You can use Group Policy Objects (GPOs) to control almost every aspect of your computing environment. This guide breaks down the basics of GPOs, and offers helpful tips for managing them and keeping them secure. We'll be updating this page from time to time, so be sure to
Find more information on Microsoft Group Policy.
TABLE OF CONTENTS|
Managing your GPOs
Security and problem resolution
Questions for our experts
|GPO basics||Return to Table of Contents|
- What's new with status GPOs?
Determining the effective GPO status can be daunting until you know about these simple shortcuts.
- A rundown on GPOs
Expert Laura E. Hunter gives a reader a quick overview of how Group Policy objects are applied.
- Chapter of the Week: 'Group Policy Objects (GPOs)'
Need help managing or troubleshooting your GPOs? Then this chapter is for you. Get ready for an extensive run-down of various GPO-related problems and hands-on solutions to everything from GPO backup issues to applying stubborn GPO security filters.
- "Active Directory Field Guide," Chapter 4, 'Deploying Group Policy'
You can use Group Policy Objects (GPOs) to control almost every aspect of your computing environment, from creating a consistent desktop configuration, to securing your systems, to deploying and managing software across anything from a home office to a large enterprise.
- Understanding the GPC for Group Policy
Understanding the structure of object and object properties is an important part of dealing with Group Policy issues. Expert Derek Melber clarifies the responsibilities of the Group Policy Container (GPC).
- Understanding GPT Replication
It's important to know that Group Policy Objects are split into two parts: the Group Policy Template and the Group Policy Container. Expert Derek Melber gives an overview of the GPT and breaks down the replication process.
- The effects of GPO version numbers on Group Policy replication
The relationship of the version numbers for the Group Policy Template and Group Policy Console of each GPO are important for proper Group Policy replication. Expert Derek Melber discusses this relationship and explains why the numbers don't always add up.
|Managing your GPOs||Return to Table of Contents|
- Control your Group Policies, don't let them control you
Laura Hunter breaks down the use of GPOs within Active Directory.
- Enforcing Group Policy Object settings
Expert Derek Melber explains how you to ensure that your settings are getting to the target object -- and sticking.
- Improving the default domain controller GPOs
When Windows Server 2003 is used to establish an Active Directory-based network, there are two default GPOs: the default domain GPO and the default domain controller GPO. This article recommends several ways to improve upon the default settings in these two GPOs.
- Managing GPOs through a GPO
While it may seem a bit like the chicken and the egg problem, it is possible to control the function of GPOs to a certain extent through a GPO. Expert James Michael Stewart explains how.
- Managing GPOs through a GPO, part 2
In part two of this tip, James Michael Stewart discusses more controls for managing Group Policy Objects.
|Security and problem resolution||Return to Table of Contents|
- Protecting against anonymous connections using GPOs
Learn how to use Group Policy Objects to protect your Windows computers from insecure anonymous connections.
- Debugging user profile and GPO problems with Userenv logs NEW!
Expert Gary Olsen walks through the basics of the Userenv.log file and shares some useful case studies that illustrate how to use Userenv to debug problems involving the user environment.
- Where does your client's security policy actually come from?
Expert Gary Olsen explains why your clients could be getting different domain-enforced security settings than what you defined in your domain policy.
- Knowing key settings in Group Policy Template speeds problem resolution
Knowing how to use the Group Policy Template is vital to successfully managing your Group Policy. Expert Derek Melber breaks down the folder and file structure of GP and explains how it can help solve management and application problems.
- Protecting against anonymous connections using GPOs
Microsoft has relied on anonymous connections to allow computers and services to establish open communications with other computers. However, these anonymous connections are not secure. With Group Policy Objects (GPOs), you can protect against anonymous connections. Here's how.
- Handle event 1000 errors in Win2k
Expert Serdar Yegulalp explains what event 1000 errors are in Winsows Server 2000 Group Policy, and how to handle them.
|Questions for our experts||Return to Table of Contents|
- How do I remove changes from a GPO?
- Why do password security values in GPO revert to defaults?
- Why does the GPO sometimes delete the locally cached profile and sometimes not?
- Is there a preset GPO for Remote Assistant Invitation?
- What are the causes for policy delivery failure in a GPO-linked container?
- Have a question that you don't see here? Check out our Ask the Experts section to learn more about Group Policy and other topics, or post your own question to our IT Knowledge Exchange forum.
What do you think of this guide? Would you like to see more guides like this? Is anything missing from this page that you'd like to see added? E-mail us your thoughts and comments.
This was first published in April 2006