<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
    <title>MDMandGPanswers</title>
    <atom:link href="https://mdmandgpanswers.com/rss" rel="self" type="application/rss+xml" />
    <link>https://mdmandgpanswers.com/</link>
    <language>en-US</language>
    <sy:updatePeriod>
        hourly </sy:updatePeriod>
    <sy:updateFrequency>
        1 </sy:updateFrequency>

    <image>
        <url>https://mdmandgpanswers.com/assets/images/favicon.png</url>
        <title>MDMandGPanswers</title>
        <link>https://mdmandgpanswers.com/rss</link>
        <width>32</width>
        <height>32</height>
    </image>


        <item>
        <title> How to Validate Dynamic Groups in Microsoft Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-validate-dynamic-groups-in-microsoft-intune-</link>
        <pubDate>2025-02-03T13:18:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ There are two different types of groups you can create with Intune. The first is the traditional &amp;ldquo;Assigned Group&amp;rdquo; in which administrators manually add or remove members. This means of course that group membership only changes when an administrator makes a change. These are best for small organizations or small stable groups within a larger enterprise. 

&amp;ldquo;Dynamic Groups&amp;rdquo; offer an automated approach to group management, where membership is determined by specific query rul ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;There are two different types of groups you can create with Intune. The first is the traditional “Assigned Group” in which administrators manually add or remove members. This means of course that group membership only changes when an administrator makes a change. These are best for small organizations or small stable groups within a larger enterprise. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;“Dynamic Groups” offer an automated approach to group management, where membership is determined by specific query rules and conditions. Here, members are added or removed in real-time as they meet or no longer meet the specified criteria. These are ideal for large enterprises, large groups that change membership, or large-scale deployments based on departments, locations, or device types.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;How to Create a Dynamic Group&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;There are two ways to create dynamic groups. The first is using the Microsoft Intune admin center and navigating to Groups and select “New group.” On the next page you will create a name for the Group and state whether it is an Assigned or Dynamic group. In the screenshot below, I have selected Dynamic Device. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67be088f8fb24-DG21.png&quot; style=&quot;width: 750px; height: 500px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Now I need to create a dynamic query which will dictate the membership criteria. The screenshot above shows the “Add dynamic query” links that takes me to where I will create the Dynamic membership rules. Here you will use the wizard to create the rules that are comprised of properties, operators and values. You can add as many expressions as you want. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67be08b6239f5-DG22.png&quot; style=&quot;width: 750px; height: 270px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Here are some examples of possible groupings you can do:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;To automatically group all devices running Windows 11 the rule would be:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;(device.operatingSystem -eq &quot;Windows&quot;) and (device.deviceOSType -eq &quot;11&quot;)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can use this group to deploy security baselines policies or upgrade legacy systems.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	 &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can also make a group comprised of a specific Windows version such as Windows 11 24H2 Devices as follows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;(device.deviceOSVersion -startsWith &quot;10.0.261&quot;)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Group All Users in a Specific Department such as Finance:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;(user.department -eq &quot;Finance&quot;)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can build composite rule sets combining multiple criteria, for example, a group that identifies corporate Windows 10 devices by validating both the operating system version and company ownership status in a single expression:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;(device.deviceOSType -startsWith &quot;Windows&quot;) and (device.deviceOSVersion -startsWith &quot;10.0&quot;) and (device.deviceOwnership -eq &quot;Company&quot;)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Dynamic Group Validation&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Before using new dynamic groups in a production environment, you should validate the rules to confirm that the dynamic rule results operate as expected. To do this, go to Groups in the Microsoft Intune admin center, select the group you want to validate, and navigate to the Dynamic membership rules section. Click &quot;Validate Rules&quot;, add users or devices that should be included in the group, and then click &quot;Validate&quot; to confirm the proper assignment. The screenshot below outlines these steps. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67be091b88730-DG23.png&quot; style=&quot;width: 779px; height: 700px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Note that dynamic groups don&#039;t update instantly and may take up to 24 hours to process changes. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;I mentioned there are two ways to create and validate Dynamic Groups because you can also use the Microsoft Entra ID portal using the exact steps I used in Intune. You can also use PowerShell to validate dynamic group membership using the following cmdlet:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span monol=&quot;&quot; style=&quot;font-family:&quot;&gt;$GroupID = &quot;&lt;your_group_id&gt;&quot;&lt;/your_group_id&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span monol=&quot;&quot; style=&quot;font-family:&quot;&gt;$UserID = &quot;&lt;user_object_id&gt;&quot;&lt;/user_object_id&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span monol=&quot;&quot; style=&quot;font-family:&quot;&gt;Get-MgGroupMember -GroupId $GroupID | Where-Object { $_.Id -eq $UserID }&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; text-align:justify&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;If the output is empty, the user or device is not part of the group, meaning the rule might need adjustments. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;As organizations continue to grow and evolve, the ability to automatically manage group memberships based on specific attributes becomes a necessity for maintaining security, compliance, and operational efficiency. By leveraging rule-based membership, these groups significantly reduce administrative overhead while ensuring that access controls, policy applications, and resource distributions remain current and accurate. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The Dynamic Duo: Leveraging Compliance and Conditional Access in Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-dynamic-duo-leveraging-compliance-and-conditional-access-in-intune</link>
        <pubDate>2025-01-20T21:52:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Enterprise cloud accounts, particularly services like Office 365, face constant cybersecurity threats from malicious actors. While enforcing strict password complexity requirements can help protect these accounts, this approach alone has significant limitations. Complex passwords may lead users to create workarounds that actually reduce security such as writing passwords down or reusing them across multiple accounts. There is also a linear correlation that as password complexity increases, organ ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Enterprise cloud accounts, particularly services like Office 365, face constant cybersecurity threats from malicious actors. While enforcing strict password complexity requirements can help protect these accounts, this approach alone has significant limitations. Complex passwords may lead users to create workarounds that actually reduce security such as writing passwords down or reusing them across multiple accounts. There is also a linear correlation that as password complexity increases, organizations typically see a corresponding rise in password-related help desk tickets, increasing IT support costs and reducing productivity. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;However, even properly authenticated users can pose security risks when accessing systems from compromised devices. Organizations need to prevent access from endpoints that have security vulnerabilities or malware infections, regardless of valid user credentials. Of course, when users are accessing resources from their home, you can’t be sure what type of device they may be using.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;If you use Microsoft Intune to manage your user accounts, you can leverage two key policy types working in tandem: Conditional Access policies and compliance policies. When implemented together, these policies ensure organizational resources are only accessible from devices that meet your security requirements. Conditional Access policies define the circumstances under which access is permitted, while compliance policies establish the security standards devices must maintain.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Create a Compliance Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Compliance policies in Microsoft Intune are sets of rules and conditions used to evaluate the configuration of your managed devices. These policies help secure organizational data and resources by ensuring devices meet specific configuration requirements. Devices must satisfy the conditions set in these policies to be considered compliant by Intune such as:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Requiring encryption (e.g., BitLocker).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Enforcing password complexity.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Ensuring the device is not jailbroken or rooted.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Setting minimum/maximum OS versions&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;To create a compliance policy in the Microsoft Intune Admin Center, navigate to Devices &gt; Compliance and select “Create Policy” as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f679ae87641e9b-dualpolicy1.png&quot; style=&quot;width: 750px; height: 292px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Name your policy and then choose the compliance settings you want. In the example below, I want all compliant machines to have BitLocker, Secure Boot, and Code integrity enabled. Because all my employees are running machines with Windows 11, version 22H2, I chose that as the minimum operating system to be compliant. For the minimum operating system version in Intune, you would specify: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Minimum OS Version: 10.0.22621.0&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;This corresponds to Windows 11, version 22H215. By leaving the maximum OS version blank, you are allowing those with later versions access. See the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f679ae8a35a3ef-dualpolicy2.png&quot; style=&quot;width: 750px; height: 576px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Because I am running Microsoft Defender for Endpoint on employee machines, I will configure Microsoft Defender for Endpoint rules in the compliance policy. Here, I am requiring that all devices be at or under a machine risk score of Low. This means that Devices with &quot;Medium&quot; or &quot;High&quot; risk scores will be marked as noncompliant.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f679ae8d2ae06f-dualpolicy3.png&quot; style=&quot;width: 550px; height: 173px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;The compliance policy will immediately mark the device as noncompliant when any one of these conditions is not met. On the next screen, you can configure additional Actions for noncompliance, such as sending email notifications to users or remotely locking devices. For this example, I am going to skip this section and proceed to apply the policy to all users and groups.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Creating a Conditional Access Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Conditional access policies serve as a type of gatekeeper for designated resources of your organizations. These policies make real-time decisions about whether to grant, limit, or block access to resources based on specific conditions. You can create policies that do things such as:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Require MFA when accessing resources from outside your corporate network &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Only allow access from devices that are encrypted and up-to-date on security patches &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Block access from countries where your company doesn&#039;t operate &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Enforce browser-only access for unmanaged devices &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Require periodic re-authentication for sensitive applications&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;To create a conditional access policy, navigate below to Conditional access and click on “Create new policy” and name it. In my example here, I selected a group and then chose Office 365 as the target as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f679ae8fd8a9cf-dualpolicy4.png&quot; style=&quot;width: 750px; height: 717px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;One of the purposes of this conditional access policy is to scrutinize all the login attempts from off prem locations. By excluding trusted networks from the policy, we maintain seamless access for users on known secure networks while enforcing additional security measures for connections from elsewhere.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;For this configuration to be effective, trusted network locations must be pre-defined in the Microsoft Entra admin center. These typically include:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Corporate office network ranges&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Known VPN network ranges&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Other verified secure networks&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;The screenshot demonstrates this configuration:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f679ae93a54705-dualpolicy5.png&quot; style=&quot;width: 400px; height: 371px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;I then created two conditions that must be met to grant access:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Require multifactor authentication (MFA) only for off-premises access attempts. Users accessing resources from within the corporate network (on-premises) will not need to go through MFA.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Require that all computers must be compliant with the organization&#039;s policies to prevent employees from logging in using personal, potentially unsecured devices when off-prem. The associated compliance policy created earlier ensures that off-premises devices meet the same operating system and Microsoft Defender for Endpoint requirements as on-premises users.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;The selections are shown in the screenshot below:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f679ae9634c02c-dualpolicy6.png&quot; style=&quot;width: 300px; height: 877px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Conclusion&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Of course, I have only scratched the surface here of possibilities. The configurations discussed here represent just a small sample of Intune&#039;s extensive security capabilities. Conditional Access and compliance policies can be customized with numerous additional controls and requirements to match your organization&#039;s specific security needs and risk tolerance. As threats evolve and organizational requirements change, these policies can be adjusted and you should regularly review and update your policies. By leveraging the full potential of Intune&#039;s policy framework, organizations can build a dynamic, responsive security posture that aligns with the principles of zero trust while enabling a modern, flexible workplace.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Understanding Background Refresh Delays for Remote Machines </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/understanding-background-refresh-delays-for-remote-machines</link>
        <pubDate>2025-01-06T12:27:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Group Policy and Mobile Device Management (MDM) solutions like Microsoft Intune both experience a time lag between policy creation or modification and its deployment to target devices. This delay is an inherent characteristic of centralized management systems:

Group Policy:


	Policies refresh every 90 minutes by default for domain-joined computers. Domain controllers refresh every 5 minutes
	There is a random offset up to 30 minutes to prevent network congestion


Microsoft Intune:
 ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Group Policy and Mobile Device Management (MDM) solutions like Microsoft Intune both experience a time lag between policy creation or modification and its deployment to target devices. This delay is an inherent characteristic of centralized management systems:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;u&gt;Group Policy&lt;/u&gt;&lt;/b&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Policies refresh every 90 minutes by default for domain-joined computers. Domain controllers refresh every 5 minutes&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;There is a random offset up to 30 minutes to prevent network congestion&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;u&gt;Microsoft Intune&lt;/u&gt;&lt;/b&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Check-in frequency is typically every 8 hours for Windows device&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Accelerating Group Policy Deployment&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In certain situations, waiting for standard Group Policy refresh intervals isn&#039;t practical, particularly when immediate policy updates are crucial. For example, when implementing a new GPO to address an emerging security threat, or when troubleshooting requires immediate policy changes affecting permissions. While it may be feasible to use Remote Desktop Protocol (RDP) to connect to critical servers and manually update policies via command prompt, this approach isn&#039;t always efficient or scalable. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;A simple method to force Group Policy updates is through the Group Policy Management Console (GPMC). By right-clicking on an organizational unit and selecting &quot;Group Policy Update,&quot; administrators can trigger an immediate policy refresh. When selected, a confirmation dialog appears as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6799135ddec30-gpupdate1.png&quot; style=&quot;width: 500px; height: 319px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Confirming this prompt will force all computers within the selected organizational unit to immediately update their Group Policy settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;If you have Microsoft Endpoint Configuration Manager (formerly SCCM) in your environment, you can use it to trigger gpupdate as well using the management console.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Using PowerShell for Gpupdates&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Another alternative for forcing gpupdates on remote computers is to use the Invoke-GPUpdate command in PowerShell. The example below shows the command if you wanted to update the Group Policy on the local computer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;Invoke-GPUpdate -Force&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The commnd template below shows how to force GPUpdates on a remote computer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;Invoke-GPUpdate -Computer &quot;ComputerName&quot; -Force -RandomDelayInMinutes 0&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Here&#039;s a breakdown of the key parameters:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;-Computer &quot;ComputerName&quot;: Specifies the target computer. Replace &quot;ComputerName&quot; with the actual name of the remote computer you want to update.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;-Force: This parameter ensures that all policies are reapplied, even if they haven&#039;t changed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;-RandomDelayInMinutes 0: Sets the random delay to 0 minutes, which means the update will be applied immediately.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;For example, to force a Group Policy update on a computer named &quot;COMPUTER02&quot;, you would use:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;Invoke-GPUpdate -Computer &quot;COMPUTER02&quot; -Force -RandomDelayInMinutes 0&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;To apply updates on more than one remote computer, you can do this:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;# Define the target computer(s)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;$computers = @(&quot;Computer1&quot;, &quot;Computer2&quot;)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;# Run gpupdate remotely on the target computers&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;Invoke-Command -ComputerName $computers -ScriptBlock {&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;    gpupdate /force&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can also use a loop or pipeline as shown in the example below: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;$computers = &quot;Computer1&quot;, &quot;Computer2&quot;, &quot;Computer3&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#196b24&quot;&gt;$computers | ForEach-Object { Invoke-GPUpdate -Computer $_ -Force -RandomDelayInMinutes 0 }&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Note that when the gpupdate command is run remotely, the remote clients will briefly see a CMD screen pop-up notifying them of the Group Policy update&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Scheduling Updates&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;If you aren’t in a hurry to deploy group policy updates but instead want to schedule GPUpdates at a precise time for designated machines, you can use Task Scheduler. Simply configure the task to run the gpudate command and deploy the task to the remote machines via Group Policy, PowerShell, or other deployment tools.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Use Device Categories to Organize and Manage Devices in Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/use-device-categories-to-organize-and-manage-devices-in-intune</link>
        <pubDate>2024-12-23T16:14:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you have ever created a Device Configuration Policy with Microsoft Intune, you may have noticed a Menu Item called &amp;ldquo;Device Categories.&amp;rdquo; Device categories They provide a way to group devices based on specific criteria so you can deploy special policies for designated departments. Categories can be based on various factors such as device type, department, or location. For instance,


	Sales devices need a CRM app installation as well as VPN configuration
	Finance devices require ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;If you have ever created a Device Configuration Policy with Microsoft Intune, you may have noticed a Menu Item called “Device Categories.” Device categories They provide a way to group devices based on specific criteria so you can deploy special policies for designated departments. Categories can be based on various factors such as device type, department, or location. For instance,&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Sales devices need a CRM app installation as well as VPN configuration&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Finance devices require stricter security and encryption policies as well as financial software deployment&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Marketing Devices need social media management tools and content creation software deployment&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;By categorizing devices, your organization can ensure that sensitive departments like Finance have appropriate security measures in place. Device categories allow administrators to quickly apply policies to specific departments or device types without manual assignment. When users enroll their devices, they can select a category, which automatically adds the device to the corresponding group in Intune. Let’s say you ship your sales personnel new laptops. During the enrollment process of their new device, users can choose the appropriate category, reducing administrative overhead.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Creating a Device Category&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;To create or edit a device category, you must be a Global Administrator or Intune Administrator. Using the Microsoft Intune Admin Center, navigate to Devices &gt; Device Categories &gt; click Create device category. Enter a name for the new device category and add an optional description as shown in the screenshot below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f677701a6149fe-DC1.png&quot; style=&quot;width: 700px; height: 298px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;You can add an optional tag in the next step and then verify your settings on the Review + Create tab. Once the device category is created, you will see it in your list of device categories. Devices can be assigned to categories manually or you can allow users to make their selection during enrollment.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;In addition to setting up device configurations, you can set up corresponding dynamic Azure AD groups. These dynamic groups can automatically add or remove members based on specified criteria&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The Many Ways to Block Access to Windows Command Prompt using Intune or Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-many-ways-to-block-access-to-windows-command-prompt-using-intune-or-group-policy</link>
        <pubDate>2024-12-16T11:04:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Since the early days of Group Policy, I have been talking about the importance of blocking Windows command prompt for non-administrative users. While it is an essential tool for IT personnel, in the wrong hands, the command prompt can be used to execute potentially harmful commands, access sensitive system files, modify system settings, run malicious scripts, or launch programs that could compromise system integrity. Even barring malicious intent, preventing access helps maintain system stabilit ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;margin-top: 11px; margin-bottom: 5px;&quot;&gt;Since the early days of Group Policy, I have been talking about the importance of blocking Windows command prompt for non-administrative users. While it is an essential tool for IT personnel, in the wrong hands, the command prompt can be used to execute potentially harmful commands, access sensitive system files, modify system settings, run malicious scripts, or launch programs that could compromise system integrity. Even barring malicious intent, preventing access helps maintain system stability by preventing accidental misuse of powerful command-line tools that could disrupt operations or expose confidential data.&lt;/p&gt;

