Managing Desktops in an Active Directory Environment


When you use Windows XP Professional or Windows 2000 Professional on Windows 2000 Server networks with Active Directory installed, you can take full advantage of IntelliMirror and Group Policy management features. If you are managing Windows XP Professional or Windows 2000 Professional desktops on networks and Active Directory is not installed, see Managing Desktops Without Active Directory later in this chapter.

IntelliMirror allows you to centrally manage workstations, saving you significant time while improving manageability. IntelliMirror ensures that users data, software, and personal settings are available when they move from one computer to another, whether or not their computers are connected to the network.

IntelliMirror consists of four components: user data management, user settings management, computer settings management, and Group Policy based software installation and maintenance. The IntelliMirror components can help you to:

  • Centrally create and manage the configuration of each user s desktop.

  • Enable users to access files from any location at any time by using Roaming User Profiles and Folder Redirection in combination with Offline Files.

  • Manage how software is deployed and installed on computers to ensure that users have the software they need to perform their jobs. Large organizations that need advanced software distribution and inventory capabilities should consider using Microsoft Systems Management Server (SMS) 2.0.

  • Manage and enforce centralized data storage, which helps administrators keep important corporate data backed up.

  • Save time when replacing computers by using Remote Installation Services(RIS) and Group Policy based software installation and maintenance to easily replace applications, Roaming User Profiles to recover user profiles, and Folder Redirection to centrally manage files.

For more information about implementing IntelliMirror features, see the Distributed Systems Guide of the Microsoft Windows 2000 Server Resource Kit. For more information about deploying IntelliMirror in a Windows 2000 Server environment, see the Change and Configuration Management Deployment Guide link on the Web Resources page at http://www.microsoft.com/windows/reskits/webresources

Implementing IntelliMirror

Active Directory and Group Policy provide the foundation for implementing IntelliMirror. Without Active Directory, you cannot take full advantage of IntelliMirror for managing clients. Table 5-2 shows the streamlined management tasks you can perform in an Active Directory environment.

Table 5-2: Management Tasks That Use IntelliMirror

Management Task

IntelliMirror Feature

Configure registry-based Group Policy settings for computers and users.

Administrative Templates

Manage local, domain, and network security.

Security Settings

Centrally install, update, and remove software.

Group Policy based software distribution

Manage Internet Explorer configuration settings after deployment.

Internet Explorer Maintenance

Apply scripts during user logon/logoff and computer startup/shutdown.

Scripts

Centrally manage users folders and files on the network, and make shared files and folders available offline.

Folder Redirection

Offline Files and Folders

Centrally manage user profiles.

Roaming User Profiles

You can also use Group Policy to manage Remote Installation Services (RIS) by centrally setting client configuration options. For more information about using RIS, see Automating and Customizing Installations, in this book.

Active Directory stores information about all physical and logical objects on the network. This information is automatically replicated across the network to simplify finding and managing data, no matter where the data is located in the organization. The Active Directory structure you create determines how you apply Group Policy settings. In an Active Directory environment, Group Policy allows you to define and control the state of computers and users in an organization. Group Policy allows you to control more than 600 customizable settings that you can use to centrally configure and manage users and computers.

Depending on the size of your organization, managing desktops, users, and their permissions can be a very complex task, especially because changes constantly happen. For example, users join and leave organizations, get promoted and transferred, and regularly change offices. Similarly, printers, computers, and network file shares are frequently added, removed, and relocated. When implemented in a Windows 2000 Active Directory infrastructure, Group Policy-based IntelliMirror features greatly simplify managing these ongoing changes. Once set, Group Policy automatically maintains the state you design without requiring further intervention.

You can associate or link a particular Group Policy object (GPO) to one or more sites, domains, or organizational units (OUs)in an Active Directory structure. When multiple GPOs are linked to a particular site, domain, or OU, you can prioritize the order in which the GPOs are applied by determining when in the processing order particular settings are processed.

By linking GPOs to sites, domains, and OUs, you can implement Group Policy settings as broadly or as narrowly in the organization as necessary. Consider the following when linking GPOs:

  • A GPO linked to a site applies to all users and computers in the site.

