Introducing Group PolicyThis module describes the basis of what Group Policy is and how it functions. It also describes the Group Policy features that are in included in the newer Windows operating systems.
- LessonsWhat is Group PolicyNew New Group Policy Features in Windows Server 2008 R2 and Windows 7Group Policy ScenariosManaging Group PoliciesGroup Policy Features in Windows Server 2008 and Windows Vista
- Lab : Introducing Group PolicyPreparing Windows XP for Domain PoliciesPreparing Windows Vista for Domain PoliciesPreparing Windows 7 for Domain Policies
Using Group Policy Management ToolsThis module describes the differences between local and domain policies and the Group Policy management tools you can use to manage these policies. This module also describes the Group Policy refresh process and hot to manually force a refresh ahead of the default interval.
- LessonsLocal and Domain PoliciesWhat is the Group Policy Management Console?Installing the GPMCUsing the GPMSUnderstanding Group Policy Refresh
- Lab : Using Group Policy Management ToolsWorking with Multiple Local PoliciesInstalling the GPMC on Windows XPInstalling the GPMC on VistaInstalling the GPMC on Windows 7Basic Group Policy Management
Designing a Group Policy InfrastructureThis module details the steps a successful Group Policy deployment should follow, linking your design to how your company can best use the features. Essential network components and security design are also defined.
- LessonsOverview of Active DirectoryIntroducing the Design Stages for Implementing Group PolicyPlanning your Group Policy DesignDesigning Your Group Policy SolutionDeploying Your Group Policy SolutionManaging Your Group Policy Solution
- Lab : Designing a Group Policy InfrastructureCreating an OU Structure for Group PolicyDelegating GPO ManagementCreating Starter GPOsInstalling and Configuring the AGPM
Understanding the Architecture of Group Policy ProcessingThis module details the concepts that you must grasp in order to troubleshoot Group Policy. The module also describes the options that are available to change the standard Group Policy processing sequence.
- LessonsUsing Active Directory Components to Deploy Group Policy SettingsUnderstanding the Group Policy Deployment OrderModifying Group Policy Processing
- Lab : Exploring the Group Policy Processing ArchitectureWorking with Multiple GPO LevelsUsing the Block Inheritance and Enforce OptionsImplementing Security FilteringCreating a WMI FilterWorking with Loopback Processing
Troubleshooting and Backing Up GPOsThis module explains how to use the RSoP tools to determine whether policies are being processed in the correct manner. This module discusses how to use the available tools to troubleshoot policy issues back up, restore, import, copy, and search for GPOs and migrate GPOs from one domain to another.
- LessonsUsing Group Policy Troubleshooting ToolsIntegration of RSoP FunctionalityUsing Logging OptionsBacking Up, Restoring, Importing, and Copying GPOsBuilding Migration Tables
- Lab : Troubleshooting and Backing Up GPOsUsing Tools for TroubleshootingBacking Up and Restoring GPOsGroup Policy Management Scripts
Using Windows PowerShell to Manage Group PolicyThis module explains how to navigate and use basic Windows PowerShell commands and how to use Windows PowerShell to manage Group Policy. This module will also describe how you can use PowerShell logon scripts with Group Policy.
- LessonsIntroduction to PowerShellWindows PowerShell Library for Group PolicyWindows PowerShell-Based Logon Scripts
- Lab : Deploying Legacy Security TemplatesIntroduction to Using Windows PowerShellUsing PowerShell to Manage GPOs
Implementing Security Using Group PolicyThis module defines the Windows security model and describes the process of using Group Policy to implement user account, computer account, and domain security.
- LessonsExploring the Windows Security ArchitectureSecuring User AccountsExploring Local PoliciesHardening Computer AccountsImplementing Domain Security
- Lab : Implementing Security Using Group PolicyInstalling the Microsoft GPOAcceleratorConfiguring Enterprise Auditing through Group Policy DeploymentConfiguring Standard Password PoliciesConfiguring Fine-Grained Password PoliciesConfiguring Restricted GroupsUsing Security Templates
Configuring the Desktop Environment with Group PolicyThis module explains many of the settings that are available to configure and restrict the user desktop environment, such as Control Panel restrictions, Start Menu settings, and Windows Explorer configuration.
- LessonsExploring Script Types and Controlling Script ExecutionDefining the Desktop, Start Menu, and Taskbar SettingsDefining the Control Panel SettingsDefining the Windows Components SettingsConfiguring the Printer Management and Pruning SettingsDefining the Network Settings
- Lab : Configuring the Desktop Environment with Group PolicyUsing Logon ScriptsConfiguring Desktop SettingsManaging Windows ComponentsConfiguring Printers with Group PolicyManaging Network Settings
Configuring Roaming Profiles and Folder RedirectionThis module explains how to use roaming profiles and Folder Redirection to maintain the users personal files and settings.
- LessonsManaging User ProfilesConfiguring Folder RedirectionUsing Folder Redirection and Roaming Profiles Together
- Lab : Configuring Roaming Profiles and Folder RedirectionPreparing for Profiles and Folder RedirectionConfiguring Folder RedirectionManaging Roaming Profiles
Assigning and Publishing Software PackagesThis module explains how to use Group Policy for deploying software.
- LessonsUsing MSI Packages to Distribute SoftwareUsing Group Policy as a Software Deployment MethodDeploying SoftwareSetting Up Distribution PointsUsing the Systems Center Configuration Manager to Distribute Software
- Lab : Assigning and Publishing Software PackagesPreparing for DistributionCreating Custom Software PackagesRepackaging ApplicationsDeploying Software Packages
Implementing Software Restriction Policies and AppLockerThis module explains the deployment of software restriction policies including the essential components, rules, and the order of precedence of such policy. You will learn how to use software restriction policies to prevent users from running unauthorized software reducing the likelihood that viruses, Trojan horses, or spyware might intrude upon the environment.
- LessonsWhat is a Software Restriction Policy?Creating a Software Restriction PolicyUsing additional Rules to Help Identify SoftwareWhat Makes an Effective Software Restriction PolicyUsing AppLocker in Windows Server 2008 R2 and Windows 7
- Lab : Implementing AppLocker and Software Restrictions PoliciesEnforcing Software Restriction PoliciesUsing AppLocker to Restrict Software
Creating and Deploying Administrative TemplatesThis module explains the logic behind administrative templates, when to use them, and the basics of how to write them. This module also explains how to deploy templates by loading legacy ADM templates into the Group Policy Management Editor, and copying ADMX templates to the Central Store.
- LessonsIntroducing ADM TemplatesStandard ADM TemplatesCustom ADM TemplatesUsing the New ADMX TemplatesConverting and Creating Custom ADMX TemplatesUsing the ADMX Central Store
- Lab : Working with ADMX Templates and the Central StoreImporting ADMX FilesImplementing the ADMX Central StoreConverting Legacy ADM FilesCreating a Custom ADMS File