Consulting Training Blog Careers About Us Contact Us
All Classes Will Be Held Virtually – Live Online Intertech's Training Division has been successfully instructing professionals through virtual live online training since the advent of the smartboard. It is a proven form and offers the convenience of live questions, group interaction, and labs with an instructor looking over your shoulder. Because of this, we will continue all classes live but virtually, including Agile and Scrum instruction, so businesses and individual’s seeking professional development can keep moving forward during these unexpected times.

Managing, Maintaining, and Securing Your Networks Through Group Policy Training

Course ID: MSL-50255
Duration: 4 Days

Upcoming Classes

Click the Get Notified button for priority notification when a class is next scheduled.

Get Notified

On Site/Private

Can't find a class that fits right for you? Contact us to inquire about scheduling your own private class

Contact Us


Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this course, you will learn to control and manage computer systems and domain users running Windows Server 2003, Server 2008, XP, and Vista. You will learn to create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks.

Bring This Course To You

For groups of 5 or more, let Intertech bring this course to your location. Customized versions tailored towards your objectives are also available.

Learn More

Learning Objectives

After completing this course, students will be able to:

  • Design and deploy security policies for all your Windows 2003/2008 servers, workstations, member servers, XP, and Vista clients
  • Delegate Administrative Control of Group Policies
  • Back up and restore Group Policy Objects (GPOs) through Group Policy Management Console (GPMC)
  • Easily roll out selected software updates and operating system patches from your network environment
  • Tips for troubleshooting Group Policy


This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design.

Course Outline

Module 1: Introduction to Group Policy

This module provides a review of the Active Directory infrastructure and describes the basis of what Group Policy is and how it functions.

  • Group Policy and Active Directory
  • Review of Active Directory
  • Overview of Group Policy

After completing this module, students will be able to:

  • Understand how Active Directory relates to Group Policy
  • Explain the basic concepts of Active Directory
  • Describe the new Group Policy features
Module 2: Group Policy Management Tools

This module describes a downloadable console, Group Policy Management Console, from Microsoft released after Server 2003 intended as a "one-stop shop" for Group Policy administration.

  • What is the GPMC?
  • Installing the GPMC
  • Advanced GPMC Features
  • Migration Tables
  • Integration of RSoP Functionality
  • WMI Filters

After completing this module, students will be able to:

  • Describe the needs filled by the GPMS
  • Successfully install the GPMC following installation requirements
  • Back up, restore, import, copy and search for GPOs using the GPMC
  • Build migration tables and resolve any conflicts
  • Use the GPMS to accomplish RSoP analyses
  • Create and apply a WMI filter
Module 3: Designing a Group Policy Infrastructure

This module details the steps a successful Group Policy deployment should follow, linking your design to how your company can best use the features. Essential network components and security design are also defined.

  • Implementing Group Policy
  • Planning your Group Policy Design
  • Designing Your Group Policy Solution
  • Deploying Your Group Policy
  • Managing Your Group Policy Solution

After completing this module, students will be able to:

  • List the four stages of implementing Group Policy
  • Plan Group Policy in accordance with a company's requirements
  • Follow Group Policy creation guidelines when developing GPOs
  • Deploy Group Policy based on the Active Directory structure
  • Manage Group Policy by delegating administration and setting permissions
Module 4: Troubleshooting Group Policy

This module explains the key concepts that you must grasp in order to effectively troubleshoot Group Policy.

  • Group Policy Infrastructure
  • Group Policy Deployment Order
  • Group Policy Troubleshooting Tools

After completing this module, students will be able to:

  • Describe the Active Directory components that are used to deploy Group Policy
  • Explain the order in which Group Policy is deployed in Active Directory
  • Describe some of the tools used to troubleshoot Group Policy
Module 5: Deploying Legacy Security Templates

This module defines the Windows security model and details the process of using the Security Configuration and Analysis tools to apply security templates.

  • Security Architecture
  • The SECEDIT Database
  • Hardening Computer Accounts

After completing this module, students will be able to:

  • Explain how security principals, access control lists, security groups, user profiles, and the registry are used for Group Policy deployment
  • Create, analyze, apply and customize security templates
  • App account and local policies
Module 6: : Implementing Security Using Group Policy

This module details effective security design using Active Directory logical components. You will also learn how to utilize predefined Security Guide templates and the GPO Accelerator tool in order to further security your environment.