&lt;p style=&quot;margin-top: 11px; margin-bottom: 5px;&quot;&gt;While the objective may be the same, there are multiple methods to implement this policy in modern IT environments. Let’s explore the various ways to achieve this security measure using Group Policy, Microsoft Intune and the Intune Education portal.  &lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Using Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The way to block access to Windows Command Prompt using Group Policy hasn’t changed at all over the years. It is still a straightforward approach. Simply create a new GPO and navigate to User Configuration &gt; Administrative Templates &gt; System &gt; and enable the policy setting “Prevent access to the command prompt&quot; as shown in the screenshot below:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67756688ec405-cmd1.png&quot; style=&quot;width: 700px; height: 462px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Note that the setting, “Prevent access to registry editing tools” has been enabled which as well and is highly recommended.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Using Intune Settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;Settings Picker&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;When we start talking about Microsoft Intune, there are multiple ways to block access. The simplest approach is to use the Settings Catalog Configuration Profile. Using the Microsoft Intune admin center, navigate to Devices &gt; Configuration &gt; Create &gt; New policy. Choose Windows 10 and later as the Platform and Settings catalog as the Profile type. Do a search for “CMD” and browse Administrative Templates\System. Then enable the “Prevent access to the command prompt (User)&quot; setting” and choose the “Disable the command prompt script processing also? (User)&quot; if desired. These steps are outlined in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f677566b267123-cmd2.png&quot; style=&quot;width: 700px; height: 245px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Note that until December 2024 you could use Administrative Templates to create a new configuration profile to block CMD access. Microsoft has now phased out the use of Administrative Templates for creating new configuration profiles to block CMD access.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;OMA-URI Settings&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can also create a Configuration profile using OMA-URI settings. Here are the settings:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;OMA-URI path:  ./User/Vendor/MSFT/Policy/Config/ADMX_ShellCommandPromptRegEditTools/DisableCMD&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Data type: Integer&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Value: 1 (to block) or 2 (to block and disable scripting)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;See the screenshot below for an example:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f677566dfd847f-cmd3.png&quot; style=&quot;width: 700px; height: 139px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;AppLocker Settings&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;If you&#039;ve already created an AppLocker Group Policy that successfully blocks the CMD prompt, you can leverage this existing configuration in Intune. Extract the XML content from your Group Policy and deploy it through Intune using OMA-URI settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;OMA-URI: ./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/apps/EXE/Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Data type: String&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Value: (Paste the XML content of your AppLocker policy here)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Education Portal Method&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Some educational institutions with limited IT resources opt for the Education version of Microsoft Intune. This simplified platform is designed to be more accessible, allowing staff members with basic technical knowledge, such as teachers with some IT background, to manage and implement fundamental Mobile Device Management (MDM) policies. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can access the Intune Education portal at (&lt;a href=&quot;https://intuneeducation.portal.azure.com/&quot; style=&quot;color:#467886; text-decoration:underline&quot; target=&quot;_blank&quot;&gt;https://intuneeducation.portal.azure.com/&lt;/a&gt;). Then navigate to Groups &gt; All Devices &gt; Settings &gt; Windows Device Settings &gt; Apps. Use the &quot;Block Access to Administrative Apps&quot; option as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6775671a0c20a-cmd4.png&quot; style=&quot;width: 700px; height: 305px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Note that by default, this setting also blocks access to other system apps such as PowerShell and regedit.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Intune Administrative Templates are Now Retired </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/intune-administrative-templates-are-now-retired</link>
        <pubDate>2024-12-02T09:27:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you have recently attempted to make Intune configuration profiles using the tried-and-true Administrative Templates, you may have stumbled upon a surprise. A &amp;quot;(retired)&amp;quot; tag is now visible next to Administrative Templates, and the Create button is greyed out as shown in the screenshot below.



After all these years, Administrative Templates are being retired in Microsoft Intune. This means you can no longer create new Administrative Templates configuration profiles through the  ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;If you have recently attempted to make Intune configuration profiles using the tried-and-true Administrative Templates, you may have stumbled upon a surprise. A &quot;(retired)&quot; tag is now visible next to Administrative Templates, and the Create button is greyed out as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6775508578194-retired1.png&quot; style=&quot;width: 450px; height: 719px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;After all these years, Administrative Templates are being retired in Microsoft Intune. This means you can no longer create new Administrative Templates configuration profiles through the path: Devices &gt; Configuration &gt; Create &gt; New policy &gt; Windows 10 and later &gt; Administrative Templates. Users will now be directed to use the Settings Catalog instead which hosts the same settings found in Administrative Templates.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Existing Administrative Templates can still be viewed, updated, and deleted so you can still fully utilize any configuration policies you have made in the past. The retirement of Administrative Templates does not affect other templates, which will continue to be supported.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Buy a Laptop ... For the Normal Person... in 2025. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-buy-a-laptop--for-the-normal-person-in-2025</link>
        <pubDate>2024-11-27T18:46:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This is a yearly re-post and re-edit, originally written in 2009 and updated (irregularly) on an annual basis. What started as advice for close friends has become one of my most popular blog entries. Here&amp;rsquo;s the fully updated guide for the end of 2024 into 2025.

Tip: Search for &amp;quot;Final Thoughts&amp;quot; to just jump to the END for the TL;DR version / summary / exactly what to do if you&amp;#39;re &amp;quot;in a hurry.&amp;quot;

Quick Updates for 2024-2025:


	
	The rise of ARM machines.
	
 ]]>
        </description>
        <content:encoded>
            &lt;h2 style=&quot;font-style:italic;&quot;&gt;This is a yearly re-post and re-edit, originally written in 2009 and updated (irregularly) on an annual basis. What started as advice for close friends has become one of my most popular blog entries. Here’s the fully updated guide for the end of 2024 into 2025.&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;Tip: Search for &quot;Final Thoughts&quot; to just jump to the END for the TL;DR version / summary / exactly what to do if you&#039;re &quot;in a hurry.&quot;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Quick Updates for 2024-2025:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;
	&lt;p&gt;The rise of ARM machines.&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;What’s the deal with CoPilot, NPUs, and AI chips?&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;My &quot;about face&quot; on Chromebooks—who’s using them in my life?&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;iPads... with a mouse?&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;Jeremy&#039;s laptop update: What I’m using in 2024 and where I&#039;m going in 2025.&lt;/p&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you’re an IT geek like me, chances are you’ve been asked, “What kind of laptop should I buy?” more times than you can count.&lt;/p&gt;

&lt;p&gt;And if you’re not an IT geek, you’re probably asking this very question to someone who is.&lt;/p&gt;

&lt;p&gt;This guide is for both groups.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;For the IT Pros:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This question might not seem directly relevant to you, since your organization likely provides you with a laptop. But because you carry one around or have that unmistakable geeky vibe, you’ve likely been cornered with the question, “What kind of laptop should I buy?” more than once.&lt;/p&gt;

&lt;p&gt;You might be tempted to say, “Buy a MacBook,” partly to dodge any future support requests since you don’t use one yourself. (Here’s a great example of that problem, courtesy of &lt;a href=&quot;http://theoatmeal.com/comics/computers&quot; rel=&quot;noopener&quot; target=&quot;_new&quot;&gt;The Oatmeal&lt;/a&gt;.) That said, MacBooks are undeniably fantastic machines. If you want to do serious work on one, you absolutely can. But this guide isn’t about Macs; it’s about how to buy a &lt;strong&gt;Windows PC laptop.&lt;/strong&gt; Macs are great, and if you’re inclined to go that route, more power to you.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;For Everyone Else:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Your challenges are significant, too. Ask three IT geeks, and you’ll probably get three different answers.&lt;/p&gt;

&lt;p&gt;This guide, “Jeremy’s Guide to Buying a New PC Laptop in 2024-2025,” is what I share with friends, family, and anyone else who asks me for advice. It’s written for the everyday person who wants clear, actionable guidance without the noise.&lt;/p&gt;

&lt;p&gt;Seriously, when someone asks me about laptops, I send them a link to this post—and I’m done.&lt;/p&gt;

&lt;p&gt;These recommendations should work for about 90% of the people who come to you for advice. Sure, there will be exceptions, but this guide is designed to get most people pointed in the right direction.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Jeremy’s Guide to Buying a new PC-based Laptop in 2025&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;We’re going to answer some questions here like:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Laptop or Ultrabook ?&lt;/li&gt;
	&lt;li&gt;What &quot;Chip&quot; should I get in my laptop?&lt;/li&gt;
	&lt;li&gt;Should I opt for a Chromebook instead of a Windows Laptop?&lt;/li&gt;
	&lt;li&gt;Laptop or iPad or Surface (Windows Tablet)?&lt;/li&gt;
	&lt;li&gt;Should I get a $200 Windows laptop?&lt;/li&gt;
	&lt;li&gt;What is / should I get a Microsoft Surface?&lt;/li&gt;
	&lt;li&gt;iPad Pro? Will that work for me?&lt;/li&gt;
	&lt;li&gt;Where can I get good deals?&lt;/li&gt;
	&lt;li&gt;What kind of hardware (and warranty) should I get?&lt;/li&gt;
	&lt;li&gt;Should I get Windows 11 or hunt down a laptop with Windows 10?&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;&lt;strong&gt;Laptop or Ultrabook?&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;To make sure we all understand the marketing vocabulary you’re likely to encounter as you go to buy a machine:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Laptops: You know what a laptop is.&lt;/li&gt;
	&lt;li&gt;Ultrabook: Just like a laptop, but thinner and lighter.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For most people, they want Laptops. They’re mid priced, mid weight and have a full sized keyboard.&lt;/p&gt;

&lt;p&gt;If you pay a little more, you can get an Ultrabook, which is just like a laptop — except lighter. Sometimes less ports and you have to drag around a dongle to increase your ports.&lt;/p&gt;

&lt;p&gt;I think there are a ton of great options out there where you don’t have buy a HEAVY laptop, or buy an EXPENSIVE Ultrabook.&lt;/p&gt;

&lt;p&gt;Said another way, you can get a great laptop, which approaches the weight of an Ultrabook, at a “Laptop cost.”&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Non-Windows tablets (iPad, Android, Chromebooks)&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Before diving into laptops, let’s take a quick detour to discuss your potential &lt;strong&gt;“second” device.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You might be wondering, &lt;em&gt;“Do I even need a laptop? Maybe an iPad, iPad Pro, or Chromebook would work just as well?”&lt;/em&gt; Or perhaps you’ve heard of the &lt;strong&gt;Microsoft Surface&lt;/strong&gt; and want to know where it fits in.&lt;/p&gt;

&lt;p&gt;Here’s the bottom line: &lt;strong&gt;nothing beats a laptop for ACTUAL WORK.&lt;/strong&gt;&lt;/p&gt;

&lt;h4&gt;&lt;strong&gt;iPads: Almost There, but Not Quite&lt;/strong&gt;&lt;/h4&gt;

&lt;p&gt;The iPad can be pushed into doing actual work, but it’s not designed for it. Apple offers a range of iPads—the standard iPad, the iPad Mini, and the jumbo iPad Pro, which is essentially just a &lt;em&gt;really big iPad with a pen&lt;/em&gt;. These devices have specialized apps that can mimic work functionality, but ultimately, they’re not a replacement for a laptop.&lt;/p&gt;

&lt;p&gt;That said, I’ve found some surprising utility in using my &lt;strong&gt;iPad Mini&lt;/strong&gt; for light tasks. On a recent trip, I paired it with a $15 Bluetooth travel mouse, and it was a game-changer. Websites that previously felt clunky on an iPad suddenly worked beautifully. Now, when I travel, I often bring only my iPad Mini, a Bluetooth keyboard, and that mouse—it’s “good enough” for about 90% of what I need.&lt;/p&gt;

&lt;p&gt;But let’s be real: I’m not writing this guide on an iPad. Creating documents, delivering presentations, or building spreadsheets is technically possible on an iPad, but the experience pales compared to a laptop or desktop. Even with a Bluetooth keyboard, the software and overall workflow aren’t as smooth.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Verdict:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If you need a device for &lt;em&gt;real work&lt;/em&gt; and want a travel machine that will last for years, go with a laptop.&lt;/li&gt;
	&lt;li&gt;If you’re lounging on a beach, bus, or couch and want to read, game, surf, or stream Netflix—occasionally handling business websites—a Bluetooth-equipped iPad might suffice.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Android Tablets and Chromebooks: Where Do They Fit?&lt;/h3&gt;

&lt;p&gt;Some people can and do use a Google Chromebook is their “daily driver” for all things. And in 2024, I got on board. In 2024, Chromebooks became part of my family. One was provided by a school for educational use, and the other I gave to my parents. Here’s why:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chromebooks in Schools:&lt;/strong&gt;&lt;br /&gt;
Chromebooks are perfect for K-12 environments. They run Google apps, store almost everything in the cloud, and are virtually disposable in terms of hardware—if one breaks, there’s no local data to lose. Schools love them for their simplicity, cost-effectiveness, and “it just works” factor.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chromebooks for My Parents:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For my parents, it took a few hours and I put all their stuff in Google land, and gave them a laptop. With much kicking and screaming where &quot;&lt;em&gt;This can&#039;t possibly wor&lt;/em&gt;k&quot; and &quot;&lt;em&gt;I don&#039;t know how printing or scanning will work&lt;/em&gt;&quot; and &quot;&lt;em&gt;I can&#039;t live without Microsoft Word&lt;/em&gt;&quot; ... 8 months into this experiment, &lt;strong&gt;I&#039;ve had zero tech support calls &lt;/strong&gt;and it &quot;just totally works&quot; for their (modest) situation.&lt;/p&gt;

&lt;p&gt;The Chromebook has proven itself as ideal: Documents are stored and shared in Google Workspace, and I can step in remotely if necessary.&lt;/p&gt;

&lt;p&gt;While my parents don’t use Android apps, it’s good to know the capability exists to install them if needed. Chromebooks may not work for my daily needs, but for them, it was &lt;em&gt;exactly&lt;/em&gt; the right solution.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My Take on Chromebooks Summary:&lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;If you can manage your tasks on a Chromebook for six months, give it a shot&lt;/em&gt;. You might find you don’t need a Windows laptop at all, avoiding the constant upgrade treadmill. This path isn’t for me, but for the right person, it’s an excellent option.&lt;/p&gt;

&lt;p&gt;I know: Shocker. Again, this route ISN&#039;T for me, but for my parents, it was EXACTLY what the doctor ordered.&lt;/p&gt;

&lt;p&gt;Okay, now that we’ve covered tablets and Chromebooks, let’s get back to &lt;strong&gt;Windows laptops.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Back to laptops.. Windows Laptops.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Which laptop brand should I get?&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Before diving into whether you should try hard to get Windows 10 on your laptop (we’ll get to that soon), let’s address the broader question: &lt;strong&gt;Which laptop brand should you buy?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here’s the reality: &lt;strong&gt;All laptops are basically the same.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I know, it’s a bold statement, but hear me out. Much like cars, 99% of the “guts” in laptops are nearly identical. The differences between them mostly come down to features like:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The number or type of ports (USB 3.0, USB-C, etc.).&lt;/li&gt;
	&lt;li&gt;Whether it has one or two video chips (let’s not even go there).&lt;/li&gt;
	&lt;li&gt;Keyboard styles: does it twist or snap off to become a tablet, or is it just a plain laptop?&lt;/li&gt;
	&lt;li&gt;Speed differences: some are a little faster, some a little slower.&lt;/li&gt;
	&lt;li&gt;Weight: some are heavier, others lighter.&lt;/li&gt;
	&lt;li&gt;Screen sizes: from 14&quot; to 16&quot;, there’s a range.&lt;/li&gt;
	&lt;li&gt;10-key pad: some laptops have it, some don’t.&lt;/li&gt;
	&lt;li&gt;Power supplies: large, heavy ones versus compact travel-friendly options.&lt;/li&gt;
	&lt;li&gt;Touchscreens: available on some models, not on others.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But again, &lt;strong&gt;99% of laptops running Windows are fundamentally the same&lt;/strong&gt; in terms of what they can do. That’s great news for most users because it means you can’t really go wrong with a new laptop.&lt;/p&gt;

&lt;h3&gt;My #1 Buying Tip: Understand the Warranty&lt;/h3&gt;

&lt;p&gt;Since laptops are so similar, the real difference comes down to support. A good warranty can make or break your ownership experience. (We’ll dive deeper into warranties in the next section.)&lt;/p&gt;

&lt;h3&gt;Where to Find the Best Deals&lt;/h3&gt;

&lt;p&gt;Here are my top recommendations for buying a new laptop:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;New Dell Inspiron Laptops&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;They’re affordable, reliable, and fast, and Dell offers excellent warranties (more on this shortly).&lt;/li&gt;
		&lt;li&gt;Inspiron laptops are &quot;perfectly reasonable&quot; for the average person. Like Goldilocks, not too much, not too little. Basically &quot;just right.&quot;&lt;/li&gt;
		&lt;li&gt;Make sure you select a model with a &lt;strong&gt;Solid-State Drive (SSD)&lt;/strong&gt;—I can’t emphasize this enough. Avoid drives with moving parts; they’re outdated. Good news, its hard to find a laptop anymore without SSDs anyway in 2024 / 2025.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Dell Factory Outlet: &lt;a href=&quot;https://www.dell.com/en-us/dfh/lp/outlet&quot;&gt;https://www.dell.com/en-us/dfh/lp/outlet&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;Think of this as Dell’s “island of lost toys.” Most items here are lightly used returns, often from customers who decided they couldn’t afford the purchase.&lt;/li&gt;
		&lt;li&gt;Everything comes with Dell’s original warranty, so you’re protected. I’ve personally purchased four laptops from the Outlet, and it’s been a win every time.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Online Retailers: NewEgg, Backmarket, and others&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;These sites offer great deals, including new, off-lease, or market closeouts.&lt;/li&gt;
		&lt;li&gt;While the prices are tempting, warranties can be hit or miss. Many items are covered by the manufacturer’s warranty only, so you’ll need to research each deal carefully. Don’t expect much after-sales support from the retailer.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Retail Stores: Best Buy, Office Depot, Staples, etc.&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;Even with an enticing warranty or a killer deal, I can’t recommend these stores for laptops.&lt;/li&gt;
		&lt;li&gt;Why? These places are often staffed by undertrained employees, and turnover is high. Can you trust them to help with a problem 1.5 years down the line?&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Other Online Deal Sites: Woot, Buy.com, etc.&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;Like NewEgg, these sites often offer manufacturers’ warranties only, which can range from 30 to 90 days. That’s not ideal for most buyers.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;h1&gt;&lt;strong&gt;Understanding the warranty (the most important part of your laptop)&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Let’s take a moment to talk about &lt;strong&gt;Dell laptops&lt;/strong&gt; and why I’ve historically been a big fan. (Stick with me to the end, though—I’ll explain why I personally use Lenovo now. Trust me, it’ll make sense.)&lt;/p&gt;

&lt;p&gt;The simple reason I’ve recommended Dell laptops for years is that &lt;strong&gt;Dell’s warranty structure is easy to understand&lt;/strong&gt;—even for my “pea-brain.”&lt;/p&gt;

&lt;p&gt;Here’s how it works:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Default Warranty (1 Year):&lt;/strong&gt;&lt;br /&gt;
	If something fails (e.g., power supply, screen goes blank, USB port dies), you call Dell, and they’ll attempt to fix the issue over the phone.&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;For &lt;strong&gt;user-replaceable parts&lt;/strong&gt; (e.g., battery, mouse, removable DVD drive), they’ll ship the part to you with a pre-paid box for the return. You handle the swap yourself.&lt;/li&gt;
		&lt;li&gt;For &lt;strong&gt;non-user-replaceable parts&lt;/strong&gt; (e.g., screen, motherboard), they’ll ship the part overnight to a regional repair center. Once it arrives, the center will call you to schedule a repair.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Upgraded Warranty (3 Years On-Site):&lt;/strong&gt;&lt;br /&gt;
	For an additional cost, Dell offers a three-year &lt;strong&gt;on-site repair option&lt;/strong&gt;—they’ll send a technician to you.&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Accidental Damage Coverage:&lt;/strong&gt;&lt;br /&gt;
	For an extra fee, Dell offers insurance for mishaps like spilling coffee on your laptop, dropping it on a marble floor, or even submerging it in water.&lt;/p&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;The Reality of Warranty Timelines&lt;/h3&gt;

&lt;p&gt;Dell’s warranty is excellent, but it doesn’t mean your laptop will be fixed within 24 hours. Here’s how it typically works:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If you call after 2:00 PM, they might miss the day’s shipping cutoff. In that case, your replacement part will ship the next business day.&lt;/li&gt;
	&lt;li&gt;Once the part arrives at the repair center, they’ll call you to schedule a repair, which could take another 24 hours.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, the process begins immediately, but repairs usually take &lt;strong&gt;24 hours after the part reaches the repair center.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Because I understand and can explain this process, I’ve confidently recommended Dell to many “Joe and Jane users” over the years. Dell’s straightforward warranty is the &lt;strong&gt;“devil I know,”&lt;/strong&gt; and I trust it to deliver reliable service.&lt;/p&gt;

&lt;h3&gt;Why Warranty Matters&lt;/h3&gt;

&lt;p&gt;I cannot stress this enough: &lt;strong&gt;Understanding your laptop’s warranty is the single most important factor when choosing a laptop.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;While I’ve outlined Dell’s warranty structure here, feel free to investigate other manufacturers’ warranties. Just make sure you understand the terms before you buy. For me, Dell’s warranty is reliable, transparent, and easy to explain, which is why I usually recommend their laptops to everyday users.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;“How much laptop do I, a regular person, need?”&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;If your daily tasks include things like surfing the web, using Facebook, Microsoft Office, Google Docs, Gmail, Hotmail, Office 365, Netflix, Skype, or similar, you have what I call &lt;strong&gt;“modest needs.”&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Again: &lt;strong&gt;If this is &quot;all you do&quot; again, maybe a laptop is &quot;too much&quot; and you should instead consider a Chromebook which does all that stuff and doesn&#039;t have all the &quot;Windows burden&quot; associated with it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For these needs, a Chromebook might be worth considering. It can handle all of that without the added complexity of a full Windows machine.&lt;/p&gt;

&lt;p&gt;But if you’re running high-powered software—like Quark, World of Warcraft, Final Cut, Movie Maker, VMware Workstation, Hyper-V, AutoCAD, Camtasia Studio, or Mathematica—you’ll need something more robust.&lt;/p&gt;

&lt;p&gt;Now, before we get into this, there’s a handful of.. holycow.. NEW $200 full Windows laptops out there. (&lt;a href=&quot;http://www.wsj.com/articles/hp-stream-11-review-a-200-windows-laptop-thats-worth-the-price-1417546863&quot;&gt;Here’s an older Wall Street Journal Entry on them.&lt;/a&gt; And here’s a &lt;a href=&quot;https://www.laptopmag.com/articles/best-cheap-laptop&quot;&gt;LaptopMag.com article from 2017 on sub-$200 laptops&lt;/a&gt;) And here&#039;s an article for 2018 from &lt;a href=&quot;https://bestlaptopsworld.com/best-laptops-under-200/&quot;&gt;Best Laptops World&lt;/a&gt; for computers under $200. But … they FAIL the “sniff test.” Read the article, then also read my discussion on Chip Type.. right here.&lt;/p&gt;

&lt;p&gt;So, here’s my answer for your “modest needs” person.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;&lt;em&gt;CPU Chip type and speed:&lt;/em&gt;&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Here’s the dirty little secret the laptop manufactures don’t want you to know: This almost doesnt matter. Or said another way, you almost cannot go wrong. Here are my suggestions:&lt;/p&gt;

&lt;p&gt;Here’s a secret the laptop manufacturers don’t want you to know: &lt;strong&gt;For most users, the CPU type almost doesn’t matter.&lt;/strong&gt; That said, here are my recommendations:&lt;/p&gt;

&lt;h4&gt;Intel Core Chips (i3, i5, i7, i9):&lt;/h4&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Best Bang for Your Buck:&lt;/strong&gt; The Intel &lt;strong&gt;i5&lt;/strong&gt; is usually the sweet spot for performance and cost.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Upgrade Option:&lt;/strong&gt; If your budget allows, go for an &lt;strong&gt;i7&lt;/strong&gt;. Even at its lowest speed, it offers solid performance and is often worth the extra cost.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Overkill:&lt;/strong&gt; The &lt;strong&gt;i9&lt;/strong&gt; is powerful but unnecessary for most users unless you’re a heavy-duty power user or gamer. Power supplies you have to lug around for i9 are also typically much heavier.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;Avoid These Chips:&lt;/h4&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Intel Celeron:&lt;/strong&gt; Avoid at all costs. These processors are underpowered and often found in $200 budget laptops that fail to deliver a good user experience.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Intel Atom:&lt;/strong&gt; While these offer excellent battery life, they’re significantly slower than the Core series. Just totally avoid.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Snapdragon / ARM Laptops &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There&#039;s a a new choice on the block ... in a chip called ARM &lt;strong&gt;Snapdragon X&lt;/strong&gt;. If this word maybe sounds familiar to you, it&#039;s because many phones utilize Snapdragon processors. They are very low power, which means you get pretty insane battery life. Snapdragon laptops are closer to ATOM processors than they are to Intel i3/i5/i7s. This is because all the software you&#039;re running has to convert everything from &quot;Intel speak to Snapdragon speak.&quot;&lt;/p&gt;

&lt;p&gt;They are considered &quot;Always on, always connected.&quot; So even if you close the lid, they don&#039;t really go to sleep... they jusst &quot;sip&quot; power and will just be ready to rock when you re-open the lid. (Like an iPad works.)&lt;/p&gt;

&lt;p&gt;The good news is that, by all accounts, Snapdragon PCs are pretty nifty and if you use your PC like I use my iPad... for checking web stuff, surfing, skyping, etc etc. If you use a PC like this, then a Snapdragon PC is a pretty good choice. There is a tradeoff: you have to sacrifice a bit of a speed drop, but you get a really big advantage of outrageous near all-day battery life. Sometimes up to like 21 hours.&lt;/p&gt;

&lt;p&gt;Depending on what you do with your PC this could be an excellent &quot;daily driver&quot; &lt;a href=&quot;https://www.forbes.com/sites/davealtavilla/2024/11/05/snapdragon-x-long-term-review-lenovo-laptop-wins-as-a-daily-driver/&quot;&gt;See this Forbes review&lt;/a&gt; of a Lenovo Snapdragon PC from 2024.&lt;/p&gt;

&lt;p&gt;The problem with Snapdragon machines is: there&#039;s always going to be some level of IN-compatibility with SOME software. Mostly games. Here&#039;s the gist &lt;a href=&quot;https://9to5mac.com/2024/09/04/windows-games-not-working-arm-pcs/&quot;&gt;in this article&lt;/a&gt;. But there could also be some other application that YOU NEED that JUST WONT FRICKIN&#039; WORK on ARM machines. Here&#039;s &lt;a href=&quot;https://www.reddit.com/r/Surface/comments/1dliej1/list_of_software_not_working_natively_with_arm64/&quot;&gt;an unofficial list&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Typically low-level software, like security software, VPN software, and/or other things that require drivers require special ARM versions. Most apps will work just fine, but, you never know until you needed &quot;Applicatoin ABC&quot; and it just falls over and dies on ARM, when it would have worked fine on a normal x64 laptop. &lt;/p&gt;

&lt;p&gt;I do think for MOST PEOPLE an ARM laptop might be just the right thing though and you should consider it in your searches. Here&#039;s a single page which links to &lt;a href=&quot;https://www.qualcomm.com/snapdragon/laptops-and-tablets&quot;&gt;all vendors with Snapdragon laptops&lt;/a&gt;. If I had to pick one in a hurry, &lt;a href=&quot;https://www.lenovo.com/us/en/p/laptops/yoga/yoga-slim-series/yoga-slim-7x-gen-9-14-inch-snapdragon/len101y0049&quot;&gt;I&#039;d likely go with this beauty&lt;/a&gt;. I&#039;m pretty sure this will be my next &quot;traveling PC&quot; I get. But, if you like Dell and their warranty, &lt;a href=&quot;https://www.dell.com/en-us/shop/scc/scr/laptops/appref=copilot-plus-pcs-artificial-intelligence,snapdragon-x-plus-processor,snapdragon-x-elite-processor&quot;&gt;here&#039;s a list of those&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;What&#039;s the deal with CoPilot (and NPU chips)&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Additionally, just to make this more complicated, there&#039;s a whole new category or machines which contain NPU chips .. Neural Processing Unit chips. Sounds like what the Terminator had in his head, and maybe it&#039;s not too far off, honestly. NPUs are chips which accelerate AI processing on your computer. So when you make a ChatGPT request, like &quot;Draw two ferrets at the county fair&quot; all that stuff happens on the ChatGPT website... and out pops a picture that you download.&lt;/p&gt;

&lt;p&gt;But with an NPU chip ON your computer, your computer is able to take on some of this workload locally. This makes sense if your application supports it. Right now, this is in early, early days. There&#039;s a few things in Windows 11 that takes advantage of this, including Windows 11&#039;s new Recall feature. Recall lets you look backward at your work and locate stuff you did on-screen yesterday or last week. Demo &lt;a href=&quot;https://www.youtube.com/watch?v=tWXKOKF3YFk&quot;&gt;example here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;As we head into 2025, there&#039;s like a small handful of apps which use the NPU chip, and &lt;a href=&quot;https://www.windowscentral.com/software-apps/these-6-npu-friendly-creative-apps-prove-microsoft-was-right-about-windows-on-arm#:~:text=popular%20creative%20apps.-,Blender%2C%20Affinity%20Photo%202%2C%20Capture%20One%2C%20Moises%2C%20Cubase,taxing%20a%20CPU%20or%20GPU.&quot;&gt;here they are&lt;/a&gt;. If you don&#039;t get a machine with an NPU chip, you will be just fine as a &quot;normal person.&quot; You wont miss it.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Gamer Laptops&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Avoid “gamer” laptops unless gaming is your main priority. They’re expensive, have poor battery life, and often come with bulky power supplies. For everyday tasks, they don’t offer noticeable speed improvements.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;RAM:&lt;/strong&gt;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Minimum:&lt;/strong&gt; Get at least &lt;strong&gt;16GB of RAM.&lt;/strong&gt; This is the new baseline for modern laptops.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Recommended:&lt;/strong&gt; If your budget allows, consider 32GB for better multitasking and future-proofing.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;&lt;strong&gt;Video card / chip:&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Unless you’re playing graphically intensive games, the video card doesn’t matter much. Apps like Netflix, Hulu, and Minecraft run just fine on integrated graphics. Avoid laptops with multiple video chips—they add complexity without meaningful benefits for most users.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Screen Size / Resolution &amp; Touch:&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Look for something with WXGA or WXGA+ resolution. This can mean 1280×720 and up, which is decent on a laptop. &lt;/p&gt;

&lt;p&gt;In a total surprise, I find Microsoft Surface laptops to have &quot;too much&quot; resolution and too insane on my eyes. I&#039;m over 40, and.. well, that means my eyes are just so-so. I would test-drive any laptop and make sure the resolution works for you. Of course this is adjustable in software / Windows.. but sometimes Windows looks lousy when not at the uppermost maximum resolution.&lt;/p&gt;

&lt;p&gt;Some laptops don’t have touch screens. I still don&#039;t personally own any touch-screen laptops. I dont like to touch my monitor, but you might. &lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Wireless Networking support:&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;All laptops have built-in Wireless cards. You don’t have to get all worried if you don’t have the fastest wireless card.&lt;/p&gt;

&lt;p&gt;No matter what new laptop you get you&#039;ll be fine. The fastest is a thing called &quot;Wifi7&quot; but I think only a handful of laptop manufacturers put Wifi 7 chips built into their notebooks (Asus being one of them). Its not needed for most regular humans. And you likely don&#039;t have a Wifi7 router so... &quot;who cares.&quot; Whatever you get here is fine.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Picking the OS. Windows 11 or 10. &lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Let’s cut to the chase: &lt;strong&gt;It’s nearly impossible to buy a new laptop without Windows 11.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;And honestly, that’s fine—there’s no compelling reason to stick with Windows 10. It’s approaching &lt;strong&gt;End of Life&lt;/strong&gt; status, meaning support and updates will soon dwindle.&lt;/p&gt;

&lt;p&gt;Even if you’re not a fan of Windows 11’s new look and feel, my advice is simple: &lt;strong&gt;get used to it.&lt;/strong&gt; I did, and it’s not as bad as you might think. There&#039;s even software you can get to make it look and quack like Windows 10 or even Windows 7 &lt;a href=&quot;https://www.stardock.com/products/start11/&quot;&gt;if you wanted like Stardock&lt;/a&gt;. &lt;/p&gt;

&lt;h3&gt;Windows Pro vs. Home: Does It Matter?&lt;/h3&gt;

&lt;p&gt;Not really. Both versions now support &lt;strong&gt;full disk encryption,&lt;/strong&gt; which is the one feature I care about the most. So, whether you choose Pro or Home, you’re covered. There’s no need to stress about this decision. And since you&#039;re buying this laptop for yourself, you don&#039;t need Pro which is more suited for domain-joined corporate environments.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Example Buys for 2024 / 2025:&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;For the best &lt;strong&gt;price-to-performance ratio&lt;/strong&gt;, your top choice is likely the &lt;strong&gt;Dell Factory Outlet&lt;/strong&gt;: &lt;a href=&quot;http://www.dell.com/Outlet/&quot; rel=&quot;noopener&quot; target=&quot;_new&quot;&gt;Dell Outlet&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I found plenty of excellent options under $600. Here’s one example available at the time of writing:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Processor:&lt;/strong&gt; Intel i7 Gen 12&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Operating System:&lt;/strong&gt; Windows 11 Pro&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Storage:&lt;/strong&gt; 512GB Solid-State Drive (SSD)&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Memory:&lt;/strong&gt; 16GB DDR4 RAM&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Display:&lt;/strong&gt; 15.6&quot; FHD (1920 x 1080), non-touch&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Graphics:&lt;/strong&gt; Intel HD Graphics&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Model:&lt;/strong&gt; Dell Outlet Inspiron 15 - 3520&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Total Price:&lt;/strong&gt; $510 (as of Nov 27, 2024)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Are these the lightest, fastest, or fanciest laptops on the market? &lt;strong&gt;Absolutely not.&lt;/strong&gt; But for most users, these laptops—combined with the warranty options explained earlier—are more than sufficient for everyday tasks.&lt;/p&gt;

