Managing Windows Environments with Group Policy

Managing Windows Environments with Group Policy
Event on 2015-05-26 08:30:00

Course: MS50255C

 

Length: 4 Days

 

Overview

In this four day course intended for IT professionals you will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server, and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.

 

Audience Profile

This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design.

 

At Course Completion

After completing this course, students will be able to:

  • Design and deploy security policies for all your Windows servers, workstations, member servers, and Windows  clients
  • Delegate Administrative Control of Group Policies
  • Backup and restore Group Policy Objects (GPOs) through Group Policy Management Console (GPMC)
  • Easily roll out selected software updates and operating system patches from your network environment
  • Tips for troubleshooting Group Policy

 

Prerequisites

Experience with the Microsoft Windows Server 2008/2012 environments and a fundamental understanding of Active Directory

 

Course Outline

Module 1: Introducing Group Policy

This module describes the basis of what Group Policy is and how it functions. It also describes the Group Policy features that are in included in the newer Windows operating systems.

Lessons

  • What is Group Policy
  • Group Policy Scenarios
  • Managing Group Policies
  • New Group Policy Features in Windows Server 2008 R2 and Windows 7
  • New Group Policy Features in Windows Server 2012 and Windows 8 Client

Lab : Introducing Group Policy

  • Preparing Windows 8 for Domain Policies
  • Preparing Windows 7 for Domain Policies
  • Preparing Windows Vista for Domain Policies

After completing this module, students will be able to:

  • Define Group Policy
  • List the ways you can use Group Policy
  • Describe the tools, features, and policies you can use to manage group policies

 

Module 2: Using Group Policy Management Tools

This module describes the differences between local and domain policies and the Group Policy management tools you can use to manage these policies.  This module also describes the Group Policy refresh process and hot to manually force a refresh ahead of the default interval.

Lessons

  • Local and Domain Policies
  • Using Group Policy Management Console?
  • Understanding Group Policy Refresh

Lab : Using Group Policy Management Tools

  • Working with Multiple Local Policies
  • Installing the GPMC on Windows 8 Client
  • Basic Group Policy Management
  • Navigating the Windows 8 Client Interface with a Mouse and Keyboard
  • Navigating the Windows Server 2012 Console
  • Installing the GPMC on Windows 7

After completing this module, students will be able to:

  • Describe the advantages of using domain policies instead of local policies
  • List the capabilities of the Group Policy Management Console
  • Describe the requirements for installing the Group Policy Management Console
  • Explain how to use the different GPMC features to create and manage policies
  • Describe the elements of the gpupdate command

 

Module 3: Designing a Group Policy Infrastructure

This module details the steps a successful Group Policy deployment should follow, linking your design to how your company can best use the features.  Essential network components and security design are also defined.

Lessons

  • Overview of Active Directory
  • Introducing the Design Stages for Implementing Group Policy
  • Planning your Group Policy Design
  • Designing Your Group Policy Solution
  • Deploying Your Group Policy Solution
  • Managing Your Group Policy Solution

Lab : Designing a Group Policy Infrastructure

  • Creating an OU Structure for Group Policy
  • Delegating GPO Management
  • Creating Starter GPOs

After completing this module, students will be able to:

  • Describe the basic structure of Active Directory
  • Describe the four stages of implementing Group Policy
  • Explain how to plan Group Policy in accordance with a company’s requirements
  • Describe the guidelines that you should follow when you create new GPOs

 

Module 4: Understanding the Architecture of Group Policy Processing

This module details the concepts that you must grasp in order to troubleshoot Group Policy.  The module also describes the options that are available to change the standard Group Policy processing sequence.

Lessons

  • Group Policy Components in AD DS
  • Understanding the Group Policy Deployment Order
  • Modifying Group Policy Processing

Lab : Exploring the Group Policy Processing Architecture

  • Working with Multiple GPO Levels
  • Using the Block Inheritance and Enforce Options
  • Implementing Security Filtering
  • Creating a WMI Filter
  • Working with Loopback Processing

After completing this module, students will be able to:

  • Describe the Active Directory components that you can use to deploy Group Policy
  • Explain the order in which Group Policy is deployed in Active Directory
  • Describe the methods that are available to modify Group Policy processing

 

Module 5: Troubleshooting and Backing Up GPOs

This module explains how to use the RSoP tools to determine whether policies are being processed in the correct manner.  This module discusses how to use the available tools to troubleshoot policy issues; back up, restore, import, copy, and search for GPOs; and migrate GPOs from one domain to another.

