MCTS Windows 7 Configuration Clustering with Windows Server 2009 IT professional
When you took the MCTS-level certification exams on mcse exams, you brie?y looked at the topics of creating Active Directory objects and linking them to appro- priate users, containers, and so forth. And even at that level, where you had to concern yourself with only one or at most two Group Policy objects, you had to consider the impact that even one change could make. If you didn?t implement your policy right, you could lock yourself, the head administrator, out of important software to which you need access or important ?les that have to be shared.
At the enterprise level, your primary concern regarding Group Policy is making sure that it spreads to the right place at the right time. On average, a large infrastructure will have several dozen or possibly several hundred policies in place. If these policies aren?t carefully designed, they won?t be implemented effectively.
In this chapter, you’ll examine the scope and impact of Group Policy, as well as how Group Policy can authorize and authenticate users. I’ll also talk about controlling the installation of device drivers and then touch a little bit on software installation, which will be discussed later in this book. Lastly, I’ll discuss two notable features of Server 2008: searching Group Policy objects and using the Group Policy modeling tool.
Whenever you create a Group Policy object using the Group Policy mcse 2003, the first step is to de?ne the policy and establish all its settings. Afterward, a little bit of Active Directory magic happens, and a Group Policy object (GPO) is created. However, in and of itself, that GPO doesn?t do a whole lot. In fact, it does absolutely nothing until that policy is linked to one of three different administrative structures: