Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Default Domain GPO

Posted on 2006-11-22
2
217 Views
Last Modified: 2013-12-04
In W2k the last admin tried to push everything through the Domain security GPO then it didn't work right so he tried to turn on policy blocking. On OUs then to stop it from taking effect., and this had been causing some trouble for me. I was hoping someone could point me in the direction of a tool that I could use that will show me all of the setting he changed in a specific GPO?

Thank you
0
Comment
Question by:ChicagoMikeW
2 Comments
 
LVL 11

Accepted Solution

by:
KaliKoder earned 500 total points
ID: 17996707
Hello ChicagoMikeW-

You can use the GPMC (Group Policy Management Console) to look at effective and resultant policies. It is a very effective tool, you can see only the GPO settings that are applied to an OU, the order they are enforced, the resultant effect (if more than one Group Policy is applied to same OU), you can save reports in html format for later review etc.

You can download GPMC and get information about it from:

http://www.microsoft.com/windowsserver2003/gpmc/default.mspx

I believe GPMC is the tool that would best suit you.

Thanks and Good Luck!
0
 
LVL 2

Author Comment

by:ChicagoMikeW
ID: 17996883
I will give it a try ASAP Thank you
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Trusted Platform Module with Windows 10 - Upgrading TPM 1.2 to TPM 2.0 13 81
Sweet32 Vulnerability in Microsoft IIS7.5 6 947
SHA2 certs for IIS AND Java? 2 113
is this a virus? 3 57
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question