  • A GPO linked to a domain applies directly to all users and computers in the domain and by inheritance to all users and computers in all the OUs that are linked to that domain. Note that Group Policy is not inherited across domains.

  • A GPO linked to an OU applies directly to all users and computers in the OU and by inheritance to all users and computers in child OUs.

  • GPOs are stored in Active Directory by domain. You can, however, link a site, domain, or OU to a GPO in another trusted domain, but this is generally not recommended for performance reasons.

For detailed procedures for linking a GPO to a site, domain, or OU, see Windows 2000 Server Help. For complete technical information about Active Directory and Group Policy, see the Distributed Systems Guide of the Microsoft Windows 2000 Server Resource Kit. For information about planning and deploying an Active Directory structure, see Designing the Active Directory Structure in the Deployment Planning Guide. For examples of Active Directory deployment scenarios, see the Windows 2000 Server Deployment Lab Scenarios link on the Web Resources page at http://www.microsoft.com/windows/reskits/webresources

Using IntelliMirror to Manage Desktops

Windows XP Professional, Windows 2000 Professional, and Windows 2000 Server include IntelliMirror management technologies, which are primarily enabled by Group Policy. IntelliMirror and Group Policy greatly streamline managing user data, managing user settings, managing computer settings, and installing and maintaining software.

User Data Management

Files that a user creates and uses are user data. Examples are word processing documents, spreadsheets, or graphics files. User data belongs to the user and is located on the user s computer or on a network share to which the user has rights.

Less obvious forms of user data include Microsoft Internet Explorer cookies and Favorites and customized templates. User data is usually hard to recreate for example, a template that has undergone extensive design work and customization. With IntelliMirror, users can transparently access their data from any Windows XP Professional or Windows 2000 Professional based computer on the network, regardless of whether or not that computer is their primary computer.

IntelliMirror technologies that support user data management include:

  • Folder Redirection

  • Offline Files and Synchronization Manager

  • Roaming User Profiles

You can ensure that users data is always available to them in the following ways.

Protecting user data by using Folder Redirection

You can redirect user data to a network share, where it can be backed up as part of routine system maintenance. This can be done so that the process is transparent to the user. It is recommended that users be trained to store all user data in My Documents (in the built-in subfolders My Pictures, My Music, and My Videos, and in any subfolders they create to organize their data). The My Documents folder is then redirected to a network share. This capability helps to enforce corporate directives such as storing business-critical data on servers that are centrally managed by the IT staff. If users are in the habit of storing files on their desktops, you should also consider redirecting the desktop.

Although the Application Data folder can be redirected using Folder Redirection, this is generally only recommended in the following cases:

  • To reduce the size of the profile thereby decreasing logon time on multi-user computers where you have enabled a Group Policy setting to delete cached profiles. This gives users access to their application data, but without the need to download possibly large files every time they log on.

  • To reduce the size of the profile in situations where keeping initial logon time short is a top priority, such as on terminals.

  • For Terminal Services clients.

Providing users access to their data even when they are disconnected from the network

By using Offline Files and Synchronization Manager, administrators can ensure that the most up-to-date versions of a user s data reside on both the local computer and on the server. You can use Offline Files in conjunction with Folder Redirection to make available offline those folders that have been redirected to a server. Users can manually configure which files and folders are available offline, or administrators can configure them through Group Policy. The file is stored on a server, and the file on the local computer is synchronized with the network copy. Changes made while offline are synchronized with the server when the user reconnects to the network. Offline Files now supports Distributed File System (DFS) and Encrypting File System (EFS).

Enabling roaming user profiles

Although profiles are commonly used as a method of managing user settings (such as a user s shortcuts and other customizations of their environment), the profile also contains user data, including Favorites and Cookies. When roaming user profiles are enabled, users can access this data when they log on to any computer on the network. Windows XP Professional Group Policy settings allow the profile to roam correctly and free up system memory.

