Description

In this course professionals will learn how to reduce costs and increase efficiencies in your network. Professionals will get to know how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and professionals will learn to manage as well as control computer systems as well as domain users running Windows clients and Windows Server. Create Group Policies, security templates and execute administrative, and determine best practices when deploying software packages. Walk away with the tools as well as experience required to enhance your enterprise systems and networks. Execute security templates and administrative, and determine best practices when deploying software packages. Walk away with the tools and experience required to enhance your enterprise networks and systems.

 

Radiant Teachlearning offers Managing Windows Environments with Group Policy Training Program in Classroom and Virtual instructor Led/Online mode.

 

Duration: 5 days

 

Learning Objectives

After accomplishing this course, professionals will be able to:

  • Features and functions of Group Policy
  • Utilize Group Policy management tools to manage and maintain security policies.
  • Design a Group Policy infrastructure
  • Group Policy processing architecture
  • Back up, import, copy, and restore Group Policy Objects through Group Policy
  • Management Console
  • Use Windows PowerShell to manage Group Policy
  • Implement security using Group Policy
  • Configure the desktop environment with Group Policy
  • Configure roaming profiles and Folder Redirection
  • Assign and publish software packages
  • Implement AppLocker and software restriction policies
  • Create and deploy Administrative Templates
  • Configure Group Policy preferences

Pre-requisite

Before attending this course, professionals must have:

  • Experience with the Microsoft Windows Server 2008/2012 environments and a basic acknowledging of Active Directory.

 

Audience Profile

This training program is intended for Enterprise network staff responsible for help system administration, network design and desk support.

Course Content

Lesson 1: Introduction to Configuration Management

This lesson explains the basis of what configuration management is and how it functions.

Lessons

  • Configuration Management Overview
  • Configuration Management Using Group Policy
  • Group Policy Features Introduced with Later Versions of Windows
  • Using Windows PowerShell in the Configuration Management Process

Lab: Introducing Configuration Management

  • Boot and join the lab virtual machines to the domain
  • Explore the default Policy Settings
  • Explore Windows 10 and Windows Server 2016 interface

After accomplishing this lesson, professionals will be able to:

  • Define configuration management
  • List the ways professionals can use configuration management in Windows
  • Explain the new Group Policy features available in the latest versions of Windows
  • Describe how PowerShell can be used with configuration management

 

Lesson 2: Using Group Policy Management Tools

This lesson explains the differences between local and domain policies and the Group Policy management tools professionals can use to manage these policies. This lesson also explains the Group Policy refresh process and how to manually force a refresh ahead of the default interval.

Lessons

  • Local and Domain Policies
  • Using Group Policy Management Console
  • Acknowledging Group Policy Refresh

Lab: Using Group Policy Management Tools

  • Working with Multiple Local Policies
  • Installing the GPMC on various Windows operating systems
  • Basic Group Policy Management techniques

After accomplishing this lesson, professionals will be able to:

  • Explain the advantages of using domain policies instead of local policies
  • List the capabilities of the Group Policy Management Console
  • Explain the requirements for installing the Group Policy Management Console
  • Describe how to use the different GPMC features to create and manage policies
  • Explain the elements of the gpupdate command

 

Lesson 3: Designing a Group Policy Infrastructure

This lesson details the steps a successful Group Policy deployment should follow, linking your design to how your company can best use the features. Important network security and components design are also defined.

Lessons

  • Design Stages for a Group Policy Infrastructure
  • Planning your Group Policy Design
  • Designing Your Group Policy Solution
  • Deploying Your Group Policy Solution
  • Managing Your Group Policy Solution

Lab: Designing a Group Policy Infrastructure

  • Creating an OU Structure for Group Policy
  • Delegating GPO Management
  • Creating Starter GPOs
  • Using the AGPM to manage policies

After accomplishing this lesson, professionals will be able to:

  • Explain the four stages of implementing Group Policy
  • Describe how to plan Group Policy in accordance with a company’s requirements
  • Explain the guidelines that professionals should follow when professionals create new GPOs
  • Describe how to manage Group Policy by delegating administration and setting permissions

 

Lesson 4: Acknowledging the Architecture of Group Policy Processing

This lesson details the concepts that professionals must grasp in order to troubleshoot Group Policy. The lesson also explains the options that are available to change the standard Group Policy processing sequence.