&lt;h3&gt;Looking at ARM Machines&lt;/h3&gt;

&lt;p&gt;If the &lt;strong&gt;ARM architecture&lt;/strong&gt; interests you (see above for its pros and cons), here’s my top pick the &lt;a href=&quot;https://www.lenovo.com/us/en/p/laptops/yoga/yoga-slim-series/yoga-slim-7x-gen-9-14-inch-snapdragon/len101y0049&quot;&gt;Lenovo Yoga slim 7x.&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Model:&lt;/strong&gt; Lenovo Yoga Slim 7x&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Processor:&lt;/strong&gt; Snapdragon® X Elite X1E-78-100 (3.40 GHz)&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Operating System:&lt;/strong&gt; Windows 11 Home 64 (ARM)&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Graphics:&lt;/strong&gt; Integrated Qualcomm® Adreno™ GPU (again ... this doesn&#039;t matter at all.)&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Memory:&lt;/strong&gt; 16GB LPDDR5X-8448MHz (Soldered)&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Storage:&lt;/strong&gt; 1TB SSD M.2 2242 PCIe Gen4 TLC&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Display:&lt;/strong&gt; 14.5&quot; 3K (2944 x 1840)&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Total Price:&lt;/strong&gt; $999.00 (as of Nov 27, 2024)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This machine offers incredible battery life and solid performance for typical day-to-day use. However, remember the potential compatibility issues outlined earlier when considering ARM machines.&lt;/p&gt;

&lt;p&gt;So, after this: everything else.. everything else.. is just bells and whistles when it comes to laptops.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You could argue that touch is becoming more and more important. So, if you wanted touch, then… get one with touch.  :-) Again: I have two &quot;daily driver&quot; Windows PC laptops, neither has touch, and I don&#039;t miss it, not even a litle bit.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;What kind of laptop do you own, Jeremy?&lt;/strong&gt; &lt;strong&gt;(Here comes a little geekier stuff.)&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Some of you might be wondering: &lt;em&gt;What kind of laptop does Jeremy use?&lt;/em&gt; Well, here’s the answer—and fair warning, this gets a little geeky.&lt;/p&gt;

&lt;h4&gt;My Main machine driver is a &lt;strong&gt;Lenovo P1 Core i9 (10th generation)&lt;/strong&gt; from 2020. It’s equipped with:&lt;/h4&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;i9 Processor&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;4TB of storage&lt;/strong&gt; spread across two SSDs.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;32GB of RAM.&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Windows 11&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;A hefty build with a beefy power supply.&lt;/li&gt;
	&lt;li&gt;Its typically docked, like 90% of its life and travels with me like 10% of its life.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It’s big, heavy, and built for power. Why? Because &lt;strong&gt;I’m not a regular user.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I do live demos in front of thousands of people, and my laptop has to perform flawlessly. For me, speed and reliability trump portability.&lt;/p&gt;

&lt;h4&gt;My &quot;Everyday&quot; Laptop: &lt;strong&gt;Lenovo X1 Carbon (9th genreation) &lt;/strong&gt;also from 2020. It&#039;s got::&lt;/h4&gt;

&lt;ul&gt;
	&lt;li&gt;i7 processor&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;16GB of RAM.&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;1TB SSD.&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This laptop is light, portable, (as is the power supply) and has pretty good battery life (though I did just change the battery out myself this year.) It’s perfect for:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Carrying around the house.&lt;/li&gt;
	&lt;li&gt;Quick trips where I’m not presenting complex demos (just PowerPoints, for example).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It handles 98% of my needs and represents what I’d recommend for a &lt;strong&gt;“mere mortal” machine.&lt;/strong&gt;&lt;/p&gt;

&lt;h4&gt;Looking Ahead: Lenovo Yoga ARM&lt;/h4&gt;

&lt;p&gt;I’m considering upgrading my secondary laptop to the &lt;strong&gt;Lenovo Yoga ARM machine&lt;/strong&gt; I mentioned earlier. It has incredible battery life and should be a great fit for my lighter use cases—but I haven’t pulled the trigger just yet.&lt;/p&gt;

&lt;h3&gt;Why Not Dell?&lt;/h3&gt;

&lt;p&gt;Good question! I know I’ve mentioned Dell about 80 times in this article, and I absolutely recommend it for &lt;strong&gt;most people.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;However, I personally prefer Lenovo for its &lt;strong&gt;build quality.&lt;/strong&gt; Over the years, I’ve owned several Lenovo laptops, and here’s the kicker:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;I’ve &lt;strong&gt;never needed the warranty.&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;I’ve never had a dead pixel, fried USB port, or malfunctioning keyboard. Not once.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;My Needs vs. Yours&lt;/h3&gt;

&lt;p&gt;To be clear, my setup is &lt;strong&gt;not recommended for regular users.&lt;/strong&gt; My work involves hardcore demos, so I need:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;32GB of RAM.&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Extremely fast storage.&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Extremely fast processing.&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;A laptop that can handle demanding workloads.&lt;/li&gt;
	&lt;li&gt;A laptop that runs specialized applications (VMware Workstation and Camtasia 2024 mostly.)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But if you’re intrigued by Lenovo and willing to check out their warranty options, go for it. Just remember, your needs may differ significantly from mine!&lt;/p&gt;

&lt;h1&gt;Final Thoughts (and if you read nothing else…)&lt;/h1&gt;

&lt;p&gt;If you’re overwhelmed by the details, here’s the TL;DR version:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;For Most People:&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;Stick with a &lt;strong&gt;Dell laptop&lt;/strong&gt; from the &lt;strong&gt;Dell Factory Outlet&lt;/strong&gt; for the best price-to-performance ratio. Look for a machine with &lt;strong&gt;16GB of RAM&lt;/strong&gt;, an &lt;strong&gt;i5 or i7 processor&lt;/strong&gt;, and an &lt;strong&gt;SSD&lt;/strong&gt;.&lt;/li&gt;
		&lt;li&gt;For lighter needs, consider a &lt;strong&gt;Chromebook&lt;/strong&gt;, especially if most of your work is web-based.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Avoid These Pitfalls:&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;Don’t buy laptops with &lt;strong&gt;Intel Celeron&lt;/strong&gt; or &lt;strong&gt;Atom processors&lt;/strong&gt;—they’re too slow.&lt;/li&gt;
		&lt;li&gt;Skip &lt;strong&gt;gamer laptops&lt;/strong&gt; unless you’re gaming; they’re heavy, overpriced for everyday use, and have poor battery life.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Windows 11:&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;Don’t fight it—Windows 10 is nearing End of Life.&lt;/li&gt;
		&lt;li&gt;Windows Home vs. Pro? It doesn’t matter for most users anymore.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;If You Want ARM:&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;ARM laptops, like the &lt;strong&gt;Lenovo Yoga Slim 7x&lt;/strong&gt;, offer insane battery life but may face app compatibility issues. They’re great for light, portable use.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Key Features to Focus On:&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;16GB RAM&lt;/strong&gt; is the new standard.&lt;/li&gt;
		&lt;li&gt;Stick with &lt;strong&gt;integrated graphics&lt;/strong&gt; unless you’re gaming. (Don&#039;t buy laptops with multiple grahpic chips.)&lt;/li&gt;
		&lt;li&gt;Choose a &lt;strong&gt;screen resolution&lt;/strong&gt; that’s comfortable for your eyes—test it out in person if possible or make sure you can return it easily.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;Touchscreens:&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;Nice to have, but not essential. If you like them, get one. If not, don’t worry about it.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;The Warranty is Key:&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;The warranty can make or break your experience. Understand what you’re getting and consider extended or accidental damage coverage.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;&lt;strong&gt;What Jeremy Uses:&lt;/strong&gt;&lt;/p&gt;

	&lt;ul&gt;
		&lt;li&gt;I recommend Dell for most people, but I personally use Lenovo for its &lt;strong&gt;build quality&lt;/strong&gt; and reliability.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;At the end of the day, buy what suits your needs. Whether it’s a laptop, a Chromebook, or even an ARM machine, make an informed choice—and don’t stress too much. Most modern laptops are good enough for the average user.&lt;/p&gt;

&lt;p&gt;Hope this guide helps you and your friends out.&lt;/p&gt;

&lt;p&gt;– Signed, your friendly neighborhood Jeremy Moskowitz, Enterprise Mobility MVP&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The Many Ways to Configure Windows Firewall Rules using Intune or Command Line </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-many-ways-to-configure-windows-firewall-rules-using-intune-or-command-line</link>
        <pubDate>2024-11-22T16:47:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The Many Ways to Configure Windows Firewall Rules

In today&amp;#39;s rapidly evolving threat landscape, organizations must prioritize a multilayer security strategy. That includes configuring and enforcing Windows Firewall on servers and workstations. In this article we will look at the multiple ways to deliver Windows Firewall settings to your Windows devices. 

Using Intune

There are a several ways to configure Windows Firewall Rules and enforce them using the Microsoft Intune Admin Center ]]>
        </description>
        <content:encoded>
            &lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;The Many Ways to Configure Windows Firewall Rules&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In today&#039;s rapidly evolving threat landscape, organizations must prioritize a multilayer security strategy. That includes configuring and enforcing Windows Firewall on servers and workstations. In this article we will look at the multiple ways to deliver Windows Firewall settings to your Windows devices. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Using Intune&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;There are a several ways to configure Windows Firewall Rules and enforce them using the Microsoft Intune Admin Center. One way is to navigate to Endpoint Security &gt; Firewall and click “Create Policy.” Then choose “Windows” as the Platform and then choose one of the two Profile options:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows Firewall: Choose this option to enable or disable the Windows Firewall for different network profiles and only need basic firewall settings and configurations.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows Firewall Rules: Use this option if you already have Windows Firewall enabled and you want to create granular custom firewall rules for inbound and outbound traffic.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In the example below I chose Windows Firewall.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f674b86c15e262-fw1.png&quot; style=&quot;width: 700px; height: 234px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You then have the option to enable or disable the Windows Firewall for Domain, Private or Public Networks. If you aren’t sure which profile to choose, here are some tips:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The Domain profile in Windows Firewall is applied when a computer is connected to a network that is identified as a Domain Network. The Domain profile takes precedence over Private and Public profiles when connected to a domain network and is typically more permissive than the Public profile, as the domain network is assumed to be trusted and secure.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	 &lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The Network private profile is for networks in which devices are visible to one another on the same network. Network discovery is usually enabled and file and printer sharing features are active. This profile is typically used for SOHO environments.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	 &lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The Public profile is designed for use on untrusted networks such as an establishment that provides a public or guest network. The devices are not discoverable by other devices on the network stricter firewall rules are applied to limit incoming connections.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can then configure basic settings for each of these profiles as shown below. Here I chose to enable the Public Network. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f674b86ec94e9a-fw2.png&quot; style=&quot;width: 600px; height: 538px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Choosing the Windows Firewall Rules option I outlined earlier provides you with a different interface to select more customized rules as shown in the screenshot below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f674b871e6423c-fw3.png&quot; style=&quot;width: 650px; height: 320px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Clicking the Edit instance will prompt you with the port configuration settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can also configure Windows Firewall using Intune Configuration profiles. Navigate to Devices &gt; Configuration Profiles and create a new profile. Select Windows 10 and later as the platform. Then choose Endpoint protection as the profile type as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f674b876010570-fw4.png&quot; style=&quot;width: 450px; height: 694px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Name the profile and then proceed to the next screen where once again, you can configure basic settings for the Domain, Private and Public profiles.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f674b8793e571e-fw5.png&quot; style=&quot;width: 600px; height: 430px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Another approach to configuring firewall rules with Intune is to use PowerShell Script Deployment. This method leverages NetFirewallRule cmdlets to define firewall rules as is shown below:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;New-NetFirewallRule -DisplayName &quot;Allow Inbound Port 80&quot; -Direction Inbound -LocalPort 80 -Protocol TCP -Action Allow&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You would then use the Microsoft Win32 Content Prep Tool and package it into an .intunewin file. You can download the Win32 Content Prep Tool from Microsoft&#039;s official GitHub repository. Then go to the Microsoft Intune Admin Center and navigate to Apps &gt; Windows &gt; and add a new Windows app (Win32). Then upload the .intunewin file and set the following install command:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;powershell.exe -executionpolicy bypass -file &lt;script_name&gt;.ps1&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Whichever option you choose to deliver the Firewall settings, you would then assign the profile to the designated groups you want to target and then save it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:&quot;Calibri Light&quot;,sans-serif&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Using Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;If you want to configure Firewall settings for domain-joined computers, then Group Policy is the best option. Using the Group Policy Management Console, create a new GPO and navigate to Computer Configuration &gt; Policies &gt; Windows Settings &gt; Security Settings &gt; Windows Defender Firewall with Advanced Security. You can enable your desired network profiles by right-clicking on &quot;Windows Defender Firewall with Advanced Security&quot; and selecting &quot;Properties.” To add rules, you would expand either &quot;Inbound Rules&quot; or &quot;Outbound Rules&quot; and right-click and select &quot;New Rule.” Then simply follow the wizard to define the ports, programs or custom rules you want as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f674b87bbd4360-fw6.png&quot; style=&quot;width: 700px; height: 324px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Ultimately, whether using Intune or Group Policy, the goal remains the same: to protect critical assets from unauthorized access and potential threats while maintaining seamless operational efficiency. Stay safe out there. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt; &lt;/p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Setting up Autopilot in Intune for Streamlined Device Deployment </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/setting-up-autopilot-in-intune-for-streamlined-device-deployment</link>
        <pubDate>2024-11-18T13:34:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Whether you are onboarding laptops for new employees that work in a remote office or executing a large-scale refresh for employees or students, the manual effort required to configure each device can drain IT resources, disrupt productivity, and create inconsistent user experiences. If your computers are going to be integrated within Azure AD however, there is a simpler way that streamlines the process. 

