Solved

Group Policies-What is it?

Posted on 1998-07-09
2
138 Views
Last Modified: 2013-12-28
I was looking under System Tools in Add/Remove Programs, I installed something called Group Policies. What is it? And how would I use it?
0
Comment
Question by:GreatOne
2 Comments
 
LVL 5

Accepted Solution

by:
stevemiller earned 20 total points
ID: 1642537
Group Based support for system policies.

these are settings for network workgroups that are controlled by a central administrator and executed on the client workstations.  Settings like rights, attributes, and basically controlling what you can and cannot do on your pc.

Microsoft's web site and the win98 help file contain info on using this function.

steve
0
 
LVL 4

Expert Comment

by:TimCaturaHouser
ID: 1642538
This is part of the ongoing march toward the idea of Zero Admin. Windows or ZAW. Right now, for '95 you can download ZAK (the k stands for Kit)

A group is something in NT4.

We might have a group called Sales, and another group called Accounting.  Each group would need different printers, and different applications. Using the above example,

Sales has rights to access the Color Laser printer and can access Word, Excel and PowerPoint.

Accounting has rights to access the high speed dot matrix printer (multi-part forms) Word, Excel, and Forest & Trees accounting package.

The idea is to not allow (lock down) adding say, Fuji Golf that came free in a pak of diskettes, and screwing up the video drivers..... and creating a tech support call for the now 'broken computer'.

A policy can be as loose or as tight as you need it to be.... Hint: Don't get too wierd with policies with workers... They will rebel. Do use them for protecting the systems.

0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

774 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question