DESKTOP

Windows Server 2008 and Windows Vista : Item-Level Targeting (part 6) - Security Group,WMI Query

3/27/2014 2:13:26 AM
Security Group

A Security Group targeting item, shown in Figure 18, allows a preference item to be applied to computers or users only if the processing computer or user is a member of the group specified in the targeting item and, optionally, only if the specified group is the primary group for the processing computer or user. The group’s security identifier is used to determine group membership, not the display name of the group. The types of groups that are supported include:

  • Domain groups

    • Global groups

    • Universal groups

  • Local groups

    • Local groups (including built-in groups)

    • Domain local groups

    • Well-known groups

Figure 18. You can use a Security Group item in item-level targeting for Group Policy Preferences.

Site

A Site targeting item allows a preference item to be applied to computers or users only if the processing computer is in the site in Active Directory specified in the targeting item. The Site box accepts preference processing variables. Press F3 to display the Select a Variable dialog box, which lists the system-defined variables from which you can select.

Terminal Session

A Terminal Session targeting item allows a preference item to be applied to users only if the processing user is logged on to a terminal services session with the settings specified in the targeting item.

Time Range

A Time Range targeting item allows a preference item to be applied to computers or users only if the current time on the end user’s computer is within the time range specified in the targeting item.

User

A User targeting item, shown in Figure 19, allows a preference item to be applied to users only if the processing user is the user specified in the targeting item. When the Match by SID option is enabled, you must browse to select the user. If you do not select Match by SID, a string match is performed. Although the domain and user name of that user at the time of selection are displayed, the targeting item saves the user’s SID for comparison to that of the processing user. The User text box accepts preference processing variables. Press F3 to display the Select a Variable dialog box, which lists the system-defined variables from which you can select.

Figure 19. You can use a User item in item-level targeting for Group Policy Preferences.

Note

User targeting is available only for preference items under User Configuration.


WMI Query

A WMI Query targeting item, shown in Figure 20, allows a preference item to be applied to computers or users only if the processing computer evaluates the WMI query as true. If any of the value is returned from the query, the filter will return true.

Figure 20. You can use a WMI Query item in item-level targeting for Group Policy Preferences.


Note

For all of the item-level targeting items, text boxes for Computer Name (NetBIOS only), Domain, Site, Terminal Session, and User (if not matched by SID) accept single-character (?) and multiple-character (*) wildcards.

Other  
  •  Windows Server 2008 and Windows Vista : Advanced Group Policy Preferences Settings - Action Modes, Common Tab
  •  The Gaming Mouse: Ozone Neon
  •  Windows 8 : Understanding product editions, architectures, and hardware requirements
  •  Windows 8 Architecture from a Developer’s Point of View : Picking the Appropriate Technology for Your Project
  •  Windows 8 Architecture from a Developer’s Point of View : .NET Framework 4.5
  •  Windows Server 2008 R2 Powershell Cmdlets (part 6) - Windows Server Backup cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 5) - Server Manager cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 4) - Group Policy cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 3) - Failover Cluster cmdlets
  •  Windows Server 2008 R2 Powershell Cmdlets (part 2) - AppLocker cmdlets
  •  
    Top 10
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
    Java Tutorials : Nested For Loop (part 1)
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS