Contact Us info@learnquest.com

??WelcomeName??
??WelcomeName??
photo

Thank you for your interest in LearnQuest.

Your request is being processed and LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

photo

Thank you for your interest in Private Training.

We look forward to helping you develop the perfect training solution to help you meet your company's goals.

For immediate assistance, speak with one of our representatives using the chat module below. Otherwise, LearnQuest or a LearnQuest-Authorized Training Provider will be in touch with you shortly.

photo

Thank you for your interest in LearnQuest!

Now, you will be able to stay up-to-date on our latest course offerings, promotions, and training discounts. Watch your inbox for upcoming special offers.

title

Date: xxx

Location: xxx

Time: xxx

Price: xxx

Please take a moment to fill out this form. We will get back to you as soon as possible.

All fields marked with an asterisk (*) are mandatory.

Managing Windows Environments with Group Policy

Course content updated by LearnQuest
Price
2,975 USD
Duration
5 Days
Rating
Course
MOC-50255
Available Formats
Classroom Training, Online Training
Microsoft
Prices reflect a 22.5% discount for IBM employees.
Prices shown are the special AWS Partner Prices.
Prices reflect the Capgemini employee discount.
Prices reflect the UPS employee discount.
Prices reflect the ??democompanyname?? employee discount.
GSA Private/Onsite Price: ??gsa-private-price??
For GSA pricing, please go to GSA Advantage.
This course is eligible for the IBM Full Access Training Pass
Enroll today and save 10% on this course. Use promo code CLOUD10 when registering.
Working on a laptop
Gain access to IBM’s library of digital, on-demand courses for one low annual subscription fee
IBM Full Access Training Pass

Class Schedule

Delivery Formats

Sort results

Filter Classes

Guaranteed to Run

Modality

Location

Language

Date

  • Guaranteed to Run
    Date: 20-Sep-2021 to 24-Sep-2021
    Time: 9AM - 5PM US Eastern
    Location: Virtual
    Language: English
    Delivered by:  
    Price: 2,975 USD
  • Guaranteed to Run
    Date: 4-Oct-2021 to 8-Oct-2021
    Time: 8:30AM - 4:30PM US Eastern
    Location: Virtual
    Language: English
    Delivered by:  
    Price: 2,975 USD
View Global Schedule

Course Description

Overview

In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.
 

Objectives

In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.


 

Audience

This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design.
 

Prerequisites

    Before attending this course, students must have:

    • Experience with the Microsoft Windows Server 2008/2012 environments and a fundamental understanding of Active Directory.



     

Topics

Course OutlineModule 1: Introduction to Configuration ManagementThis module describes the basis of what configuration management is and how it functions. Lessons
  • Configuration Management Overview
  • Configuration Management Using Group Policy
  • Group Policy Features Introduced with Later Versions of Windows
  • Using Windows PowerShell in the Configuration Management Process
Lab : Introducing Configuration Management
  • Boot and join the lab virtual machines to the domain
  • Explore the default Policy Settings
  • Explore Windows 10 and Windows Server 2016 interface

After completing this module, students will be able to:

  • Define configuration management
  • List the ways you can use configuration management in Windows
  • Describe the new Group Policy features available in the latest versions of Windows
  • Explain how PowerShell can be used with configuration management
Module 2: Using Group Policy Management ToolsThis module describes the differences between local and domain policies and the Group Policy management tools you can use to manage these policies. This module also describes the Group Policy refresh process and how to manually force a refresh ahead of the default interval.Lessons
  • Local and Domain Policies
  • Using Group Policy Management Console
  • Understanding Group Policy Refresh
Lab : Using Group Policy Management Tools
  • Working with Multiple Local Policies
  • Installing the GPMC on various Windows operating systems
  • Basic Group Policy Management techniques

After completing this module, students will be able to:

  • Describe the advantages of using domain policies instead of local policies
  • List the capabilities of the Group Policy Management Console
  • Describe the requirements for installing the Group Policy Management Console
  • Explain how to use the different GPMC features to create and manage policies
  • Describe the elements of the gpupdate command
Module 3: Designing a Group Policy InfrastructureThis module details the steps a successful Group Policy deployment should follow, linking your design to how your company can best use the features. Essential network components and security design are also defined.Lessons
  • Design Stages for a Group Policy Infrastructure
  • Planning your Group Policy Design
  • Designing Your Group Policy Solution
  • Deploying Your Group Policy Solution
  • Managing Your Group Policy Solution
Lab : Designing a Group Policy Infrastructure
  • Creating an OU Structure for Group Policy
  • Delegating GPO Management
  • Creating Starter GPOs
  • Using the AGPM to manage policies

After completing this module, students will be able to:

  • Describe the four stages of implementing Group Policy
  • Explain how to plan Group Policy in accordance with a company's requirements
  • Describe the guidelines that you should follow when you create new GPOs
  • Explain how to manage Group Policy by delegating administration and setting permissions
Module 4: Understanding the Architecture of Group Policy ProcessingThis module details the concepts that you must grasp in order to troubleshoot Group Policy. The module also describes the options that are available to change the standard Group Policy processing sequence.Lessons
  • Group Policy Components in AD DS
  • Understanding the Group Policy Deployment Order
  • Modifying Group Policy Processing
Lab : Understanding the Group Policy Processing Architecture
  • Working with Multiple GPO Levels
  • Using the Block Inheritance and Enforce Options
  • Implementing Security Filtering
  • Creating a WMI Filter
  • Working with Loopback Processing

After completing this module, students will be able to:

  • Describe the Active Directory components that you can use to deploy Group Policy
  • Explain the order in which Group Policy is deployed in Active Directory
  • Describe the methods that are available to modify Group Policy processing
Module 5: Troubleshooting and Backing Up GPOsThis module explains how to use the RSoP tools to determine whether policies are being processed in the correct manner. This module discusses how to use the available tools to troubleshoot policy issues; back up, restore, import, copy, and search for GPOs; and migrate GPOs from one domain to another.Lessons
  • Using Group Policy Troubleshooting Tools
  • Integration of RSoP Functionality
  • Group Policy Logging Options
  • Backing Up, Restoring, Importing, and Copying GPOs
  • Building Migration Tables
Lab : Troubleshooting and Backing Up GPOs
  • Using Tools for Troubleshooting
  • Backing Up and Restoring GPOs
  • Use Command Line Tools to Perform GPO Maintenance

After completing this module, students will be able to:

  • Describe the Group Policy troubleshooting tools
  • Describe the GPMC tools that have RSoP functionality
  • Describe the GPO logging tools used to obtain more detail about the GPO processing issues
  • Explain how to back up, restore, import, and copy GPOs using the GPMC
  • Explain how to build migration tables
Module 6: Securing Windows Using Group PolicyThis module defines the Windows security model and describes the process of using Group Policy to implement user account, computer account, and domain security. Lessons
  • Exploring the Windows Security Architecture
  • Securing User Accounts
  • Exploring Security Policies
  • Windows Firewall with Advanced Security
  • Implementing Domain Security
  • Security Policy Options for Window Client and Windows Server
Lab : Securing Windows Using Group Policy
  • Using the Security Compliance Manager
  • Managing Auditing with a GOP
  • Create and Test Restricted Groups
  • Implement Security Templates
  • Creating a Windows Firewall Policy

After completing this module, students will be able to:

  • Describe the Windows security architecture
  • Explain how to secure user accounts with Group Policy
  • Explain how to harden computer accounts
  • Explain how to control the domain security policy with a GPO
Module 7: Implementing Application Security Using Group PolicyThis module describes the process of securing applications in a Windows environment. It also explains how to implement UAC (User Account Control) to help prevent users from running unauthorized software, reducing the likelihood that viruses, Trojan horses, or spyware that might intrude upon the environment. Lessons
  • Managing UAC Settings
  • Defending Against Malware
  • Using AppLocker to Restrict Software
  • Implementing Windows App Security Settings
Lab : Implementing Application Security Using Group Policy
  • Implementing UAC
  • Using AppLocker to Restrict Software
  • Configure Windows Defender with Group Policy
  • Windows 8.1 Client Lock Screen and App Policies

After completing this module, students will be able to:

  • Describe UAC
  • Describe the AppLocker features
  • Explain the features of Windows Apps
Module 8: Configuring the Desktop Environment with Group PolicyThis module explains many of the settings that are available to configure and restrict the user desktop environment, such as Control Panel restrictions, Start Menu settings, and Windows Explorer configuration.Lessons
  • Exploring Script Types and Controlling Script Execution
  • Defining the Desktop, Start Menu, and Taskbar Settings
  • Defining the Control Panel Settings
  • Defining the Windows Components Settings
  • Configuring the Printer Management and Pruning Settings
  • Defining the Network Settings
  • Discovering the new Group Policy Settings
Lab : Configuring the Desktop Environment with Group Policy
  • Using Logon Scripts
  • Configuring Desktop Settings
  • Managing Windows Components
  • Configuring Printers with Group Policy
  • Managing Network Settings

After completing this module, students will be able to:

  • Describe the startup, shutdown, logon, and logoff scripts and settings.
  • Identify the many ways to control the user desktop, Start menu, and taskbar settings
  • Explain how to restrict the Control Panel settings
  • Explain how to restrict operations that users can perform in Windows Explorer, Windows Internet Explorer, and Remote Desktop Services
  • Explain how to configure the printer management and pruning settings
  • Describe the network settings
Module 9: Implementing User State VirtualizationThis module explains the different options available to maintain the user's personal files and settings. Lessons
  • Configuring Folder Redirection
  • Managing Offline Files
  • Implementing User Experience Virtualization
  • OneDrive for Business
Lab : Implementing User State Virtualization
  • Preparing for Folder Redirection,Offline Files, and UE-V
  • Configuring Folder Redirection
  • Managing Offline Files
  • Implementing User Experience Virtualization

After completing this module, students will be able to:

