Group Policy
Group Policy
Introduction
• Components:
• Hives, Root keys, Keys, subkeys and values
Working with Group Policy Objects
• ■ Computer and user scripts: Configuring logon/logoff scripts for users and
startup/shutdown scripts for computers.
• Folder redirection Moving critical data folders for users to network shares where they can be
better managed and backed up regularly (domain-based Group Policy only).
• General computer security: Establishing security settings for accounts, event logs, restricted
groups, system services, the registry, and file systems. (With Local Group Policy, you can
only manage general computer security for account policies.)
• Local security policies Setting policy for auditing, user rights assignment, and user
privileges.
• IP security Setting IP security policy for clients, servers, and secure servers.
• Public key security Setting public key policies for autoenrollment, the Encrypting File System
(EFS), enterprise trusts, and more.
• Software installation Automated deployment of new software and software upgrades
(domain-based Group Policy only).
Inheritance policy
Linking
When you create a domain, two GPOs are created
by default:
The Default Domain Policy
• you should edit the Default Domain Policy GPO only to manage
the default Account Policies settings and three specific areas of
Account Policies:
■ Password Policy: Determines default password policies for
domain controllers such as password history and minimum
password length settings
■ Account Lockout Policy: Determines default account lockout
policies for domain controllers, such as account lockout duration
and account lockout threshold
■ Kerberos Policy: Determines default Kerberos policies for domain
controllers such as maximum tolerance for computer clock
synchronization