SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Peter Tsai
Spiceworks IT Content Dude
Group Policy Management
With Special Guest:
Jimmy Tassin
IT Manager – St. Louis, MO
12 years in IT
“Currently managing
a project to transition
the company from a
2003 Active
Directory/Exchange
environment to a 2012
environment.”
With Special Guest:
Bill Kindle
Network/Systems Administrator - Dayton, OH
10 years in IT
What is Group Policy?
Group Policy provides the centralized management and
configuration of OSes, apps, and user settings in
an Active Directory environment.
USED GROUP POLICY
SAVED A BUNCH OF TIME
Why should I care about Group Policy?
Simple… Group policy makes life for IT
pros easier!
What are Group Policy objects?
GPOs = policy documents that apply their settings to
the computers and users within their control
GPO = Giant Pacific Octopus
Group Policy Object
Photo Courtesy of Wikipedia Commons
Managing Users & Computers with GPOs and OUs
Installing Software via Group Policy Objects
Group Policy Tips + Best Practices
SAVING YOUR BACON
Continue the discussion:
Software Deployment in Active
Directory using GPOs & MSIs
Active Directory & Group Policy
Discussion Group
Continue the discussion:
Spotlight on IT: The inner workings
of Group Policy
Mitigate Zero Day Exploits using Group
Policy to Deny Access
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Windows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy ChangesWindows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy ChangesEduardo Castro
 
Securing Windows with Group Policy
Securing Windows with Group PolicySecuring Windows with Group Policy
Securing Windows with Group PolicyJosh Rickard
 
Group Policy Preferences, Templates, And Scripting
Group Policy Preferences, Templates, And ScriptingGroup Policy Preferences, Templates, And Scripting
Group Policy Preferences, Templates, And ScriptingMicrosoft TechNet
 
Windows server 2012 and group policy
Windows server 2012 and group policyWindows server 2012 and group policy
Windows server 2012 and group policyRavi Kumar Lanke
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2IGZ Software house
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1denogx
 
Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy ADsentmery5
 
How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10Global Knowledge Training
 

Was ist angesagt? (10)

Mcts chapter 7
Mcts chapter 7Mcts chapter 7
Mcts chapter 7
 
Windows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy ChangesWindows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy Changes
 
Securing Windows with Group Policy
Securing Windows with Group PolicySecuring Windows with Group Policy
Securing Windows with Group Policy
 
Group Policy Preferences, Templates, And Scripting
Group Policy Preferences, Templates, And ScriptingGroup Policy Preferences, Templates, And Scripting
Group Policy Preferences, Templates, And Scripting
 
Windows server 2012 and group policy
Windows server 2012 and group policyWindows server 2012 and group policy
Windows server 2012 and group policy
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1
 
Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy AD
 
Domain wide organisation policy
Domain wide organisation policyDomain wide organisation policy
Domain wide organisation policy
 
How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10
 

Ähnlich wie Group Policy Management Makes Your Life Easier

Harnessing Collective Intelligence
Harnessing Collective IntelligenceHarnessing Collective Intelligence
Harnessing Collective IntelligenceJoao Pereira
 
Key Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance ProgramKey Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance ProgramDATAVERSITY
 
Migrate to Google Apps? - Gillingham
Migrate to Google Apps? - GillinghamMigrate to Google Apps? - Gillingham
Migrate to Google Apps? - GillinghamMark Gillingham
 
DataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data SinsDataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data SinsDATAVERSITY
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Angie Jorgensen
 
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxchristiandean12115
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaCaserta
 
The Shift from Centralized to Decentralized #SPSVB
The Shift from Centralized to Decentralized #SPSVBThe Shift from Centralized to Decentralized #SPSVB
The Shift from Centralized to Decentralized #SPSVBChristian Buckley
 
Data Governance challenges in a major Energy Company
Data Governance challenges in a major Energy CompanyData Governance challenges in a major Energy Company
Data Governance challenges in a major Energy CompanyChristopher Bradley
 
PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES_FP7
 
Präsentation share point
Präsentation share pointPräsentation share point
Präsentation share pointcoda-efurt
 
Sharepoint Architecture
Sharepoint Architecture Sharepoint Architecture
Sharepoint Architecture arun kumar
 
Interior Designs
Interior DesignsInterior Designs
Interior Designsarun kumar
 
Boldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big DataBoldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big Databoldonjames
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365David Broussard
 
Microsoft PPT_Sharepoint_introduction
Microsoft PPT_Sharepoint_introductionMicrosoft PPT_Sharepoint_introduction
Microsoft PPT_Sharepoint_introductionDipti Bohra
 
