Solved

Script or Group Policy or Installation File

Posted on 2013-11-25
6
305 Views
Last Modified: 2013-11-25
What is a better best practice when it comes to choosing to use Group Policy, Scripts, or installation package set-up?

For example, I can use the IEAK toolkit to set-up my default Internet Explorer or configure thru Group Policy certain settings.  If I have the option to do either, which is a better best practice or is it strictly administrator preference?
0
Comment
Question by:Robert Mohr
  • 3
  • 3
6 Comments
 
LVL 53

Accepted Solution

by:
McKnife earned 500 total points
ID: 39675777
It depends on what parameters we take to define "best result".
Do we need to log?
Do we need to make everything ready to be rolled back at any time?
Should these settings be applied at once or at next reboot/logon?

It depends. May I ask why you ask?
0
 

Author Comment

by:Robert Mohr
ID: 39675862
We are making some changes which include a more robust Group Policy.
We have used scripts and .msi packages but with Server 2008 R2 we want to take advantage of the more robust Group Policy.

We do need logs and simple ways to roll back so it sounds like Group Policy is the way to go?
0
 
LVL 53

Expert Comment

by:McKnife
ID: 39675876
We cannot tell without having more examples.
What should be called "robust"?
Some examples of settings you are deploying, please and how you solved it so far and which questions arose.
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 

Author Closing Comment

by:Robert Mohr
ID: 39675928
At this point I think it's whatever works best for our environment.
0
 
LVL 53

Expert Comment

by:McKnife
ID: 39675948
Depends on what you do - if you need advice, we need to get detailed.
0
 

Author Comment

by:Robert Mohr
ID: 39676175
We are reviewing Group Policy and I think we won't know until we get into specific situations.
Your answer helps confirm that it is on a case by case situation.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Preface There are many applications where some computing systems need have their system clocks running synchronized within a small margin and eventually need to be in sync with the global time. There are different solutions for this, i.e. the W3…
Hello, As I have seen there a lot of requests regarding monitoring and reporting for exchange 2007 / 2010 / 2013 I have decided to post some thoughts together and link to articles that have helped me. Of course a lot of information you can get…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now