Home / Courses / Microsoft Technology / 50255C: Managing Windows Environments with Group Policy

Windows Server

50255C: Managing Windows Environments with Group Policy

Module 1: Introducing Group PolicyThis module describes the basis of what Group Policy is and how it functions. It also describes the Group Policy features that are in included in the newer Windows operating systems.Lessons

  • What is Group Policy
  • Group Policy Scenarios
  • Managing Group Policies
  • New Group Policy Features in Windows Server 2008 R2 and Windows 7
  • New Group Policy Features in Windows Server 2012 and Windows 8 Client 

Lab : Introducing Group Policy

  • Preparing Windows 8 for Domain Policies
  • Preparing Windows 7 for Domain Policies
  • Preparing Windows Vista for Domain Policies
After completing this module, students will be able to:
  • Define Group Policy
  • List the ways you can use Group Policy
  • Describe the tools, features, and policies you can use to manage group policies

Module 2: Using Group Policy Management Tools

 
This module describes the differences between local and domain policies and the Group Policy management tools you can use to manage these policies.  This module also describes the Group Policy refresh process and hot to manually force a refresh ahead of the default interval.

Lessons

  • Local and Domain Policies
  • Using Group Policy Management Console?
  • Understanding Group Policy Refresh

Lab : Using Group Policy Management Tools

  • Working with Multiple Local Policies
  • Installing the GPMC on Windows 8 Client
  • Basic Group Policy Management
  • Navigating the Windows 8 Client Interface with a Mouse and Keyboard
  • Navigating the Windows Server 2012 Console
  • Installing the GPMC on Windows 7
After completing this module, students will be able to:
  • Describe the advantages of using domain policies instead of local policies
  • List the capabilities of the Group Policy Management Console
  • Describe the requirements for installing the Group Policy Management Console
  • Explain how to use the different GPMC features to create and manage policies
  • Describe the elements of the gpupdate command

Module 3: Designing a Group Policy Infrastructure

 
This module details the steps a successful Group Policy deployment should follow, linking your design to how your company can best use the features.  Essential network components and security design are also defined.

Lessons

  • Overview of Active Directory
  • Introducing the Design Stages for Implementing Group Policy
  • Planning your Group Policy Design
  • Designing Your Group Policy Solution
  • Deploying Your Group Policy Solution
  • Managing Your Group Policy Solution

Lab : Designing a Group Policy Infrastructure

  • Creating an OU Structure for Group Policy
  • Delegating GPO Management
  • Creating Starter GPOs
After completing this module, students will be able to:
  • Describe the basic structure of Active Directory
  • Describe the four stages of implementing Group Policy
  • Explain how to plan Group Policy in accordance with a company’s requirements
  • Describe the guidelines that you should follow when you create new GPOs

Module 4: Understanding the Architecture of Group Policy Processing

 
This module details the concepts that you must grasp in order to troubleshoot Group Policy.  The module also describes the options that are available to change the standard Group Policy processing sequence. 

Lessons

  • Group Policy Components in AD DS
  • Understanding the Group Policy Deployment Order
  • Modifying Group Policy Processing

Lab : Exploring the Group Policy Processing Architecture

  • Working with Multiple GPO Levels
  • Using the Block Inheritance and Enforce Options
  • Implementing Security Filtering
  • Creating a WMI Filter
  • Working with Loopback Processing
After completing this module, students will be able to:
  • Describe the Active Directory components that you can use to deploy Group Policy
  • Explain the order in which Group Policy is deployed in Active Directory
  • Describe the methods that are available to modify Group Policy processing

Module 5: Troubleshooting and Backing Up GPOs

 
This module explains how to use the RSoP tools to determine whether policies are being processed in the correct manner.  This module discusses how to use the available tools to troubleshoot policy issues; back up, restore, import, copy, and search for GPOs; and migrate GPOs from one domain to another. 