Novell Teaming Use Cases
Novell Teaming Use CasesNovell Teaming Use Cases
Novell Teaming Use CasesNovell
 
Collaboration 2.0: Interacting Profitably in a Connected World
Collaboration 2.0: Interacting Profitably in a Connected WorldCollaboration 2.0: Interacting Profitably in a Connected World
Collaboration 2.0: Interacting Profitably in a Connected WorldScott Abel
 
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...Altoros
 

Ähnlich wie Group Policy Management Makes Your Life Easier (20)

Harnessing Collective Intelligence
Harnessing Collective IntelligenceHarnessing Collective Intelligence
Harnessing Collective Intelligence
 
Key Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance ProgramKey Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance Program
 
Migrate to Google Apps? - Gillingham
Migrate to Google Apps? - GillinghamMigrate to Google Apps? - Gillingham
Migrate to Google Apps? - Gillingham
 
Group policy objects
Group policy objectsGroup policy objects
Group policy objects
 
DataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data SinsDataEd Slides: Exorcising the Seven Deadly Data Sins
DataEd Slides: Exorcising the Seven Deadly Data Sins
 
Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...Encrypted Data Management With Deduplication In Cloud...
Encrypted Data Management With Deduplication In Cloud...
 
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docxISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
ISSC340_Presentation_Ronald_Averion.pptxNAME Ronald Averi.docx
 
Data Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with ClouderaData Governance, Compliance and Security in Hadoop with Cloudera
Data Governance, Compliance and Security in Hadoop with Cloudera
 
The Shift from Centralized to Decentralized #SPSVB
The Shift from Centralized to Decentralized #SPSVBThe Shift from Centralized to Decentralized #SPSVB
The Shift from Centralized to Decentralized #SPSVB
 
Data Governance challenges in a major Energy Company
Data Governance challenges in a major Energy CompanyData Governance challenges in a major Energy Company
Data Governance challenges in a major Energy Company
 
PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...PERICLES Policy management & ontology supported preservation - Acting on Chan...
PERICLES Policy management & ontology supported preservation - Acting on Chan...
 
Präsentation share point
Präsentation share pointPräsentation share point
Präsentation share point
 
Sharepoint Architecture
Sharepoint Architecture Sharepoint Architecture
Sharepoint Architecture
 
Interior Designs
Interior DesignsInterior Designs
Interior Designs
 
Boldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big DataBoldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big Data
 
SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
 
Microsoft PPT_Sharepoint_introduction
Microsoft PPT_Sharepoint_introductionMicrosoft PPT_Sharepoint_introduction
Microsoft PPT_Sharepoint_introduction
 
Novell Teaming Use Cases
Novell Teaming Use CasesNovell Teaming Use Cases
Novell Teaming Use Cases
 
Collaboration 2.0: Interacting Profitably in a Connected World
Collaboration 2.0: Interacting Profitably in a Connected WorldCollaboration 2.0: Interacting Profitably in a Connected World
Collaboration 2.0: Interacting Profitably in a Connected World
 
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
 

Mehr von Spiceworks Ziff Davis

Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Spiceworks Ziff Davis
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
 
Milking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worthMilking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worthSpiceworks Ziff Davis
 
Bang on tips for running a successful IT service business
Bang on tips for running a successful IT service businessBang on tips for running a successful IT service business
Bang on tips for running a successful IT service businessSpiceworks Ziff Davis
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Spiceworks Ziff Davis
 
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks. On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks. Spiceworks Ziff Davis
 
US Presidents and the Evolution of Technology
US Presidents and the Evolution of TechnologyUS Presidents and the Evolution of Technology
US Presidents and the Evolution of TechnologySpiceworks Ziff Davis
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshareSpiceworks Ziff Davis
 

Mehr von Spiceworks Ziff Davis (20)

Are You an IT Geek?
Are You an IT Geek?Are You an IT Geek?
Are You an IT Geek?
 
Windows Server 2003 Lifecycle
Windows Server 2003 LifecycleWindows Server 2003 Lifecycle
Windows Server 2003 Lifecycle
 
5 Signs You're Up to Spice!
5 Signs You're Up to Spice!5 Signs You're Up to Spice!
5 Signs You're Up to Spice!
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
Hiring Managers Tell All
Hiring Managers Tell AllHiring Managers Tell All
Hiring Managers Tell All
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.
 
Milking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worthMilking Spiceworks for all IT's worth
Milking Spiceworks for all IT's worth
 
Managing the mobile takeover
Managing the mobile takeoverManaging the mobile takeover
Managing the mobile takeover
 
Intro to the Spiceworks Help Desk
Intro to the Spiceworks Help Desk Intro to the Spiceworks Help Desk
Intro to the Spiceworks Help Desk
 
Beancounters: Friend or Foe?
Beancounters: Friend or Foe? Beancounters: Friend or Foe?
Beancounters: Friend or Foe?
 
Bang on tips for running a successful IT service business
Bang on tips for running a successful IT service businessBang on tips for running a successful IT service business
Bang on tips for running a successful IT service business
 
Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!Big data security in the cloud: Buzzword Bingo!
Big data security in the cloud: Buzzword Bingo!
 
Spiceworks Unplugged - Seattle!
Spiceworks Unplugged - Seattle!Spiceworks Unplugged - Seattle!
Spiceworks Unplugged - Seattle!
 
Top 3 demand gen challenges
Top 3 demand gen challengesTop 3 demand gen challenges
Top 3 demand gen challenges
 
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks. On Your Mark! Getting ready and set to spice IT up in Spiceworks.
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
 
The IT Buyer's Path to Purchase
The IT Buyer's Path to PurchaseThe IT Buyer's Path to Purchase
The IT Buyer's Path to Purchase
 
You've got email!
You've got email!You've got email!
You've got email!
 
US Presidents and the Evolution of Technology
US Presidents and the Evolution of TechnologyUS Presidents and the Evolution of Technology
US Presidents and the Evolution of Technology
 
All about virtualization spiceworks - slideshare
All about virtualization  spiceworks - slideshareAll about virtualization  spiceworks - slideshare
All about virtualization spiceworks - slideshare
 
Avoiding a BYOD Blowup!
Avoiding a BYOD Blowup!Avoiding a BYOD Blowup!
Avoiding a BYOD Blowup!
 

Kürzlich hochgeladen

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

Group Policy Management Makes Your Life Easier

  • 1. Peter Tsai Spiceworks IT Content Dude Group Policy Management
  • 2. With Special Guest: Jimmy Tassin IT Manager – St. Louis, MO 12 years in IT “Currently managing a project to transition the company from a 2003 Active Directory/Exchange environment to a 2012 environment.”
  • 3. With Special Guest: Bill Kindle Network/Systems Administrator - Dayton, OH 10 years in IT
  • 4. What is Group Policy? Group Policy provides the centralized management and configuration of OSes, apps, and user settings in an Active Directory environment. USED GROUP POLICY SAVED A BUNCH OF TIME
  • 5. Why should I care about Group Policy? Simple… Group policy makes life for IT pros easier!
  • 6. What are Group Policy objects? GPOs = policy documents that apply their settings to the computers and users within their control GPO = Giant Pacific Octopus Group Policy Object Photo Courtesy of Wikipedia Commons
  • 7. Managing Users & Computers with GPOs and OUs
  • 8. Installing Software via Group Policy Objects
  • 9. Group Policy Tips + Best Practices SAVING YOUR BACON
  • 10. Continue the discussion: Software Deployment in Active Directory using GPOs & MSIs Active Directory & Group Policy Discussion Group
  • 11. Continue the discussion: Spotlight on IT: The inner workings of Group Policy Mitigate Zero Day Exploits using Group Policy to Deny Access

Hinweis der Redaktion

  1. IT Security is a bigger concern than ever and there’s always the issue of managing your many users. Group Policy is a feature of Active directory that both helps keep the bad guys out, and the good guys in AND it helps you keep users from overstepping their boundaries and causing you headaches! Today, we’ll share group policy best practices and learn tips from a couple of the top SpiceHeads in our community.
  2. So…. Back to our original point - how can Group Policy save your bacon?You know that zero day Internet Explorer Flash exploit that everyone has been making a big deal about this week? The one where hackers are targeting companies with valuable information and trying to get them to click on malicious links? Well, Group policy can be used to protect all of your users against this threat!How you ask? Well you can disable the Flash plugin for Internet Explorer in a Group Policy object, then apply it to all computers.But wait, there’s another way to use Group Policy to save your bacon against this exploit. SpiceHead “spiceuser” detailed a way to deny file access to a specific DLL file that the exploit needs to work, specifically VGX.dll in a GPO, then applying the object to all users. Then he instructs everyone to run GPUPDATE like I mentioned earlier… and Voila! Threat neutralized across however many computers you have in your environment.Let’s get back to our special guests for other GPO best practices…What are your top tips for managing users or computers using GPOs?What Is the coolest thing you have done using GPOs?What is a caveat that you have to remember with GPO?Do you want to have a lot of GPOs with only a few settings, or do you want to have fewer GPOs that encompass a ton of settings?Bill, how are Virtual machines useful when testing out Group Policy changes?