MCSEClasses Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us


Microsoft Course 50255: Managing Windows Environments with Group Policy

Course Length: 5 days

Class Schedule
Call for Class Schedule

  • Hands-on instruction by a certified instructor
  • Includes all course materials
  • On-site Testing
  • Lunch & Snacks provided each day

In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks, implement administrative and security templates, and determine best practices when deploying software packages.

Audience profile

This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design.

At course completion

  • Features and functions of Group Policy
  • Use Group Policy management tools to manage security policies
  • Design a Group Policy infrastructure
  • Group Policy processing architecture
  • Back up, restore, import, and copy Group Policy Objects through the Group Policy
  • Management Console
  • Use Windows PowerShell to manage Group Policy
  • Implement security using Group Policy
  • Configure the desktop environment with Group Policy
  • Configure roaming profiles and Folder Redirection
  • Assign and publish software packages
  • Implement AppLocker and software restriction policies
  • Create and deploy Administrative Templates
  • Configure Group Policy preferences

Prerequisites

  • Experience with the Microsoft Windows Server 2008/2012 environments and a fundamental understanding of Active Directory

Course Outline

Module 1: Introduction to Configuration Management

This module describes the basis of what configuration management is and how it functions.

  • Configuration Management Overview
  • Configuration Management Using Group Policy
  • Group Policy Features Introduced with Later Versions of Windows
  • Using Windows PowerShell in the Configuration Management Process

After completing this module, students will be able to:

  • Define configuration management
  • List the ways you can use configuration management in Windows
  • Describe the new Group Policy features available in the latest versions of Windows
Module 2: Using Group Policy Management Tools

This module describes the differences between local and domain policies and the Group Policy management tools you can use to manage these policies. This module also describes the Group Policy refresh process and hot to manually force a refresh ahead of the default interval.

  • Local and Domain Policies
  • Using Group Policy Management Console
  • Understanding Group Policy Refresh

After completing this module, students will be able to:

  • Describe the advantages of using domain policies instead of local policies
  • List the capabilities of the Group Policy Management Console
  • Describe the requirements for installing the Group Policy Management Console
  • Explain how to use the different GPMC features to create and manage policies
  • Describe the elements of the gpupdate command
Module 3: Designing a Group Policy Infrastructure

This module details the steps a successful Group Policy deployment should follow, linking your design to how your company can best use the features. Essential network components and security design are also defined.

  • Design Stages for a Group Policy Infrastructure
  • Planning your Group Policy Design
  • Designing Your Group Policy Solution
  • Deploying Your Group Policy Solution
  • Managing Your Group Policy Solution

After completing this module, students will be able to:

  • Describe the four stages of implementing Group Policy
  • Explain how to plan Group Policy in accordance with a company's requirements
  • Describe the guidelines that you should follow when you create new GPOs
  • Explain how to manage Group Policy by delegating administration and setting permissions
Module 4: Understanding the Architecture of Group Policy Processing

This module details the concepts that you must grasp in order to troubleshoot Group Policy. The module also describes the options that are available to change the standard Group Policy processing sequence.

  • Group Policy Components in AD DS
  • Understanding the Group Policy Deployment Order
  • Modifying Group Policy Processing

After completing this module, students will be able to:

  • Describe the Active Directory components that you can use to deploy Group Policy
  • Explain the order in which Group Policy is deployed in Active Directory
  • Describe the methods that are available to modify Group Policy processing
Module 5: Troubleshooting and Backing Up GPOs

This module explains how to use the RSoP tools to determine whether policies are being processed in the correct manner. This module discusses how to use the available tools to troubleshoot policy issues; back up, restore, import, copy, and search for GPOs; and migrate GPOs from one domain to another.

  • Using Group Policy Troubleshooting Tools
  • Integration of RSoP Functionality
  • Using Logging Options
  • Backing Up, Restoring, Importing, and Copying GPOs
  • Building Migration Tables

After completing this module, students will be able to:

  • Describe the Group Policy troubleshooting tools
  • Describe the GPMC tools that have RSoP functionality
  • Describe the GPO logging tools used to obtain more detail about the GPO processing issues
  • Explain how to back up, restore, import, and copy GPOs using the GPMC
  • Explain how to build migration tables
Module 6: Securing Windows Using Group Policy

This module defines the Windows security model and describes the process of using Group Policy to implement user account, computer account, and domain security.

  • Exploring the Windows Security Architecture
  • Securing User Accounts
  • Exploring Security Policies
  • Windows Firewall with Advanced Security
  • Implementing Domain Security

After completing this module, students will be able to:

  • Describe the Windows security architecture
  • Explain how to secure user accounts with Group Policy
  • Explain how to harden computer accounts
  • Explain how to control the domain security policy with a GPO
Module 7: Implementing Application Security Using Group Policy

This module describes the process of securing applications in a Windows environment. It also explains how to implement UAC (User Account Control) to help prevent users from running unauthorized software, reducing the likelihood that viruses, Trojan horses, or spyware might intrude upon the environment.

  • Managing UAC Settings
  • Defending Against Malware
  • Using AppLocker to Restrict Software
  • Implementing Windows 8 App Security Settings

After completing this module, students will be able to:

  • Describe UAC
  • Describe the AppLocker features
  • Explain the features of Windows 8 Apps
Module 8: Configuring the Desktop Environment with Group Policy

This module explains many of the settings that are available to configure and restrict the user desktop environment, such as Control Panel restrictions, Start Menu settings, and Windows Explorer configuration.

  • Exploring Script Types and Controlling Script Execution
  • Defining the Desktop, Start Menu, and Taskbar Settings
  • Defining the Control Panel Settings
  • Defining the Windows Components Settings
  • Configuring the Printer Management and Pruning Settings
  • Defining the Network Settings
  • New Settings for Windows 8 Client and Windows Server 2012

After completing this module, students will be able to:

  • Describe the startup, shutdown, logon, and logoff scripts and settings.
  • Identify the many ways to control the user desktop, Start menu, and taskbar settings
  • Explain how to restrict the Control Panel settings
  • Explain how to restrict operations that users can perform in Windows Explorer, Windows Internet Explorer, and Remote Desktop Services
  • Explain how to configure the printer management and pruning settings
  • Describe the network settings
Module 9: Implementing User State Virtualization

This module explains the different options available to maintain the user's personal files and settings.

  • Configuring Folder Redirection
  • Managing Offline Files
  • Implementing User Experience Virtualization
  • OneDrive for Business

After completing this module, students will be able to:

  • Explain how to redirect user folders to a server
  • Describe the Offline Files feature
  • Explain the purpose of User Experience Virtualization
  • Describe the OneDrive for Business feature
Module 10: Assigning and Publishing Software Packages

This module explains how to use Group Policy for deploying software.

  • Using MSI Packages to Distribute Software
  • Using Group Policy as a Software Deployment Method
  • Deploying Software
  • Setting Up Distribution Points
  • Using the Systems Center Configuration Manager to Distribute Software

After completing this module, students will be able to:

  • Describe the basic elements of an MSI package
  • Determine when to build or repackage your own
  • Define the requirements for distributing software via Group Policy
  • Describe when you might want to assign and publish software
  • Explain how to upgrade and remove packages
  • Explain how to set up distribution points for software deployment
  • List the advantages of using SCCM to distribute software instead of Group Policy
Module 11: Configuration Management with Windows PowerShell

This module explains how to navigate and use basic Windows PowerShell commands and how to use Windows PowerShell to manage Group Policy. It also explains how you can use PowerShell logon scripts with Group Policy.

  • Using Windows PowerShell
  • Writing PowerShell Scripts
  • Windows PowerShell Library for Group Policy
  • Windows PowerShell-Based Logon Scripts
  • Using PowerShell Desired State Configuration

After completing this module, students will be able to:

  • Describe the Windows PowerShell features
  • Explain how to perform the basic Windows PowerShell operations
  • Explain how to access the Windows PowerShell library for Group Policy
  • Manage systems using Windows PowerShell Desired State Configuration
Module 12: Creating and Deploying Administrative Templates

This module explains the logic behind administrative templates, when to use them, and the basics of how to write them. This module also explains how to deploy templates by loading legacy ADM templates into the Group Policy Management Editor, and copying ADMX templates to the Central Store.

  • Introducing Administrative Templates
  • Legacy ADM Templates
  • Managing ADMX Templates
  • Converting and Creating Custom ADMX Templates
  • Using the ADMX Central Store

After completing this module, students will be able to:

  • Describe the benefits of using Administrative Templates
  • List some of the ADM templates that are included with each version of Windows
  • List tips that you can use to write your own customer Administrative templates
  • Describe the advantages of using the new ADMX file format
  • Identify which tool converts the ADM templates to ADMX templates and also creates new ADMX templates
  • Define ADMX Central Store
Module 13: Configuring Group Policy Preferences

This module describes the function of Group Policy Preferences. You will learn how to configure Group Policy Preferences and modify the advanced configuration options.

  • Introducing Group Policy Preferences
  • Comparing Preferences and Policy Settings
  • Configuring Preferences Settings

After completing this module, students will be able to:

  • Describe the purpose of Group Policy Preferences
  • Describe the differences between Preferences and Policy Settings
  • Identify the settings that you can configure in the Computer Configuration and User Configuration sections of the Group Policy Management Console
  • Describe the Windows and Control Panel settings

MCSEClasses.com is your best choice for MOC 50255, MOC 50255 training, MOC 50255 certification, MOC 50255 certification boot camp, MOC 50255 boot camp, MOC 50255 certification training, MOC 50255 boot camp training, MOC 50255 boot camp certification, MOC 50255 certification course, MOC 50255 course, training MOC 50255, certification MOC 50255, boot camp MOC 50255, certification MOC 50255 boot camp, certification MOC 50255 training, boot camp MOC 50255 training, certification MOC 50255 course.



mcseclasses home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | ced solutions oracle® certification training | linux, unix, aix | comptia certification | webmaster training | pricing | locations | financing | instructors needed | e-mail us





Search classes by keyword:


Search classes by category:

Copyright © 2018 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.