Solved

GPO analysis

Posted on 2013-06-06
3
394 Views
Last Modified: 2013-06-25
I received an email stating that a particular GPO is going to take affect this weekend and I wanted to know how I could find and analyze what this GPO is going to produce?  This is on a Windows 2008 R2 server.
0
Comment
Question by:uppercut7141
3 Comments
 
LVL 3

Expert Comment

by:IKtech
ID: 39226134
get a test system and apply the GPO then test.  Also if you have access to group policy manager in active directory you can investigate what settings are enabled and see a brief description of what they do.

Also you can ask the person who created the policy.
0
 

Author Comment

by:uppercut7141
ID: 39226652
Is there another way to verify what the GPO's are supposed to do...maybe is there a way to verify without connecting to the actual server?  Where else can I check for this?  Would it be under a specific folder or something..Maybe SYSVOL folder?
0
 
LVL 9

Accepted Solution

by:
VirastaR earned 500 total points
ID: 39228503
Hi,

May be Group Policy Modeling will help you with that

Please have a look at this :
http://technet.microsoft.com/en-us/library/cc780305(v=ws.10).aspx
&
http://technet.microsoft.com/en-us/library/cc771389.aspx

Hope that helps :)
0

Featured Post

Are end users causing IT problems again?

You’ve taken the time to design and update all your end user’s email signatures, only to find out they’re messing up the HTML, changing the font and ruining the imagery. What can you do to prevent this? Find out how you can save your signatures from end users today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the shift in today’s hiring climate (http://blog.experts-exchange.com/ee-blog/5-tips-on-succeeding-in-the-new-gig-economy/?cid=Blog_031816), many companies are choosing to hire freelancers to get projects completed efficiently and inexpensively…
A procedure for exporting installed hotfix details of remote computers using powershell
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now