User Settings Management

With the user settings management tools in Windows XP Professional, you can centrally define computing environments for groups of users, and grant or deny users the ability to further customize their environments.

By managing user settings, you can:

  • Reduce support calls by providing a preconfigured desktop environment appropriate for the user s job.

  • Save time and costs when replacing computers by automatically restoring the user s settings.

  • Help users be more efficient by automatically providing their desktop environment, no matter where they work.

The primary IntelliMirror technologies that support user settings management is Roaming User Profiles and Administrative Templates. The settings in Administrative Templates can control the desktop with pre-defined configurations; for more information, see the Administrative Templates section, later in this chapter.

A user profile contains:

  • The portion of the registry that stores settings such as Windows Explorer settings, persistent network connections, taskbar settings, network printer connections, user-defined settings made from Control Panel, Accessories, and application settings.

  • A set of profile folders that store information such as shortcut links, desktop icons, and startup applications.

User profiles are located by default on the local computer; one profile is created for each user who has logged on to that computer. By configuring user profiles to roam, you can ensure that the settings in a user s profile are copied to a network server when the user logs off from the computer and are available to the user no matter where he or she next logs on to the network.

While useful for roaming users, roaming user profiles are also beneficial for users who always use the same computer. For these users, roaming user profiles provide a transparent way to back up their profile to a network server, protecting the information from individual system failure. If a user s primary workstation needs to be replaced, the new computer receives the user s profile from the server as soon as the user logs on.

Some folders in a user profile cannot be configured to roam; these are found in the Local Settings folder, and include the subfolders Application Data (not to be confused with the other Application Data folder that is a peer of Local settings, which does roam), History, Temp, and Temporary Internet Files. These folders contain application data that is not required to roam with the user, such as temporary files, non-critical settings, and data too large to roam effectively. This data is not copied to and from the server when a user logs on or logs off.

As an illustration of using roaming and non-roaming folders, you might configure Internet Explorer to store a user s Favorites in the roaming portion of the user profile and store the temporary Internet files in the local, non-roaming portion of the user profile. By default, the History, Local Settings, Temp, and Temporary Internet Files folders are excluded from the roaming user profile. You can configure additional folders to not roam by specifying them in the Group Policy snap-in, at User Configuration\Administrative Templates\System\User Profiles\Exclude directories in roaming profile.

Computer Settings Management

Group Policy settings also allow you to define how desktop computers are customized and restricted on your network. For optimal control of workstations, use Group Policy objects in an Active Directory network to centralize computer management. However, if Active Directory is not deployed, you can control security on a computer-by-computer basis by using the local Group Policy object. Each computer has one LGPO that can be used to manage the computer outside of an Active Directory environment. If you configure desktop security this way, make sure to set workstation security to match corporate security standards.

The Computer Configuration tree in the Group Policy Microsoft Management Console (MMC) snap-in includes the local computer-related Group Policy settings that specify operating system behavior, desktop behavior, application settings, security settings, computer-assigned application options, and computer startup and shutdown scripts. Computer-related Group Policy settings are applied when the operating system starts up and during periodic refresh cycles. See Using Group Policy to Manage Desktops, later in this chapter for more information.

You can also customize computer configuration settings by using the Group Policy MMC snap-in, thus simplifying individual computer setup.

Group Policy based Software Distribution

While the advanced software deployment and management features of Systems Management Server 2.0 (SMS) offer distinct advantages in enterprise-sized organizations such as inventory, diagnosis, and monitoring Group Policy provides some ability to deploy software to workstations and servers running Windows 2000 or later. With Group Policy based software deployment, you can target groups of users and computers based on their location in the Active Directory. Group Policy based software deployment uses Windows Installer as the installation engine on the local computer.

This Software Installation and Maintenance component allows you to efficiently deploy, patch, upgrade, and remove software applications without visiting each desktop. This gives users reliable access to the applications that they need to perform their jobs, no matter which computer they are using.

Group Policy based software distribution enables you to:

Using the Software Installation extension of the Group Policy MMC snap-in, you can centrally manage the installation of software on a client computer, either by assigning applications to users or computers or by publishing applications for users. You can:

Using Group Policy to Manage Desktops

Group Policy is the primary tool for defining and controlling how programs, network resources, and Windows XP Professional and Windows 2000 Professional behave for users and computers in an organization. Similar to the way in which information is stored in Microsoft Word .doc files, Group Policy settings are contained in Group Policy objects (GPOs) created by using the Group Policy MMC snap-in.

Using Group Policy in an Active Directory environment, you can specify a user or computer configuration once, and then rely on the Windows XP Professional or Windows 2000 operating system to enforce that configuration on all affected client computers until you change it. After you apply Group Policy, the system maintains the state without further intervention.

You can define configurations by implementing Group Policy settings from a central location for hundreds or even thousands of users or computers at one time. For example, you might use Group Policy to implement the following rules:

Note 

Do not confuse Group Policy settings with preferences. Group Policy settings are created by an administrator and enforced automatically. Preferences are system settings and configuration options, such as a screen saver or the view in My Documents that users set and alter without an administrator s intervention. Group Policy settings take precedence over preferences.

Group Policy Objects

Each combination of Group Policy settings that you configure is called a Group Policy object (GPO). You can link GPOs to computers and users based on their location in an Active Directory structure. That is, you can link a GPO to a site, domain, or organizational unit (OU). Each GPO is applied as part of the startup process or when a user logs on to a workstation. The settings within the GPOs are evaluated by the affected clients, using the hierarchical nature of Active Directory, as described in GPO Processing Order, later in this section.

Note 

Every computer receives one LGPO, which is stored on the local computer itself. Because LGPOs must be set and modified individually on every client computer, it is recommended that you use LGPOs to manage clients only if Active Directory is not deployed in your environment, and only if you are not using the Windows XP Professional or Windows 2000 Group Policy Administrative Templates with Windows NT 4.0 System Policy.

To create, edit, and manage a GPO, use the Group Policy MMC snap-in, either as a stand-alone tool or as an extension to an Active Directory snap-in (such as the Active Directory Users and Computers snap-in or the Active Directory Sites and Services snap-in). When working in an Active Directory environment, the preferred method is to use the Group Policy snap-in as an extension to an Active Directory snap-in. This allows you to browse Active Directory for the correct Active Directory container, and then define Group Policy based on the selected scope. To access Group Policy from either the Active Directory Users and Computers snap-in or in the Active Directory Sites and Services snap-in, select the Group Policy tab from the Properties page of a site, domain, or organizational unit.

When you create a GPO, start with a template that contains all of the Group Policy settings available for you to configure. Because Group Policy settings apply to either computers or users, GPOs contain trees for each:

Warning 

If an Active Directory domain contains both Windows 2000 and Windows XP Professional based clients, any new Group Policy settings specific to Windows XP Professional that you configure do not apply to the Windows 2000 based clients. See Group Policy Help or the Extended view in the Group Policy snap-in for the desktop operating system required for each setting to apply.

GPO Processing Order

Local computer Group Policy is applied during the startup process and periodic refresh cycles. User Group Policy is applied when the user logs on to the computer and during the periodic refresh cycle. When a computer starts, computer policy is applied during the boot process. Then, when a user logs on, user policy is applied in the following order: local GPO, GPOs linked to sites, GPOs linked to domains, and GPOs linked to organizational units (OUs). In the case of nested OUs, GPOs associated with parent OUs are processed prior to GPOs associated with child OUs. Keep this processing order in mind when configuring multiple GPOs to centrally manage desktops in your network environment.

Note 

If a setting in a later-applied GPO is not configured, it does not overwrite settings configured in earlier-applied GPOs.

This order of application is the default behavior. You can modify the default processing order by using the No Override, Block Policy Inheritance, or Loopback Group Policy settings. These allow you to modify the rules of inheritance, either by forcing GPOs to affect groups of users or computers, or by preventing higher-level GPOs from affecting groups of users or computers.

Resultant Set of Policy

The biggest change in Group Policy for Windows XP Professional is the introduction of the Resultant Set of Policy (RSoP) MMC snap-in. RSoP gives administrators a powerful and flexible tool for and troubleshooting Group Policy. RSoP allows you to see the aggregate effect of Group Policy on a target user or computer, including which settings take precedence over others.

RSoP is enabled by Windows Management Instrumentation (WMI) by leveraging the capability of WMI to extract data from the registry, drivers, the file system, Active Directory, Simple Network Management Protocol (SNMP), Windows Installer, Microsoft SQL Server , various networking features, and Microsoft Exchange Server.

Use Logging mode to determine which GPO settings are actually applied to a target user or computer. You can also use logging mode on a stand-alone computer.

For example, a help desk worker can connect to any Windows XP Professional-based computer on the network and run Logging mode if they have local administrator access on the target computer.

Managing Users and Desktops by Using Group Policy Extensions

Group Policy provides several extensions you can use to configure GPOs that enable IntelliMirror features and manage users. These extensions include:

Note 

Folder Redirection, Software Installation and Maintenance, and RIS require Active Directory; they are not present on the local Group Policy object and cannot be managed by using the local Group Policy object. If Active Directory is not deployed on your network, use System Policy instead.

You can use any of these extensions to apply Group Policy to users or computers, although settings are different for users and computers. Use the Group Policy snap-in to access the extensions. By default, all the available extensions are loaded when you start the Group Policy snap-in. Different extensions are available depending on whether you are viewing the local Group Policy object or Active Directory domain-based Group Policy.

Administrative Templates

Administrative templates (.adm files) are Unicode files that you can use to configure the registry-based settings that govern the behavior of many services, applications, and operating system components such as the Start menu. By default, the Group Policy snap-in contains four .adm files that cumulatively contain more than 600 settings. You can also access three additional .adm files that can be used with the Windows NT 4.0 System Policy Editor. The .adm files are described in Table 5-4.

Table 5-4: Administrative Template Files

.adm File

Use With

Description

System.adm

Windows XP Professional

Contains many settings that you can use to customize the user s operating environment.

Inetres.adm

Windows XP Professional

Contains settings for Internet Explorer.

Conf.adm

Windows XP Professional

Contains settings you can use to configure Microsoft NetMeeting .

Winnt.adm

Windows NT 4.0 System Policy Editor, Poledit.exe

Contains policy for Windows NT 4.0 based clients.

Wmplayer.adm

Windows XP Professional

Contains settings you can use to configure Windows Media Player.

Common.adm

Windows NT 4.0 System Policy Editor, Poledit.exe

Contains policy for client computers running Windows NT 4.0, Microsoft Windows 95, and Microsoft Windows 98.

Windows.adm

Windows NT 4.0 System Policy Editor, Poledit.exe

Contains policy for Windows 95 and Windows 98 based clients.

An .adm file specifies a hierarchy of categories and subcategories that together define how the Group Policy snap-in displays the options. The file also indicates the registry locations where the settings are stored if a particular selection is made, specifies any options or restrictions in values that are associated with the selection, and might specify a default value if a selection is activated.

In Windows 2000 and Windows XP Professional, all Group Policy settings set registry entries in either the \Software\Policies tree (the preferred location for all new policies) or the \Software\Microsoft\Windows\CurrentVersion\Policies tree, in either the HKEY_CURRENT_USER subtree or the HKEY_LOCAL_MACHINE subtree.

Policy settings that are stored in these registry subkeys are known as true policy settings. Storing settings here has the following advantages:

This prevents Windows NT 4.0 behavior, where System Policy settings result in persistent settings in the registry. A policy remains in effect until the value of its corresponding registry entry is reversed, either by a counteracting policy or by editing the registry. These settings are stored outside the approved registry locations above and are known as preferences.

By default, only true policy settings are displayed in the Group Policy snap-in. Because they use registry entries in the Policies subkeys of the registry, they will not cause persistent settings in the registry when the GPO that applies them is no longer in effect. The following .adm files are displayed by default:

Administrators can add additional .adm files to the Group Policy snap-in that set registry values outside of the Group Policy subkeys. These settings are referred to as preferences because the user, application, or other parts of the system can also change the settings. By creating non Group Policy .adm files, the administrator ensures that certain registry entries are set to specified values.

One useful feature of the Windows XP Professional Group Policy snap-in is view filtering. For example, you can hide settings that aren t configured or view only settings supported on a particular operating-system platform.

To filter the view of the Group Policy snap-in

  1. Click View, and then click Filtering.

  2. Select the Filter by requirements information check box, and then in the list box select the check boxes for the categories that you want to make visible.

  3. If you want to hide settings that are not configured, select the Only show configured policy settings check box. If you do this, only enabled or disabled settings will be visible.

  4. If you want to hide Windows NT 4.0 style system policy settings, make sure that the Only show policy settings that can be fully managed check box is selected. This option is recommended, and it is enabled by default.

You can also prevent administrators from viewing or using non-policy settings by enabling the Enforce Show Policies Only Group Policy setting in User Configuration\Administrative Templates\System\Group Policy.

The icon for non-policy or preference settings is red. True policy settings have a blue icon.

Use of non Group Policy settings within the Group Policy infrastructure is strongly discouraged because of the persistent nature of these registry-based settings. To set registry-based policy settings on client computers running Windows NT 4.0, Windows 95, and Windows 98, use the Windows NT 4.0 System Policy Editor tool, Poledit.exe.

Extended View for the Group Policy snap-in now provides Explain text for the selected Group Policy setting without having to open a separate Help window. It also clearly shows which operating system client platform is required for the selected setting to apply. You can now more easily determine which settings will function depending on the existing desktop operating systems on your network.

A Group Policy settings spreadsheet is available on the Web for easy tracking of your configured Group Policy settings. See the Group Policy Object Settings spreadsheet link on the Web Resources page at http://www.microsoft.com/windows /reskits/webresources.

Security Settings

Use the Security Settings extension to set the security options for computers and users within the scope of a GPO. For information about defining security settings for the domain and network, see the Distributed Systems Guide of the Microsoft Windows 2000 Server Resource Kit.

The Security Settings extension of the Group Policy snap-in complements existing system security management features such as Local Security Policy snap-in. You can continue to change specific settings as needed.

You can configure security for computers to include:

Default security templates

The following security templates are installed when Windows XP Professional is installed on an NTFS file system partition:

User Rights and Group memberships are not modified by the basic templates because these templates are most often used for undoing file system or registry access control list (ACL) changes, or to apply the default Windows XP Professional ACLs to computers that have been upgraded from Windows NT 4.0. In these cases, administrators typically want to maintain existing User Rights and Group memberships.

Typically, you do not need to define the default security templates because they are installed by default on an NTFS partition. However, they can be useful if you have converted a drive from file allocation table (FAT) to NTFS, or if you have made customizations and want to restore the system to the default ACLs.

Do not deploy these templates by using Group Policy, because it can take a long time to reapply these basic templates. They are applied during setup. Incremental templates, on the other hand, are useful to deploy using Group Policy.

Incremental security templates

Windows XP Professional includes several incremental security templates. By default, these templates are stored in systemroot\Security\Templates. You can customize these predefined templates by using the Security Templates MMC snap-in or by importing them into the Security Settings extension of the Group Policy snap-in. These templates include:

For more information about these templates, see Authorization and Access Control in this book.

Software Installation

Use the Software Installation extension of the Group Policy snap-in to centrally manage software in your organization. You can assign (make mandatory) or publish (make optionally available) software to users, and assign (but not publish) software to computers. For more information about using the Software Installation extension, see Using IntelliMirror to Manage Desktops earlier in this chapter.

Scripts

You can use Group Policy based scripts to automate computer startup and shutdown, and user logon and logoff sessions. You can use any language supported by Windows Script Host (WSH), a language-independent scripting host for 32-bit Windows platforms. Your options include Microsoft Visual Basic Scripting Edition (VBScript), JavaScript, Perl, and batch files (with .bat and .cmd extensions) such as in Microsoft MS DOS .