  • Explain how to redirect user folders to a server
  • Describe the Offline Files feature
  • Explain the purpose of User Experience Virtualization
  • Describe the OneDrive for Business feature
Module 10: Assigning and Publishing Software PackagesThis module explains how to use Group Policy for deploying software.Lessons
  • Using MSI Packages to Distribute Software
  • Using Group Policy as a Software Deployment Method
  • Deploying Software
  • Setting Up Distribution Points
  • Using the Systems Center Configuration Manager to Distribute Software
Lab : Assigning and Publishing Software Packages
  • Creating a Shared Directory Structure on a Server
  • Creating a Custom MSI package
  • Repackaging an Existing Install Package
  • Deploying Software Packages with a GPO

After completing this module, students will be able to:

  • Describe the basic elements of an MSI package
  • Determine when to build or repackage your own
  • Define the requirements for distributing software via Group Policy
  • Describe when you might want to assign and publish software
  • Explain how to upgrade and remove packages
  • Explain how to set up distribution points for software deployment
  • List the advantages of using SCCM to distribute software instead of Group Policy
Module 11: Configuration Management with Windows PowerShellThis module explains how to navigate and use basic Windows PowerShell commands and how to use Windows PowerShell to manage Group Policy. It also explains how you can use PowerShell logon scripts with Group Policy.Lessons
  • Introducing Windows PowerShell
  • Using Windows PowerShell
  • Writing PowerShell Scripts
  • Windows PowerShell Library for Group Policy
  • Windows PowerShell-Based Logon Scripts
Lab : Configuration Management with Windows PowerShell
  • Exploring the Windows PowerShell
  • Using Windows PowerShell to Manage GPOs

After completing this module, students will be able to:

  • Describe the Windows PowerShell features
  • Explain how to perform the basic Windows PowerShell operations
  • Explain how to access the Windows PowerShell library for Group Policy
  • Manage systems using PowerShell commands
Module 12: Implementing PowerShell Desired State ConfigurationThis module will describe what DSC is all about and how to implement DSC to manage systems on the network.Lessons
  • Introducing Group Policy Preferences
  • Comparing Preferences and Policy Settings
  • Options for Applying Preferences
  • Configure Preference Settings
Lab : Using PowerShell Desired State Configuration
  • Write a PowerShell Desired State Configuration Script
  • Create a DSC
  • Implement DSC

After completing this module, students will be able to:

  • Describe the purpose of Group Policy Preferences
  • Explain the differences between Preferences and Policy Settings
  • Describe the Windows and Control Panel Settings
  • List Advanced Preferences Configuration Options
Module 13: Configuring Group Policy PreferencesThis module describes the function of Group Policy Preferences. You will learn how to combine Preferences and Policies, and how Preferences are different from Policies.Lessons
  • Introducing Group Policy Preferences
  • Comparing Preferences and Policy Settings
  • Options for Applying Preferences
  • Configuring Preferences Settings
Lab : Configuring Group Policy Preferences
  • Implementing Computer Preferences
  • Implementing User Preferences

After completing this module, students will be able to:

  • Describe the purpose of Group Policy Preferences
  • Describe the differences between Preferences and Policy Settings
  • Identify the settings that you can configure in the Computer Configuration and User Configuration sections of the Group Policy Management Console
  • Describe the Windows and Control Panel settings

 
2020 Top 20 Training Industry Company - IT Training

Need Help?

Call us toll free at 877-206-0106 or e-mail us at info@learnquest.com

Personalized Solutions

Need a personalized solution for your training? Contact us, and one of our advisors will help you find the best solution to your training needs.

Contact us

Need Help?

Do you have a question about the courses, instruction, or materials covered? Do you need help finding which course is best for you?

Talk to us

Self-Paced Training Info

Learn at your own pace with anytime, anywhere training

  • Same in-demand topics as instructor-led public and private classes.
  • Standalone learning or supplemental reinforcement.
  • IBM SPVC content varies by course but at a minimum always contains a copy of the course materials and 30 day access to labs.
  • View the IBM Self-Paced version of this outline and what is included in the SPVC course.
  • Learn more about e-Learning

Course Added To Shopping Cart

bla

bla

bla

bla

bla

bla

Self-Paced Training Terms & Conditions

??spvc-wbt-warning??
??group-training-form-area??
??how-can-we-help-you-area??
??personalized-form-area??
??request-quote-area??

Sorry, there are no classes that meet your criteria.

Please contact us to schedule a class.
Nothing yet
here's the message from the cart

To view the cart, you can click "View Cart" on the right side of the heading on each page
Add to cart clicker.

Purchase Information

??elearning-coursenumber?? ??coursename??
View Cart

Need more Information?

Speak with our training specialists to continue your learning journey.

 

Delivery Formats

Close

By submitting this form, I agree to LearnQuest's Terms and Conditions

heres the new schedule
This website uses third-party profiling cookies to provide services in line with the preferences you reveal while browsing the Website. By continuing to browse this Website, you consent to the use of these cookies. If you wish to object such processing, please read the instructions described in our Privacy Policy.
Your use of this LearnQuest site affirms your consent to our use of session and persistent cookies to track how you use our website.