Managing Special Folders with Group Policy

Windows Server 2003 allows you to redirect the folders containing a comptia user’s profile to a location on the network using the Folder Redirection node in the Group Policy Object Editor console. The Offline Files feature provides users with access to redirected fold?ers even -when they are not connected to the network and can be set up manually or by using the Offline Folder node in Group Policy. This lesson introduces special folder redirection and walks you through the steps for setting up folder redirection using Group Policy. It also introduces the Offline Files feature and walks you through the steps for setting up Offline Files manually.
want to redirect the folder, and then click OK.
In the Specify Group And Location dialog box, in the Target Folder Location list,
select the redirect location you want for this GPO from one of the following:
a Create A Folder For Each User Under The Root Path (not available for the Start Menu folder) creates a folder with the user’s name in the root path. A new feature of Windows Server 2003, folder redirection automatically appends the user name and the folder name when the policy is applied.
Redirect To The Following Location enables you to redirect the folder to a location represented by the UNC path in the form \\seruername\sharename or a valid path on the user’s local computer.
Redirect To The Local Userprofile Location enables you to redirect the folder to the default folder location in the absence of redirection by an administrator.
Redirect To The User’s Home Folder (available for the My Documents folder only) enables you to redirect the user’s My Documents folder to the user’s home directory.
8.If you have selected the Create A Folder For Each A+ certification cost User Under The Root Path or Redirect To The Following Location options, enter the path to which the folder should be redirected, either the UNC path in the form \\servername\sharename or a valid path on the user’s local computer.
In the Specify Group And Location dialog box, click OK.
If you want to redirect folders for members of other security groups, repeat steps 4
through 9 until all the groups have been entered.
Click the Settings tab (shown previously in Figure 11-17), and then set each of the following options (the default settings are recommended):
Grant The User Exclusive Rights To Special Folder Type, to allow the user and the local system full rights to the folder; no one else, not even administrators, will have any rights. If this setting is disabled, no changes are made to the permissions on the folder. The permissions that apply by default remain in effect. This option is enabled by default.
Move The Contents Of User’s Current Special Folder “fo The New Location, to redirect the contents of the folder to the new location. This option is enabled by default.
The Encrypt Offline Files To Secure Data check box is disabled if you are not an administrator on the computer, the local drive is not NTFS or does not support encryption, or your free exam question papers system administrator has implemented an encryption policy for Offline Files.

Read more on Managing Special Folders with Group Policy…

Viewing RSoP Queries

The has been designed for professionals who analyze the business requirements. The autor devote herself to research the problems and knowledge of IT Certification.If you have any questions about Network+ certification,you can comments on the article the autor publiced.

Managing Group Policy with RSoP

RSoP is the sum of the group policies applied to a A+ certificate user or computer. Determining RSoP for a computer or user can be a complex task. In Microsoft Windows Server 2003, you can generate an RSoP query to determine the policies applied to a specified user or computer. This lesson introduces you to the tools used to generate RSoP queries, the ways to save RSoP queries, and the results provided by each of the RSoP generation tools
Understanding RSoP
As you learned in Chapter 10, GPOs are cumulative as they are applied to a local computer, site, domain, and OU hierarchy. RSoP is the sum of the policies applied to a user or computer, including the application of filters, such as through security groups and Windows Management Instrumentation (WMI), and exceptions, such as No Override and Block Policy Inheritance. Because of the cumulative effects of GPOs, filters, and exceptions, determining a user or computer’s RSoP can be difficult. However, the ability to generate RSoP queries in Windows Server 2003 makes determining RSoP easier. In Windows Server 2003, an RSoP query engine is available to poll existing plus benefits and report the affects of GPOs on users and computers. The query engine also checks for security groups and WMI queries used to filter GPO scope, and checks Software Installation for any applications that are associated with a particular user or computer and reports the affects of these settings as well. This information is gathered from the Com?mon Information Management Object Model (CIMOM) database.
Windows Server 2003 provides the foliowing three tools for generating RSoP queries:
Resultant Set Of Policy Wizard
Gpresult command-line tool
Advanced System Information—Policy tool
Each tool uses a different interface and provides different levels of RSoP query information, as discussed in the sections that follow.
To create an RSoP query from the Active Directory Users And Computers or Active Directory Sites And Services consoles, open the console, right-click the site, domain, OU, user account, or computer account for which you want to create a query, click All Tasks, and select Resultant Set Of Policy (Planning) or Resultant Set Of Policy (Logging). Note that Logging mode is available only for computer accounts and user accounts. Then run the Resultant Set Of Policy Wizard as described in the “To create an RSoP query with the Resultant Set Of Policy Wizard Logging mode” procedure, on page 11-7, and the “To create an RSoP query with the Resultant Set Of CompTIA Policy Wizard Planning mode” procedure, on page 11-9.