WSH is included in Windows XP Professional. With WSH, you can run scripts directly in Windows XP Professional by double-clicking a script file, or by typing the name of a script file at the command prompt.

You can use any WSH scripting tool including the VBScript programming system and Microsoft JScript development software to create scripts. Independent software vendors provide WSH support for other popular scripting languages. You can use Windows Script Host to run .vbs and .js scripts directly on the Windows desktop or command console, without having to embed the scripts in an HTML document. MS DOS-type batch files (with .bat and .cmd extensions) also use WSH.

Windows XP Professional supports the following five scripts:

Note 

Although Group Policy based scripts are similar to logon scripts set on the user object, they often require multi-branching logic to target a specific group of users. Using Group Policy, you can target the scripts by using OUs and security group filtering. For this reason, the Windows XP Professional scripting options are a more efficient choice.

Using the Scripts folder located under Computer Configuration\Administrative Templates\System and User Configuration\Configuration\Administrative Templates\System in the Group Policy snap-in, you can specify when and how startup and shutdown scripts are run. See Table 5-6 later in this chapter for a partial list of script-related settings.

Folder Redirection

Use Folder Redirection to redirect Windows XP Professional certain folders from their default location in the user profile to an alternate location on an Active Directory network where you can centrally manage them and keep them secure. The Windows XP Professional that can be redirected include My Documents (and its subfolders My Pictures, My Music, and My Videos), Application Data, Desktop, and the Start menu.

Internet Explorer Maintenance

Using Internet Explorer Maintenance, you can administer and customize Internet Explorer on Windows XP Professional based client computers by using Group Policy instead of using the Internet Explorer Administration Kit (IEAK). You can also export these settings to clients running earlier versions of Windows. For more information about managing Internet Explorer, see the Microsoft Internet Explorer Resource Kit link on the Web Resources page at http://www.microsoft.com/windows/reskits/webresources For information about individual Internet Explorer Group Policy settings, see Group Policy Help or the Extended view in the Group Policy snap-in.

Refreshing Group Policy from the Command Line

A new command-line tool, GPUdate.exe, replaces the Secedit.exe tool to give administrators better control and flexibility in refreshing policy. Normally, Group Policy refreshes every 90 minutes for the computer and user. However, after you revise a GPO, you can use GPUpdate to refresh the GPO so that it takes effect immediately. GPUpdate replaces the Windows 2000 tool Secedit.exe and provides increased control and flexibility. The command-line parameters for this tool are described in Table 5-5.

Table 5-5: Command-Line Parameters for GPUdate.exe

Command-Line Parameter

Behavior

/target:{computer|user}

Specifies that only Computer or User policy settings are refreshed. By default, both Computer and User policy settings are refreshed.

/force

Reapplies all policy settings. By default, only policy settings that have changed are applied.

/wait:value

Sets the number of seconds to wait for policy processing to finish. The default is 600 seconds. The value 0 means not to wait. The value -1 means to wait indefinitely. When the time limit is exceeded, the command prompt returns, but policy processing continues.

/logoff

Causes a logoff after the Group Policy settings have been refreshed. This is required for those Group Policy client-side extensions that do not process policy on a background refresh cycle but that do process policy when the user logs on. Examples include user-targeted Software Installation and Folder Redirection. This option has no effect if there are no extensions called that require the user to log off.

/boot

Causes a reboot after the Group Policy settings are refreshed. This is required for those Group Policy client-side extensions that do not process policy on a background refresh cycle but that do process policy when the computer starts up, such as computer-targeted Software Installation. This option has no effect if there are no extensions called that require a reboot.

/sync

Causes the next foreground policy application to be processed synchronously. Foreground policy applications occur at computer boot and user logon. You can specify this for the user, computer, or both using the /target parameter. The /force and /wait parameters are ignored if specified.




Microsoft Windows XP Professional Resource Kit 2003
Microsoft Windows XP Professional Resource Kit 2003
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 338
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net