{"id":28,"date":"2014-04-29T19:00:39","date_gmt":"2014-04-30T00:00:39","guid":{"rendered":"http:\/\/blog.metcorp.org\/?p=28"},"modified":"2014-04-29T20:14:54","modified_gmt":"2014-04-30T01:14:54","slug":"ad-reading-active-directory-group-policy","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=28","title":{"rendered":"AD Reading: Active Directory Group Policy"},"content":{"rendered":"<p>The following are extremely useful resources for understanding the Active Directory Group Policy.<\/p>\n<p><strong>Group Policy<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc758751%28WS.10%29.aspx\">Core Group Policy Technical Reference<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/eb0042e3-699b-4c49-abcc-e3526dbecc0e\">How Core Group Policy Works<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/eb0042e3-699b-4c49-abcc-e3526dbecc0e#w2k3tr_gp_how_wtxp\">Core Group Policy Architecture<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/eb0042e3-699b-4c49-abcc-e3526dbecc0e#w2k3tr_gp_how_ynan\">Core Group Policy Physical Structure<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/eb0042e3-699b-4c49-abcc-e3526dbecc0e#w2k3tr_gp_how_rbme\">Core Group Policy Processes and Interactions<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/eb0042e3-699b-4c49-abcc-e3526dbecc0e#w2k3tr_gp_how_whpj\">Network Ports Used by Group Policy<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/eb0042e3-699b-4c49-abcc-e3526dbecc0e#w2k3tr_gp_how_ojba\">Related Information<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc779077%28v=ws.10%29.aspx\">What is Core Group Policy<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc779077%28v=ws.10%29.aspx#w2k3tr_gp_what_lifl\">Change and Configuration Management<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc779077%28v=ws.10%29.aspx#w2k3tr_gp_what_jedm\">Core Group Policy Infrastructure<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc779077%28v=ws.10%29.aspx#w2k3tr_gp_what_xzql\">Core Group Policy Scenarios<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc779077%28v=ws.10%29.aspx#w2k3tr_gp_what_esiz\">Core Group Policy Dependencies<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc779077%28v=ws.10%29.aspx#w2k3tr_gp_what_kwhz\">Related Information<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc784165%28v=ws.10%29.aspx\">Core Group Policy Tools and Settings<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc784165%28v=ws.10%29.aspx#w2k3tr_gp_tools_qcbs\">Group Policy Tools<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc784165%28v=ws.10%29.aspx#w2k3tr_gp_tools_anbv\">Group Policy Settings<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc784165%28v=ws.10%29.aspx#w2k3tr_gp_tools_ezzg\">Group Policy WMI Classes<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc784165%28v=ws.10%29.aspx#w2k3tr_gp_tools_hekr\">Related Information<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc776182.aspx\">Group Policy Components<\/a><\/li>\n<li><a href=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyID=42e30e3f-6f01-4610-9d6e-f6e0fb7a0790&amp;DisplayLang=en\">Group Policy Preferences Overview<\/a> Whitepaper (download)<\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc749336.aspx\">(Vista) <\/a><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc749336.aspx\">&#8211; <\/a><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc749336.aspx\">Troubleshooting<\/a><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc749336.aspx\">Group Policy Using Event Logs<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc786775.aspx\">Interpreting Userenv log files<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc786524%28WS.10%29.aspx\">Designing a Group Policy Infrastructure<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc737786%28v=ws.10%29.aspx\">Overview of Group Policy<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc759180%28v=ws.10%29.aspx\">Planning Your Group Policy Design<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc736938%28v=ws.10%29.aspx\">Designing Your Group Policy Model<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc737330%28v=ws.10%29.aspx\">Deploying Group Policy<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc736987%28v=ws.10%29.aspx\">Maintaining Group Policy<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc780744%28v=ws.10%29.aspx\">Additional Resources for Group Policy Infrastructure<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc778172%28WS.10%29.aspx\">Group Policy Management ConsolE Technical Reference <\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc739431%28v=ws.10%29.aspx\">What Is Group Policy Management Console?<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc756808%28v=ws.10%29.aspx\">How Group Policy Management Console Works<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc778983%28v=ws.10%29.aspx\">Group Policy Management Console Tools and Settings<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc780591%28WS.10%29.aspx\">Group Policy Object Editor<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc737816%28v=ws.10%29.aspx\">What Is Group Policy Object Editor?<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc782876%28v=ws.10%29.aspx\">How Group Policy Object Editor Works<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc758588%28v=ws.10%29.aspx\">Group Policy Object Editor Tools and Settings<\/a><\/p>\n<ul>\n<li>Group Policy Loopback processing<\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/blogs.technet.com\/b\/askds\/archive\/2013\/02\/08\/circle-back-to-loopback.aspx?Redirected=true\">Part 1: Circle Back to Loopback<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/blogs.technet.com\/b\/askds\/archive\/2013\/05\/21\/back-to-the-loopback-troubleshooting-group-policy-loopback-processing-part-2.aspx?Redirected=true\">Part 2: Back to the Loopback: Troubleshooting Group Policy loopback processing<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following are extremely useful resources for understanding the Active Directory Group Policy. Group Policy Core Group Policy Technical Reference How Core Group Policy Works o\u00a0\u00a0 Core Group Policy Architecture o\u00a0\u00a0 Core Group Policy Physical Structure o\u00a0\u00a0 Core Group Policy Processes and Interactions o\u00a0\u00a0 Network Ports Used by Group Policy o\u00a0\u00a0 Related Information What is &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=28\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[5,6],"class_list":["post-28","post","type-post","status-publish","format-standard","hentry","category-technical-reading","tag-adreading","tag-mcm","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=28"}],"version-history":[{"count":1,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/28\/revisions"}],"predecessor-version":[{"id":29,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/28\/revisions\/29"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=28"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=28"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}