?
Solved

2003 ad GPO push pull

Posted on 2008-06-11
3
Medium Priority
?
650 Views
Last Modified: 2008-06-11
i have a client asking me how GPOs are applied are they pulled or pushed from the network. Are they applied when someone logs on etc. I have worked for a long tme with GPO but I guess this just never came up how are they applied thanks guys
0
Comment
Question by:zenworksb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 70

Expert Comment

by:KCTS
ID: 21759611
They are applied according to the schedule defined in the group policy, policy - the default is every 90mins for most machines with every 5 mins for DCs.

Some policies can ONLY be applied/re-applied however at startup or logon (eg re-directing a folder)
0
 

Author Comment

by:zenworksb
ID: 21759731
where is the group policy policy so I can take a look at it in there environment thank you so much KCTS you are the best
0
 
LVL 70

Accepted Solution

by:
KCTS earned 2000 total points
ID: 21759795
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A hard and fast method for reducing Active Directory Administrators members.
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question