Lessons

  • Group Policy Components in AD DS
  • Acknowledging the Group Policy Deployment Order
  • Modifying Group Policy Processing

Lab: Acknowledging the Group Policy Processing Architecture

  • Working with Multiple GPO Levels
  • Using the Block Inheritance and Enforce Options
  • Implementing Security Filtering
  • Creating a WMI Filter
  • Working with Loopback Processing

After accomplishing this lesson, professionals will be able to:

  • Explain the Active Directory components that professionals can use to deploy Group Policy
  • Describe the order in which Group Policy is deployed in Active Directory
  • Explain the methods that are available to modify Group Policy processing

 

Lesson 5: Troubleshooting and Backing Up GPOs

This lesson describes how to use the RSoP tools to determine whether policies are being processed in the correct manner. This lesson discusses way to utilize the available tools to solve policy issues; restore, copy, back up, import, and search for GPOs; and migrate GPOs from one domain to another.

Lessons

  • Using Group Policy Troubleshooting Tools
  • Integration of RSoP Functionality
  • Group Policy Logging Options
  • Backing Up, Restoring, Importing, and Copying GPOs
  • Building Migration Tables

Lab: Troubleshooting and Backing Up GPOs

  • Using Tools for Troubleshooting
  • Backing Up and Restoring GPOs
  • Use Command Line Tools to Perform GPO Maintenance

After accomplishing this lesson, professionals will be able to:

  • Explain the Group Policy troubleshooting tools
  • Explain the GPMC tools that have RSoP functionality
  • Explain the GPO logging tools used to obtain more detail about the GPO processing issues
  • Describe how to back up, restore, import, and copy GPOs using the GPMC
  • Describe how to build migration tables

 

Lesson 6: Securing Windows Using Group Policy

This lesson defines the Windows security model and explains the process of using Group Policy to implement user account, computer account, and domain security.

Lessons

  • Exploring the Windows Security Architecture
  • Securing User Accounts
  • Exploring Security Policies
  • Windows Firewall with Advanced Security
  • Implementing Domain Security
  • Security Policy Options for Window Client and Windows Server

Lab: Securing Windows Using Group Policy

  • Using the Security Compliance Manager
  • Managing Auditing with a GOP
  • Create and Test Restricted Groups
  • Implement Security Templates
  • Creating a Windows Firewall Policy

After accomplishing this lesson, professionals will be able to:

  • Explain the Windows security architecture
  • Describe how to secure user accounts with Group Policy
  • Describe how to harden computer accounts
  • Describe how to control the domain security policy with a GPO

 

Lesson 7: Implementing Application Security Using Group Policy

This lesson explains the process of securing applications in a Windows environment. It also describes how to implement UAC (User Account Control) to help prevent users from running unauthorized software, reducing the likelihood that viruses, Trojan horses, or spyware that might intrude upon the environment.

Lessons

  • Managing UAC Settings
  • Defending Against Malware
  • Using AppLocker to Restrict Software
  • Implementing Windows App Security Settings

Lab: Implementing Application Security Using Group Policy

  • Implementing UAC
  • Using AppLocker to Restrict Software
  • Configure Windows Defender with Group Policy
  • Windows 8.1 Client Lock Screen and App Policies

After accomplishing this lesson, professionals will be able to:

  • Explain UAC
  • Explain the AppLocker features
  • Describe the features of Windows Apps

 

Lesson 8: Configure Desktop Environment with Group Policy

This lesson describes variety of the settings that are available to restrict as well as configure the user desktop environment, for example Windows Explorer configuration, Control Panel restrictions, and Start Menu settings.

Lessons

  • Exploring Script Types and Controlling Script Execution
  • Defining the Start Menu, Taskbar Settings, and Desktop
  • Defining the Control Panel Settings
  • Defining the Windows Components Settings
  • Configuring the Printer Management and Pruning Settings
  • Defining the Network Settings
  • Discovering the new Group Policy Settings

Lab: Configuring the Desktop Environment with Group Policy

  • Using Logon Scripts
  • Configuring Desktop Settings
  • Managing Windows Components
  • Configuring Printers with Group Policy
  • Managing Network Settings

After accomplishing this lesson, professionals will be able to:

  • Explain the shutdown, logoff scripts, startup, and logon and settings.
  • Identify the ways to control the user Start menu, taskbar settings, and desktop
  • Describe how to restrict the Control Panel settings
  • Describe how to restrict operations that users can perform in Windows Explorer, Windows Internet Explorer, and Remote Desktop Services
  • Describe how to configure the printer management and pruning settings
  • Explain the network settings

 

Lesson 9: Implementing User State Virtualization

This lesson describes the different options available to maintain the user’s personal files and settings.

Lessons

  • Configuring Folder Redirection
  • Managing Offline Files
  • Implementing User Experience Virtualization
  • OneDrive for Business

Lab: Implementing User State Virtualization

  • Preparing for Folder Redirection,Offline Files, and UE-V
  • Configuring Folder Redirection
  • Managing Offline Files
  • Implementing User Experience Virtualization

After accomplishing this lesson, professionals will be able to:

  • Describe how to redirect user folders to a server
  • Explain the Offline Files feature
  • Describe the purpose of User Experience Virtualization
  • Explain the OneDrive for Business feature

 

Lesson 10: Assigning and Publishing Software Packages

This lesson describes how to use Group Policy for deploying software.

Lessons

  • Using MSI Packages to Distribute Software
  • Using Group Policy as a Software Deployment Method
  • Deploying Software
  • Setting Up Distribution Points
  • Using the Systems Center Configuration Manager to Distribute Software

Lab: Assigning and Publishing Software Packages

  • Creating a Shared Directory Structure on a Server
  • Creating a Custom MSI package
  • Repackaging an Existing Install Package
  • Deploying Software Packages with a GPO

After accomplishing this lesson, professionals will be able to:

  • Explain the basic elements of an MSI package
  • Determine when to build or repackage your own
  • Define the requirements for distributing software via Group Policy
  • Explain when professionals might want to assign and publish software
  • Describe how to upgrade and remove packages
  • Describe how to set up distribution points for software deployment
  • List the advantages of using SCCM to distribute software instead of Group Policy

 

Lesson 11: Configuration Management with Windows PowerShell

This lesson describes how to navigate and use basic Windows PowerShell commands and how to use Windows PowerShell to manage Group Policy. It also describes how professionals can use PowerShell logon scripts with Group Policy.

Lessons

  • Introducing Windows PowerShell
  • Using Windows PowerShell
  • Writing PowerShell Scripts
  • Windows PowerShell Library for Group Policy
  • Windows PowerShell-Based Logon Scripts

Lab: Configuration Management with Windows PowerShell

  • Exploring the Windows PowerShell
  • Using Windows PowerShell to Manage GPOs

After accomplishing this lesson, professionals will be able to:

  • Explain the Windows PowerShell features
  • Describe how to perform the basic Windows PowerShell operations
  • Describe how to access the Windows PowerShell library for Group Policy
  • Manage systems using PowerShell commands

 

Lesson 12: Implementing PowerShell Desired State Configuration

This lesson will explain what DSC is all about and how to implement DSC to manage systems on the network.

Lessons

  • Introducing Group Policy Preferences
  • Comparing Preferences and Policy Settings
  • Options for Applying Preferences
  • Configure Preference Settings

Lab: Using PowerShell Desired State Configuration

  • Write a PowerShell Desired State Configuration Script
  • Create a DSC
  • Implement DSC

After accomplishing this lesson, professionals will be able to:

  • Explain the purpose of Group Policy Preferences
  • Describe the differences between Preferences and Policy Settings
  • Explain the Windows and Control Panel Settings
  • List Advanced Preferences Configuration Options

 

Lesson 13: Configuring Group Policy Preferences

This lesson explains the function of Group Policy Preferences. Professionals will learn how to combine Preferences and Policies, and how Preferences are different from Policies.

