DESKTOP

Windows Server 2008 and Windows Vista : Benefits of Group Policy Preferences (part 2) - Working with Any Organizational Unit Design

1/18/2014 1:01:08 AM

3. Practical and Valuable Settings

Group Policy Preferences offer control over a computer that was only possible using scripts or third-party tools in the past. Even custom .adm templates could not accommodate some of the valuable settings that Group Policy Preferences provide. Some of the most useful settings include:

  • Drive mappings

  • Printer mappings

  • File and folder creation, deletion, and management

  • Local user account password modification

  • Service account password management

  • Browser-based registry management

  • Power scheme management

As companies try to meet security compliance regulations, make password management more efficient, and gain a higher return on IT investments, Group Policy Preferences and these valuable settings will be used frequently.

4. Reduced Desktop Images

Most companies have to create, maintain, and support multiple desktop images to meet the needs of unique departmental, application, and user environment configurations. In some cases companies must maintain images on 50 or more desktops.

Group Policy Preferences offer configuration management over many areas of the desktop that can dramatically reduce the need to have so many desktop images. By implementing Group Policy Preferences for applications, environment variables, files, folders, registry changes, mail profiles, and data sources, the total number of desktop images can be reduced by distributing these settings via Group Policy.

5. Reduced Need for Log-on Scripts

Most companies use log-on scripts to configure user settings and preferences related to network resources, including network drives and printers. Log-on scripts are also used to modify registry values, copy files, and manage folders. Log-on scripts are not reliable mechanisms for delivering these settings because they run only when a user is logging on. Users who keep their computers on for nightly maintenance often simply lock their computers, instead of logging off, before leaving work. In this scenario, changes to the log-on script are not applied.

A second issue with log-on scripts is the management of the scripts themselves. Most log-on scripts are batch files that have limited capabilities. Third-party tools are available to help you expand script capabilities, but their inconvenience may outweigh their benefits.

Group Policy Preferences provide an easy-to-configure interface, granular targeting, and detailed management of the common log-on script contents. Many companies have eliminated the log-on script completely and instead use Group Policy Preferences to perform these configurations.

6. Working with Any Organizational Unit Design

All Group Policy Preferences provide the advanced targeting feature called item-level targeting. This feature allows administrators to target any Group Policy Preferences setting, on a per-setting basis, using one or more targeting criteria. These criteria are shown in Figure 4.

Figure 4. Item-level targeting provides a granular method for ensuring that the correct users and computers receive the Group Policy Preferences setting.

7. Preferences vs. Policies

The term preferences has been used in relation to Group Policy to help define another Group Policy term, which is policies. These two terms are now exposed and used in the Group Policy Management Editor (GPME) interface to distinguish the two types of settings available in a GPO.

The most significant difference between the two terms is that preferences are not enforced. This means that when Group Policy applies a preference setting, the user of the computer can alter that setting. Policy settings are not alterable. This is because the location of the policy in the registry is secured. Another difference is that policy settings typically dim the setting in the user interface, preventing the user from making any modification to the setting.

Other areas where preferences and policies differ include:

  • Flexibility Preferences are very flexible, allowing for custom entries through the use of .adm templates, ADMX files, or Group Policy Registry settings. Policies are not easily created, because they require application support to function.

  • Local Group Policy Preferences are not included in local Group Policy settings. Policies are available in both local Group Policy and GPOs in Active Directory directory service.

  • Awareness Preferences are used for applications that are not Group Policy aware, whereas policies are used to support applications that are Group Policy aware.

  • Registry location and behavior Preferences are used to overwrite the original settings in the registry and are not removed when the GPO is deleted or when the object falls out of scope of management. Policies do not modify the original registry setting, but instead update values under one of the four Policies subkeys. When the object falls out of scope of management, the original setting is still intact and again controls the registry setting.

  • Targeting and filtering Preferences support item-level targeting. Policies support GPO-level Windows Management Instrumentation (WMI) filtering.

  • User interface Preferences are GUI based and user friendly; they usually duplicate the original interface for the application or feature being controlled. Policies are mostly text based, and in some cases you must test them to determine the outcome of the setting.

Table 1 summarizes the differences between preferences and policies within a GPO.

Table 1. Differences between Preferences and Policies
 Group Policy Preferences SettingsGroup Policy Policies Settings
EnforcementPreferences are not enforced.

The user interface is not disabled.

Settings can be refreshed or applied once.
Settings are enforced.

The user interface is disabled.

Settings are refreshed.
FlexibilityYou can easily create preference items for registry settings, files, and so on. You can import individual registry settings or entire registry branches from a local or remote computer.You cannot create policy settings to manage files, folders, and so on. Adding policy settings requires application support and creation of administrative templates.
Local Group PolicyNot available in local Group Policy.Available in local Group Policy.
AwarenessApplications that are not Group Policy–aware are supported.Group Policy–aware applications are required.
Registry location and behaviorOriginal settings are overwritten. Removing the preference item does not restore the original setting.Original settings are not changed.

Settings are stored in registry Policy branches.

Removing the policy setting restores the original settings
Targeting and filteringTargeting is granular, with a user interface for each type of targeting item. Supports targeting at the individual preference item level.Filtering is based on Windows WMI and requires writing WMI queries. Supports filtering at a GPO level.
User interfaceProvides a familiar, easy-to-use interface for configuring most settings.Provides an alternative user interface for most policy settings.
Other  
  •  Windows Server 2008 and Windows Vista : Creating Custom ADMX and ADML Files (part 4) - Using ADMX File Language
  •  Windows Server 2008 and Windows Vista : Creating Custom ADMX and ADML Files (part 3) - Core ADMX File Concepts
  •  Windows Server 2008 and Windows Vista : Creating Custom ADMX and ADML Files (part 2) - Core ADMX File Concepts
  •  Windows Server 2008 and Windows Vista : Creating Custom ADMX and ADML Files (part 1) - ADMX Schema , ADMX File Structure , ADML File Structure
  •  Windows 7 : Custom Libraries and Saved Searches (part 2) - Using Saved Searches
  •  Windows 7 : Custom Libraries and Saved Searches (part 1) - Creating Custom Libraries
  •  Windows 7 : Visualization and Organization - How to Make the Windows Shell Work for You - The Organizational Advantage of Libraries
  •  Windows 7 : Visualization and Organization - How to Make the Windows Shell Work for You
  •  Windows 7 : Understanding Libraries (part 2) - Special Shell Folders...Now Just User Folders
  •  Windows 7 : Understanding Libraries (part 1) - Virtual Folders 101, Libraries and Windows 7
  •  
    Top 10
    Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
    Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS