SlideShare ist ein Scribd-Unternehmen logo
1 von 16
How to Troubleshoot Group
Policy in Windows 10
© Global Knowledge Training LLC. All rights reserved. Page 2
Lesson 1: Overview of Group Policy Application
Options for Deploying Configuration Settings with Group Policies
Processing Group Policies
Modifying the Group Policy Processing Order
Group Policy Filtering
Loopback Processing
Synchronous and Asynchronous Processing of GPOs
© Global Knowledge Training LLC. All rights reserved. Page 3
Options for Deploying Configuration Settings with
Group Policies
• You can apply Group Policy settings when you:
• Manage settings manually in the local GPO
• Use AD DS to distribute the settings
• Group Policy settings consist of:
• Computer configuration
• User configuration
• Policy settings
• Preferences
© Global Knowledge Training LLC. All rights reserved. Page 4
Processing Group Policies
• Computer settings are applied at startup and then
at regular intervals, while user settings are applied
at sign-in and then at regular intervals
• Group Policy processing order:
1. Local GPOs
2. Site-level GPOs
3. Domain GPOs
4. OU GPOs
Order of processing
© Global Knowledge Training LLC. All rights reserved. Page 5
Modifying the Group Policy Processing Order
• The last processed GPO has highest precedence
• Other options that affect precedence:
• Link Order
• Enforced
• Block Inheritance
• Link Enabled
© Global Knowledge Training LLC. All rights reserved. Page 6
Group Policy Filtering
© Global Knowledge Training LLC. All rights reserved. Page 7
Loopback Processing
© Global Knowledge Training LLC. All rights reserved. Page 8
Synchronous and Asynchronous Processing of
GPOs
• Default processing of
Group Policy on
Windows Servers
• Group Policy for
computer is processed
prior to logon
• Group Policy for users
is processed before
the shell is active
• Ensures reliable
processing of Group
Policy
Synchronous
• Default processing of
Group Policy on client
computers
• Client computers do
not wait for network
before fully initializing
• Existing users are
logged on using
cached credentials
• Group Policy is applied
in the background
• Results in shorter
logon period
Asynchronous
© Global Knowledge Training LLC. All rights reserved. Page 9
Lesson 2: Resolving Client-Configuration Failures
and GPO Application Issues
Identifying How GPO Settings Take Effect
Ways to Resolve GPO Application Issues
Tools for Troubleshooting RSoP
Examining Event Logs for GPO Events
Resolving GPO Application Failures
© Global Knowledge Training LLC. All rights reserved. Page 10
Identifying How GPO Settings Take Effect
• The following process is required to apply Group Policy settings:
• GPO replication
• Replicate group changes
• Refresh Group Policy
• Options to initiate Group Policy setting preferences:
• User can sign in, sign out, or restart the computer
• Start a manual refresh
• Most client-side extensions do not reapply unchanged GPO
settings
© Global Knowledge Training LLC. All rights reserved. Page 11
Ways to Resolve GPO Application Issues
To troubleshoot GPO settings, you should:
• Determine whether the GPO was sent to the
correct computer, user account, or OU
• Enable loopback processing for special use
computers
• Force a GPO to take effect with gpupdate /force
• Restart the computer
© Global Knowledge Training LLC. All rights reserved. Page 12
Tools for Troubleshooting RSoP
© Global Knowledge Training LLC. All rights reserved. Page 13
Examining Event Logs for GPO Events
© Global Knowledge Training LLC. All rights reserved. Page 14
Resolving GPO Application Failures
• Verify that the client computer is connected and
authenticated
• Verify that the GPO is assigned properly to the
computer or user
• Verify that the GPO configuration has the proper
settings
© Global Knowledge Training LLC. All rights reserved. Page 15
Lab Demo: Generating GPO Results Report.
Exercise 1: Using GPMC to generate reports
Exercise 2: Using command prompt to generate report.
Logon Information
Virtual machines: 10982C-LON-DC1
10982C-LON-CL1
User name: AdatumAdministrator
Password: Pa55w.rd
Estimated Time: 10 Minutes
© Global Knowledge Training LLC. All rights reserved. Page 16
Course
Supporting and
Troubleshooting
Windows 10 (M10982)

Weitere ähnliche Inhalte

Was ist angesagt?