Windows Autopilot is a cloud-based Microsoft solution that simplifies and automates the d ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Whether you are onboarding laptops for new employees that work in a remote office or executing a large-scale refresh for employees or students, the manual effort required to configure each device can drain IT resources, disrupt productivity, and create inconsistent user experiences. If your computers are going to be integrated within Azure AD however, there is a simpler way that streamlines the process. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows Autopilot is a cloud-based Microsoft solution that simplifies and automates the deployment and configuration of new Windows devices. By leveraging the OEM-installed version of Windows, Autopilot gives you true zero-touch deployment. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Key benefits of Windows Autopilot include:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Zero-touch deployment: Devices ship directly to end-users, eliminating IT intervention.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;No OS re-imaging: Autopilot automates app installation, driver setup, and policy configuration.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Enhanced productivity: Reduced setup time allows employees to start work sooner.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Customized experience: Pre-configured settings and branding personalize the out-of-box experience (OOBE).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Simplified redeployment: Devices can be easily wiped and reconfigured for new users.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Zero touch deployment includes things such as automatic Azure AD or Hybrid Azure AD join, MDM auto enrollment, local administrator account restrictions, dynamic group assignments, and device resets. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows Autopilot is managed using Microsoft Intune. It is here where you can register devices, create deployment profiles, assign them to Azure AD groups, configure settings for the out-of-box experience (OOBE) and establish compliance policies and application deployments. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;What are the requirements for Autopilot?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;While there is no specific &quot;Windows Autopilot license&quot; its functionality can be enabled through one of the following plans:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Microsoft Intune Plan 1&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Microsoft 365 Business Premium&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Microsoft 365 Enterprise E3 or E5&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Microsoft 365 Education (Academic) A1, A3, or A5&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Microsoft 365 F1 or F3&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Enterprise Mobility + Security E3 or E5&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;What operating systems support Autopilot?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows 10 and 11 Pro&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows 10 and 11 Pro for Workstations&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows 10 and 11Enterprise&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows 10 and 11 Education&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows 10 Enterprise 2019 LTSC&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Autopilot works with Entra ID, formerly Azure AD. The device IDs for any computer that will participate in Autopilot will have to be uploaded to your Entra ID ahead of time. Some OEMs will work in cooperation with you, so they are ready to go upon delivery. You can also add the computers yourself by capturing the device information and uploading it in a CSV file. You can obtain the hardware hash and serial number using the &lt;a href=&quot;https://www.powershellgallery.com/packages/Get-WindowsAutopilotInfo&quot; style=&quot;color:#467886; text-decoration:underline&quot;&gt;Get-WindowsAutopilotInfo.ps1&lt;/a&gt;and saving the captured information in a CSV file which you can then import into Intune.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;To upload the CSV file Microsoft Intune Admin Center you navigate to Devices &gt; Enroll Devices &gt; Windows enrollment. In the Windows Autopilot Deployment Program pane, select Devices and then click Import and select a CSV file containing device information. An example is shown below although the serial numbers have been hidden.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f674b59bad6434-auto1.png&quot; style=&quot;width: 700px; height: 211px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Create an Autopilot Profile&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Once the computer hardware information is uploaded to Entra ID, it is time to create an autopilot profile. Navigate to Windows &gt; Windows enrollment &gt; Deployment profiles as shown in the screenshot below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f674b59e8a2c56-auto2.png&quot; style=&quot;width: 700px; height: 403px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Click Create profile and choose Window PC. Then provide a name for the profile. In the next window you will configure the settings for the out-of-box experience as shown in the screenshot below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f674b5a16c7b4f-auto3.png&quot; style=&quot;width: 700px; height: 518px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In most cases you will choose User-Driven for the Deployment mode as this is for is for end users who will log in with their Azure AD credentials. You could choose Self-Deploying for kiosks or shared devices that don’t require user interaction. Once you have your desired settings, you can assign the profile to your desired groups. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Before initiating the Autopilot deployment, you will create the necessary configuration profiles and application profiles in Intune. These profiles will define the settings, policies, and applications that will be applied to devices during the Autopilot process, ensuring a consistent and secure setup for all deployed devices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Setup and Enrollment Status Page&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;While it isn’t required, you can set up an Enrollment Status Page to track device enrollment progress and ensure all required applications are installed before users access the desktop. This is done by navigating to Devices &gt; Enrollment &gt; Windows enrollment and click &quot;Create&quot; to set up a new ESP profile. Here you can configure settings such as:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;show app and profile configuration progress&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Block device use until all apps and profiles are installed&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Specify required apps that must be installed before users can access the desktop&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Set time limits for installation and error handling&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;An example is shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f674b5a4eb73c4-auto4.png&quot; style=&quot;width: 700px; height: 630px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Like all profiles, you would then assign the ESP profile to your target user or device groups.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Testing your Autopilot Deployment&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Of course, it is highly recommended that you test all of this on a few sample devices to ensure proper functionality. When a registered device connects to the internet it should automatically begin the Autopilot process, prompting user sign-in with Azure AD credentials and applying configurations as per the assigned profile.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Managing Device Addition Limits in Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/managing-device-addition-limits-in-intune</link>
        <pubDate>2024-11-04T09:14:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you are an AD administrator, you&amp;#39;re likely aware that Active Directory (AD) typically limits users to adding 10 devices to a domain by default. For Azure AD, the default limit is higher, maxing out at 50 devices per user. Domain admins and global administrators are usually exempt from these limitations. However, there may be situations where you need to allow lower-level IT staff or other personnel to add more devices than the default limit allows, or you may need to modify the device lim ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;If you are an AD administrator, you&#039;re likely aware that Active Directory (AD) typically limits users to adding 10 devices to a domain by default. For Azure AD, the default limit is higher, maxing out at 50 devices per user. Domain admins and global administrators are usually exempt from these limitations. However, there may be situations where you need to allow lower-level IT staff or other personnel to add more devices than the default limit allows, or you may need to modify the device limit or restrict it further for Azure AD users.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;To Modify the restriction in on-prem AD, there is no Group Policy to do it. Instead you have to:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Use Active Directory Users and Computers and right-click on the &lt;b&gt;domain name&lt;/b&gt; at the top&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Select &lt;b&gt;Properties&lt;/b&gt;.and go to the &lt;b&gt;Attribute Editor&lt;/b&gt; tab. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Find the &lt;b&gt;ms-DS-MachineAccountQuota&lt;/b&gt; and change its value to the desired number of devices &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;In the example below, I have raised the number to 20.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6723821a1cb7f-enroll1.png&quot; style=&quot;width: 600px; height: 346px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Restricting Ordinary Users to 15 Devcies or Less for Azure&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;If you want to limit the number of device enrollments for ordinary users in Azure AD, you can do so using Microsoft Intune. Here&#039;s how to set up device enrollment restrictions:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Access the Microsoft Intune Admin Center&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Navigate to either:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
	&lt;ul style=&quot;list-style-type:disc&quot;&gt;
		&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list 1.0in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Devices &gt; Enrollment restrictions, or&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
		&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list 1.0in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Devices &gt; Windows &gt; Enrollment restrictions&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Click on &quot;Device limit restrictions&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Select &quot;Create restriction&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;In the settings, you can choose a limit between 1 and 15 devices per user as shown below:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67238233143d3-enroll2.png&quot; style=&quot;width: 600px; height: 458px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Then complete the policy by assigning the groups or users to it and finish out the wizard. If you want to make the restriction greater than 15, you will have to do so using the Microsoft Entra Admin Center and navigate to Devices &gt; Device Settings. The available options are shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67238265e4fe2-enroll3.png&quot; style=&quot;width: 600px; height: 366px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Windows Autopilot&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;For large organizations, school systems implementing one-to-one device programs for students, or companies with numerous remote workers, Windows Autopilot offers a more efficient alternative to manually adding devices to Azure. This cloud-based solution streamlines the process of setting up and pre-configuring new Windows devices and ensure they are business-ready without requiring hands-on IT involvement. Autopilot automates device registration, configuration, and enrollment into Azure AD and Intune. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;When a user receives a device, they simply connect it to the internet and log in with their corporate credentials. Autopilot automatically configures the device based on its assigned profile, installing necessary applications and applying company policies. This zero-touch deployment approach eliminates the need for IT to manually prepare each device, making the process faster and more scalable across the organization.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;You can create the necessary Autopilot profiles using Intune which I will cover in a future blog. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> 6 Essential One Drive Settings in Intune and Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/6-essential-one-drive-settings-in-intune-and-group-policy</link>
        <pubDate>2024-10-21T16:55:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ There are a few key items you&amp;#39;ll likely want to tune in OneDrive settings before setting it loose in your environment. As such.&amp;nbsp;Microsoft gives you the ability to manage Intune settings in both Group Policy and Intune. Those settings are:&amp;nbsp;


	Prompt users when they delete multiple OneDrive files on their local computer
	Warn users who are low on disk space
	&amp;nbsp;Silently sign in users to the OneDrive sync app with their Windows credentials
	&amp;nbsp;Use OneDrive Files On-Demand ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;There are a few key items you&#039;ll likely want to tune in OneDrive settings before setting it loose in your environment. As such. &lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Microsoft gives you the ability to manage Intune settings in both Group Policy and Intune. Those settings are: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align: justify; margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;Prompt users when they delete multiple OneDrive files on their local computer&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align: justify; margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;Warn users who are low on disk space&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align: justify; margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt; Silently sign in users to the OneDrive sync app with their Windows credentials&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align: justify; margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt; Use OneDrive Files On-Demand and Coauthor and share in Office desktop apps (User).&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align: justify; margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;To configure OneDrive settings using the Microsoft Intune Admin Center., navigate to Devices &gt; Configuration &gt; Create New Policy in the Microsoft Intune Admin Center. When creating the policy, select &quot;Windows 10 and later&quot; as the Platform and &quot;Settings catalog&quot; as the Profile type. After naming the policy, type &quot;OneDrive&quot; into the Settings picker and select the OneDrive options. You can then choose which of the settings you want to include in the policy as shown in the screenshot below. In this example, I have chosen six settings that serve important functions in OneDrive. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67229ba4757a0-od1.png&quot; style=&quot;width: 700px; height: 322px;&quot; /&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;Prompt users when they delete multiple OneDrive files on their local computer&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;margin-left:24px; text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;This is a data protection feature designed to prevent unintended bulk file deletions in OneDrive. When enabled, this setting triggers a warning prompt if a user attempts to delete multiple OneDrive files simultaneously. If a user tries to delete a large number of files larger at once that is larger than the configured threshold, they will see a pop-up message asking them to confirm the deletion action. The setting includes a configurable threshold that you can set to trigger the prompt as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67229bd648584-od2.png&quot; style=&quot;width: 600px; height: 92px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;        2. Warn users who are low on disk space&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;This setting monitors the local disk space on a user&#039;s device to prevent them from unexpectedly running out of storage, which could impact their ability to sync OneDrive files. It includes a configurable threshold, specified in GB, that triggers a warning notification to users when their available disk space falls below this set level as shown here below:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67229bfbb0340-od3.png&quot; style=&quot;width: 600px; height: 86px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;3. Silently sign in users to the OneDrive sync app with their Windows credentials&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;When enabled, this setting automatically authenticates users with their existing Windows login information to ensure a seamless Single Sign-On (SSO) experience, thus eliminating the need for manual credential entry.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;4. Silently move Windows known folders to OneDrive&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;When enabled, this setting automatically redirects a user’s Windows known folders (such as Documents, Pictures, and Desktop) to OneDrive without user intervention. This aids in ensuring that important files are automatically backed up to the cloud by moving the contents of these folders to OneDrive. Once enabled, you must provide your tenant ID as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67229c4948554-od4.png&quot; style=&quot;width: 600px; height: 163px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;       5. Use OneDrive Files On-Demand&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;When enabled, this setting allows users to see and interact with all their OneDrive files in File Explorer without downloading them all to their device. Files are downloaded only when opened, which saves local disk space. Users can choose to make specific files or folders always available offline.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;       6. Coauthor and share in Office desktop apps (User)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;When enabled, this setting allows users to simultaneously work on the same document with colleagues, allowing users to edit them and see each other’s changes in real-time.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Using Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can also manage these settings using Group Policy.  Five of the above settings are from the computer side. Navigate to Computer Configuration &gt; Administrative Templates &gt; OneDrive and enable any of the five settings shown in the screenshot below. Here, I have highlighted the “Prompt users when they delete multiple OneDrive files on their local computer” setting.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67229cbe5f99c-od5.png&quot; style=&quot;width: 700px; height: 256px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The remaining setting, “Coauthor and share in Office desktop apps (User)” is a user side setting. Navigate to User Configuration &gt; Administrative Templates &gt;OneDrive and enable the setting as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f67229ce57935a-od6.png&quot; style=&quot;width: 600px; height: 400px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The remaining setting, “Coauthor and share in Office desktop apps (User)” is a user side setting. Navigate to User Configuration &gt; Administrative Templates &gt;OneDrive and enable the setting as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Disable Windows Shortcut Keystrokes using Group Policy and Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-disable-windows-shortcut-keystrokes-using-group-policy-and-intune</link>
        <pubDate>2024-10-07T10:58:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Windows shortcut keys are pre-defined keyboard combinations that allow users to perform various tasks and functions quickly and efficiently within the Windows operating system. Shortcut keys enable users to execute commands and navigate the system faster than using a mouse or touchpad. Windows shortcut keys may provide an alternative way to execute commands or access system functions that are normally restricted or blocked through traditional menus and interfaces. That&amp;rsquo;s why in some cases, ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows shortcut keys are pre-defined keyboard combinations that allow users to perform various tasks and functions quickly and efficiently within the Windows operating system. Shortcut keys enable users to execute commands and navigate the system faster than using a mouse or touchpad. Windows shortcut keys may provide an alternative way to execute commands or access system functions that are normally restricted or blocked through traditional menus and interfaces. That’s why in some cases, it may be worthwhile to disable Windows keystrokes all together. You can do this using either Group Policy or Intune.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Disabling Windows Shortcut Keys using Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;To disable Windows shortcut keystrokes in Group Policy you can create a GPO using the Group Policy Management Console. Then use Group Policy Editor and navigate to User Configuration &gt; Administrative Templates &gt; Windows Components &gt; File Explorer and enable the policy setting titled “Turn off Windows key hotkeys” as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66fabc210bb52-HK1.png&quot; style=&quot;width: 650px; height: 420px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Then assign the GPO to the applicable users or groups. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Disabling Windows Shortcut Keys using Intune&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can also achieve the same result using the Microsoft Intune Admin Center. Navigate to Devices &gt; Configuration profiles and click on create profile. Select Windows 10 and later as the platform and choose the Custom template. Enter a name for the profile and then add the following OMA-URI settings:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;Name&lt;/b&gt;: Enter a name for the setting.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;Description&lt;/b&gt;: Provide a description (optional).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;OMA-URI&lt;/b&gt;: ./Device/Vendor/MSFT/Policy/Config/KeyboardFilter/Enable&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;Data type&lt;/b&gt;: Select Integer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;Value&lt;/b&gt;: Enter 1 to enable Keyboard Filter.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66fabc51a6c79-HK2.png&quot; style=&quot;width: 650px; height: 149px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Then assign the policy towards the designated users or groups and save it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Customizing Windows Settings Visibility with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/customizing-windows-settings-visibility-with-intune-</link>
        <pubDate>2024-09-30T10:50:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ You can create a &amp;quot;Settings Page Visibility List&amp;quot; policy that allows administrators to show only specific pages in the Settings app. The secret here is the &amp;quot;showonly:&amp;quot; string that appears in the custom OMA-URI settings. In this example I will choose the only the following settings to remain visible. 


	bluetooth: Bluetooth settings
	camera: Camera settings
	about: System information
	sound: Sound settings
	easeofaccess-audio: Ease of Access audio settings
	windowsupda ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can create a &quot;Settings Page Visibility List&quot; policy that allows administrators to show only specific pages in the Settings app. The secret here is the &quot;showonly:&quot; string that appears in the custom OMA-URI settings. In this example I will choose the only the following settings to remain visible. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;bluetooth: Bluetooth settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;camera: Camera settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;about: System information&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;sound: Sound settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;easeofaccess-audio: Ease of Access audio settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;windowsupdate-action: Windows Update actions&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;sound-devices: Sound devices settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;apps-volume: App volume and device preferences&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;easeofaccess-visualeffects: Ease of Access visual effects&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;appsfeatures-app: Apps &amp; features&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;installed-apps: Installed apps list&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;privacy-webcam: Privacy settings for webcam&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Using the Microsoft Intune Admin Center, navigate to Devices &gt; Configuration &gt; Create &gt; New Policy. Select Windows 10 and later as the Platform and Custom as the Profile type. Name the policy and click Add to configure the OMA-URI settings as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66faba87a106f-vis1.png&quot; style=&quot;width: 650px; height: 240px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The OMA-URI path is OMA-URI: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;./Device/Vendor/MSFT/Policy/Config/Settings/PageVisibilityList&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Choose String as the Data Type. The string will include the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Value: showonly:bluetooth;camera;about;sound;easeofaccess-audio;windowsupdate-action;sound-devices;apps-volume;easeofaccess-visualeffects;appsfeatures-app;installed-apps;privacy-webcam&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;When completed the OMA-URI settings will look something like this: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66fabaa762554-vis2.png&quot; style=&quot;width: 600px; height: 439px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Then assign the designated groups to the policy and save. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Configure App-Specific Intune Access Controls </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-configure-appspecific-intune-access-controls</link>
        <pubDate>2024-09-16T10:47:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you use Azure AD to host your user accounts, you may want to create conditional access policies for when employees attempt to access certain cloud applications. An example might be an enterprise resource planning solution, an employee benefits site or a password manager. A couple of conditions you can assign might be:


