settings. Following discussion of the differences between user and computer settings inside the Group Policy Management Editor, we ran through some exercises of normal tasks associated with links and filtering. We wrapped things up with details on two very important options that exist for any GPO: security filtering and WMI filtering. After reading this chapter, you should be able to take any GPO in your environment and apply it with precision to only the computers or users to which it needs to apply.

Turn the page to continue exploring Group Policy functionality. In the next chapter, we will take a closer look at the Group Policy Management Editor, and the settings contained within, as we start to take this idea of centralized management via Group Policy and turn it into reality by creating some real policy settings and pushing them out to our computers.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.23.101.1