Group Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierGroup Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierSpiceworks Ziff Davis
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy ConceptsRob Dunn
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2IGZ Software house
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1denogx
 

Was ist angesagt? (6)

Group Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierGroup Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life Easier
 
Group Policy
Group PolicyGroup Policy
Group Policy
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy Concepts
 
70 640 Lesson07 Ppt 041009
70 640 Lesson07 Ppt 04100970 640 Lesson07 Ppt 041009
70 640 Lesson07 Ppt 041009
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1
 

Ähnlich wie How to Troubleshoot Group Policy in Windows 10

Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11gameaxt
 
(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory PwnagePetros Koutroumpis
 
Chapter09 Implementing And Using Group Policy
Chapter09      Implementing And  Using  Group  PolicyChapter09      Implementing And  Using  Group  Policy
Chapter09 Implementing And Using Group PolicyRaja Waseem Akhtar
 
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09   Group Policy - Eric VanderburgNetwork Implementation and Support Lesson 09   Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09 Group Policy - Eric VanderburgEric Vanderburg
 
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesMark Skurla
 
Postgres Point-in-Time Recovery
Postgres Point-in-Time RecoveryPostgres Point-in-Time Recovery
Postgres Point-in-Time RecoveryEDB
 
Arcelor Mittal intern
Arcelor Mittal internArcelor Mittal intern
Arcelor Mittal internAnshul Jain
 
Environment Manager Policy
Environment Manager PolicyEnvironment Manager Policy
Environment Manager PolicyIvanti
 
Process improvement in computer system.pptx
Process improvement in computer system.pptxProcess improvement in computer system.pptx
Process improvement in computer system.pptxAnnieRoseDulang
 
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...Software AG
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13APSU
 
Adaptiva Green Planet
Adaptiva Green PlanetAdaptiva Green Planet
Adaptiva Green PlanetAdaptiva
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business ContinuityDr. Ahmed Al Zaidy
 
CTU June 2011 - Guided Hands on Lab on GPO - GPP
CTU June 2011 - Guided Hands on Lab on GPO - GPPCTU June 2011 - Guided Hands on Lab on GPO - GPP
CTU June 2011 - Guided Hands on Lab on GPO - GPPSpiffy
 
093049ov10.pptx
093049ov10.pptx093049ov10.pptx
093049ov10.pptxNguyenNM
 

Ähnlich wie How to Troubleshoot Group Policy in Windows 10 (20)

Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
 
Group policy objects
Group policy objectsGroup policy objects
Group policy objects
 
(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage
 
Chapter09 Implementing And Using Group Policy
Chapter09      Implementing And  Using  Group  PolicyChapter09      Implementing And  Using  Group  Policy
Chapter09 Implementing And Using Group Policy
 
70 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 04100970 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 041009
 
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09   Group Policy - Eric VanderburgNetwork Implementation and Support Lesson 09   Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
 
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
 
Postgres Point-in-Time Recovery
Postgres Point-in-Time RecoveryPostgres Point-in-Time Recovery
Postgres Point-in-Time Recovery
 
Arcelor Mittal intern
Arcelor Mittal internArcelor Mittal intern
Arcelor Mittal intern
 
Environment Manager Policy
Environment Manager PolicyEnvironment Manager Policy
Environment Manager Policy
 
Process improvement in computer system.pptx
Process improvement in computer system.pptxProcess improvement in computer system.pptx
Process improvement in computer system.pptx
 
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...
 
BRE Deep Dive
BRE Deep DiveBRE Deep Dive
BRE Deep Dive
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
Adaptiva Green Planet
Adaptiva Green PlanetAdaptiva Green Planet
Adaptiva Green Planet
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business Continuity
 
Trade Promotion Management in the cloud.
Trade Promotion Management in the cloud.Trade Promotion Management in the cloud.
Trade Promotion Management in the cloud.
 
CTU June 2011 - Guided Hands on Lab on GPO - GPP
CTU June 2011 - Guided Hands on Lab on GPO - GPPCTU June 2011 - Guided Hands on Lab on GPO - GPP
CTU June 2011 - Guided Hands on Lab on GPO - GPP
 
093049ov10.pptx
093049ov10.pptx093049ov10.pptx
093049ov10.pptx
 

Mehr von Global Knowledge Training

PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywhereGlobal Knowledge Training
 
Why Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceWhy Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceGlobal Knowledge Training
 
Develop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningDevelop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningGlobal Knowledge Training
 
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Global Knowledge Training
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyGlobal Knowledge Training
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksGlobal Knowledge Training
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationGlobal Knowledge Training
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationGlobal Knowledge Training
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?Global Knowledge Training
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success Global Knowledge Training
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementGlobal Knowledge Training
 

Mehr von Global Knowledge Training (20)

Taking Advantage of Microsoft PowerShell
Taking Advantage of Microsoft PowerShell Taking Advantage of Microsoft PowerShell
Taking Advantage of Microsoft PowerShell
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention Everywhere
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Accelerating with Ansible
Accelerating with AnsibleAccelerating with Ansible
Accelerating with Ansible
 
Why Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceWhy Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD Workforce
 
How to Maximize Your Training Budget
How to Maximize Your Training BudgetHow to Maximize Your Training Budget
How to Maximize Your Training Budget
 
Develop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningDevelop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online Learning
 
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification Journey
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
How to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS LambdaHow to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS Lambda
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your Organization
 
How to Migrate a Web App to AWS
How to Migrate a Web App to AWSHow to Migrate a Web App to AWS
How to Migrate a Web App to AWS
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your Organization
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People Management
 

Kürzlich hochgeladen

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Kürzlich hochgeladen (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

How to Troubleshoot Group Policy in Windows 10

  • 1. How to Troubleshoot Group Policy in Windows 10
  • 2. © Global Knowledge Training LLC. All rights reserved. Page 2 Lesson 1: Overview of Group Policy Application Options for Deploying Configuration Settings with Group Policies Processing Group Policies Modifying the Group Policy Processing Order Group Policy Filtering Loopback Processing Synchronous and Asynchronous Processing of GPOs
  • 3. © Global Knowledge Training LLC. All rights reserved. Page 3 Options for Deploying Configuration Settings with Group Policies • You can apply Group Policy settings when you: • Manage settings manually in the local GPO • Use AD DS to distribute the settings • Group Policy settings consist of: • Computer configuration • User configuration • Policy settings • Preferences
  • 4. © Global Knowledge Training LLC. All rights reserved. Page 4 Processing Group Policies • Computer settings are applied at startup and then at regular intervals, while user settings are applied at sign-in and then at regular intervals • Group Policy processing order: 1. Local GPOs 2. Site-level GPOs 3. Domain GPOs 4. OU GPOs Order of processing
  • 5. © Global Knowledge Training LLC. All rights reserved. Page 5 Modifying the Group Policy Processing Order • The last processed GPO has highest precedence • Other options that affect precedence: • Link Order • Enforced • Block Inheritance • Link Enabled
  • 6. © Global Knowledge Training LLC. All rights reserved. Page 6 Group Policy Filtering
  • 7. © Global Knowledge Training LLC. All rights reserved. Page 7 Loopback Processing
  • 8. © Global Knowledge Training LLC. All rights reserved. Page 8 Synchronous and Asynchronous Processing of GPOs • Default processing of Group Policy on Windows Servers • Group Policy for computer is processed prior to logon • Group Policy for users is processed before the shell is active • Ensures reliable processing of Group Policy Synchronous • Default processing of Group Policy on client computers • Client computers do not wait for network before fully initializing • Existing users are logged on using cached credentials • Group Policy is applied in the background • Results in shorter logon period Asynchronous
  • 9. © Global Knowledge Training LLC. All rights reserved. Page 9 Lesson 2: Resolving Client-Configuration Failures and GPO Application Issues Identifying How GPO Settings Take Effect Ways to Resolve GPO Application Issues Tools for Troubleshooting RSoP Examining Event Logs for GPO Events Resolving GPO Application Failures
  • 10. © Global Knowledge Training LLC. All rights reserved. Page 10 Identifying How GPO Settings Take Effect • The following process is required to apply Group Policy settings: • GPO replication • Replicate group changes • Refresh Group Policy • Options to initiate Group Policy setting preferences: • User can sign in, sign out, or restart the computer • Start a manual refresh • Most client-side extensions do not reapply unchanged GPO settings
  • 11. © Global Knowledge Training LLC. All rights reserved. Page 11 Ways to Resolve GPO Application Issues To troubleshoot GPO settings, you should: • Determine whether the GPO was sent to the correct computer, user account, or OU • Enable loopback processing for special use computers • Force a GPO to take effect with gpupdate /force • Restart the computer
  • 12. © Global Knowledge Training LLC. All rights reserved. Page 12 Tools for Troubleshooting RSoP
  • 13. © Global Knowledge Training LLC. All rights reserved. Page 13 Examining Event Logs for GPO Events
  • 14. © Global Knowledge Training LLC. All rights reserved. Page 14 Resolving GPO Application Failures • Verify that the client computer is connected and authenticated • Verify that the GPO is assigned properly to the computer or user • Verify that the GPO configuration has the proper settings
  • 15. © Global Knowledge Training LLC. All rights reserved. Page 15 Lab Demo: Generating GPO Results Report. Exercise 1: Using GPMC to generate reports Exercise 2: Using command prompt to generate report. Logon Information Virtual machines: 10982C-LON-DC1 10982C-LON-CL1 User name: AdatumAdministrator Password: Pa55w.rd Estimated Time: 10 Minutes
  • 16. © Global Knowledge Training LLC. All rights reserved. Page 16 Course Supporting and Troubleshooting Windows 10 (M10982)

