Question

​Case Project 6-2 Explaining GPOs

Case Project 6-2 Explaining GPOs 


The owner of CSM Tech Publishing has told you he needs to lock down some desktops so that these users can’t access certain Windows components, such as the Control Panel. He also wants some standardization in the look of users’ desktops, such as wallpaper and so forth. However, he’s not sure how to make these changes without affecting all users and computers. Write a short explanation of how GPOs can be applied. Include information about how policies defined in one place can take precedence over policies defined elsewhere.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Group Policy Object:

  • This feature came along with the Windows Operating system in which we can implement a certain collection of the settings that will define how the systems will look like or work for the defined group of users without affecting rest of the devices in the network.
  • This policy makes it very easy to implement such changes in the system and making them inaccessible too. The use of Group Policy Management Console makes it very easy to snap in with such manipulation in the users falling in certain groups and can be made changes to all the devices which fall in the same group.
  • The GPO is being associated with the certain selected Active Directories in the containers such as the domains or the organizational units making it easy to define the following services easily:
    • Security Policies
    • Registry-based policies
    • Software Installations
    • Maintenance options
    • Running certain scripts
    • Folder Redirection
    • Changing the Look and Feel
  • Hence, these are some of the services which can be easily provided to the system which fall under the certain group policies and making them even from all the views makes it completely great for the organizations.

Hence, this is how the GPO can be made use of in certain circumstances where some of the machines or devices are only required to be changed.

Add a comment
Know the answer?
Add Answer to:
​Case Project 6-2 Explaining GPOs
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • I just need answer for case 2 question no 2 and 3 please 148 Chapter 6...

    I just need answer for case 2 question no 2 and 3 please 148 Chapter 6 Policy Issues for Older Adults The policies and programs covered in this chapter include: Social Security, a policy impacting retired workers, spouses, dependents, and indi- viduals with disabilities. SSI, a program providing resources for lower income individuals, including older adults and people with disabilities. Medicare, health insurance for older adults and certain people with disabilities. Medicaid, a program providing health care for people with...

  • Hi, Kindly assist with my project management assignment below using the attached case study Question 1 Update the project charter for the remainder of the project in response to Adams’ memo (lines 241...

    Hi, Kindly assist with my project management assignment below using the attached case study Question 1 Update the project charter for the remainder of the project in response to Adams’ memo (lines 241 through 246). Question 2 Prepare a plan for the remainder of the project in response to Adams’ memo (lines 241 through 246). Your answers to the above will be assessed in terms of the level of communication displayed, the insights and inferences drawn, and your ability to...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen....

    Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen. “Shared Services at RR Communications.” #1-L07-1-002, Queen’s School of Business, September 2007. Reproduced by permission of Queen’s University, School of Business, Kingston, Ontario, Canada. Vince Patton had been waiting years for this day. He pulled the papers together in front of him and scanned the small conference room. “You’re fired,” he said to the four divisional CIOs sitting at the table. They looked nervously...

  • Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen....

    Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen. “Shared Services at RR Communications.” #1-L07-1-002, Queen’s School of Business, September 2007. Reproduced by permission of Queen’s University, School of Business, Kingston, Ontario, Canada. Vince Patton had been waiting years for this day. He pulled the papers together in front of him and scanned the small conference room. “You’re fired,” he said to the four divisional CIOs sitting at the table. They looked nervously...

  • CASE 6 Using Ex-Cons to Teach Business business school with a master's degree, worked as a...

    CASE 6 Using Ex-Cons to Teach Business business school with a master's degree, worked as a Ethics at MCL devised a 56 million money launderin home and served two years in federal prison. AL After the Enron scandal and he was the way he became divorced and unemployed, and Tyon, and Adelphia debacles that wed a couple of to move back in with his parents. As Busw. We years later, the business ethics industry really started to reported, it was...

  • Select two of the discussion questions and analyze the case study using project management principles. Apply...

    Select two of the discussion questions and analyze the case study using project management principles. Apply your knowledge of project management to the facts presented in the case study to describe how you would proceed. We only need to answer one of the questions. A thorough answer will probably require 300 to 500 words for each question.   Feel free to use text bullets, tables, or graphics to summarize your points. Questions Q1: Make or Buy decision – Describe the make...

  • Why did the Energy Telematics project fail and why was Joel's tram vaught off guard by...

    Why did the Energy Telematics project fail and why was Joel's tram vaught off guard by the hostile reaction of the truck drivers at the Omaha depot? MINI CASE Working Smarter at Continental Furniture International Joel Parsons hurried down the hall to the monthly executive committee meeting doing a mental checklist of all the things he was responsible for: sales analysis-check; mar keting stats-check; quarterly and YTD financials-check; operating statistics-check trends in each of these areas-check. Parsons was right hand...

  •    3 questions 6 Part S Cases What's Ahead? Microsoft has been the leader in the...

       3 questions 6 Part S Cases What's Ahead? Microsoft has been the leader in the OS market for quite some time, but it does not know much about retailing. Thus, the opening of company-owned retail stores in an at- tempt to counteract Apple's channel strategy success is indeed a bold step on the part of the OS giant. Is Microsoft going to be able to do it? One could argue that Microsoft lacks the type of innovative flare that...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT