Solved

Deploying Printers Through Group Policy

Posted on 2013-06-02
2
453 Views
Last Modified: 2013-06-06
Hello,

we are going to deploy printers through GPOs but i have a questions regarding the deployment .

Please check the Screen Shot

Printers
What the Difference between
1- Create
2- Replace
3- Update

In our deployment we are going to use Update but if the user change the Default Printers after log off and log in or restart does it will come back again as group policy or no ?

Regards
0
Comment
Question by:fadyaz
2 Comments
 
LVL 31

Accepted Solution

by:
Frosty555 earned 500 total points
ID: 39214974
You should be using the "Print Management" console, which will manage the printer sharing, drivers, and group policies, rather than trying to create the group policies yourself manually.

Follow this step by step tutorial:
http://www.youtube.com/watch?v=4kJbnJ4xHrA

That being said, the difference between create, replace and update is subtle but significant, and applies to all aspects of the Control Panel section of group policy (e.g. it applies to mapped drivers, printers, files, folders etc):

Create - Creates the object if it isn't already there according to the group policy. If it IS already there, stop and don't touch it

Replace - Delete the object if it already exists. Then, re-create it according to the group policy

Update - create the object if it isn't already there. If it IS already there, update it's settings to match what the group policy states it should be

In general the correct selection is "Update".
0
 
LVL 2

Expert Comment

by:Wouter Makkinje
ID: 39217072
I second what Frosty555 said, You should only deploy printers via GPP (Group Policy Preferences) IF you want to control what printer is set as standard for the users.

Otherwise use Print Managment Console to deploy the printers. The difference being that with Print Management Console you will need to deploy PushPrinterconnections.exe IF you have Windows XP clients. Also the other difference is that you cannoit steer the default printer this way.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
This article explains the steps required to use the default Photos screensaver to display branding/corporate images
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question