Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Mastering Windows Group Policy
  • Table Of Contents Toc
Mastering Windows Group Policy

Mastering Windows Group Policy

By : Jordan Krause
4.5 (10)
close
close
Mastering Windows Group Policy

Mastering Windows Group Policy

4.5 (10)
By: Jordan Krause

Overview of this book

This book begins with a discussion of the core material any administrator needs to know in order to start working with Group Policy. Moving on, we will also walk through the process of building a lab environment to start testing Group Policy today. Next we will explore the Group Policy Management Console (GPMC) and start using the powerful features available for us within that interface. Once you are well versed with using GPMC, you will learn to perform and manage the traditional core tasks inside Group Policy. Included in the book are many examples and walk-throughs of the different filtering options available for the application of Group Policy settings, as this is the real power that Group Policy holds within your network. You will also learn how you can use Group Policy to secure your Active Directory environment, and also understand how Group Policy preferences are different than policies, with the help of real-world examples. Finally we will spend some time on maintenance and troubleshooting common Group Policy-related issues so that you, as a directory administrator, will understand the diagnosing process for policy settings. By the end of the book, you will be able to jump right in and use Group Policy to its full potential.
Table of Contents (12 chapters)
close
close

Backing up and restoring GPOs

Backups are critical inside any environment. To most users, this means storing extra copies of their documents in case they are lost, but those of us who work in IT know that backups mean so, so much more. It's not just about keeping multiple offsite copies of data in case that data is lost or damaged; backups are also a key piece to any disaster-recovery scenario. When a server goes down, you need a plan (and a backup) to deal with restoring that server. When a system gets hacked, you need a plan and a backup in order to wipe and restore that machine. It would be great if we had one big Backup Now button for a domain and everything inside of it, but the reality is that each piece of technology we use inside our networks has special considerations when it comes to backups.

This is especially true when it comes to Domain Controllers and the data...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Mastering Windows Group Policy
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon