Write the proposals only on all 3 docs
Lab 16
Designing a Group Policy Strategy
This lab contains the following exercises and activities:
| Exercise 16.1 | Planning and Designing Group Policy |
| Exercise 16.2 | Configuring Loopback Processing |
| Exercise 16.3 | Configuring WMI Filtering |
| Exercise 16.4 | Configuring Slow-Link Detection |
| Exercise 16.5 | Modifying the Group Policy Caching Defaults |
| Exercise 16.6 | Deploying a Site-Link GPO |
| Lab Challenge | Planning a Group Policy (Contoso Group Policy Project) |
BEFORE YOU BEGIN
The lab environment consists of student workstations connected to a local area network, along with a server that functions as the domain controller for a domain called contoso.com. The computers required for this lab are listed in Table 16-1.
Table 16-1
Computers required for Lab 16
| Computer | Operating System | Computer Name |
| Server | Windows Server 2012 R2 | CRWDC01 |
| Server | Windows Server 2012 R2 | ARWDC01 |
In addition to the computers, you will also need the software listed in Table 16-2 to complete Lab 16.
Table 16-2
Software required for Lab 16
| Software | Location |
| Lab 16 student worksheet | Lab16_worksheet.docx (provided by instructor) |
Working with Lab Worksheets
Each lab in this manual requires that you answer questions, shoot screen shots, and perform other activities that you will document in a worksheet named for the lab, such as Lab16_worksheet.docx. You will find these worksheets on the book companion site. It is recommended that you use a USB flash drive to store your worksheets, so you can submit them to your instructor for review. As you perform the exercises in each lab, open the appropriate worksheet file, fill in the required information, and then save the file to your flash drive.
SCENARIO
After completing this lab, you will be able to:
Estimated lab time: 140 minutes
| Exercise 16.1 | Planning and Designing Group Policy |
| Overview
|
In this written exercise, you will read the background information for the Contoso Corporation provided in Appendix A, then read the information below, and then answer the questions. |
| Mindset | Group Policy is a technology used to configure user and computer settings from a centralized location (Active Directory Domain Services). Domain-joined computers and users can be controlled by administrators, forcing the computers and clients to meet specific policies. |
| Completion time | 20 minutes |
| Question 1 | Which type of policy is processed first? |
| Question 2 | Typically, which policy is not added to GPO settings? |
| Question 3 | What should you do to ensure certain GPO settings are not overwritten by other policies? |
| Question 4 | A company application includes a 32-bit version and a 64-bit version. How can you ensure that 32-bit machines get the 32-bit version and 64-bit machines get the 64-bit version? |
| Question 5 | You want to create several kiosk machines for the lobby. However, you want to ensure certain settings are applied to the kiosk computer no matter who logs on. What can you do? |
| Question 6 | You administer an OU that is used for testing. How can you block most of the GPOs? |
| Exercise 16.2 | Configuring Loopback Processing |
| Overview
|
In this exercise, the computer settings will overwrite user settings when applying GPO settings for a GPO (GPO1) that you will create. Unlike the approach used in previous courses, you will not be guided through each step. Instead, you must determine the best way to perform the task based on the guidelines provided. |
| Mindset: | You are responsible for establishing a multiple-kiosk computer that will be used in the front lobby of your company. You want to ensure that the configuration of the computer is the same regardless of who logs on. How can you do it? |
| Completion time | 10 minutes |
Take a screen shot of the Configure User Group Policy Loopback Processing Mode dialog box that shows the settings by pressing Alt+Prt Scr and then paste it into your Lab 16 worksheet file in the page provided by pressing Ctrl+V.
| Exercise 16.3 | Configuring WMI Filtering |
| Overview | In this exercise, you will fine-tune the processing of GPOs by using WMI filtering that will affect only 32-bit machines. Unlike the approach used in previous courses, you will not be guided through each step. Instead, you must determine the best way to perform the task based on the guidelines provided. |
| Mindset | Using the WMI Query Language, administrators can filter based on several hardware and software criteria. When added to Group Policy Objects, WMI Filters will filter the targeted systems and filter based on the specified criteria. |
| Completion time | 15 minutes |
Take a screen shot of the Configure user Group Policy Loopback Processing Mode dialog box that shows the settings by pressing Alt+Prt Scr and then paste it into your Lab 16 worksheet file in the page provided by pressing Ctrl+V.
| Exercise 16.4 | Configuring Slow-Link Detection |
| Overview | In this exercise, you will configure a Group Policy to define a slow links as 1000 KBps. Unlike the approach used in previous courses, you will not be guided through each step. Instead, you must determine the best way to perform the task based on the guidelines provided. |
| Mindset | Defined in kilobytes per second (KBps), links between a client and the nearest domain controller are measured. A link slower than 500 KBps is considered a slow link. |
| Completion time | 10 minutes |
Take a screen shot of the Configure Group Policy Slow Link Detection dialog box that shows the settings by pressing Alt+Prt Scr and then paste it into your Lab 16 worksheet file in the page provided by pressing Ctrl+V.
| Exercise 16.5 | Modifying the Group Policy Caching Defaults |
| Overview
|
In this exercise, you will enable Group Policy Caching. Unlike the approach used in previous courses, you will not be guided through each step. Instead, you must determine the best way to enable Group Policy Caching based on the guidelines provided. |
| Mindset | Turned on by default in Windows Server 2012 R2 and Windows 8.1, Group Policy Caching pulls certain GPOs from the domain controller and stores them locally on the client computer for faster load times at the next network logon. |
| Completion time | 5 minutes |
Take a screen shot of the Configure Group Policy Caching dialog box that shows the settings by pressing Alt+Prt Scr and then paste it into your Lab 16 worksheet file in the page provided by pressing Ctrl+V.
| Exercise 16.6 | Deploying a Site-Link GPO |
| Overview | In this exercise, you will link the GPO to Site2. |
| Mindset | Group Policy Objects linked at the site level apply first to all users and computers located within that site. Site-linked GPOs will, in turn, affect all users and computers of all domains within the forest located in that site. This means that if three domains have objects located within one site, a GPO linked to the site will apply to every user and computer in that site. |
| Completion time | 10 minutes |
| Question 7 | Which GPO executes first: domain level, organizational units, or sites? |
| Lab Challenge | Planning a Group Policy (Contoso Group Policy Project) |
| Overview
|
In this written exercise, you will read the background information for the Contoso Corporation provided in Appendix A, then read the information below, and then write your plan. |
| Mindset | You are a new administrator for the Contoso Corporation, which is a leading company in producing smart devices for the home. Your manager wants you to review the GPOs and determine the best strategy to deploy when using and managing GPOs. He also wants you to recommend GPO settings that should be applied. |
| Completion time | 70 minutes |
Create a proposal that includes the following sections:
When writing the proposal, you must explain the reasoning behind your choices.
End of lab.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more