|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn957125432 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
160827s2015 xx o 000 0 eng d |
010 |
|
|
|a 2015946972
|
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d CHVBK
|d OCLCO
|d OCLCQ
|d IDB
|d MERUC
|d OCLCQ
|d OCLCA
|d ZCU
|d ICG
|d BUF
|d OCLCF
|d VT2
|d OCLCA
|d OCLCQ
|d OCLCO
|d WYU
|d LVT
|d TKN
|d DKC
|d OCLCQ
|d UKAHL
|d OCLCQ
|d SDF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1055384419
|a 1066496336
|a 1076713185
|a 1081277736
|a 1228527961
|a 1244446777
|a 1249249566
|
020 |
|
|
|a 9781119035688
|
020 |
|
|
|a 1119035686
|
020 |
|
|
|a 9781119035589
|
020 |
|
|
|a 1119035589
|
020 |
|
|
|a 9781119035671
|q (ebk)
|
020 |
|
|
|a 1119035678
|
029 |
1 |
|
|a AU@
|b 000061374656
|
029 |
1 |
|
|a CHNEW
|b 000893233
|
029 |
1 |
|
|a DEBBG
|b BV043892451
|
035 |
|
|
|a (OCoLC)957125432
|z (OCoLC)1055384419
|z (OCoLC)1066496336
|z (OCoLC)1076713185
|z (OCoLC)1081277736
|z (OCoLC)1228527961
|z (OCoLC)1244446777
|z (OCoLC)1249249566
|
050 |
|
4 |
|a QA76.76.O63
|b .M675 2015
|
082 |
0 |
4 |
|a 005.4/46
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Moskowitz, Jeremy.
|
245 |
1 |
0 |
|a Group Policy :
|b Fundamentals, Security, and the Managed Desktop.
|
250 |
|
|
|a 3rd ed.
|
260 |
|
|
|b Wiley,
|c 2015.
|
300 |
|
|
|a 1 online resource (1058 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Introduction -- Chapter 1: Group Policy Essentials -- Getting Ready to Use This Book -- Getting Started with Group Policy -- Active Directory and Local Group Policy -- An Example of Group Policy Application -- Examining the Resultant Set of Policy -- Group Policy, Active Directory, and the GPMC -- Group Policy 101 and Active Directory -- Our Own Group Policy Examples -- Final Thoughts -- Chapter 2: Managing Group Policy with the GPMC and via PowerShell -- Common Procedures with the GPMC and PowerShell -- Security Filtering and Delegation with the GPMC.
|
505 |
8 |
|
|a Performing RSoP Calculations with the GPMC -- Searching and Commenting Group Policy Objects and Policy Settings -- Starter GPOs -- Back Up and Restore for Group Policy -- Migrating Group Policy Objects between Domains -- GPMC At-a-Glance Icon View -- Final Thoughts -- Chapter 3: Group Policy Processing Behavior Essentials -- Group Policy Processing Principles -- Policy Application via Remote Access, Slow Links, and after Hibernation -- Using Group Policy to Affect Group Policy -- Final Thoughts -- Chapter 4: Advanced Group Policy Processing -- Fine-Tuning When and Where Group Policy Applies.
|
505 |
8 |
|
|a Group Policy Loopback Processing -- Group Policy with Cross-Forest Trusts -- Final Thoughts -- Chapter 5: Group Policy Preferences -- Powers of the Group Policy Preferences -- Group Policy Preferences Concepts -- Group Policy Preferences Tips, Tricks, and Troubleshooting -- Giving Group Policy Preferences a "Boost" (Using PolicyPak Preferences Manager and PolicyPak Cloud) -- Final Thoughts -- Chapter 6: Managing Applications and Settings Using Group Policy -- Understanding Administrative Templates -- Exploring ADM vs. ADMX and ADML Files.
|
505 |
8 |
|
|a ADMX and ADML Files: What They Do and the Problems They Solve -- The Central Store -- Creating and Editing GPOs in a Mixed Environment -- Using ADM and ADMX Templates from Other Sources -- ADMX Migrator and ADMX Editor Tools -- PolicyPak Application Manager -- Final Thoughts -- Chapter 7: Troubleshooting Group Policy -- Under the Hood of Group Policy -- The Birth, Life, and Death of a GPO -- How Client Systems Get Group Policy Objects -- Why Isn't Group Policy Applying? -- Client-Side Troubleshooting -- Advanced Group Policy Troubleshooting with the Event Viewer Logs -- Final Thoughts.
|
505 |
8 |
|
|a Chapter 8: Implementing Security -- The Two Default Group Policy Objects -- The Strange Life of Password Policy -- Inside Basic and Advanced Auditing -- Restricted Groups -- Restrict Software Using AppLocker -- Controlling User Account Control with Group Policy -- Wireless (802.3) and Wired Network (802.11) Policies -- Configuring Windows Firewall with Group Policy -- Final Thoughts -- Chapter 9: Profiles: Local, Roaming, and Mandatory -- Setting the Stage for Multiple Clients -- What Is a User Profile? -- Roaming Profiles -- Mandatory Profiles -- Final Thoughts.
|
520 |
8 |
|
|a Get up to speed on the latest Group Policy tools, features, and best practices Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10 and Windows Server vNext, bringing you up to speed on all the newest settings, features, and best practices. Microsoft Group Policy MVP Jeremy Moskowitz teaches you the major categories of Group Policy, essential troubleshooting techniques, and how to manage your Windows desktops. This is your complete guide to the latest Group Policy features and functions for all modern Windows clients and servers, helping you manage more efficiently and effectively. Perform true desktop and server management with the Group Policy Preferences, ADMX files, and additional add-ons Use every feature of the GPMC and become a top-notch administrator Troubleshoot Group Policy using tools, enhanced logs, Resource Kit utilities, and third-party tools Manage printers, drive maps, restrict hardware, and configure Internet Explorer Deploy software to your desktops, set up roaming profiles, and configure Offline Files for all your Windows clients-and manage it all with Group Policy settings Secure your desktops and servers with AppLocker, Windows Firewall with Advanced Security, and the Security Configuration Manager This is your comprehensive resource to staying current, with expert tips, techniques, and insight.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a Microsoft Windows (Computer file)
|
630 |
0 |
7 |
|a Microsoft Windows (Computer file)
|2 fast
|
650 |
|
0 |
|a Operating systems.
|
650 |
|
0 |
|a Software configuration management.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Directory services.
|
650 |
|
6 |
|a Logiciels
|x Gestion de configurations.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Software configuration management
|2 fast
|
758 |
|
|
|i has work:
|a Group policy (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFWKkm7YXDWTwdy697v6YX
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Moskowitz, Jeremy.
|t Group Policy : Fundamentals, Security, and the Managed Desktop.
|d : Wiley, ©2015
|z 9781119035589
|
830 |
|
0 |
|a Online access with DDA: Askews (Maths)
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4040685
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH27098770
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH27098807
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4040685
|
994 |
|
|
|a 92
|b IZTAP
|