Lessons

  • Using Group Policy Troubleshooting Tools
  • Integration of RSoP Functionality
  • Using Logging Options 
  • Backing Up, Restoring, Importing, and Copying GPOs 
  • Building Migration Tables

Lab : Troubleshooting and Backing Up GPOs

  • Using Tools for Troubleshooting
  • Backing Up and Restoring GPOs
After completing this module, students will be able to:
  • Describe the Group Policy troubleshooting tools
  • Describe the GPMC tools that have RSoP functionality
  • Describe the GPO logging tools used to obtain more detail about the GPO processing issues
  • Explain how to back up, restore, import, and copy GPOs using the GPMC
  • Explain how to build migration tables

Module 6: Using Windows PowerShell to Manage Group Policy

 
This module explains how to navigate and use basic Windows PowerShell commands and how to use Windows PowerShell to manage Group Policy.  This module will also describe how you can use PowerShell logon scripts with Group Policy. 

Lessons

  • Introduction to PowerShell
  • Windows PowerShell Library for Group Policy
  • Windows PowerShell Cmdlets for Group Policy
  • Windows PowerShell-Based Logon Scripts

Lab : Using Windows PowerShell to Manage Group Policy

  • Exploring Windows PowerShell
  • Using PowerShell to Manage GPOs
  • Using PowerShell ISE to Write More Scripts
After completing this module, students will be able to:
  • Describe the Windows PowerShell features
  • Explain how to perform the basic Windows PowerShell operations
  • Explain how to access the Windows PowerShell library for Group Policy
  • List the third-party Windows PowerShell-based login script tools

Module 7: Implementing Security Using Group PolicyThis module defines the Windows security model and describes the process of using Group Policy to implement user account, computer account, and domain security.Lessons

  • Exploring the Windows Security Architecture
  • Securing User Accounts
  • Exploring Local Policies
  • Hardening Windows Environments
  • Implementing Domain Security

Lab : Implementing Security Using Group Policy

  • Using the Security Compliance Manager
  • Configuring Enterprise Auditing through Group Policy Deployment
  • Configuring Standard Password Policies
  • Configuring Fine-Grained Password Policies
  • Configuring Restricted Groups
  • Using Security Templates
After completing this module, students will be able to:
  • Describe the Widows security architecture
  • Explain how to secure user accounts with Group Policy
  • Describe the purpose of local policies
  • Explain how to harden computer accounts
  • Explain how to control the domain security policy with a GPO

Module 8: Configuring the Desktop Environment with Group Policy

 
This module explains many of the settings that are available to configure and restrict the user desktop environment, such as Control Panel restrictions, Start Menu settings, and Windows Explorer configuration. 

Lessons

  • Exploring Script Types and Controlling Script Execution
  • Defining the Desktop, Start Menu, and Taskbar Settings
  • Defining the Control Panel Settings
  • Defining the Windows Components Settings
  • Configuring the Printer Management and Pruning Settings
  • Defining the Network Settings
  • New Settings for Windows 8 Client and Windows Server 2012

Lab : Configuring the Desktop Environment with Group Policy

  • Using Logon Scripts
  • Configuring Desktop Settings
  • Managing Windows Components
  • Configuring Printers with Group Policy
  • Managing Network Settings
After completing this module, students will be able to:
  • Describe the startup, shutdown, logon, and logoff scripts and settings.
  • Identify the many ways to control the user desktop, Start menu, and taskbar settings
  • Explain how to restrict the Control Panel settings
  • Explain how to restrict operations that users can perform in Windows Explorer, Windows Internet Explorer, and Remote Desktop Services
  • Explain how to configure the printer management and pruning settings
  • Describe the network settings

Module 9: Configuring Roaming Profiles and Folder Redirection

 
This module explains how to use roaming profiles and Folder Redirection to maintain the user’s personal files and settings.

