Gp-2

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Gp-2 as PDF for free.

More details

  • Words: 393
  • Pages: 9
1

Use Group Policy to: to: Manage users and computers Deploy software Enforce security settings Enforce a consistent desktop environment

2

Software Deployment

1

2

Publish Assign

Create Create aa software software distribution distribution point point

Use Use aa GPO GPO to to deploy software software

3

What Are Group Policy Script Settings?

Group Policy script settings can be used to assign: For computers Startup scripts Shutdown scripts For users Logon scripts Logoff scripts

4

Why Use Group Policy Scripts?

Group Policy scripts can: Perform tasks that cannot be done through other Group Policy settings Clean desktops and return computers to their original state Provide a secure environment by clearing temp folders and page files

5

What is a Software Restriction Policy?

A policy-driven mechanism that identifies and controls software on a client computer A mechanism restricting software installation and viruses A component with two parts: Ÿ A default rule with two options: Unrestricted Disallowed

Ÿ Exceptions to the default rule

6

Software Restriction Rules

Hash Hash Rule Rule Use Use to to employ employ MD5 MD5 or or SHA1 SHA1 hash hash of aa file file to confirm confirm identity identity Use Use to to allow allow or or prohibit prohibit a certain certain version version of of a file from from being being run run

Path Path Rule Use Use when when restricting restricting the the path path of of aa file file Use Use when when multiple multiple files files exist exist for for the the same application application Essential Essential when when SRPs SRPs are are strict strict

Certificate Certificate Rule Rule Checks Checks for for digital digital signature signature on on application application Use Use when when you you want want to restrict restrict Win32 Win32 applications applications and and ActiveX ActiveX content content

Internet Internet Zone Zone Rule Rule Controls Controls how how Internet Internet Zones Zones can can be be accessed Use Use in high-security environments environments to to control control access access to to Web Web applications applications

7

What Is Folder Redirection?

Redirection to folders on the local computer or on a network Share Folders on a server appear as if they are located on the local drive Fastens the User logon process in case if the profile is large.

8

Folders That Can Be Redirected

My Documents Application Data Desktop Start Menu

9

Related Documents

Gp2
August 2019 14
Diarhea And Sth - Gp2
June 2020 1
R17 Gp1, Gp2, Gp3_17
October 2019 33
F1 Master 2008 - Gp2
November 2019 4