Copyrighted Material

Copyrighted Material

Index Note to the reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations. Active Directory groups, strict control of, Numbers 476–479 802.3 and Wireless Policy Client-Side Active Directory Sites and Services tool, 24 Extension, 368 for manual replication, 398 802.3 Wired Policy Active Directory Users and Computers, 27, on slow networks, 172 54, 612 for Vista, 527–528 attribute editor, 455 802.11 Wireless Policy vs. GPMC, 35–36 on slow networks, 171 and Group Policy, 33 for Vista, 527–528 logon script visibility to user, 795 for Windows XP, 527 to view GPCs and GUIDs, 351, 352 Active X controls, 804 Add or Remove Programs folder, 736 user removal of application with, 743 A Add/Remove Programs control panel, application display on, 746 files, 363, 749 .AAS Add/Remove Snap-in dialog box, 15, 35 account management, auditing, 460 Add/Remove Templates dialog box, 317 Accounts: Administrator account status Add the Administrators Security Group to policy setting, 440, 515 Roaming User profiles policy setting, Accounts: Guest account status policy 596, 606 setting, 441 Add Upgrade Package dialog box, 750, 750 Accounts: Rename administrator account .ADM files, 238–239, 293, 362 policy setting, 440 vs. ADMX files, 301–302 Accounts: Rename guest account policy distributing updated definitions to setting, 440 administrators, 305–306 settings available for, 112 for Group Policy Object Editor, 184 ACLs, troubleshooting, 404–405 introduction, 298–299 Action on Server Disconnect policy SYSVOL for storing, 302–304, 303 setting, 696–697 templates from other sources, 316–324 Active Administrator, 866 leveraging from Windows management Active Directory station, 317–319 Change and Configuration Microsoft Office, 319–323 Management, 616 COPYRIGHTED.ADM MATERIAL files, turning off automatic and Group Policy, 11, 18–20 update, 175–176 Group Policy Objects (GPOs), 346–349 \Adm folder in GPT, 361–362 network levels, 18 Admin Log, 425 site configuration, 402 for troubleshooting in Windows Active Directory-based Group Policy, 17–21 7, 426–428 Active Directory-based Group Policy viewing event, 427 Objects, 11 administrative credentials, users and, 518 Active Directory Domain Controller, in Administrative Template Policy Client-Side sample test lab, 2 Extension, 365 581858bindex.indd 867 3/22/10 7:07:23 AM 868 Administrative Templates (.adm files) – applications Administrative Templates (.adm files), 7, 291, Advanced Folder Redirection, 157 362. See also .ADM files Advanced Group Policy Management, default, 299 templates, 130 history, 292, 292–293, 293 AdventNet, 864 location of Registry settings, 389–390 advertisement of package, 363, 721, 722 policy settings, 66–67 AGPM (Advanced Group Policy policy vs. preference, 293–298 Management) tool, templates, 128 preventing background refresh, 178 “All Users” profile, 555 for restricting access to hardware, 807 Allow Admin to Install from Terminal on slow networks, 172 Services Session policy setting, 773 for User and Computer nodes, 4 Allow administrators to override device Administratively Assigned Offline Files installation restrictions policy policy setting, 630, 663, 698–699, setting, 817 699, 708 Allow Cross-Forest User Policy and Administrator accounts, 161–162 Roaming User Profiles policy setting, disabling, 440 177, 207, 590 protected, 522–523 Allow installation of devices that match renaming, 440 any of these device IDs policy setting, and scripts, 794 817–818 Administrator security group, adding to Allow installation of devices using drivers Roaming user profiles, 596 that match these setup classes policy administrators setting, 817 distributing updated definitions Allow Only Bitmapped Wallpaper policy to, 305–306 setting, 203 granting access to redirected Allow or Disallow use of the Offline Files folders, 629–631 feature policy setting, 703 AdminStudio (Flexera), 727, 752 allow rules, for WFAS, 542 ADML files, 293, 300–301 “Allowed to Authenticate” right, 210 copying to Central Store, 310 Always Install with elevated privileges policy faAdmxConv.exe tool to create, 325 setting, 770–771, 776–777 ADMX editor, 326–328, 327 Always use local ADM files for Group Policy in ADMX Migrator, 324 Object Editor policy setting, 184, 306 ADMX files, 186, 238–239, 293, Always wait for the network at computer 300, 300–301 startup and logon policy setting, 159, vs. ADM files, 301–302 394, 795 copying to Central Store, 310 AND, for item-level targeting, 271 deciding how to use templates, 324 Anderson, Christa, 204 faAdmxConv.exe tool to create, 325 Andersson, Christoffer, 458 templates from other sources, 316–324 AppData folder, 558 ADMX Migrator tool, 324, 325–326, 862 Application Data folder, 555 ADMX schema, 339 redirecting, 638–639 adprep command, 526 for Roaming Profiles, 584 ADSI Edit, for