?
Solved

exporting all GPOs and all the settings/links from production environment to the test environment

Posted on 2014-12-10
2
Medium Priority
?
79 Views
Last Modified: 2014-12-22
Hello,
Could you please recommend the best way of exporting all GPOs and all the settings/links, etc from production environment to the test environment.

Thank you very much
0
Comment
Question by:claudiamcse
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 2000 total points
ID: 40492705
Several ways to do this,  you can use vbscript or powershell. Check out Ashely's blog

http://blogs.technet.com/b/ashleymcglone/archive/2014/04/28/three-steps-to-migrate-group-policy-with-powershell.aspx

In a nutshell you are exporting from domain A and importing into your test domain.

Let me know what questions you have on that

Thanks

Mike
0
 
LVL 37

Expert Comment

by:Neil Russell
ID: 40492715
You have three questions open on this now.  

If you are trying to reproduce a test server in an isolated Testlab environment like two of your other posts suggests then you dont need all these questions.  

I have suggested that you you just create a backup or P2V your current active server into an isolated environment and that is it, job done.  You dont set up a lab buy trying to do all the little bits that make up a server one at a time.
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month14 days, 14 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question