Lessons

  • Managing User Profiles
  • Configuring Folder Redirection
  • Using Folder Redirection and Roaming Profiles Together

Lab : Configuring Roaming Profiles and Folder Redirection

  • Preparing for Profiles and Folder Redirection
  • Configuring Folder Redirection
  • Managing Roaming Profiles
After completing this module, students will be able to:
  • Explain how to customize the processing of user profiles and roaming user profiles
  • Explain how to redirect user folders to a server
  • Describe what happens when roaming profiles and Folder Redirection are both enabled

Module 10: Assigning and Publishing Software Packages

 
This module explains how to use Group Policy for deploying software. 

Lessons

  • Using MSI Packages to Distribute Software
  • Using Group Policy as a Software Deployment Method
  • Deploying Software
  • Setting Up Distribution Points
  • Using the Systems Center Configuration Manager to Distribute Software

Lab : Assigning and Publishing Software Packages

  • Preparing for Distribution
  • Creating Custom Software Packages
  • Repackaging Applications
  • Deploying Software Packages
After completing this module, students will be able to:
  • Describe the basic elements of an MSI package
  • Determine when to build or repackage your own
  • Define the requirements for distributing software via Group Policy
  • Describe when you might want to assign and publish software
  • Explain how to upgrade and remove packages
  • Explain how to set up distribution points for software deployment
  • List the advantages of using SCCM to distribute software instead of Group Policy

Module 11: Implementing Software Restriction Policies and AppLocker

 
This module explains the deployment of software restriction policies including the essential components, rules, and the order of precedence of such policy.  You will learn how to use software restriction policies to prevent users from running unauthorized software reducing the likelihood that viruses, Trojan horses, or spyware might intrude upon the environment. 

Lessons

  • What is a Software Restriction Policy?
  • Creating a Software Restriction Policy
  • Using additional Rules to Help Identify Software
  • What Makes an Effective Software Restriction Policy
  • Using AppLocker in Windows 7 and later

Lab : Implementing AppLocker and Software Restrictions Policies

  • Enforcing Software Restriction Policies
  • Using AppLocker to Restrict Software
After completing this module, students will be able to:
  • Define software restriction policies
  • Explain how to create software restriction policies
  • Describe the additional rules that you can apply to software restriction policies
  • Describe the characteristics of an effective software restriction policy
  • Describe the AppLocker features

Module 12: Creating and Deploying Administrative Templates

 
This module explains the logic behind administrative templates, when to use them, and the basics of how to write them. This module also explains how to deploy templates by loading legacy ADM templates into the Group Policy Management Editor, and copying ADMX templates to the Central Store. 

Lessons

  • Introducing  ADM Templates
  • Legacy ADM Templates
  • Custom ADM Templates
  • Using the New ADMX Templates
  • Converting and Creating Custom ADMX Templates
  • Using the ADMX Central Store

Lab : Working with ADMX Templates and the Central Store

  • Importing ADMX Files
  • Implementing the ADMX Central Store
  • Converting Legacy ADM Files
  • Creating a Custom ADMS File
After completing this module, students will be able to:
  • Describe the benefits of using ADM templates
  • List some of the ADM templates that are included with each version of Windows
  • List tips that you can use to write your own customer ADM templates
  • Describe the advantages of using the new ADMX file format
  • Identify which tool converts the ADM templates to ADMX templates and also creates new ADMX templates
  • Define ADMX Central Store

Module 13: Configuring Group Policy Preferences

 
This module describes the function of Group Policy Preferences. You will learn how to combine Preferences with Policies, and how Preferences are different from Policies.

Lessons

  • Introducing Group Policy Preferences
  • Comparing Preferences and Policy Settings
  • Configuring Preferences Settings

Lab : Configuring Group Policy Preferences

  • Implementing Computer Preferences 
  • Implementing User Preferences 
  • Preparing Legacy Clients for Preferences 

 

After completing this module, students will be able to:
  • Describe the purpose of Group Policy Preferences
  • Describe the differences between Preferences and Policy Settings
  • Identify the settings that you can configure in the Computer Configuration and User Configuration sections of the Group Policy Management Console
  • Describe the Windows and Control Panel settings

Course Registration

 

4 days
$1,900.00

 

Course Outline

 

Request