Solved

GPO ADMX Files for MS Office 2013

Posted on 2014-11-05
5
207 Views
Last Modified: 2014-11-15
I would like to configure a GPO with MS Office options.  In the past it was easy.  Download the ADM files... Add them... Have at it!!

Now you have to create a PolicyDefinitions Folder in the SYSVOL folder and dump the ADMX files in there....

My issue is once I do that ALL of the other GPO policies disappear.

How can I successfully add the OFFICE 2013 ADMX files, while keeping the rest of the policies in tact?
0
Comment
Question by:BSModlin
  • 3
  • 2
5 Comments
 
LVL 56

Accepted Solution

by:
Cliff Galiher earned 500 total points
ID: 40424932
You don't *have* to create a a folder on sysvol. The feature you describe is known as a central store and has been around since Vista. Not new to office 2013 and not mandatory. You can copy the files to the local store as always.

If yo choose to create a central store, you need to copy the OS ADMX files there as well if you want to view/edit them in GPMC. That is as simple as taking the newest OS on your network, navigating to the local store, and copying those ADMX files to the same central store as office 2013.
0
 

Author Comment

by:BSModlin
ID: 40424950
So if I have Windows 7Pro workstations, and a combination of  2008 and 2012 servers I should copy ALL the ADMX files from Windows 7 ONLY?

Do I need to copy them from the servers?

I only have 1 site with 2 DCs.... How does this affect replication/bandwidth?
0
 
LVL 56

Expert Comment

by:Cliff Galiher
ID: 40424975
2012 is newer that 7. As I said, the newest on your network. So I'd only copy the 2012.

They are small text files. There will be a small one-time replication hit, but it should barely be a blip.
0
 

Author Comment

by:BSModlin
ID: 40425030
Ok, great..... and where are they located on the 2012 R2 Server?
0
 
LVL 56

Expert Comment

by:Cliff Galiher
ID: 40425056
System drive \ windows \ policydefinitions
If I recall correctly.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Recently Microsoft released a brand new function called CONCAT. It's supposed to replace its predecessor CONCATENATE. But how does it work? And what's new? In this article, we take a closer look at all of this - we even included an exercise file for…
This article descibes how to create a connection between Excel and SAP and how to move data from Excel to SAP or the other way around.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now