Solved

Default Domain GPO

Posted on 2006-11-22
2
220 Views
Last Modified: 2013-12-04
In W2k the last admin tried to push everything through the Domain security GPO then it didn't work right so he tried to turn on policy blocking. On OUs then to stop it from taking effect., and this had been causing some trouble for me. I was hoping someone could point me in the direction of a tool that I could use that will show me all of the setting he changed in a specific GPO?

Thank you
0
Comment
Question by:ChicagoMikeW
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 11

Accepted Solution

by:
KaliKoder earned 500 total points
ID: 17996707
Hello ChicagoMikeW-

You can use the GPMC (Group Policy Management Console) to look at effective and resultant policies. It is a very effective tool, you can see only the GPO settings that are applied to an OU, the order they are enforced, the resultant effect (if more than one Group Policy is applied to same OU), you can save reports in html format for later review etc.

You can download GPMC and get information about it from:

http://www.microsoft.com/windowsserver2003/gpmc/default.mspx

I believe GPMC is the tool that would best suit you.

Thanks and Good Luck!
0
 
LVL 2

Author Comment

by:ChicagoMikeW
ID: 17996883
I will give it a try ASAP Thank you
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Monitoring software... 2 73
Sophos EC migration to Cloud. 1 138
PCI compliance 16 59
How to centrally test thousands of laptops USB is blocked 5 62
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question