50255-E-Managing Windows Environments with Group Policy

50255-E-Managing Windows Environments with Group Policy

Ön Koşul

Bu kurs, yardım masası desteği, sistem yönetimi ve ağ tasarımından sorumlu Kurumsal ağ personeline yöneliktir.

Etkinlik Hedefi

Kurumsal bir BT altyapısının yönetimini Grup İlkesi ile nasıl birleştireceğinizi keşfedecek ve Windows Server ve Windows istemcileri çalıştıran bilgisayar sistemlerini ve etki alanı kullanıcılarını kontrol etmeyi ve yönetmeyi öğreneceksiniz.

Etkinlik İçeriği

Module 1: Introduction to Configuration Management Configure Windows Defender with Group Policy
This module describes the basis of what configuration management is and how it functions. Windows 8.1 Client Lock Screen and App Policies
Lessons After completing this module, students will be able to:
Configuration Management Overview Describe UAC
Configuration Management Using Group Policy Describe the AppLocker features
Group Policy Features Introduced with Later Versions of Windows Explain the features of Windows Apps
Using Windows PowerShell in the Configuration Management Process Module 8: Configuring the Desktop Environment with Group Policy
Lab : Introducing Configuration Management This module explains many of the settings that are available to configure and restrict the user desktop environment, such as
Boot and join the lab virtual machines to the domain Control Panel restrictions, Start Menu settings, and Windows Explorer configuration.
Explore the default Policy Settings Lessons
Explore Windows 10 and Windows Server 2016 interface Exploring Script Types and Controlling Script Execution
After completing this module, students will be able to: Defining the Desktop, Start Menu, and Taskbar Settings
Define configuration management Defining the Control Panel Settings
List the ways you can use configuration management in Windows Defining the Windows Components Settings
Describe the new Group Policy features available in the latest versions of Windows Configuring the Printer Management and Pruning Settings
Explain how PowerShell can be used with configuration management Defining the Network Settings
Module 2: Using Group Policy Management Tools Discovering the new Group Policy Settings
This module describes the differences between local and domain policies and the Group Policy management tools you can use to manage these policies. This module also describes the Group Policy refresh process and how to manually force a refresh ahead of the default interval. Lab : Configuring the Desktop Environment with Group Policy
Lessons Using Logon Scripts
Local and Domain Policies Configuring Desktop Settings
Using Group Policy Management Console Managing Windows Components
Understanding Group Policy Refresh Configuring Printers with Group Policy
Lab : Using Group Policy Management Tools Managing Network Settings
Working with Multiple Local Policies After completing this module, students will be able to:
Installing the GPMC on various Windows operating systems Describe the startup, shutdown, logon, and logoff scripts and settings.
Basic Group Policy Management techniques Identify the many ways to control the user desktop, Start menu, and taskbar settings
After completing this module, students will be able to: Explain how to restrict the Control Panel settings
Describe the advantages of using domain policies instead of local policies Explain how to restrict operations that users can perform in Windows Explorer, Windows Internet Explorer, and Remote Desktop Services
List the capabilities of the Group Policy Management Console Explain how to configure the printer management and pruning settings
Describe the requirements for installing the Group Policy Management Console Describe the network settings
Explain how to use the different GPMC features to create and manage policies Module 9: Implementing User State Virtualization
Describe the elements of the gpupdate command This module explains the different options available to maintain the user's personal files and settings.
Module 3: Designing a Group Policy Infrastructure Lessons
This module details the steps a successful Group Policy deployment should follow, linking your design to how your company can best use the features. Essential network components and security design are also defined. Configuring Folder Redirection
Lessons Managing Offline Files
Design Stages for a Group Policy Infrastructure Implementing User Experience Virtualization
Planning your Group Policy Design OneDrive for Business
Designing Your Group Policy Solution Lab : Implementing User State Virtualization
Deploying Your Group Policy Solution Preparing for Folder Redirection,Offline Files, and UE-V
Managing Your Group Policy Solution Configuring Folder Redirection
Lab : Designing a Group Policy Infrastructure Managing Offline Files
Creating an OU Structure for Group Policy Implementing User Experience Virtualization
Delegating GPO Management After completing this module, students will be able to:
Creating Starter GPOs Explain how to redirect user folders to a server
Using the AGPM to manage policies Describe the Offline Files feature
After completing this module, students will be able to: Explain the purpose of User Experience Virtualization
Describe the four stages of implementing Group Policy Describe the OneDrive for Business feature
Explain how to plan Group Policy in accordance with a company's requirements Module 10: Assigning and Publishing Software Packages
Describe the guidelines that you should follow when you create new GPOs This module explains how to use Group Policy for deploying software.
Explain how to manage Group Policy by delegating administration and setting permissions Lessons
Module 4: Understanding the Architecture of Group Policy Processing Using MSI Packages to Distribute Software
This module details the concepts that you must grasp in order to troubleshoot Group Policy. The module also describes the options that are available to change the standard Group Policy processing sequence. Using Group Policy as a Software Deployment Method
Lessons Deploying Software
Group Policy Components in AD DS Setting Up Distribution Points
Understanding the Group Policy Deployment Order Using the Systems Center Configuration Manager to Distribute Software
Modifying Group Policy Processing Lab : Assigning and Publishing Software Packages
Lab : Understanding the Group Policy Processing Architecture Creating a Shared Directory Structure on a Server
Working with Multiple GPO Levels Creating a Custom MSI package
Using the Block Inheritance and Enforce Options Repackaging an Existing Install Package
Implementing Security Filtering Deploying Software Packages with a GPO
Creating a WMI Filter After completing this module, students will be able to:
Working with Loopback Processing Describe the basic elements of an MSI package
After completing this module, students will be able to: Determine when to build or repackage your own
Describe the Active Directory components that you can use to deploy Group Policy Define the requirements for distributing software via Group Policy
Explain the order in which Group Policy is deployed in Active Directory Describe when you might want to assign and publish software
Describe the methods that are available to modify Group Policy processing Explain how to upgrade and remove packages
Module 5: Troubleshooting and Backing Up GPOs Explain how to set up distribution points for software deployment
This module explains how to use the RSoP tools to determine whether policies are being processed in the correct manner. This module discusses how to use the available tools to troubleshoot policy issues; back up, restore, import, copy, and search for GPOs; and migrate GPOs from one domain to another. List the advantages of using SCCM to distribute software instead of Group Policy
Lessons Module 11: Configuration Management with Windows PowerShell
Using Group Policy Troubleshooting Tools This module explains how to navigate and use basic Windows PowerShell commands and how to use Windows PowerShell to manage Group Policy. It also explains how you can use PowerShell logon scripts with Group Policy.
Integration of RSoP Functionality Lessons
Group Policy Logging Options Introducing Windows PowerShell
Backing Up, Restoring, Importing, and Copying GPOs Using Windows PowerShell
Building Migration Tables Writing PowerShell Scripts
Lab : Troubleshooting and Backing Up GPOs Windows PowerShell Library for Group Policy
Using Tools for Troubleshooting Windows PowerShell-Based Logon Scripts
Backing Up and Restoring GPOs Lab : Configuration Management with Windows PowerShell
Use Command Line Tools to Perform GPO Maintenance Exploring the Windows PowerShell
After completing this module, students will be able to: Using Windows PowerShell to Manage GPOs
Describe the Group Policy troubleshooting tools After completing this module, students will be able to:
Describe the GPMC tools that have RSoP functionality Describe the Windows PowerShell features
Describe the GPO logging tools used to obtain more detail about the GPO processing issues Explain how to perform the basic Windows PowerShell operations
Explain how to back up, restore, import, and copy GPOs using the GPMC Explain how to access the Windows PowerShell library for Group Policy
Explain how to build migration tables Manage systems using PowerShell commands
Module 6: Securing Windows Using Group Policy Module 12: Implementing PowerShell Desired State Configuration
This module defines the Windows security model and describes the process of using Group Policy to implement user account, computer account, and domain security. This module will describe what DSC is all about and how to implement DSC to manage systems on the network.
Lessons Lessons
Exploring the Windows Security Architecture Introducing Group Policy Preferences
Securing User Accounts Comparing Preferences and Policy Settings
Exploring Security Policies Options for Applying Preferences
Windows Firewall with Advanced Security Configure Preference Settings
Implementing Domain Security Lab : Using PowerShell Desired State Configuration
Security Policy Options for Window Client and Windows Server Write a PowerShell Desired State Configuration Script
Lab : Securing Windows Using Group Policy Create a DSC
Using the Security Compliance Manager Implement DSC
Managing Auditing with a GOP After completing this module, students will be able to:
Create and Test Restricted Groups Describe the purpose of Group Policy Preferences
Implement Security Templates Explain the differences between Preferences and Policy Settings
Creating a Windows Firewall Policy Describe the Windows and Control Panel Settings
After completing this module, students will be able to: List Advanced Preferences Configuration Options
Describe the Windows security architecture Module 13: Configuring Group Policy Preferences
Explain how to secure user accounts with Group Policy This module describes the function of Group Policy Preferences. You will learn how to combine Preferences and Policies, and how Preferences are different from Policies.
Explain how to harden computer accounts Lessons
Explain how to control the domain security policy with a GPO Introducing Group Policy Preferences
Module 7: Implementing Application Security Using Group Policy Comparing Preferences and Policy Settings
This module describes the process of securing applications in a Windows environment. It also explains how to implement UAC (User Account Control) to help prevent users from running unauthorized software, reducing the likelihood that viruses, Trojan horses, or spyware that might intrude upon the environment. Options for Applying Preferences
Lessons Configuring Preferences Settings
Managing UAC Settings Lab : Configuring Group Policy Preferences
Defending Against Malware Implementing Computer Preferences
Using AppLocker to Restrict Software Implementing User Preferences
Implementing Windows App Security Settings After completing this module, students will be able to:
Lab : Implementing Application Security Using Group Policy Describe the purpose of Group Policy Preferences
Implementing UAC Describe the differences between Preferences and Policy Settings
Using AppLocker to Restrict Software Identify the settings that you can configure in the Computer Configuration and User Configuration sections of the Group Policy Management Console
  Describe the Windows and Control Panel settings

 

Mail WhatsApp Telefon