Type
Virtual
Classroom ILT
Skill Level
Available dates
Learning Path
Virtual
Duration
1 Day
TYPE
Virtual
Classroom ILT
LEARNING PATH
SKILL LEVEL
DURATION
AVAILABLE DATES
Introduction:
In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks. Implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.
Audience profile:
This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design.
Pre-requisites:
Before attending this course, students must have:
- Experience with the Microsoft Windows Server 2008/2012 environments and a fundamental understanding of Active Directory
Course Objectives:
After completing this course, students will be able to:
- Features and functions of Group Policy
- Use Group Policy management tools to manage security policies
- Design a Group Policy infrastructure
- Group Policy processing architecture
- Back up, restore, import, and copy Group Policy Objects through the Group Policy
- Management Console
- Use Windows PowerShell to manage Group Policy
- Implement security using Group Policy
- Configure the desktop environment with Group Policy
- Configure roaming profiles and Folder Redirection
- Assign and publish software packages
- Implement AppLocker and software restriction policies
- Create and deploy Administrative Templates
- Configure Group Policy preferences
Module 1: Introduction to Configuration Management |
This module describes the basis of what configuration management is and how it functions.
Lessons: |
|
Lab: Introducing Configuration Management |
|
After completing this module, students will be able to: |
|
Module 2: Using Group Policy Management Tools |
This module describes the differences between local and domain policies and the Group Policy management tools you can use to manage these policies. This module also describes the Group Policy refresh process and how to manually force a refresh ahead of the default interval.
Lessons: |
|
Lab: Using Group Policy Management Tools |
|
After completing this module, students will be able to |
|
Module 3: Designing a Group Policy Infrastructure |
This module details the steps a successful Group Policy deployment should follow, linking your design to how your company can best use the features. Essential network components and security design are also defined.
Lessons: |
|
Lab: Designing a Group Policy Infrastructure |
|
After completing this module, you will be able to: |
|
Module 4: Understanding the Architecture of Group Policy Processing |
This module details the concepts that you must grasp in order to troubleshoot Group Policy. The module also describes the options that are available to change the standard Group Policy processing sequence.
Lessons: |
|
Lab: Understanding the Group Policy Processing Architecture |
|
After completing this module, students will be able to: |
|
Module 5: Troubleshooting and Backing Up GPOs |
This module explains how to use the RSoP tools to determine whether policies are being processed in the correct manner. This module discusses how to use the available tools to troubleshoot policy issues; back up, restore, import, copy, and search for GPOs; and migrate GPOs from one domain to another.
Lessons: |
|
Lab: Troubleshooting and Backing Up GPOs |
|
After completing this module, students will be able to: |
|
Module 6: Securing Windows Using Group Policy |
This module defines the Windows security model and describes the process of using Group Policy to implement user account, computer account, and domain security.
Lessons: |
|
Lab: Securing Windows Using Group Policy |
|
After completing this module, students will be able to: |
|
Module 7: Implementing Application Security Using Group Policy |
This module describes the process of securing applications in a Windows environment. It also explains how to implement UAC (User Account Control) to help prevent users from running unauthorized software, reducing the likelihood that viruses, Trojan horses, or spyware might intrude upon the environment.
Lessons: |
|
Lab: Implementing Application Security Using Group Policy |
|
After completing this module, students will be able to: |
|
Module 8: Configuring the Desktop Environment with Group Policy |
This module explains many of the settings that are available to configure and restrict the user desktop environment, such as Control Panel restrictions, Start Menu settings, and Windows Explorer configuration.
Lessons: |
|
Lab: Configuring the Desktop Environment with Group Policy |
|
After completing this module, students will be able to: |
|
Module 9: Implementing User State Virtualization |
This module explains the different options available to maintain the user’s personal files and settings.
Lessons: |
|
Lab: Implementing User State Virtualization |
|
After completing this module, students will be able to: |
|
Module 10: Assigning and Publishing Software Packages |
This module explains how to use Group Policy for deploying software.
Lessons: |
|
Lab: Assigning and Publishing Software Packages |
|
After completing this module, students will be able to: |
|
Module 11: Configuration Management with Windows PowerShell |
This module explains how to navigate and use basic Windows PowerShell commands and how to use Windows PowerShell to manage Group Policy. It also explains how you can use PowerShell logon scripts with Group Policy.
Lessons: |
|
Lab: Configuration Management with Windows PowerShell |
|
After completing this module, students will be able to: |
|
Module 12: Implementing PowerShell Desired State Configuration |
This module will describe what DSC is all about and how to implement DSC to manage systems on the network.
Lessons: |
|
Lab: Using PowerShell Desired State Configuration |
|
After completing this module, students will be able to: |
|
Module 13: Configuring Group Policy Preferences |
This module describes the function of Group Policy Preferences. You will learn how to combine Preferences and Policies, and how Preferences are different from Policies.
Lessons: |
|
Lab: Configuring Group Policy Preferences |
|
After completing this module, students will be able to: |
|
Associated certifications and exam:
On successful completion of this course students will receive a Torque IT attendance certificate.
Microsoft Overview
Skilled Microsoft engineers add significant value to the marketplace by reducing the cost of technology solutions whilst improving efficiency and fuelling innovation. Through authorized Microsoft training, Torque IT empowers engineers, developers and end-users to realise their full potential by providing them with the necessary knowledge and skills to optimise the adoption and use of Microsoft solutions.
Torque IT considers authorised Microsoft training to be an integral part of any Microsoft implementation. Microsoft authorised training, and associated certification, ensures that you get the most from your technology investment and that you are able to operate above the technology curve. Microsoft career certifications are universally recognised as demonstrating a high level of expertise and credibility for individuals and the organisations that employ them.
Authorized Microsoft training and certification is the industry standard for any solution that includes designing, selling, implementing, upgrading, managing, and operating Microsoft solutions.
For 19 years, Torque IT has maintained the status of Gold Learning Partner for Microsoft in South Africa. This is the highest level of accreditation that Microsoft awards to Learning Partners that specialize in technical, product, sales, development, end-user and solutions training.
These achievements reflect our commitment to providing our customers with quality skills development, enablement, training, and certification solutions that demonstrate exceptional depth, breadth, and expertise across Windows Server, Windows Client, Microsoft Virtualization, Microsoft Azure, Office 365, Exchange Server, SharePoint Server, Skype for Business, System Centre Server, Visual Studio and Microsoft Office technologies.
Torque is recognized by Microsoft, and the industry, as having met rigorous standards for educational competency, service, customer satisfaction and investment in Microsoft technologies that will prepare the next generation of IT industry professionals.