What should you configure?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. The domain contains two organizational units (OUs) named 0U1 and 0U2 in the root of the domain. Two Group Policy objects (GPOs) named GP01 and GP02 are created. GPOi is linked to 0U1. GP02 is linked to 0U2. 0U1 contains a client computer named Computer1. 0U2 contains a user named User1. You need to ensure that the GPOs applied to Computer1 are applied to User1 when User1 logs on. What should you configure?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2012. The domain contains two organizational units (OUs) named 0U1 and 0U2 in the root of the domain. Two Group Policy objects (GPOs) named GP01 and GP02 are created. GPOi is linked to 0U1. GP02 is linked to 0U2. 0U1 contains a client computer named Computer1. 0U2 contains a user named User1. You need to ensure that the GPOs applied to Computer1 are applied to User1 when User1 logs on. What should you configure?

A.
Item-level targeting

B.
Group Policy loopback processing mode

C.
the Enforced setting

D.
Block Inheritance



Leave a Reply 7

Your email address will not be published. Required fields are marked *


Mega

Mega

To set user configuration per computer, follow these steps:

In the Group Policy Microsoft Management Console (MMC), click Computer Configuration.
Locate Administrative Templates, click System, click Group Policy, and then enable the Loopback Policy option.

This policy directs the system to apply the set of GPOs for the computer to any user who logs on to a computer affected by this policy. This policy is intended for special-use computers where you must modify the user policy based on the computer that is being used. For example, computers in public areas, in laboratories, and in classrooms.

bambooyip

bambooyip

Yes, Loopback processing is the only answer although the question does not describe enough details. When a computer boots up, computer configuration policies from GPO1 was applied. Assuming there is some user configuration policies on GPO1, they were not applied if there is no users login. Next is when there is a user logon, user configuration policies from GPO2 will apply (assuming necessary filter has been configured). So, user configuration policies from GPO1 is missing. Lookback process will take care of it.

Google

Google

We prefer to honor lots of other net sites on the net, even though they arent linked to us, by linking to them. Underneath are some webpages worth checking out.

mobile app builder

mobile app builder

that will be the finish of this write-up. Here you will obtain some web pages that we believe you will enjoy, just click the links over

注管理システム

注管理システム

always a massive fan of linking to bloggers that I adore but really don’t get a good deal of link enjoy from

Latex Inks distributor

Latex Inks distributor

usually posts some really interesting stuff like this. If youre new to this site