  • Getting Started with Security Configuration
  • Domain Security
  • Controlling Services with Group Policy
  • Enforcing an Audit Policy
  • Restricting Security Group Membership
  • Using Scripts

After completing this module, students will be able to:

  • Use Microsoft security guidelines, tools, and templates to configure security policies for your network
  • Use ACLs to deploy domain security
  • Define Group Policy network settings per machine and per user
  • Create an effective audit policy
  • Use Restricted Groups as a component of your security policy
Module 7: Configuring the Desktop Environment

This module explains many of the settings that are available to configure and restrict the user desktop environment, such as Control Panel restrictions, Start Menu settings, and Windows Explorer configuration.

  • Scripts for Clients
  • Desktop, Start Menu, and Taskbar Control
  • Control Panel Control
  • Windows Components
  • User Profiles
  • Folder Redirection
  • Printer Management and Pruning
  • Computer Network Settings

After completing this module, students will be able to:

  • Specify startup, shutdown, logon, and logoff scripts and settings
  • Identify the many ways to control the user desktop, Start menu, and taskbar
  • Restrict the Control Panel settings
  • Restrict operations that users can perform in Windows Explorer, Internet Explorer, and Terminal Services
  • Customize processing of user profiles and roaming user profiles
  • Redirect user folders to a server
Module 8: Assigning and Publishing Software Packages

This module explains how manage to use Group Policy for deploying software.

  • MSI Packages
  • Group Policy as a Software Deployment Method
  • Software Deployment
  • Setting Up Distribution Points
  • Systems Management Server

After completing this module, students will be able to:

  • Describe the basic elements of an MSI package and determine when to use an existing package or build or repackage your own
  • Define the requirements for distributing software via Group Policy
  • Identify the best method of software deployment for your organization
  • Explain how to set up distribution points for software deployment
  • Explain when you might want to use SMS instead of Group Policy
Module 9: Software Restrictions Policies

This module explains the deployment of software restriction policies including the essential components, rules, and the order of precedence of such policy. You will learn how to use software restriction policies to prevent users from running unauthorized software reducing the likelihood that viruses, Trojan horses, or spyware might intrude upon the environment.

  • What is a Software Restriction Policy?
  • How to Create a Software Restriction Policy
  • Additional Rules to Identify Software
  • What Makes an Effective Software Restriction Policy

After completing this module, students will be able to:

  • Describe software restriction policies and how to use them
  • Explain how to create software restriction policies
  • Explain how additional rules are applied to software restriction policies
  • Describe the characteristics of an effective software restriction policy
Module 10: Creating and Deploying Legacy Administrative Templates

This module explains the logic behind administrative templates, when to use them, and the basics of how to write them.

  • Overview of ADM Templates
  • Standard ADM Templates
  • Registry Structure Used by ADM Templates
  • ADM Template Syntax
  • Custom ADM Templates

After completing this module, students will be able to:

  • Describe the benefits of using ADM templates
  • List the ADM templates that come with each version of Windows
  • Identify the registry locations that ADM templates affect
  • List and explain the key words and syntax used in building ADM templates
  • Explain the different ways you can add custom ADM templates to the registry
Module 11: New Group Policy Features for Windows Vista and Server 2008

This module explains the new GPO features and settings that are available for Windows Vista and Windows Serve 2008. You will learn about the changes in the GPO Editor and differences in GPO processing.

  • Group Policy in Windows Vista and Windows Server 2008
  • Group Policy Editor Enhancements
  • Changes to Group Policy Processing
  • New GPO Settings

After completing this module, students will be able to:

  • Briefly review the new features of Group Policy in Windows Vista and Windows Server 2008
  • Describe some of the Group Policy Editor changes in Windows Vista and Windows Server 2008
  • Compare some of the differences in policy processing between Windows Server 2008 and older operating systems
  • List some of the new categories of GPO settings
Module 12: Managing Group Policy Preferences

This module explains the function of GPO preferences, describes how Preferences can be combined with GPO Policies are different from Policies.

  • Overview of Group Policy Preferences
  • Comparing Preferences and Policy Settings
  • Configuring Preference Settings
  • Group Policy Preferences: Advanced Configuration

After completing this module, students will be able to:

  • Describe the purpose of Group Policy Preferences
  • Explain the difference between Preferences and Policies
  • Configure Group Policy Preference settings, including Windows and Control Panel settings
  • Describe the advanced Preference configuration options available in Group Policy

Free Resources from Intertech

Free Tutorial: Cordova & Ionic Apps to a Windows Phone

Free Guide: Creating Mobile Apps with Xamarin.Forms

Free Guide: Claims-Based Identity and Access Control