This chapter was all about applying and filtering your GPOs. We explained link order precedence and showcased the areas of GPMC where link priority can be viewed and manipulated. We also discussed some need-to-know features such as blocking inheritance, and enforcement of GPO settings. Following discussion of the differences between user and computer settings inside the Group Policy Management Editor, we ran through some exercises of normal tasks associated with links and filtering. We wrapped things up with details on two very important options that exist for any GPO: security filtering and WMI filtering. After reading this chapter, you should be able to take any GPO in your environment and apply it with precision to only the computers or users to which it needs to apply.
Turn the page to continue exploring Group Policy functionality. In the next chapter, we will take...