	Require MFA as an extra layer of authentication beyond passwords to reduce the risk of unauthorized access even if credentials are compromised.
	Require that access be on ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;If you use Azure AD to host your user accounts, you may want to create conditional access policies for when employees attempt to access certain cloud applications. An example might be an enterprise resource planning solution, an employee benefits site or a password manager. A couple of conditions you can assign might be:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Require MFA as an extra layer of authentication beyond passwords to reduce the risk of unauthorized access even if credentials are compromised.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Require that access be only granted from Azure joined devices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Conditional access policies allow you to safeguard sensitive information and apply stricter controls only where they&#039;re most needed. They may also aid in complying with various regulatory requirements and helps mitigate risks associated with remote work.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in 1.0in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In this example I am going to create a conditional access policy for LastPass, a password management tool. To create a conditional access policy for a specific cloud application, sign into the Microsoft Intune Admin Center and navigate to Devices &gt; Conditional Access. Click &quot;New policy&quot; to start configuring the new conditional access policy. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in 1.0in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Give the policy a descriptive name and go to assignments. For users I chose a group comprised of all IT workers that regularly access many applications. I then selected the two LastPass cloud applications that our organization uses as shown in the screenshot below:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in 1.0in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66fab9b4df5f7-IAC1.png&quot; style=&quot;width: 650px; height: 516px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Then under Access Controls I will create two conditions for granted access. The first is MFA and the second is that the user must be using a compliant device as shown below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66fab9d95a14f-IAC2.png&quot; style=&quot;width: 650px; height: 325px;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;For added security you can specify a sign in frequency under the Session category. Assigning a sign-in frequency requires users to re-authenticate periodically when accessing cloud applications or resources. As shown in the screenshot below, administrators can customize the frequency based on the sensitivity of the applications or data. In this case I am requiring users to reauthenticate each day. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Enable Windows 11 Dev Drive with Group Policy and Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-enable-windows-11-dev-drive-with-group-policy-and-intune</link>
        <pubDate>2024-09-02T10:38:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Dev Drive is a new feature in Windows 11 designed to enhance performance for developers. It provides a specialized storage volume optimized for tasks like cloning repositories, building code, and copying files. Dev Drive is built on Microsoft&amp;#39;s Resilient File System (ReFS) technology and offers improved performance and data integrity compared to NTFS. It also provides enhanced control over storage volume settings and security, including trust designation, antivirus configuration, and adminis ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Dev Drive is a new feature in Windows 11 designed to enhance performance for developers. It provides a specialized storage volume optimized for tasks like cloning repositories, building code, and copying files. Dev Drive is built on Microsoft&#039;s Resilient File System (ReFS) technology and offers improved performance and data integrity compared to NTFS. It also provides enhanced control over storage volume settings and security, including trust designation, antivirus configuration, and administrative control over attached filters.  You can learn more about Dev Drive and how to create it &lt;a href=&quot;Dev%20Drive%20is%20a%20new%20feature%20in%20Windows%2011%20designed%20to%20enhance%20performance%20for%20developers%20by%20providing%20a%20specialized%20storage%20volume%20optimized%20for%20tasks%20like%20cloning%20repositories,%20building%20code,%20and%20copying%20files.%20Built%20on%20Microsoft&#039;s%20Resilient%20File%20System%20(ReFS)%20technology,%20Dev%20Drive%20offers%20improved%20performance%20and%20data%20integrity%20compared%20to%20NTFS.%20It%20also%20provides%20enhanced%20control%20over%20storage%20volume%20settings%20and%20security,%20including%20trust%20designation,%20antivirus%20configuration,%20and%20administrative%20control%20over%20attached%20filters,%20making%20it%20a%20powerful%20tool%20for%20developers%20seeking%20to%20optimize%20their%20workflow%20while%20maintaining%20security.&quot; style=&quot;color:#467886; text-decoration:underline&quot;&gt;here in this article&lt;/a&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You will need to create a policy first that allows the creation of Dev Drive storage volumes on Windows 11 devices. When enabled, users with appropriate permissions can create and use Dev Drives. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;How to Enable Dev Drive using Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Create a GPO and use the Open the Local Group Policy Editor. Navigate to Computer Configuration &gt; Administrative Templates &gt; System &gt; Filesystem and enable the Enable dev drive&quot; policy as shown in the screenshot below:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66fab7654eb12-DD1.png&quot; style=&quot;width: 650px; height: 441px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Note that the optional antivirus filter setting ensures that antivirus protection remains active on Dev Drives, even if local administrators attempt to detach it. Once enabled, assign the policy to your DevOps users for policy deployment. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;How to Enable Dev Drive using Intune&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Using the Microsoft Intune Admin Center, you will navigate to Devices &gt; Configuration &gt; Create &gt; New Policy. Select Windows 10 and later as the Platform and Administrative Templates as the Profile type. Now go to Computer Configuration &gt; Administrative Templates &gt; System &gt; Filesystem just like the Group Policy example. The screenshot below shows the configured settings:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66fab7c276dc0-DD2.png&quot; style=&quot;width: 650px; height: 196px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Create your own Authentication Strengths for Intune MFA </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/create-your-own-authentication-strengths-for-intune-mfa-</link>
        <pubDate>2024-08-19T15:58:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Given the increasing ease with which passwords can be compromised, relying solely on password authentication is no longer a secure method for controlling access. In response to this vulnerability, many companies are now widely implementing Multi-Factor Authentication (MFA) to strengthen their cybersecurity defenses. MFA adds an essential layer of security by requiring multiple forms of verification, such as passwords, security tokens, or biometric scans. This added layer of protection makes it s ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Given the increasing ease with which passwords can be compromised, relying solely on password authentication is no longer a secure method for controlling access. In response to this vulnerability, many companies are now widely implementing Multi-Factor Authentication (MFA) to strengthen their cybersecurity defenses. MFA adds an essential layer of security by requiring multiple forms of verification, such as passwords, security tokens, or biometric scans. This added layer of protection makes it significantly harder for unauthorized individuals to access sensitive data. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Intune provides multiple secure authentication alternatives. Some built in options include Passwordless MFA that includes phishing resistant methods that use Microsoft Authenticator. It also includes the use of FIDO2 security keys and Windows Hello for Business. Intune. In the case of FIDO2 keys, you can restrict authentication to specific manufacturers. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Custom Authentication Strengths&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt; Microsoft Intune provides administrators with the flexibility to create tailored authentication requirements that can precisely match their organization&#039;s security needs. Administrators can create up to 15 custom authentication strength using the following authentication methods:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Password&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;SMS&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Voice call&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Microsoft Authenticator app (push notification)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;OATH hardware token&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;OATH software token&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Windows Hello for Business&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;FIDO2 security key&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Certificate-based authentication&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;You can use different combinations to enforce specific authentication methods for different scenarios. For instance, different authentication strengths can be required based on whether users are accessing resources from inside or outside the corporate network. Stronger authentication methods can also be required for users or sign-ins deemed high-risk.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;To create new authentication strengths using Microsoft Intune Admin Center and navigate to Conditional Access &gt; Authentication strengths and click &quot;New authentication strength&quot;. Then select the desired authentication method. In the example below I made a authentication strength for Passkeys FIDO2. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66d4c5ba1dd6c-auth10.png&quot; style=&quot;width: 600px; height: 296px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;I then clicked the advanced options and chose checked Microsoft Authenticator (Preview). &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66d4c5e7b9a6e-auth11.png&quot; style=&quot;width: 550px; height: 306px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Then click create and you are one.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Creating a Conditional Access Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Now let’s use the new authentication strength in a conditional access policy. Return back to Conditional Access and click “Create New Policy.” Then do the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Give the policy a descriptive name such as &quot;Require FIDO2 for Passwordless Access&quot;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Under &quot;Users and groups&quot;, select the users or groups you want this policy to apply to.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Under &quot;Cloud apps or actions&quot;, select the applications you want to protect as shown in the screenshot below&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66d4c6800ed42-auth12.png&quot; style=&quot;width: 624px; height: 571px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;You can then choose the conditions that will trigger the policy such as User risk level, device platform or location. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;To configure the Access controls, go to Grant and select Require authentication strength&quot; and select an existing custom strength. You can also create a new authentication strength here as well.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66d4c6c45b92e-auth13.png&quot; style=&quot;width: 295px; height: 864px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;The Grant section will now show 1 control selected as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66d4c6e7b73b6-auth14.png&quot; style=&quot;width: 584px; height: 812px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Now Set &quot;Enable policy&quot; to &quot;On&quot; and create the policy. You have now created a conditional access policy with your custom authentication strength. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Use Device Tags to Simplify Intune Management </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/use-device-tags-to-simplify-intune-management</link>
        <pubDate>2024-08-05T14:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Admins can tag devices using Microsoft Intune to enhance device management, organization, and security across their enterprise environment. Tags can be used to efficiently group and categorize devices based on various attributes such as department, location or function. This logical grouping enables IT teams to apply policies, updates and security measures more effectively. Tags can be automatically assigned and updated through dynamic rules, ensuring that device classification remains accurate  ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Admins can tag devices using Microsoft Intune to enhance device management, organization, and security across their enterprise environment. Tags can be used to efficiently group and categorize devices based on various attributes such as department, location or function. This logical grouping enables IT teams to apply policies, updates and security measures more effectively. Tags can be automatically assigned and updated through dynamic rules, ensuring that device classification remains accurate and up-to-date. Some of the applications of tagging includes the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Tags can be used to filter and search for specific devices in large environments to improve management efficiency.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Tags can be used to apply specific policies, configurations, or software to groups of devices that share common characteristics.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Tags can help in tracking and managing hardware assets across an organization.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Tags can be used to identify devices that require specific security measures or compliance checks.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Tags can provide additional context about devices, which can be helpful during troubleshooting or decision-making processes.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In other words, tagging provides numerous management options and can prove a way to simplify your MDM efforts. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Create a Configuration Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;To implement tagging using the Microsoft Intune Admin Center, navigate to Devices &gt; Configuration &gt; Policies &gt; and create a new policy. Choose Windows 10 and later as the Platform and select Custom Templates as the Profile type. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You will then apply a name for the policy and configure the OMA-URI Settings. The OMA-URI path is the most critical here so use the following path:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;tt&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/DeviceTagging/Group&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/tt&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In the example below I selected String as the data type and made a tag called IT Employee.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66d4b26f304c8-tag1.png&quot; style=&quot;width: 466px; height: 334px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You could also use a PowerShell script to create tags and deploy the script through Intune. I can then create a dynamic group in Azure AD that includes all devices with the “IT Laptop” tag. Security policies and configuration policies could then be applied to devices belonging to the IT role group. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Configure Conditional Access Name Locations with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/configure-conditional-access-name-locations-with-intune</link>
        <pubDate>2024-07-29T17:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The Microsoft Intune Admin Center enables you to create Conditional Access policies based on locations for additional granular control over access to organizational resources. This feature is particularly valuable for entities with geographically limited operations, such as school districts, government institutions, or regional businesses.

For instance, if your organization&amp;#39;s users are primarily located within a single country, you can implement a policy that restricts logins from all oth ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;The Microsoft Intune Admin Center enables you to create Conditional Access policies based on locations for additional granular control over access to organizational resources. This feature is particularly valuable for entities with geographically limited operations, such as school districts, government institutions, or regional businesses.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;For instance, if your organization&#039;s users are primarily located within a single country, you can implement a policy that restricts logins from all other countries. This approach significantly enhances your security posture by mitigating risks associated with global cyber threats.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;By leveraging Named Locations in Conditional Access policies, you can effectively:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;1. Block access attempts from unexpected geographical areas&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;2. Reduce the attack surface for brute force and credential stuffing attacks&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;3. Minimize the risk of unauthorized access from foreign IP addresses&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;By restricting access from unfamiliar or high-risk locations, organizations can reduce the risk of unauthorized access and potential security breaches.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Create Country Locations&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;To create these location areas, you need to navigate to Devices &gt; Conditional Access &gt; Named Locations. Here you can create locations according to Countries, IP addresses and Multifactor Authentication Trusted IPs as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66aaac324e33b-CA5.png&quot; style=&quot;width: 650px; height: 157px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Let’s say you want to create a conditional access policy that stops all login attempts from other countries. Click Countries location and select all countries outside of your own as shown here.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66aaac65cc671-CA6.png&quot; style=&quot;width: 450px; height: 908px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Once you&#039;ve defined the Named Location, you can proceed to create a corresponding Conditional Access policy. Configure the policy to use the location condition, selecting the Named Location you&#039;ve previously defined. You may want to initially enable the policy in &quot;Report-only&quot; mode. This allows you to monitor its potential impact without affecting user access. You also need to be mindful of employees who travel internationally as this may require you to:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;a) Create exceptions for specific users or groups&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;b) Implement a process to temporarily modify the policy for traveling employees&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;c) Create a traveling policy that allows access from all countries and assign it to anyone traveling temporarily.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;The screenshot below shows how anyone attempting access from all other countries of the world will be blocked. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66aaacbada83b-CA7.png&quot; style=&quot;width: 650px; height: 524px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Other Location Scenarios&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;You can also create locations based on IP addresses or ranges. You can use these locations for a variety of instances. For instance, you can create policies that differentiate between office locations and remote work environments that apply security measures differently for set locations. You also may be receiving failed login attempts from a certain IP address and make a conditional access policy to block it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;You can also create trusted IP locations to coincide with your MFA conditional access policies. In this scenario, all logins except those originating from your trusted IP ranges. Users connecting from trusted locations will not be prompted for MFA, while those connecting from outside these ranges will need to complete MFA.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Setup Multi Admin Approval with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-setup-multi-admin-approval-with-intune</link>
        <pubDate>2024-07-15T17:01:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ One of the first objectives of a hacker upon infiltrating a network is to gain access to a privileged identity within your organization. One of the more powerful privileged accounts in your network is probably an Intune admin as these accounts weld a lot of power. Should one of those accounts get compromised, they can do significant list of things to your MDM environment such as deploy a malicious application to your corporate devices such as ransomware or backdoor apps. They could also deploy a ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;One of the first objectives of a hacker upon infiltrating a network is to gain access to a privileged identity within your organization. One of the more powerful privileged accounts in your network is probably an Intune admin as these accounts weld a lot of power. Should one of those accounts get compromised, they can do significant list of things to your MDM environment such as deploy a malicious application to your corporate devices such as ransomware or backdoor apps. They could also deploy a harmful PowerShell script or other executable script. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;MAA is like MFA &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;With the rapidly expanding threat landscape of today, relying on a single password to secure user accounts is no longer viable. This is why multifactor authentication (MFA) is now considered best practice, as it provides an additional security layer to protect digital identities. Now let’s apply that same logic to your Intune environment. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You cannot risk the compromise of a single Intune admin account that can then execute malicious tasks at will. Like MFA, Multi Admin Approval (MAA) &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;adds an extra layer of security by requiring multiple administrators to approve certain critical actions before they can be executed. This means that if you create a new policy to deploy an application, that policy will not be enabled until a member of the assigned approval group authorizes the action. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;When a Tenant account attempts to modify a resource protected by an access policy, Intune implements withholds applying the change until a member of the designated approval group reviews and authorizes it. This process ensures that critical changes undergo additional scrutiny before implementation. The approver has the authority to either approve the change and allow it to proceed or reject it which will block it entirely. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;How to Configure MAA in Intune&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Note there are some prerequisites that must be met prior to enabling MAA:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Multi admin approval requires a minimum of two administrator accounts within your tenant&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Creating an access policy requires that your account be assigned either the Intune Service Administrator role or Azure Global Administrator role.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;To qualify as an approver, an account must belong to the group assigned to the access policy for a specific type of resource.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To enable MAA for Intune go to the Microsoft Endpoint Manager admin center and navigate to Tenant Administration &gt; Multi Admin Approval &gt; select Access policies and click Create as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66aaa5b158175-MAA1.png&quot; style=&quot;width: 650px; height: 344px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Create a name for the MAA policy and select either Scripts or Apps for the Profile type as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66aaa5d8a9372-MAA2.png&quot; style=&quot;width: 650px; height: 357px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Next is the Approvers page where you will click “Add groups” and select the group of users that will act as approvers for this policy. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f66aaa603e5594-MAA3.png&quot; style=&quot;width: 650px; height: 340px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Then review and click Create to finalize and save the policy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Approving Requests&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align: justify; margin-top: 11px; margin-bottom: 5px;&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;So now let’s say you create an Intune policy to deploy a new application. A new step will be required for you to include the business justification for your request. Rather than an active policy, it is submitted as a request and awaits approval. You can monitor the status of your requests on the MAA page. There you will see a list of all your submitted requests, along with their current status.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-top: 11px; margin-bottom: 5px;&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The status of your requests can be one of the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;tab-stops:list .25in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Pending: The request is waiting for approval from another administrator.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;tab-stops:list .25in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Approved: The request has been approved and the changes have been applied.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;tab-stops:list .25in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Rejected: The request was rejected by an approver.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;tab-stops:list .25in&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Canceled: The request was canceled by you or another administrator.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;To approve the request of another admin, simply navigate to Pending requests and select the specific request you want to approve. Make sure that all administrators involved in the approval process are notified of pending actions.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> 2 Different Ways to Manage the Control Panel with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/2-different-ways-to-manage-the-control-panel-with-intune</link>
        <pubDate>2024-07-01T17:14:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft Intune offers two primary methods for managing Control Panel settings on Windows devices: Administrative Templates and the Settings Catalog. Administrative Templates are based on ADMX files, similar to Group Policy Objects (GPOs) in on-premises Active Directory. By using the administrative templates, you can configure a wide range of settings, including Control Panel visibility and functionality. This method provides a familiar interface for administrators who have experience with Grou ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Microsoft Intune offers two primary methods for managing Control Panel settings on Windows devices: Administrative Templates and the Settings Catalog. Administrative Templates are based on ADMX files, similar to Group Policy Objects (GPOs) in on-premises Active Directory. By using the administrative templates, you can configure a wide range of settings, including Control Panel visibility and functionality. This method provides a familiar interface for administrators who have experience with Group Policy.&lt;/p&gt;

&lt;p&gt;To use this method, open the Microsoft Intune admin center and navigate to navigate to Devices &gt; Configuration &gt; Create New profile and select Windows 10 and later as the platform and Administrative Templates as the Profile type. In this example I want to hide Add or Remove Programs. In the screenshot below I went to User Configuration and chose “Remove Add or Remove Programs” and then enabled the setting as shown in the screenshot below.&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6681c9de1154f-control1.png&quot; style=&quot;width: 700px; height: 276px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Another approach might be to remove the Programs and Features page altogether. To do so, navigate to User Configuration &gt; Control panel and select “Hide specified Control Panel items” and set the option to enabled. As shown in the screenshot below, list the Control Panel items you want to hide using their &lt;a href=&quot;https://learn.microsoft.com/en-us/windows/win32/shell/controlpanel-canonical-names#control-panel-canonical-names&quot; style=&quot;color:#467886; text-decoration:underline&quot;&gt;canonical names&lt;/a&gt;. Here Is chose to hide System Settings and Programs and Features. Complete the creation process by assigning the policy to the designated groups. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6681ca08dbf47-control2.png&quot; style=&quot;width: 700px; height: 337px;&quot; /&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span aptos=&quot;&quot; display=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Using Windows Settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can also manage Control Panel with Intune without using administrative templates. In this case you will use the Settings Catalog that will apply to both the traditional Control Panel and the modern Settings app. Once again, navigate to Devices &gt; Windows &gt; Configuration profiles and click on &quot;Create Profile&quot;. Then select &quot;Windows 10 and later&quot; as the Platform but this time choose &quot;Settings catalog&quot; as the Profile type. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In the Settings picker do a search for “control panel” and I chose “Add or Remove Programs” but this time I had more options to choose from. I then “Hide Add New Program page for users. Then I enabled the policy to the left as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6681ca42bf5f8-control3.png&quot; style=&quot;width: 700px; height: 319px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can also hide specific control panel items as well as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6681ca756d93f-control4.png&quot; style=&quot;width: 700px; height: 258px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Both administrative templates and the settings catalog can be used to manage the Control Panel using Intune. The settings catalog offers more comprehensive options, including all settings available in Administrative Templates plus additional ones. It allows administrators to search for specific settings and create custom groups. However, in many cases, both alternatives may prove equally effective for managing Control Panel settings. The choice often depends on the specific requirements of the organization and the preferences of the IT administrators.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Setting up a Background Image for an Intune Managed Device </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/setting-up-a-background-image-for-an-intune-managed-device</link>
        <pubDate>2024-06-17T15:37:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Companies want to control the background image on their workstations to maintain a professional appearance, reinforce brand identity, and ensure consistency across all devices. It also prevents &amp;quot;genreal messing around&amp;quot; and at least looks tidy. . 