Hinweis der Redaktion

  1. Provide an overview of the lesson.
  2. This topic should be a review for most students. Cover this content quickly, unless the students are unfamiliar with local GPOs.
  3. Use this topic to ensure that students understand the basic process for GPO application, and that GPOs at the organizational unit (OU) level override domain-level GPOs. Additionally, be sure to mention security filtering, Windows Management Instrumentation (WMI) filtering, and slow-link processing as exceptions to the default processing order.
  4. Explain that there are exceptions to the typical precedence in Group Policy processing, and then describe when you would use each of the options that the slide lists: Link Order. Use to ensure that a specific GPO that is linked to an OU has precedence on that OU. Enforced. Use to apply standardized settings for an OU or department. Block Inheritance. Use to allow a department to operate independently of the GPOs applied in the rest of the OU. Link Enabled. Use to disable processing of a GPO during troubleshooting.
  5. Explain security and WMI filtering, and the effect of both on Group Policy processing. Mention that with WMI filtering, the client computer evaluates the filter to determine whether to apply Group Policy. However, with security filtering, the domain controller decides whether to apply Group Policy. Mention that, therefore, the result is that the Group Policy does not apply to all users or computers in the same part of Active Directory Domain Services (AD DS).
  6. Explain to students that you do not use loopback processing for most computers. Rather, you use it only for specific scenarios when you need to modify the normal user configuration. Discuss with students why this is useful for settings such as classrooms or conference room.
  7. The key concept for students to understand from this topic is that the asynchronous processing that Windows 10 uses might result in the Windows operating system delaying the application of GPO settings, because users might need to reboot the computer before the settings take effect.
  8. Provide an overview of the lesson.
  9. Use this slide to summarize the details regarding when GPO settings take effect. This should answer questions such as, “When do I change a policy setting,” and “When will that setting actually apply to a user or computer?“ Do not provide too much detail about the replication technologies themselves, but rather, point out that both the Group Policy container and Group Policy template must replicate to the domain controller from which a client obtains its policies. Point out that the Group Policy container and Group Policy template use different replication technologies that are not always synchronized. Other points to make: We recommend that organizations implement the Always Wait For Network At Startup And Logon policy setting. Otherwise, a change to a policy setting might take several signin/signout or restart cycles before it takes effect, and it is not possible to predict how long this will take. To manage the application of new policy settings effectively, enable Always Wait For Network At Startup And Logon. Make sure that students understand that this does not slow down the startup or signin process significantly. Users will not complain that it is noticeably slower. Also, make sure that students understand that when a system is not connected to the network, it ignores this setting, so this setting is not applied to disconnected laptop users. Users cannot change most policy settings, particularly managed policy settings. However, if users are administrators of their machines, it is possible for them to change some settings. Those changes will never be reverted to match the settings that the GPOs specify, because most client-side extensions will reapply policy settings only when a GPO has changed. The exceptions to this rule are security settings, which reapply every 16 hours, regardless of whether the GPO has changed. If your organization is concerned about enforcing its policy settings, and if it is possible for users to change those settings, then you should configure the client-side extensions to reapply policy settings even if the GPO has not changed. You can use Group Policy to configure the policy processing behavior of each client-side extension.
  10. This topic lists some common ways that you can resolve GPO application issues. If you have experience with resolving GPO application issues, include additional troubleshooting tips based on your experience. Students also might have methods that they wish to share. Point out to students that they used the gpupdate /force command in the previous practice demonstration.
  11. Consider demonstrating the three major logs in which you can find Group Policy events. Point out that RSoP reports also display Group Policy events, particularly in the Advanced view. Mention that the Group Policy Operational log is a great way to learn exactly how Group Policy applies to Windows operating systems.
  12. Use this topic as an opportunity to reinforce the lesson’s contents before beginning the lab.
  13. Exercise 1: Resolving Group Policy Application (1) In this exercise, you will resolve the reported GPO application problem that tier 1 help-desk staff could not resolve. Note: For the complete exercise scenario, please refer to the student guide.