Solved

What is the difference between GPO Computer Configuration and User Configuration?

Posted on 2009-05-09
2
709 Views
Last Modified: 2012-05-06
Can someone please explain to me what is the difference between Group policy "Computer Settings" and "User Settings", as most of the stuff is identical.

How to decide where to apply settings?

Some specific rules I should abide when setting GPOs?

Thanks.
0
Comment
Question by:mrmut
2 Comments
 
LVL 5

Accepted Solution

by:
DTAHARLEV earned 500 total points
ID: 24346201
you create an OU, which may have computers under it, or users. You then assign a Group Policy to the OU. It will apply to everything under it, using computer settings to computers under it and user settings to users under it. for example, if you have a policy to set user jdoe's wallpaper to "\\server\share\image.bmp", this will take effect on all machines jdoe logs on to.

If you have a computer policy set to not allow USB devices, anyone who logs on to this machine -- jdoe or anyone else -- won't be able to do it.

What if they conflict? Well, the way by which they're determined is pretty complex, including OUs, Sites, and so on. I'd start here:

http://www.microsoft.com/windowsserver2003/techinfo/overview/gpintro.mspx

0
 

Author Comment

by:mrmut
ID: 24346233
Thanks!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
While rebooting windows server 2003 server , it's showing "active directory rebuilding indices please wait" at startup. It took a little while for this process to complete and once we logged on not all the services were started so another reboot is …
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

822 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question