Setting up a background image for on prem corporate workstations using Group Policy was straightforward. 


	An administrator stored the background image on a network share
	A GPO was created to point to the shared image


However, f ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Companies want to control the background image on their workstations to maintain a professional appearance, reinforce brand identity, and ensure consistency across all devices. It also prevents &quot;genreal messing around&quot; and at least looks tidy. . &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Setting up a background image for on prem corporate workstations using Group Policy was straightforward. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;An administrator stored the background image on a network share&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;A GPO was created to point to the shared image&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;However, for mobile and remote machines, this approach is not feasible as these devices are often disconnected from the corporate network.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Intune provides a solution for assigning a background image to any Windows computing device it manages, regardless of location. The first step is to store your shared image on the internet as I have done below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;a href=&quot;https://cdnsm5-ss9.fabrikam.com/UserFiles/Servers/Server_136424/Image/Departments/Technology/UserBackground.jpg&quot; style=&quot;color:#467886; text-decoration:underline&quot;&gt;https://cdnsm5-ss9.fabrikam.com/UserFiles/Servers/Server_136424/Image/Departments/Technology/UserBackground.jpg&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Then, using the Microsoft Intune Admin Center navigate to Devices &gt; Configuration &gt; Create New policy and select Windows 10 and later as the platform and settings catalog as the Profile type. Using the Settings picker, do a search for personalization. Then choose Desktop Image URL and input the URL as shown in the screenshot below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6681b3ba8d772-back1.png&quot; style=&quot;width: 700px; height: 257px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;Another key difference here is that with Group Policy, the image is not downloaded to the device. The policy simply points to the image in its shared location. Using Intune, both the policy and image file are pushed to the managed devices, and the image is stored on the device itself.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Aptos,sans-serif&quot;&gt;This makes Intune a preferred solution for off-premises machines. Like any configuration profile, the final step is to assign the policy to the designated groups, and you are done.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Using Group Policy to Enforce Resiliency </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/using-group-policy-to-enforce-resiliency</link>
        <pubDate>2024-06-03T14:37:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Traditional cybersecurity approaches have primarily focused on attack prevention through measures like firewalls, antivirus software, and access controls. Recently however, cybersecurity has transitioned to a resiliency mindset. With the rise of advanced persistent threats (APTs), state-sponsored attacks, ransomware, and other sophisticated cyber threats, it has become increasingly difficult to prevent all attacks through traditional security measures alone. Resiliency acknowledges that breaches ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Traditional cybersecurity approaches have primarily focused on attack prevention through measures like firewalls, antivirus software, and access controls. Recently however, cybersecurity has transitioned to a resiliency mindset. With the rise of advanced persistent threats (APTs), state-sponsored attacks, ransomware, and other sophisticated cyber threats, it has become increasingly difficult to prevent all attacks through traditional security measures alone. Resiliency acknowledges that breaches are likely to occur and focuses on minimizing their impact and ensuring continuity of operations.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;At any moment, attackers can begin exploiting a vulnerability that is unknown to anyone in the world except themselves. These zero-day attacks are particularly challenging because you cannot defend against a threat you are unaware of. The compromise of user accounts has also become common place using phishing and credential stuffing attacks. It has become clear that organizations must prepare themselves for the inevitability that such attacks are probably going to occur. By fostering resilience in their systems and networks, they can limit the blast zone and prevent attackers from moving laterally across the network and obtaining greater privileges. A resilient approach acknowledges that breaches are likely to happen and focuses on minimizing their impact and ensuring continuity of operations. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;How Group Policy can Help&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;A primary means of building resilience within your enterprise is to enforce the principle of least privilege (PoLP). PoLP &lt;span style=&quot;background:white&quot;&gt;minimizes security risks by ensuring users and systems have only the necessary access to perform their tasks. This reduces the potential attack surface, limits the impact of breaches, and prevents unauthorized access to sensitive data, thereby enhancing overall cybersecurity in an increasingly complex and threat-prone digital environment.&lt;/span&gt; Here are some classic Group Policy settings to harden your attack surface.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can quickly restrict access to the command prompt completely with User Configuration &gt; Administrative Templates &gt; System and enable ‘Prevent access to the command prompt’. For additional security, you can select ‘Disable the command prompt script processing also’ as shown in the screenshot below. This means that any script that attempts to execute a batch file will fail, and users will not be able to run batch scripts manually.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f665a18d64daad-gp2.png&quot; style=&quot;width: 500px; height: 460px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;By disabling both the command prompt and script processing, this setting significantly enhances security by reducing the potential for users to execute potentially harmful scripts or commands.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Enforcing the membership of privileged local groups on all your enterprise computers is a crucial aspect of resiliency building. You can achieve this using either Group Policy Preferences or the Security Settings in Group Policy. In the example below, I have chosen the latter approach. I navigated to **Computer Configuration** &gt; **Policies** &gt; **Windows Settings** &gt; **Security Settings** &gt; **Restricted Groups**. I then selected the local Administrators group and specified domain admins as the only members, as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f665a18a85fb15-gp3.png&quot; style=&quot;width: 650px; height: 425px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;color: rgb(13, 13, 13); font-family: Calibri, sans-serif; font-size: 11pt;&quot;&gt;These examples illustrate how you can leverage Group Policy to enhance the resilience of your Windows machines against various threats and vulnerabilities. By implementing settings through Group Policy Administrative Templates and Preferences, you can enforce robust security configurations across your Windows environment.&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;However, these are just a few of the many resilience-focused measures that can be deployed using Group Policy. In the next installment of this article series, we will explore additional resilient settings and configurations that can be implemented through Group Policy to further fortify your Windows infrastructure against cyber threats, insider risks, and potential misconfigurations.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Remove the Ability of Users to Change Passwords with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/remove-the-ability-of-users-to-change-passwords-with-intune</link>
        <pubDate>2024-05-20T15:49:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ While security professionals have traditionally recommended that users change their passwords regularly, this mantra is no longer considered a best practice. In fact, there are valid reasons why an organization may choose to even remove the ability for users to change passwords altogether. By restricting password changes, organizations can ensure that password resets and updates are centrally managed and controlled, aligning with their security policies and compliance requirements. 

One scena ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;While security professionals have traditionally recommended that users change their passwords regularly, this mantra is no longer considered a best practice. In fact, there are valid reasons why an organization may choose to even remove the ability for users to change passwords altogether. By restricting password changes, organizations can ensure that password resets and updates are centrally managed and controlled, aligning with their security policies and compliance requirements. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;One scenario where restricting password changes can be beneficial is in educational institutions where student usernames are required to contain assigned student ID numbers. Allowing students to change their passwords could lead to inconsistencies and potential issues with account management.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Other examples include environments where shared accounts are used where permitting individual users to change passwords can lead to confusion, disruption, and potential security risks. By removing this ability, organizations can ensure that shared account passwords are managed centrally and consistently.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Some organizations may already have established password management solutions or processes in place, such as Local Administrator Password Solution (LAPS) or third-party password management tools. In these cases, removing the ability for users to change passwords through Intune can help prevent conflicts or inconsistencies with these existing solutions, ensuring a streamlined and cohesive password management approach.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span aptos=&quot;&quot; display=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;Creating the Necessary Intune Configuration Profile&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To prevent users from changing their passwords using the Microsoft Intune admin center go to Devices &gt; Configuration and create a new policy. Select ‘Windows 10 and later’ as the platform and choose ‘Administrative Templates’ as the profile type. Then name the profile and proceed to configuration settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You will find the appropriate settings in User Configuration &gt; System &gt; Ctrl+Alt+Del Options and enable ‘Remove Change Password” as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6658d8197db44-cp11.png&quot; style=&quot;width: 720px; height: 197px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;While restricting the ability for users to change passwords can address certain challenges, it is recommended that organizations carefully evaluate their specific requirements, security policies, and existing processes before implementing such a policy. They should consider any potential complexity issues in terms of password management and user experience that it may introduce.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Creating Security Baselines in Microsoft Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/creating-security-baselines-in-microsoft-intune</link>
        <pubDate>2024-05-06T15:43:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Security baselines are used to standardize and enforce security configurations across devices to reduce vulnerabilities and ensure compliance. They allow organizations to rapidly deploy a hardened, secure configuration across their managed Windows devices. The baselines contain groups of pre-configured settings recommended by Microsoft&amp;#39;s product security teams, saving significant time and effort in researching and testing individual settings. Pre-configured baselines simplify the deployment  ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Security baselines are used to standardize and enforce security configurations across devices to reduce vulnerabilities and ensure compliance. They allow organizations to rapidly deploy a hardened, secure configuration across their managed Windows devices. The baselines contain groups of pre-configured settings recommended by Microsoft&#039;s product security teams, saving significant time and effort in researching and testing individual settings. Pre-configured baselines simplify the deployment of security settings to make it easier for IT administrators to apply comprehensive security policies without having to configure each setting manually. By using predefined baselines, administrators can save time and effort compared to developing and implementing custom security policies from scratch.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Security baselines can be deployed using either Group Policy or Microsoft Intune. Group Policy baselines are typically managed by importing the latest Microsoft Security Compliance Toolkit baselines and customizing settings via GPOs while Intune security baselines are managed directly in the Intune admin console, where admins can create profiles based on the built-in Microsoft-provided baselines and customize settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;While providing a solid security foundation, baselines can also be customized to meet the specific needs of an organization by adjusting the pre-configured security settings as required. &lt;span style=&quot;background:#fcfcf9&quot;&gt;You can assign different Intune security baselines to different user or device groups. This allows you to tailor the security configurations based on specific requirements or roles within your organization. &lt;/span&gt;After creating the desired security baseline profiles, you can assign each profile to different user or device groups within your Intune environment. This allows you to apply distinct security configurations to different sets of users or devices based on their roles, locations, or other criteria.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:14pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Deploying Security Baselines with Intune&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;To deploy security baselines using the Microsoft Intune admin center, navigate to Endpoint security &gt; Security baseline and select from the available security baselines. For this example, I will choose the &#039;Security Baseline for Windows 10 and later&#039; and customize it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6658d627bea3c-sbl1.png&quot; style=&quot;width: 650px; height: 207px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;After clicking the selected baseline, click the ‘Create profile’ button to create a new profile. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6658d651e936f-sbl2.png&quot; style=&quot;width: 700px; height: 167px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Name the new profile and then proceed to the Configuration settings section. The baseline template has all the settings configured according to best practices by Microsoft engineers. However, there are a couple of settings I want to customize in this case. For instance, the Allow Password Manager setting is configured to Block by default, but in this case, I want to allow it for certain user roles. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6658d68c70663-sbl3.png&quot; style=&quot;width: 650px; height: 383px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Another setting I chose to change is to block outbound traffic which is not the case by default. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6658d6ada2090-sbl4.png&quot; style=&quot;width: 650px; height: 570px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Of course, I could also choose to accept all the preconfigured settings as they are and create a profile too. In this case, deploying the preconfigured baseline makes it convenient to blast out best practice security settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In the same manner that Intune configuration profiles are created, you need to assign this customized security baseline profile to designated groups and then finish out the wizard. You can create as many profiles of the same security baseline as you want. By assigning different Intune security baselines to different user or device groups, you can effectively implement a tailored and granular security strategy that aligns with the specific needs and risk profiles of various segments within your organization.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Manage your OEM BIOS Settings with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-manage-your-oem-bios-settings-with-intune</link>
        <pubDate>2024-04-29T18:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Intune provides the capability to enable or disable various BIOS features and settings, enhancing device security before the operating system even loads. Among these features is the ability to set or change the BIOS password, which is crucial for securing the boot process and protecting the device against unauthorized changes to BIOS settings. Additionally, Intune allows for the configuration of boot sequence settings, the enabling or disabling of hardware components, and the management of power ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Intune provides the capability to enable or disable various BIOS features and settings, enhancing device security before the operating system even loads. Among these features is the ability to set or change the BIOS password, which is crucial for securing the boot process and protecting the device against unauthorized changes to BIOS settings. Additionally, Intune allows for the configuration of boot sequence settings, the enabling or disabling of hardware components, and the management of power management settings, among others. This comprehensive control over BIOS settings helps fortify device security and ensures a consistent configuration across the enterprise.&lt;/span&gt;&lt;/span&gt; As of right now Intune only supports Dell computers. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span aptos=&quot;&quot; display=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Create and Deploy the Dell Configuration File&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To create a Dell configuration file, follow these preliminary steps to ensure your devices meet the necessary requirements for successful configuration via Intune:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;1. Device and System Requirements:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Ensure the device is a Dell commercial client running Windows 10 or a later version.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The device must be enrolled in Intune&#039;s mobile device management (MDM) system.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;letter-spacing:.05pt&quot;&gt;.NET 6.0 runtime for Windows x64 must be installed on the device.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Install Dell Command | Endpoint Configure for Microsoft Intune (DCECMI) on the endpoint.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;2. Creating the Configuration File:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Download the DCECMI tool from Dell’s official website. Using this tool, you can create a configuration file tailored to your specific needs, including any OEM-supported configuration settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;When creating the configuration file, a corresponding Win32 app, provided by the OEM, will be needed. This app acts as an agent that interprets the configuration file and manages BIOS password settings among other configurations.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;3. Deployment:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Deploy the OEM Win32 app to all relevant devices using Intune. This app is crucial as it reads the configuration file and applies the settings, including BIOS passwords, to the devices&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 style=&quot;margin-top:11px; margin-bottom:5px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span aptos=&quot;&quot; display=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;Target the BIOS Configuration Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To effectively target the BIOS configuration policy, you should focus on a specific set of devices. Here are two options for doing so:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Option 1: Create a Device Group&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Create a group comprising only the devices needing the policy. Assign both the app policy and the BIOS configuration policy directly to this group during creation.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Option 2: Use an Assignment Filter&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Implement an assignment filter based on the device manufacturer, specifically targeting OEM devices. Apply this filter when assigning the app and BIOS configuration policies.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 style=&quot;margin-top:32px; margin-bottom:12px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span aptos=&quot;&quot; display=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0f4761&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Creating the BIOS Configuration Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now it is time to create the policy itself. Using the Microsoft Intune Admin Center navigate to Devices &gt; Configuration and create a new policy. Select Windows 10 and later as the Platform and select ‘BIOS configurations and other settings as the Profile Type as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f662ecdaeb33ac-BIOS1.png&quot; style=&quot;width: 550px; height: 448px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In the Configuration settings, &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;select your hardware OEM vendor from the list of supported OEMs which is currently, only Dell. Next you will configure ‘Disable per-device BIOS password protection’ by choosing No or Yes.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;No&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;: Intune assigns a unique device password to each device. Users must use this password to access and modify the BIOS settings on their device.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Yes&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;: The BIOS is not protected by a password. Any previously set passwords are cleared, allowing end users unrestricted access to the BIOS settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The final step is to point to the configuration file you made earlier with the OEM tool as shown in the screenshot below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f662ecddd232ff-BIOS2.png&quot; style=&quot;width: 624px; height: 287px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Then assign the profile to the group you designated earlier, and the BIOS settings will be delivered. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Wrap and Deploy Apps using Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-wrap-and-deploy-apps-using-intune</link>
        <pubDate>2024-04-01T18:46:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ One of the features of Intune is the ability to deploy applications across a wide range of devices and users. For this demonstration I want to install RingCentral for my East Coast Sales users, but first there are some prerequisites to complete first. Using a Windows 11 computer you will need to:


	Download the Microsoft Win32 Content Prep Tool (IntuneWinAppUtil.exe)
	Download the installer for the designated program.
	Create the necessary folder structure for the setup files.