FGPP, 449–454, 451 Application Event Log, 405 Advanced configuration, for folder Application Management, 7, 291 redirection, 619 applications Advanced Deployment Options dialog advanced published or assigned, 744–756 box, 748 assigning, 728–729 Advanced Features, for Password Setting deleting, users and, 743 object, 455 isolation, 742–743 581858bindex.indd 868 3/22/10 7:07:23 AM Applications extension – Background Refresh cycle 869 package-targeting strategy, 731–738 Audit object access policy setting, 464 and Policies keys, 296 Audit policies PolicyPak Community Edition advanced configuration, 470, 470–472 limitations, 329 for domain controllers, 443 PolicyPak node to manage, 335 auditing, 458–475 publishing, 729–730 auditable events, 460–464 testing, 741–742 Event IDs for Windows Server 2008, pulling through network, 720 469–470 Registry for controlling, 294–295 file access, 464–465, 465 removing, 759–763 Group Policy Object changes, 465–470 automatic for Assigned or Published event IDs for Windows Server 2003, .MSI applications, 760 467–469, 468 forcefully removing, 761–762 specific OU, 473–474 immediately uninstalling from Users step-by-step guide on advanced, 474 and Computers, 761–762 using Group Policy, 459–464 published .ZAP applications, 762 Auditpol.exe, 458, 472, 473 user control, 759–760 authenticated bypass rules, for WFAS, 542 rules of deployment, 730–731 Authenticated IP (AuthIP), 547, 548 testing assigned, 737–738 Authenticated Users when they will be installed, 736–737 administrators as members, 86 Applications extension, for User computers as, 87 configuration, 226 removing from GPO, 89 \Applications folder, 363, 364 authentication, forest-wide or Applock modes, in PolicyPak, 336 selective, 209 AppLocker, 480 auto-install, with Windows AppID service, 497–499, 498 Installer, 722 enforcement or auditing, 496–497, 497 Autocache, 663–667 importing and exporting rules, 505 vs. administratively assigned Offline modifying message for client, 500 Files, 662–663 for restricting software, 489–491 Explorer and, 657–670 rules and rule conditions, 491 in Vista, 666 testing, 499, 499–500 in Windows 7, 666, 667 Default deny, 501 in Windows 2000, 664, 664 user option for subverting, 505 in Windows XP, 665, 665–666, 667 Apply Group Policy permission, 393 autolaunching application, at login with “Apply once and do not reapply” setting for GPO, 62–63 Group Policy, 268 automatic state transition, 685 AppMgmtDebugLevel key, 419 Automatically Generate Executable Rules appmgmts.dll, 384 Wizard, 502–504, 503, 504 Appstation, 616 Avecto, 864 assigned applications, 728–729 testing, 737–738 asynchronous processing, 152 of scripts, 794 B in Windows 2000, 395 background BMP, for user at command, 87 logon, 202–203 At logoff, delete local copy of user’s offline background policy processing, files policy setting, 705 forcing, 159–160 Attachmate/NetIQ, 866 Background Refresh cycle, 77 581858bindex.indd 869 3/22/10 7:07:23 AM 870 background refresh interval – Checkbox Wizard (PolicyPak) background refresh interval, 152 Block Inheritance, 81, 81–82, 145 computer check for timing in, 169 Enforced function and, 82 for Computer node, 176 icon for, 142 for Windows 2000/2003/2008 domain troubleshooting, 393 controllers, 154 block rules, for WFAS, 542 for Windows 2000/2003/2008 member Blue Exclamation Point (!), 393 servers, 152–153 BMP files, for server identification background refresh policy processing, details, 202 152–160, 186 Browse for a Group Policy Object dialog for domain controllers, 149 box, 16, 16 exemptions, 154–155 Built-in Administrator account policy for member computers, 149 setting, 515 security, 161–166 background security refresh processing, 163–164 background synchronization C policy setting for, 694, 695 CAB file, saving Starter GPOs as, 132, 133 in Windows 7, 654 Cache Transforms in Secure Location on Background upload of a Roaming Workstation policy setting, 773 user profile’s Registry file while Cachemov.exe utility, 585 user is logged on policy setting, caching. See also Offline Files 600, 601 default size, policy setting for, 703–704 backup and Roaming Profiles, 574–575, 592 directory for, 136–137 and security, 711 GPMC vs. old interface, 28 transparent, 694–695 for Group Policy, 135–142 turning off automatic offline for GPOs, 136–137 desktops, 710–716 IPsec settings, 141–142 calc.exe, autolaunch at login with Starter GPOs, 140, 141 GPO, 62–63 of test lab, 859 Capture Wizard (PolicyPak), 333 WMI filters, 141 case, and Filter Options search, 115 Backup Operator Properties dialog Central Store, 307–312 box, 477, 477 for ADMX files, 317 Baseline File Cache Maximum Size policy creating, 309–310 setting, 775–776 populating, 310 Basic

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    37 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us