IT tutorials
 
Windows
 

Windows Server 2008 : Group Policy Overview - Using Loopback Processing, Running Scripts with Group Policy

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
1/7/2014 7:58:01 PM

1. Using Loopback Processing

Group Policy settings applied to users normally take precedence over Group Policy settings that apply to computers. As a reminder, the last Group Policy that is applied is the one that takes precedence. Because a computer boots up before a user can log on, the Group Policy settings for the computer is applied first, and the Group Policy settings for the user are applied last.

Note

A simple way of understanding loopback processing is that it ensures that the policies applying to the computer take precedence over the policies applying to the user. For example, if you want to enable folder redirection for users ONLY when they log on to terminal servers, you can enable loopback processing in a GPO that applies to users only when they log on to computers in the terminal server OU.


However, there are times when you want this reversed. In other words, you want the Group Policy settings for the computer to take precedence over the Group Policy settings for the user. You can do so by enabling Loopback Processing. Figure 1 shows the location of this setting.

Figure 1. Enabling Loopback Processing

2. Running Scripts with Group Policy

You can write scripts and have them automatically run through Group Policy. The great strength of this is that you write and configure the script once, and it runs on all the computers in your domain or all the computers in a specific OU, depending on where you link the GPO holding the script.

Figure 2 shows the locations of these GPO settings and the following table explains them.

Group Policy Script EventsComments
Computer StartupThe script runs when the computer starts. The Group Policy setting for a domain GPO is in the Computer Configuration, Policies, Windows Settings, Scripts node.
Computer ShutdownThe script runs when the computer shuts down. The Group Policy setting for a domain GPO is in the Computer Configuration, Policies, Windows Settings, Scripts node.
User logonThe script runs when the user logs on. The Group Policy setting for a domain GPO is in the User Configuration, Policies, Windows Settings, Scripts node.
User logoffThe script runs when the user logs off. The Group Policy setting for a domain GPO is in the User Configuration, Policies, Windows Settings, Scripts node.

Figure 2. Group Policy settings for scripts

Scripts can run either synchronously or asynchronously.

Script Behavior TypesComments
SynchronousScripts run one after the other. Users cannot interact with the system until all scripts have completed.
AsynchronousMultiple scripts run at the same time. User can interact with system before the scripts have completed.

All scripts run asynchronously by default on Windows Server 2008 and Windows Server 2008 R2. This includes both computer startup and user logon scripts.

Tip

The default behavior for computer startup and user logon scripts before Windows Server 2008 was synchronous. Users could not interact with the system until all scripts completed. However, computers boot quicker with this set to asynchronous and the behavior is changed in Windows Server 2008, Server 2008 R2, Windows Vista, and Windows 7. You can modify the new default behavior if needed.

 
Others
 
- Windows Server 2008 : Group Policy Overview - Blocking Inheritance, Enforcing GPOs
- Windows 7 : Updating Software - How to Remove Updates
- Windows 7 : Updating Software - How to Troubleshoot Problems Installing Updates
- Windows 7 : Updating Software - How to Verify Updates
- Windows 7 : BitLocker (part 4) - How to Disable or Remove BitLocker Drive Encryption, Troubleshooting BitLocker Problems
- Windows 7 : BitLocker (part 3) - How to Manage BitLocker Keys on a Local Computer, How to Recover Data Protected by BitLocker
- Windows 7 : BitLocker (part 2) - How to Enable BitLocker Encryption
- Windows 7 : BitLocker (part 1) - How to Use BitLocker with TPM Hardware
- Windows 7 : Encrypting File System (part 3) - How to Recover to an EFS-encrypted File Using a Data Recovery Agent
- Windows 7 : Encrypting File System (part 2) - How to Grant an Additional User Access to an EFS-encrypted File , How to Import Personal Certificates
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us