Tip

Manage GPOs through a GPO

James Michael Stewart, Contributor

While it may seem a bit like the chicken and the egg problem, it is possible to control the function of GPOs to a certain extent through a GPO. Controls for GPOs are found in both the Computer Configuration and User Configuration sections within their respective Administrative Templates/System/Group Policy folders.

The controls found in the Computer Configuration section are as follows:

The Turn off background refresh of Group Policy control prevents the GPO from being refreshed or updated on a system while that system is in use. The system will wait until the current user logs off before refreshing Group Policy.

The Group Policy refresh interval for computers control defines the refresh interval for GPOs. It applies only to the Computer Configuration section of GPOs. The refresh interval includes a defined interval and a randomizer. The defined interval is set to 90 minutes by default and the randomizer has a default maximum value of 30 minutes.

The Group Policy refresh interval for domain controllers control defines the refresh interval for domain controllers just like the previous control. The defined interval is set to 5 minutes by default and the randomizer has a default maximum value of 0 minutes.

The User Group Policy loopback processing mode control controls how alternate user settings are applied when the user logs on. When enabled the options are to replace the current settings or to merge the

Requires Free Membership to View

current settings with the alternate settings.

The Group Policy slow link detection control defines the speed at which a connection is considered a slow link.

The Turn off Resultant Set of Policy logging control defines whether RSoP logging is enabled or not on a client system. RSoP records details as to which GPOs were applied, the source of the GPOs, and any client-side extension settings applied to the group policy.

The Remove users ability to invoke machine policy refresh control prevents a user from manually invoking a GPO refresh.

The Disallow Interactive Users from generating Resultant Set of Policy data control restricts access to the RSoP logs.

The Registry policy processing control manages when Registry policies are applied. Controls can restrict application during background processing and when GPOs have not changed.

The Internet Explorer Maintenance policy processing control defines when policy settings are applied. Controls can restrict application over slow links, during background processing, and when GPOs have not changed.

The Software Installation policy processing manages when policy settings are applied. Controls can restrict application over slow links and when GPOs have not changed.

The Folder Redirection policy processing control manages when policy settings are applied. Controls can restrict application over slow links and when GPOs have not changed.

The Scripts policy processing control manages when policy settings are applied. Controls can restrict application over slow links, during background processing, and when GPOs have not changed.

The Security policy processing control manages when policy settings are applied. Controls can restrict application during background processing, and when GPOs have not changed.

The IP Security policy processing control manages when policy settings are applied. Controls can restrict application over slow links, during background processing, and when GPOs have not changed.

The EFS recovery policy processing control manages when policy settings are applied. Controls can restrict application over slow links, during background processing, and when GPOs have not changed.

The Disk Quota policy processing control is used to manage when policy settings are applied. Controls can restrict application over slow links, during background processing, and when GPOs have not changed.


James Michael Stewart is a partner and researcher for ITinfopros, a technology-focused writing and training organization.


This was first published in January 2003

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.