SlideShare una empresa de Scribd logo
1 de 16
How to Troubleshoot Group
Policy in Windows 10
© Global Knowledge Training LLC. All rights reserved. Page 2
Lesson 1: Overview of Group Policy Application
Options for Deploying Configuration Settings with Group Policies
Processing Group Policies
Modifying the Group Policy Processing Order
Group Policy Filtering
Loopback Processing
Synchronous and Asynchronous Processing of GPOs
© Global Knowledge Training LLC. All rights reserved. Page 3
Options for Deploying Configuration Settings with
Group Policies
• You can apply Group Policy settings when you:
• Manage settings manually in the local GPO
• Use AD DS to distribute the settings
• Group Policy settings consist of:
• Computer configuration
• User configuration
• Policy settings
• Preferences
© Global Knowledge Training LLC. All rights reserved. Page 4
Processing Group Policies
• Computer settings are applied at startup and then
at regular intervals, while user settings are applied
at sign-in and then at regular intervals
• Group Policy processing order:
1. Local GPOs
2. Site-level GPOs
3. Domain GPOs
4. OU GPOs
Order of processing
© Global Knowledge Training LLC. All rights reserved. Page 5
Modifying the Group Policy Processing Order
• The last processed GPO has highest precedence
• Other options that affect precedence:
• Link Order
• Enforced
• Block Inheritance
• Link Enabled
© Global Knowledge Training LLC. All rights reserved. Page 6
Group Policy Filtering
© Global Knowledge Training LLC. All rights reserved. Page 7
Loopback Processing
© Global Knowledge Training LLC. All rights reserved. Page 8
Synchronous and Asynchronous Processing of
GPOs
• Default processing of
Group Policy on
Windows Servers
• Group Policy for
computer is processed
prior to logon
• Group Policy for users
is processed before
the shell is active
• Ensures reliable
processing of Group
Policy
Synchronous
• Default processing of
Group Policy on client
computers
• Client computers do
not wait for network
before fully initializing
• Existing users are
logged on using
cached credentials
• Group Policy is applied
in the background
• Results in shorter
logon period
Asynchronous
© Global Knowledge Training LLC. All rights reserved. Page 9
Lesson 2: Resolving Client-Configuration Failures
and GPO Application Issues
Identifying How GPO Settings Take Effect
Ways to Resolve GPO Application Issues
Tools for Troubleshooting RSoP
Examining Event Logs for GPO Events
Resolving GPO Application Failures
© Global Knowledge Training LLC. All rights reserved. Page 10
Identifying How GPO Settings Take Effect
• The following process is required to apply Group Policy settings:
• GPO replication
• Replicate group changes
• Refresh Group Policy
• Options to initiate Group Policy setting preferences:
• User can sign in, sign out, or restart the computer
• Start a manual refresh
• Most client-side extensions do not reapply unchanged GPO
settings
© Global Knowledge Training LLC. All rights reserved. Page 11
Ways to Resolve GPO Application Issues
To troubleshoot GPO settings, you should:
• Determine whether the GPO was sent to the
correct computer, user account, or OU
• Enable loopback processing for special use
computers
• Force a GPO to take effect with gpupdate /force
• Restart the computer
© Global Knowledge Training LLC. All rights reserved. Page 12
Tools for Troubleshooting RSoP
© Global Knowledge Training LLC. All rights reserved. Page 13
Examining Event Logs for GPO Events
© Global Knowledge Training LLC. All rights reserved. Page 14
Resolving GPO Application Failures
• Verify that the client computer is connected and
authenticated
• Verify that the GPO is assigned properly to the
computer or user
• Verify that the GPO configuration has the proper
settings
© Global Knowledge Training LLC. All rights reserved. Page 15
Lab Demo: Generating GPO Results Report.
Exercise 1: Using GPMC to generate reports
Exercise 2: Using command prompt to generate report.
Logon Information
Virtual machines: 10982C-LON-DC1
10982C-LON-CL1
User name: AdatumAdministrator
Password: Pa55w.rd
Estimated Time: 10 Minutes
© Global Knowledge Training LLC. All rights reserved. Page 16
Course
Supporting and
Troubleshooting
Windows 10 (M10982)

Más contenido relacionado

La actualidad más candente

Group Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierGroup Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierSpiceworks Ziff Davis
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy ConceptsRob Dunn
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2IGZ Software house
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1denogx
 

La actualidad más candente (6)

Group Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life EasierGroup Policy Management Makes Your Life Easier
Group Policy Management Makes Your Life Easier
 
Group Policy
Group PolicyGroup Policy
Group Policy
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy Concepts
 
70 640 Lesson07 Ppt 041009
70 640 Lesson07 Ppt 04100970 640 Lesson07 Ppt 041009
70 640 Lesson07 Ppt 041009
 
Group policy management window server 2008r2
Group policy management window server 2008r2Group policy management window server 2008r2
Group policy management window server 2008r2
 
Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1
 

Similar a How to Troubleshoot Group Policy in Windows 10

Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11gameaxt
 
(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory PwnagePetros Koutroumpis
 
Chapter09 Implementing And Using Group Policy
Chapter09      Implementing And  Using  Group  PolicyChapter09      Implementing And  Using  Group  Policy
Chapter09 Implementing And Using Group PolicyRaja Waseem Akhtar
 
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09   Group Policy - Eric VanderburgNetwork Implementation and Support Lesson 09   Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09 Group Policy - Eric VanderburgEric Vanderburg
 
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesMark Skurla
 
Postgres Point-in-Time Recovery
Postgres Point-in-Time RecoveryPostgres Point-in-Time Recovery
Postgres Point-in-Time RecoveryEDB
 
Arcelor Mittal intern
Arcelor Mittal internArcelor Mittal intern
Arcelor Mittal internAnshul Jain
 
Environment Manager Policy
Environment Manager PolicyEnvironment Manager Policy
Environment Manager PolicyIvanti
 
Process improvement in computer system.pptx
Process improvement in computer system.pptxProcess improvement in computer system.pptx
Process improvement in computer system.pptxAnnieRoseDulang
 
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...Software AG
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13APSU
 
Adaptiva Green Planet
Adaptiva Green PlanetAdaptiva Green Planet
Adaptiva Green PlanetAdaptiva
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business ContinuityDr. Ahmed Al Zaidy
 
CTU June 2011 - Guided Hands on Lab on GPO - GPP
CTU June 2011 - Guided Hands on Lab on GPO - GPPCTU June 2011 - Guided Hands on Lab on GPO - GPP
CTU June 2011 - Guided Hands on Lab on GPO - GPPSpiffy
 
093049ov10.pptx
093049ov10.pptx093049ov10.pptx
093049ov10.pptxNguyenNM
 

Similar a How to Troubleshoot Group Policy in Windows 10 (20)

Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
 
Group policy objects
Group policy objectsGroup policy objects
Group policy objects
 
(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage
 
Chapter09 Implementing And Using Group Policy
Chapter09      Implementing And  Using  Group  PolicyChapter09      Implementing And  Using  Group  Policy
Chapter09 Implementing And Using Group Policy
 
70 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 04100970 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 041009
 
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09   Group Policy - Eric VanderburgNetwork Implementation and Support Lesson 09   Group Policy - Eric Vanderburg
Network Implementation and Support Lesson 09 Group Policy - Eric Vanderburg
 
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
 
Postgres Point-in-Time Recovery
Postgres Point-in-Time RecoveryPostgres Point-in-Time Recovery
Postgres Point-in-Time Recovery
 
Arcelor Mittal intern
Arcelor Mittal internArcelor Mittal intern
Arcelor Mittal intern
 
Environment Manager Policy
Environment Manager PolicyEnvironment Manager Policy
Environment Manager Policy
 
Process improvement in computer system.pptx
Process improvement in computer system.pptxProcess improvement in computer system.pptx
Process improvement in computer system.pptx
 
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...
The Pennsylvania State University: Modernizing and Standardizing the Penn Sta...
 
BRE Deep Dive
BRE Deep DiveBRE Deep Dive
BRE Deep Dive
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
Adaptiva Green Planet
Adaptiva Green PlanetAdaptiva Green Planet
Adaptiva Green Planet
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business Continuity
 
Trade Promotion Management in the cloud.
Trade Promotion Management in the cloud.Trade Promotion Management in the cloud.
Trade Promotion Management in the cloud.
 
CTU June 2011 - Guided Hands on Lab on GPO - GPP
CTU June 2011 - Guided Hands on Lab on GPO - GPPCTU June 2011 - Guided Hands on Lab on GPO - GPP
CTU June 2011 - Guided Hands on Lab on GPO - GPP
 
093049ov10.pptx
093049ov10.pptx093049ov10.pptx
093049ov10.pptx
 

Más de Global Knowledge Training

PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywhereGlobal Knowledge Training
 
Why Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceWhy Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceGlobal Knowledge Training
 
Develop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningDevelop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningGlobal Knowledge Training
 
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Global Knowledge Training
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyGlobal Knowledge Training
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksGlobal Knowledge Training
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationGlobal Knowledge Training
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationGlobal Knowledge Training
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?Global Knowledge Training
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success Global Knowledge Training
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementGlobal Knowledge Training
 

Más de Global Knowledge Training (20)

Taking Advantage of Microsoft PowerShell
Taking Advantage of Microsoft PowerShell Taking Advantage of Microsoft PowerShell
Taking Advantage of Microsoft PowerShell
 
PAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention EverywherePAN-OS - Network Security/Prevention Everywhere
PAN-OS - Network Security/Prevention Everywhere
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
Accelerating with Ansible
Accelerating with AnsibleAccelerating with Ansible
Accelerating with Ansible
 
Why Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD WorkforceWhy Pentesting is Vital to the Modern DoD Workforce
Why Pentesting is Vital to the Modern DoD Workforce
 
How to Maximize Your Training Budget
How to Maximize Your Training BudgetHow to Maximize Your Training Budget
How to Maximize Your Training Budget
 
Develop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online LearningDevelop Your Skills with Unlimited Access to Red Hat Online Learning
Develop Your Skills with Unlimited Access to Red Hat Online Learning
 
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification Journey
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
How to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS LambdaHow to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS Lambda
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your Organization
 
How to Migrate a Web App to AWS
How to Migrate a Web App to AWSHow to Migrate a Web App to AWS
How to Migrate a Web App to AWS
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your Organization
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People Management
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsFact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMsFact vs. Fiction: Autodetecting Hallucinations in LLMs
Fact vs. Fiction: Autodetecting Hallucinations in LLMs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

How to Troubleshoot Group Policy in Windows 10

  • 1. How to Troubleshoot Group Policy in Windows 10
  • 2. © Global Knowledge Training LLC. All rights reserved. Page 2 Lesson 1: Overview of Group Policy Application Options for Deploying Configuration Settings with Group Policies Processing Group Policies Modifying the Group Policy Processing Order Group Policy Filtering Loopback Processing Synchronous and Asynchronous Processing of GPOs
  • 3. © Global Knowledge Training LLC. All rights reserved. Page 3 Options for Deploying Configuration Settings with Group Policies • You can apply Group Policy settings when you: • Manage settings manually in the local GPO • Use AD DS to distribute the settings • Group Policy settings consist of: • Computer configuration • User configuration • Policy settings • Preferences
  • 4. © Global Knowledge Training LLC. All rights reserved. Page 4 Processing Group Policies • Computer settings are applied at startup and then at regular intervals, while user settings are applied at sign-in and then at regular intervals • Group Policy processing order: 1. Local GPOs 2. Site-level GPOs 3. Domain GPOs 4. OU GPOs Order of processing
  • 5. © Global Knowledge Training LLC. All rights reserved. Page 5 Modifying the Group Policy Processing Order • The last processed GPO has highest precedence • Other options that affect precedence: • Link Order • Enforced • Block Inheritance • Link Enabled
  • 6. © Global Knowledge Training LLC. All rights reserved. Page 6 Group Policy Filtering
  • 7. © Global Knowledge Training LLC. All rights reserved. Page 7 Loopback Processing
  • 8. © Global Knowledge Training LLC. All rights reserved. Page 8 Synchronous and Asynchronous Processing of GPOs • Default processing of Group Policy on Windows Servers • Group Policy for computer is processed prior to logon • Group Policy for users is processed before the shell is active • Ensures reliable processing of Group Policy Synchronous • Default processing of Group Policy on client computers • Client computers do not wait for network before fully initializing • Existing users are logged on using cached credentials • Group Policy is applied in the background • Results in shorter logon period Asynchronous
  • 9. © Global Knowledge Training LLC. All rights reserved. Page 9 Lesson 2: Resolving Client-Configuration Failures and GPO Application Issues Identifying How GPO Settings Take Effect Ways to Resolve GPO Application Issues Tools for Troubleshooting RSoP Examining Event Logs for GPO Events Resolving GPO Application Failures
  • 10. © Global Knowledge Training LLC. All rights reserved. Page 10 Identifying How GPO Settings Take Effect • The following process is required to apply Group Policy settings: • GPO replication • Replicate group changes • Refresh Group Policy • Options to initiate Group Policy setting preferences: • User can sign in, sign out, or restart the computer • Start a manual refresh • Most client-side extensions do not reapply unchanged GPO settings
  • 11. © Global Knowledge Training LLC. All rights reserved. Page 11 Ways to Resolve GPO Application Issues To troubleshoot GPO settings, you should: • Determine whether the GPO was sent to the correct computer, user account, or OU • Enable loopback processing for special use computers • Force a GPO to take effect with gpupdate /force • Restart the computer
  • 12. © Global Knowledge Training LLC. All rights reserved. Page 12 Tools for Troubleshooting RSoP
  • 13. © Global Knowledge Training LLC. All rights reserved. Page 13 Examining Event Logs for GPO Events
  • 14. © Global Knowledge Training LLC. All rights reserved. Page 14 Resolving GPO Application Failures • Verify that the client computer is connected and authenticated • Verify that the GPO is assigned properly to the computer or user • Verify that the GPO configuration has the proper settings
  • 15. © Global Knowledge Training LLC. All rights reserved. Page 15 Lab Demo: Generating GPO Results Report. Exercise 1: Using GPMC to generate reports Exercise 2: Using command prompt to generate report. Logon Information Virtual machines: 10982C-LON-DC1 10982C-LON-CL1 User name: AdatumAdministrator Password: Pa55w.rd Estimated Time: 10 Minutes
  • 16. © Global Knowledge Training LLC. All rights reserved. Page 16 Course Supporting and Troubleshooting Windows 10 (M10982)

Notas del editor

  1. Provide an overview of the lesson.
  2. This topic should be a review for most students. Cover this content quickly, unless the students are unfamiliar with local GPOs.
  3. Use this topic to ensure that students understand the basic process for GPO application, and that GPOs at the organizational unit (OU) level override domain-level GPOs. Additionally, be sure to mention security filtering, Windows Management Instrumentation (WMI) filtering, and slow-link processing as exceptions to the default processing order.
  4. Explain that there are exceptions to the typical precedence in Group Policy processing, and then describe when you would use each of the options that the slide lists: Link Order. Use to ensure that a specific GPO that is linked to an OU has precedence on that OU. Enforced. Use to apply standardized settings for an OU or department. Block Inheritance. Use to allow a department to operate independently of the GPOs applied in the rest of the OU. Link Enabled. Use to disable processing of a GPO during troubleshooting.
  5. Explain security and WMI filtering, and the effect of both on Group Policy processing. Mention that with WMI filtering, the client computer evaluates the filter to determine whether to apply Group Policy. However, with security filtering, the domain controller decides whether to apply Group Policy. Mention that, therefore, the result is that the Group Policy does not apply to all users or computers in the same part of Active Directory Domain Services (AD DS).
  6. Explain to students that you do not use loopback processing for most computers. Rather, you use it only for specific scenarios when you need to modify the normal user configuration. Discuss with students why this is useful for settings such as classrooms or conference room.
  7. The key concept for students to understand from this topic is that the asynchronous processing that Windows 10 uses might result in the Windows operating system delaying the application of GPO settings, because users might need to reboot the computer before the settings take effect.
  8. Provide an overview of the lesson.
  9. Use this slide to summarize the details regarding when GPO settings take effect. This should answer questions such as, “When do I change a policy setting,” and “When will that setting actually apply to a user or computer?“ Do not provide too much detail about the replication technologies themselves, but rather, point out that both the Group Policy container and Group Policy template must replicate to the domain controller from which a client obtains its policies. Point out that the Group Policy container and Group Policy template use different replication technologies that are not always synchronized. Other points to make: We recommend that organizations implement the Always Wait For Network At Startup And Logon policy setting. Otherwise, a change to a policy setting might take several signin/signout or restart cycles before it takes effect, and it is not possible to predict how long this will take. To manage the application of new policy settings effectively, enable Always Wait For Network At Startup And Logon. Make sure that students understand that this does not slow down the startup or signin process significantly. Users will not complain that it is noticeably slower. Also, make sure that students understand that when a system is not connected to the network, it ignores this setting, so this setting is not applied to disconnected laptop users. Users cannot change most policy settings, particularly managed policy settings. However, if users are administrators of their machines, it is possible for them to change some settings. Those changes will never be reverted to match the settings that the GPOs specify, because most client-side extensions will reapply policy settings only when a GPO has changed. The exceptions to this rule are security settings, which reapply every 16 hours, regardless of whether the GPO has changed. If your organization is concerned about enforcing its policy settings, and if it is possible for users to change those settings, then you should configure the client-side extensions to reapply policy settings even if the GPO has not changed. You can use Group Policy to configure the policy processing behavior of each client-side extension.
  10. This topic lists some common ways that you can resolve GPO application issues. If you have experience with resolving GPO application issues, include additional troubleshooting tips based on your experience. Students also might have methods that they wish to share. Point out to students that they used the gpupdate /force command in the previous practice demonstration.
  11. Consider demonstrating the three major logs in which you can find Group Policy events. Point out that RSoP reports also display Group Policy events, particularly in the Advanced view. Mention that the Group Policy Operational log is a great way to learn exactly how Group Policy applies to Windows operating systems.
  12. Use this topic as an opportunity to reinforce the lesson’s contents before beginning the lab.
  13. Exercise 1: Resolving Group Policy Application (1) In this exercise, you will resolve the reported GPO application problem that tier 1 help-desk staff could not resolve. Note: For the complete exercise scenario, please refer to the student guide.