Lessons

  • Introducing Group Policy Preferences
  • Comparing Preferences and Policy Settings
  • Options for Applying Preferences
  • Configuring Preferences Settings

Lab: Configuring Group Policy Preferences

  • Implementing Computer Preferences
  • Implementing User Preferences

After accomplishing this lesson, professionals will be able to:

  • Explain the purpose of Group Policy Preferences
  • Explain the differences between Preferences and Policy Settings
  • Identify the settings that professionals can configure in the Computer Configuration and User Configuration sections of the Group Policy Management Console
  • Explain the Windows and Control Panel settings

FAQs

Q: What is the function of a window manager?

 

A: The main job of a window manager is to handle how all kind of the windows created by multiple applications that share the screen and also who gets user input at any given time. As part of the X Windows API, applications supply a size, position as well as stacking order for each window they make.

 

Q: How do you manage group policy?

 

A: Managing Group Policy Objects through the GPMC

  • Click Start > Programs > Administrative Tools > Active Directory Users and Computers. 
  • In the navigation tree, right-click the appropriate organizational unit, then click Properties. 
  • Click Group Policy, then click Open.

 

Q: How do I read group policy settings?

 

A: On the Contents tab in the details pane, click a tab to display GPOs. Double-click the GPO to display its history. User have to Right-click the GPO version for which to review the settings and after click Settings, and then click HTML Report or XML Report to display a summary of the GPO’s settings.

 

Q: How do I change group policy management?

 

A: To manage group policy management:-

  • Open Administrative Tools, Group Policy Management (gpmc. msc).
  • Expand the Forest and Domains nodes to select a domain,
  • Expand Group Policy Objects for the domain.
  • Select an existing Group Policy Object such as Default Domain Policy then right-click and select Edit.

 

Q: Why Radiant Techlearning?

 

A: Incorporated in 2016, Radiant Techlearning is mainly a technology training company which is dedicated to Technology & Technical skill development of the workforce of our trusted clients from all across the globe. We believe in building skills for individuals, teams as well as organizations, so that they remain ahead in the cutting edge world of competitiveness driven by technology and ability to transform.

We are a team of professional technology training experts & consultants with an insight of a spectacular didactic approach towards training and development. With advance practical exercises, advance lab modules and courses coached by IT experts, we mainly help businesses & Individual professionals empower in getting scaled up and expertise in their domain. 

Our training delivery methodology will enable you to attain knowledge and proficiency in a particular domain rather than finding scattered information on different platforms. Our trainers have patience and ability to explain difficult concepts in simple way with depth and width of knowledge. Each of our training program is fully updated to meet industry needs.

One can enroll for our classroom or live virtual instructor led training programs.

All the essential ingredients required for a successful training program, such as certified instructors & Consultants, latest Content, hands-on experience on the technology, technical experts and pre & post assessments to test the performance are incorporated in our learning programs. 

Since the emphasis is on the hands-on experience, we choose Industry relevant high value projects related to each course. During your course you will get personalized attention from your respective experts. Our experts will also share best practices & will give you guidance to score high & perform better in your certification exams. 

To ensure your success, we provide support session even after the training program. 

You would also be awarded with a course completion certificate recognized by the industry after completion of the course & the assignment.

 

Q: Where is Radiant Techlearning Located?

 

A: Radiant Techlearning is headquartered in Electronic city & technology hub of Northern India, Noida, which is surrounded by several large multinational, medium & small Software companies. 

We have our offices located all across the country and partners across the globe.  

 

Q: How I will be accessing the labs?

 

A: Radiant Techlearning has a data center containing the Virtual Training environment for the purpose of participant’s hand-on-practice. 

Participants can easily access these labs over Cloud with the help of remote desktop connection. 

Radiant virtual labs provides you the flexibility to learn from anywhere in the world and in any time zone. 

Q: What kind of projects are included as a part of training?

 

A: The learners will be enthralled as we engage them the real world and industry Oriented projects during the training program. These projects will improve your skills and knowledge and you will gain better experience. These real time projects, they will help you a lot in your future tasks and assignments.

Unble To Find a Batch..?

Request a Batch