Lessons

  • Using Group Policy Troubleshooting Tools
  • Integration of RSoP Functionality
  • Using Logging Options
  • Backing Up, Restoring, Importing, and Copying GPOs
  • Building Migration Tables

Lab : Troubleshooting and Backing Up GPOs

  • Using Tools for Troubleshooting
  • Backing Up and Restoring GPOs

After completing this module, students will be able to:

  • Describe the Group Policy troubleshooting tools
  • Describe the GPMC tools that have RSoP functionality
  • Describe the GPO logging tools used to obtain more detail about the GPO processing issues
  • Explain how to back up, restore, import, and copy GPOs using the GPMC
  • Explain how to build migration tables

 

Module 6: Using Windows PowerShell to Manage Group Policy

This module explains how to navigate and use basic Windows PowerShell commands and how to use Windows PowerShell to manage Group Policy.  This module will also describe how you can use PowerShell logon scripts with Group Policy.

Lessons

  • Introduction to PowerShell
  • Windows PowerShell Library for Group Policy
  • Windows PowerShell Cmdlets for Group Policy
  • Windows PowerShell-Based Logon Scripts

Lab : Using Windows PowerShell to Manage Group Policy

  • Exploring Windows PowerShell
  • Using PowerShell to Manage GPOs
  • Using PowerShell ISE to Write More Scripts

After completing this module, students will be able to:

  • Describe the Windows PowerShell features
  • Explain how to perform the basic Windows PowerShell operations
  • Explain how to access the Windows PowerShell library for Group Policy
  • List the third-party Windows PowerShell-based login script tools

 

Module 7: Implementing Security Using Group Policy

This module defines the Windows security model and describes the process of using Group Policy to implement user account, computer account, and domain security.

Lessons

  • Exploring the Windows Security Architecture
  • Securing User Accounts
  • Exploring Local Policies
  • Hardening Windows Environments
  • Implementing Domain Security

Lab : Implementing Security Using Group Policy

  • Using the Security Compliance Manager
  • Configuring Enterprise Auditing through Group Policy Deployment
  • Configuring Standard Password Policies
  • Configuring Fine-Grained Password Policies
  • Configuring Restricted Groups
  • Using Security Templates

After completing this module, students will be able to:

  • Describe the Widows security architecture
  • Explain how to secure user accounts with Group Policy
  • Describe the purpose of local policies
  • Explain how to harden computer accounts
  • Explain how to control the domain security policy with a GPO

 

Module 8: Configuring the Desktop Environment with Group Policy

This module explains many of the settings that are available to configure and restrict the user desktop environment, such as Control Panel restrictions, Start Menu settings, and Windows Explorer configuration.

Lessons

  • Exploring Script Types and Controlling Script Execution
  • Defining the Desktop, Start Menu, and Taskbar Settings
  • Defining the Control Panel Settings
  • Defining the Windows Components Settings
  • Configuring the Printer Management and Pruning Settings
  • Defining the Network Settings
  • New Settings for Windows 8 Client and Windows Server 2012

Lab : Configuring the Desktop Environment with Group Policy

  • Using Logon Scripts
  • Configuring Desktop Settings
  • Managing Windows Components
  • Configuring Printers with Group Policy
  • Managing Network Settings

After completing this module, students will be able to:

  • Describe the startup, shutdown, logon, and logoff scripts and settings.
  • Identify the many ways to control the user desktop, Start menu, and taskbar settings
  • Explain how to restrict the Control Panel settings
  • Explain how to restrict operations that users can perform in Windows Explorer, Windows Internet Explorer, and Remote Desktop Services
  • Explain how to configure the printer management and pruning settings
  • Describe the network settings

 

Module 9: Configuring Roaming Profiles and Folder Redirection

This module explains how to use roaming profiles and Folder Redirection to maintain the user’s personal files and settings.

Lessons

  • Managing User Profiles
  • Configuring Folder Redirection
  • Using Folder Redirection and Roaming Profiles Together

Lab : Configuring Roaming Profiles and Folder Redirection

  • Preparing for Profiles and Folder Redirection
  • Configuring Folder Redirection
  • Managing Roaming Profiles

After completing this module, students will be able to:

  • Explain how to customize the processing of user profiles and roaming user profiles
  • Explain how to redirect user folders to a server
  • Describe what happens when roaming profiles and Folder Redirection are both enabled

 

Module 10: Assigning and Publishing Software Packages

This module explains how to use Group Policy for deploying software.

Lessons

  • Using MSI Packages to Distribute Software
  • Using Group Policy as a Software Deployment Method
  • Deploying Software
  • Setting Up Distribution Points
  • Using the Systems Center Configuration Manager to Distribute Software

Lab : Assigning and Publishing Software Packages

  • Preparing for Distribution
  • Creating Custom Software Packages
  • Repackaging Applications
  • Deploying Software Packages

After completing this module, students will be able to:

  • Describe the basic elements of an MSI package
  • Determine when to build or repackage your own
  • Define the requirements for distributing software via Group Policy
  • Describe when you might want to assign and publish software
  • Explain how to upgrade and remove packages
  • Explain how to set up distribution points for software deployment
  • List the advantages of using SCCM to distribute software instead of Group Policy

 

Module 11: Implementing Software Restriction Policies and AppLocker

This module explains the deployment of software restriction policies including the essential components, rules, and the order of precedence of such policy.  You will learn how to use software restriction policies to prevent users from running unauthorized software reducing the likelihood that viruses, Trojan horses, or spyware might intrude upon the environment.

Lessons

  • What is a Software Restriction Policy?
  • Creating a Software Restriction Policy
  • Using additional Rules to Help Identify Software
  • What Makes an Effective Software Restriction Policy
  • Using AppLocker in Windows 7 and later

Lab : Implementing AppLocker and Software Restrictions Policies

  • Enforcing Software Restriction Policies
  • Using AppLocker to Restrict Software

After completing this module, students will be able to:

  • Define software restriction policies
  • Explain how to create software restriction policies
  • Describe the additional rules that you can apply to software restriction policies
  • Describe the characteristics of an effective software restriction policy
  • Describe the AppLocker features

 

Module 12: Creating and Deploying Administrative Templates

This module explains the logic behind administrative templates, when to use them, and the basics of how to write them. This module also explains how to deploy templates by loading legacy ADM templates into the Group Policy Management Editor, and copying ADMX templates to the Central Store.

Lessons

  • Introducing  ADM Templates
  • Legacy ADM Templates
  • Custom ADM Templates
  • Using the New ADMX Templates
  • Converting and Creating Custom ADMX Templates
  • Using the ADMX Central Store

Lab : Working with ADMX Templates and the Central Store

  • Importing ADMX Files
  • Implementing the ADMX Central Store
  • Converting Legacy ADM Files
  • Creating a Custom ADMS File

After completing this module, students will be able to:

  • Describe the benefits of using ADM templates
  • List some of the ADM templates that are included with each version of Windows
  • List tips that you can use to write your own customer ADM templates
  • Describe the advantages of using the new ADMX file format
  • Identify which tool converts the ADM templates to ADMX templates and also creates new ADMX templates
  • Define ADMX Central Store

 

Module 13: Configuring Group Policy Preferences

This module describes the function of Group Policy Preferences. You will learn how to combine Preferences with Policies, and how Preferences are different from Policies.

Lessons

  • Introducing Group Policy Preferences
  • Comparing Preferences and Policy Settings
  • Configuring Preferences Settings

Lab : Configuring Group Policy Preferences

  • Implementing Computer Preferences
  • Implementing User Preferences
  • Preparing Legacy Clients for Preferences

After completing this module, students will be able to:

  • Describe the purpose of Group Policy Preferences
  • Describe the differences between Preferences and Policy Settings
  • Identify the settings that you can configure in the Computer Configuration and User Configuration sections of the Group Policy Management Console
  • Describe the Windows and Control Panel settings

 

at Discover ITT Riverchase Training Center
3 Riverchase Office Plaza
Birmingham, United States

This entry was posted in Enterprise Search and tagged , , , , , . Bookmark the permalink.