Read more on Managing Group Policy with RSoP…

How Group Policy Affects Startup and Logging On

The following sequence shows the order in which computer configuration and comptia user configuration settings are applied when a computer starts and a user logs on.
1.The network starts. Remote Procedure Call System Service (RPCSS) and Multiple Universal Naming Convention Provider (MUP) are started.
2.An ordered list of GPOs is obtained for the computer. The list contents depend on the following factors:
Whether the computer is part of a Windows 2000 or Windows Server 2003 domain, and is therefore subject to Group Policy through Active Directory.
The location of the computer in Active Directory.
If the list of GPOs has not changed, then no processing is done. You can use a Group Policy setting to change this behavior.
3.Computer configuration settings are processed. This occurs synchronously by default and in the following order: local GPO, site GPOs, domain GPOs, and OU
GPOs. No user interface is displayed while computer configuration settings are being processed. See the section “How Group Policy Is Applied” for details about GPO processing.
4.Startup scripts run. This is hidden and synchronous by default; each script must complete or time out before the next one starts. The default timeout is 600 seconds (10 minutes). You can use several Group Policy settings to modify this behavior.
5.The user presses Ctrl+Alt+Del to log on.
6.After the user is validated, the 220-702 exam user profile is loaded, governed by the Group Policy settings in effect.
7.An ordered list of GPOs is obtained for the user. The list contents depend on the following factors:
Whether the user is part of a Windows 2000 or Windows Server 2003 domain, and is therefore subject to Group Policy through Active Directory.
Whether loopback is enabled and the state (Merge or Replace) of the loop-back policy setting. Refer to the section “How Group Policy Is Applied” for more information about loopback.
The location of the user in Active Directory.
If the list of GPOs to be applied has not changed, then no processing is done. You can use a policy setting to change this behavior.
8.User configuration settings are processed. This occurs synchronously by default,and in the following order: local GPO, site GPOs, domain GPOs, and OU GPOs.
No user interface is displayed while user policies are being processed. See the section “How Group Policy Is Applied” for details about GPO processing.
9.Logon scripts run. Unlike Windows NT 4 scripts, Group Policy-based logon scripts are run hidden and asynchronously by default. The user object script
runs last.
10. The operating system user interface prescribed by free certification Group Policy appears.

Read more on How Group Policy Affects Startup and Logging On…

Set up User Accounts

Windows Server 2003 automatically creates accounts called built-in Network+ benefits accounts. Two commonly used built-in accounts are Administrator and Guest.

Note The IUSR_computername and IWAM_computername built-in accounts are automatically created when Microsoft Internet Information Services (IIS) are installed on the domain controller. IUSR_computername is an account for anonymous access to IIS. IWAM_computername is an account for anonymous access to IIS out-of-process applications. The TslnternetUser account is automatically created when Terminal Services are installed on the domain controller. TslnternetUser is an account used by Terminal Services.
Administrator
Use the built-in Administrator account to manage the overall computer and domain configuration for such tasks as creating and modifying user accounts and groups, managing security policies, creating printers, and assigning permissions and rights to user accounts to gain access to resources. This account is assigned the password you specified during Active Directory installation and has permissions to perform all tasks in the domain. The Administrator account cannot be deleted.
Because the Administrator account has full permissions, you must protect it from penetration by intruders. First, you should always rename the Administrator account with a new name that does not connect the account to n10-004 network administrative tasks. Renaming makes it difficult for unauthorized users to break into the Administrator account because they do not know which user account it is. Second, you should always use a long and complex password that cannot be easily cracked for the Administrator account. Third, do not allow too many people to know the administrator password. Finally, if you are the administrator, you should create a separate user account that you use to perform nonadministrative tasks. Log on by using the Administrator account only when you perform administrative tasks. Or, log on with your user account and use the Run As program when you need to perform a few administrative tasks. For information on setting up user accounts for performing nonadministrative tasks and the Run As program, see Chapter 8, “Administering Group Accounts.”
The purpose of the built-in Guest account is to provide users who do not have an account in the domain with the ability to log on and gain access to resources. For example, an employee who needs access to resources for a short time can use the Guest account. By default, the Guest account does not require a password (the pass?word can be blank) and is disabled. You should enable the Guest account only in low-security networks and always assign it a password. If you enable the Guest account, always rename it to provide a greater degree of security. Use a name that does not identify it as the Guest account. You can rename and disable the Guest CompTIA account, but you cannot delete it.

Read more on Set up User Accounts…