Opting  ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;One of the features of Intune is the ability to deploy applications across a wide range of devices and users. For this demonstration I want to install RingCentral for my East Coast Sales users, but first there are some prerequisites to complete first. Using a Windows 11 computer you will need to:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;Download the &lt;a href=&quot;https://github.com/microsoft/Microsoft-Win32-Content-Prep-Tool/blob/master/IntuneWinAppUtil.exe&quot; style=&quot;color:#467886; text-decoration:underline&quot;&gt;Microsoft Win32 Content Prep Tool&lt;/a&gt; (IntuneWinAppUtil.exe)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;Download the installer for the designated program.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Create the necessary folder structure for the setup files.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Opting for an MSI file when available is recommended for Intune deployments, as handling EXE files require additional steps and configurations&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;. Once completed, you can begin to wrap the designated application for Intune deployment. Using either PowerShell or a Command Prompt, you will use the series of commands as shown below. In this scenario, the IntuneWinAppUtil is located within a folder named &quot;Intune,&quot; containing both a &quot;Source&quot; and an &quot;Output&quot; subfolder for organizing the necessary files.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65f8c1f10d9ef-wrap1.png&quot; style=&quot;width: 600px; height: 81px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can also type a single command that will look like this:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;tt&gt;IntuneWinAppUtil.exe -c &lt;/tt&gt;&lt;source_folder&gt;&lt;tt&gt; -s &lt;/tt&gt;&lt;setup_file&gt;&lt;tt&gt; -o&lt;/tt&gt; &lt;output_folder&gt;&lt;/output_folder&gt;&lt;/setup_file&gt;&lt;/source_folder&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In this example, I didn’t need to specify a catalog folder. &lt;span style=&quot;background:white&quot;&gt;When required, the Catalog Folder contains any configuration files, scripts, or other resources required by the application during its deployment process. Including this folder ensures that all necessary components are packaged together, facilitating a smoother and more reliable installation process when the application is deployed via Intune to end-user devices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;When you run the command successfully it should look something like the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65f8c21f56a4c-wrap2.png&quot; style=&quot;width: 600px; height: 234px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The purpose of the wrapping process is to create the required ‘.intunewin’ file as shown below:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65f8c29bd7c40-wrap3.png&quot; style=&quot;width: 600px; height: 140px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;With the wrapping process complete, you are ready to upload the file to Intune. Using the Microsoft Intune Admin Center, navigate to Apps &gt; Windows and click Add and select Windows app (Win32) from the dropdown menu as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65f8c2cc43e9b-wrap4.png&quot; style=&quot;width: 700px; height: 229px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Then you need to upload the application package file that was created using the Content Prep Tool. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65f8c2fce66a0-wrap5.png&quot; style=&quot;width: 700px; height: 136px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once I clicked ‘OK’ Intune filled in the required settings under App Information other than Publisher which I provided. In the next screen, Program, Intune then added the install and uninstall commands automatically as shown below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65f8c335b0986-wrap6.png&quot; style=&quot;width: 700px; height: 388px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In the Requirements screen you will need to provide the Operating System architecture as well as the minimum operating system required. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65f8c36113db2-wrap7.png&quot; style=&quot;width: 700px; height: 473px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The next screen requires you to create a detection rule for Intune using. You generally define the rule within the Intune application deployment settings to verify if the application is already installed on a device. This involves specifying the path where the application is expected to be installed, and optionally, a file or executable within that path. For example, you might set a rule to check for the presence of an application executable in the &quot;Program Files&quot; directory. If the specified file is found, Intune considers the application installed; if not, it will proceed with the installation. This approach helps prevent reinstallation of applications already present on the device.&lt;/span&gt;&lt;/span&gt; In the screenshot below I have manually provided the path to the ProgramFiles folder where the RingCentral folder and application resides. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65f8c3c985f1a-wrap8.png&quot; style=&quot;width: 700px; height: 162px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;While dependencies and supersendence aren’t necessary here, let’s review what they are. Software dependencies section is for applications that must be installed before this application can be installed. The Supersedence section allows administrators to specify a new version of an application that should replace an older version already installed on devices. By defining supersedence relationships, Intune can automatically update or uninstall the previous version of the app when the new version is deployed, ensuring that users always have access to the latest features and security updates while maintaining a clean and optimized device environment.&lt;/p&gt;

&lt;p&gt;Not needing scope tags either, we are ready to move to the final step which was to assign the app deployment policy to the East Sales Users group and then review and create the policy.  Once complete, the designated users will receive the application.&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Block Browser Extensions with Group Policy and Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/block-browser-extensions-with-group-policy-and-intune</link>
        <pubDate>2024-03-11T09:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The web browser today has literally become the default app in this era of the cloud and spurred the growth of browser extensions. Browser extensions provide a convenient way to customize and enhance a user&amp;rsquo;s web browsing experience with added functionalities and features directly within the browser. However, just as you don&amp;rsquo;t want users utilizing certain applications on corporate devices, you might want to restrict certain browser extensions for reasons of security, compliancy, conte ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The web browser today has literally become the default app in this era of the cloud and spurred the growth of browser extensions. Browser extensions provide a convenient way to customize and enhance a user’s web browsing experience with added functionalities and features directly within the browser. However, just as you don’t want users utilizing certain applications on corporate devices, you might want to restrict certain browser extensions for reasons of security, compliancy, content control, productivity, and performance. For instance, you may not want users installing a VPN extension to get around your web filtering. Fortunately, there are a couple of ways to achieve this.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;font-style:italic;&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Create a Browser E&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;xtension Blocklist with Intune&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you use Intune to manage your Windows 10 and Windows 11 laptops, you can create a configuration profile that will specify which extensions a user cannot install. Extensions already installed prior to the deployment of blocklist will be disabled without a way for the user to enable them. Should the blocklist be removed at some point, the extension will automatically become enabled once again. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Using the Microsoft Intune Admin Center go to Devices &gt; Configuration and create a new profile. Choose Windows 10 and later as the platform and Administrative Templates as the Profile type. Assign a name to the profile and then navigate to User Configuration &gt; Microsoft Edge &gt; Extensions and then enable “&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#292827&quot;&gt;Control which extensions cannot be installed” and input the extension names you want to filter out. You can look up extension names on the Internet. An example is shown below.&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65e0946c7b24b-ext1.png&quot; style=&quot;width: 750px; height: 304px;&quot; /&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Then assign the profile to the designated groups and complete the wizard. You can also apply Edge browser extension restriction on the Computer side. In the example below, I have configured a block list for the Chrome browser. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65e0949307fc3-ext2.png&quot; style=&quot;width: 600px; height: 265px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Create a Browser E&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;xtension Blocklist with Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can do the same with Group Policy. Because we are using Administrative Templates, the setting navigation is basically identical. Create a GPO and use the Group Policy Management Editor to navigate to User Configuration &gt; Administrative Templates &gt; Microsoft Edge &gt; Extensions and enable “Control which extensions cannot be installed” as shown below. Once again, you will need to input the names of the browser extensions. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65e094f2eb652-ext3.png&quot; style=&quot;width: 750px; height: 359px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Block Access to Windows Copilot with Group Policy and Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-block-access-to-windows-copilot-with-group-policy-and-intune</link>
        <pubDate>2024-02-19T14:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Windows Copilot is a feature designed to enhance user productivity and support through AI-powered assistance directly within the Windows operating system. It offers real-time suggestions, automates tasks, and provides contextual help based on user actions and behaviors. By integrating deeply with Windows, Copilot simplifies navigation, streamlines workflows, and helps users efficiently manage their tasks, making technology more accessible and intuitive for everyone.

Think of Copilot as a spec ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;Windows Copilot is a feature designed to enhance user productivity and support through AI-powered assistance directly within the Windows operating system. It offers real-time suggestions, automates tasks, and provides contextual help based on user actions and behaviors. By integrating deeply with Windows, Copilot simplifies navigation, streamlines workflows, and helps users efficiently manage their tasks, making technology more accessible and intuitive for everyone.&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Think of Copilot as a specialized variant of ChatGPT, seamlessly integrated into the Windows operating system to provide real-time assistance, task automation, and contextual support directly from the desktop environment. Despite its clear advantages, there are potential concerns that an organization might have&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Copilot’s ability to analyze user data and behaviors might raise privacy concerns.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The use of AI tools may conflict with some security compliances concerning the handling of data.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Copilot may not be suitable for some roles that require precise communication.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;While it promises to boost productivity, reliance on Copilot could diminish users&#039; problem-solving abilities.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The introduction of Copilot may lead to new errors&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; that can potentially disrupt workflows&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In scenarios such as public kiosks, the functionality of Copilot may be unnecessary or even inappropriate.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Block with Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To restrict user access to Windows Copilot, create a GPO using Group Policy Management and then navigate to Computer &gt; Administrative Templates &gt; Windows Components &gt; Windows CoPilot and enabe “Turn off Windows Copilot” as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65cd14763b4ed-cp1.png&quot; style=&quot;width: 700px; height: 232px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Block with Intune &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;While Intune currently lacks a direct menu option for configuring Windows Copilot, but it can be administered through OMA-URI settings. The essential settings required are as follows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:48px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;OMA-URI Path: ./User/Vendor/MSFT/Policy/Config/WindowsAI/TurnOffWindowsCopilot&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:48px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Data type: Integer&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:48px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Value: 1&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Complete the profile by adding any desired scope tags and assign the profile to your designated groups and finish the wizard. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Lock Down the Windows Settings App with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/lock-down-the-windows-settings-app-with-intune</link>
        <pubDate>2024-02-05T11:37:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In the past, group policy administrators focused on limiting standard users&amp;#39; access to various sections of the Windows Control Panel. Today, while controlling access to the Control Panel remains important, it&amp;#39;s equally crucial to restrict access to the Windows Settings app. This approach is driven by several key objectives:


	Prevent unauthorized modifications that could undermine system security.
	Ensure compliance of regulatory standards
	Enhance the reliability of client devices ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In the past, group policy administrators focused on limiting standard users&#039; access to various sections of the Windows Control Panel. Today, while controlling access to the Control Panel remains important, it&#039;s equally crucial to restrict access to the Windows Settings app. This approach is driven by several key objectives:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Prevent unauthorized modifications that could undermine system security.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Ensure compliance of regulatory standards&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Enhance the reliability of client devices and systems to reduce ticket volume.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Safeguard against both accidental and deliberate data loss scenarios.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Ensure computers are optimized for business-critical functions.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Facilitate device management and troubleshooting by maintaining consistent settings across the organization.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;One way to approach this is rather than creating an Intune policy that restricts access to specific ms-settings, you use an allow list approach that only allows access to a specific list of settings. To do so using the Microsoft Intune Admin Center go to Devices &gt; Configuration and click “Create” to make a new profile. Choose Windows 10 and later as the Platform and Custom Templates as the Profile type. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Using custom templates, assign the profile a name and apply the following OMA-URI settings:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:48px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;OMA-URI: `./Device/Vendor/MSFT/Policy/Config/Settings/PageVisibilityList`&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:48px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Data type: String&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;For the String value, type showonly: and list each msi-setting you want immediately after the colon. Separate each msi-setting with a semicolon like this:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:48px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;showonly:bluetooth;camera;about;sound;easeofaccess-audio;windowsupdate-action;workplace-provisioning;sound-devices;apps-volume;privacy-webcam&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The screenshot below shows the process using Intune:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65ccec128f270-intune1.png&quot; style=&quot;width: 750px; height: 222px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Complete the profile by adding any desired scope tags and assign the profile to your designated groups and finish the wizard. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can find a complete list of ms-settings names on the &lt;a href=&quot;https://learn.microsoft.com/en-us/windows/uwp/launch-resume/launch-settings-app&quot;&gt;Microsoft website&lt;/a&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Be Careful When Applying Intune Conditional Access Policies </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/be-careful-when-applying-intune-conditional-access-policies</link>
        <pubDate>2024-01-30T13:33:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Conditional Access policies in Microsoft Intune are designed to enhance security by ensuring that only authorized users under specific conditions can access your organization&amp;#39;s applications and services. These policies are a critical component of a zero-trust security model, which assumes breach and verifies each request as though it originates from an uncontrolled network. Conditional Access Policies are a potent security mechanism, yet they require careful management to avoid inadvertently ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Conditional Access policies in Microsoft Intune are designed to enhance security by ensuring that only authorized users under specific conditions can access your organization&#039;s applications and services. These policies are a critical component of a zero-trust security model, which assumes breach and verifies each request as though it originates from an uncontrolled network. Conditional Access Policies are a potent security mechanism, yet they require careful management to avoid inadvertently locking out individual users including yourself, or even the entire organization.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s say you have all your users and computers contained within Azure Active Directory and you want to create a conditional access policy that restricts access to the Azure AD portal for only Azure administrators or other privileged users that require access to perform their job duties. To create a conditional access policy using the Microsoft Intune Admin Center you navigate to Devices &gt; Conditional Access and create a new policy. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The default action of this policy will be to block access by default to the Azure AD portal. Thus, under “Include” I have selected All users. Note the warning directly underneath this selection that cautions me about locking myself out as the policy will apply to all users, even the person creating the policy and all high privilege administrators. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65bfd7920d8ed-ca1.png&quot; style=&quot;width: 600px; height: 494px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Thus, it is imperative that I assign groups that will be excluded from the default action. As shown in the screenshot below, I have selected an assembly of users and groups to exclude.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65bfd7cac5d02-ca2.png&quot; style=&quot;width: 600px; height: 448px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The next step is to select a Target Resource. The target resource refers to the applications, services, or data that the policy will protect. These resources are what the policy conditions apply to, determining how and when users can access them based on specific criteria such as user identity, device compliance, location, and risk level. Target resources can include cloud applications, which in this case is Windows Azure Service Management as shown below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65bfd81247747-ca3.png&quot; style=&quot;width: 600px; height: 558px;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;For this policy, I will not set any conditions, such as location or device platform, because I intend to block access irrespective of these factors. The final step is to specify what action will be granted to the Azure portal. Here I am going to block access for all users except for those specifically excluded from this policy. Since I have yet to exclude my own account or any group that includes my account, Intune is providing a final warning, cautioning that the policy I&#039;m about to implement will prevent me from accessing the Azure portal.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65bfd8402b86d-ca4.png&quot; style=&quot;width: 600px; height: 252px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Conditional Access policies are a powerful tool to enforce least privilege access to your critical resources. &lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#374151&quot;&gt;However, caution is necessary, as a single unintended click could lead to adverse outcomes.&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> GPUpdate vs GPUpdate / Force </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/gpupdate-vs-gpupdate--force</link>
        <pubDate>2024-01-16T12:10:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This is certainly a topic I have written about in the past, but revisiting how to manually update Group Policy is worthwhile, given the ongoing confusion surrounding the topic. The choice between using `gpupdate` alone or with the `/force` option is a common query.

First, let&amp;#39;s recap the automatic Group Policy update mechanisms:

1. Computer-side Group Policy Settings automatically refresh upon the restart of a domain member computer.

2. User-side Group Policy Settings&amp;nbsp;refresh w ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;This is certainly a topic I have written about in the past, but revisiting how to manually update Group Policy is worthwhile, given the ongoing confusion surrounding the topic. The choice between using `gpupdate` alone or with the `/force` option is a common query.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;First, let&#039;s recap the automatic Group Policy update mechanisms:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;1. Computer-side Group Policy Settings automatically refresh upon the restart of a domain member computer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;2. User-side Group Policy Settings refresh when a user logs onto a domain member computer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;3. By default, Group Policy Settings undergo an automatic refresh every 90 minutes, with a random offset of up to 30 minutes to prevent system overload against the DCs, so they dont fall over and di.=e.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;However, there are situations where waiting for an automatic refresh or disrupting a user&#039;s session with a logoff or reboot is impractical, especially when immediate action is required. That is when the gupdate command comes into play using either command prompt or PowerShell. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;While `gpupdate /force` can be used in any situation, making it a go-to for ensuring all policies are applied, it&#039;s not always the most efficient method. Let&#039;s explore the nuances between `gpupdate` and `gpupdate /force` to understand when each should be used for optimal Group Policy management.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;GPUpdate by Itself&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;This command efficiently updates Group Policy settings for either a computer or user, applying only the changes made since the last refresh without reapplying unchanged settings of other policies. This command is typically used to apply changes made to a single policy. It is a less intrusive option, often employed for routine Group Policy maintenance. Serving as the go-to command for most needs, it ensures that recent policy adjustments are implemented swiftly and with minimal disruption. It&#039;s especially useful for testing or when needing to apply a newly created or revised policy to a specific computer or user session.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-top:15px; margin-bottom:15px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span calibri=&quot;&quot; class=&quot;Heading2Char&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;GPUpdate /Force&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color:black&quot;&gt;This command forces a refresh of all Group Policy settings, regardless of whether any have changed or not. It re-applies all settings, which can be useful for solving issues related to policy application or when a computer or user receives new policies for the first time. However, because it reapplies all policies, it can be more disruptive, potentially causing logon scripts to run again and requiring a logoff or restart for some policies to reapply effectively. If nothing else, it takes longer to enact and leaves you sitting idle. Use `gpupdate /force` when troubleshooting policy application problems or when you need to ensure that all policies apply again, not just the recently changed ones.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Use Scope Tags for Intune Configuration Profiles </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-use-scope-tags-for-intune-configuration-profiles</link>
        <pubDate>2024-01-02T11:21:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ How many times has this happened to you? You go about creating a new configuration profile using the Microsoft Intune Admin Center. You complete the setting creation process and now want to assign the profile to the designated groups. But before that, the wizard prompts you about Scope Tags as shown in the screenshot below. 



Like other Intune administrators, you might often bypass scope tags by clicking Next, occasionally wondering about their purpose. Scope tags are vital for partitionin ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;How many times has this happened to you? You go about creating a new configuration profile using the Microsoft Intune Admin Center. You complete the setting creation process and now want to assign the profile to the designated groups. But before that, the wizard prompts you about Scope Tags as shown in the screenshot below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65bfb83d7d281-scope1.png&quot; style=&quot;width: 550px; height: 249px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Like other Intune administrators, you might often bypass scope tags by clicking Next, occasionally wondering about their purpose. Scope tags are vital for partitioning and controlling access to Intune resources, such as profiles, apps, and policies, to enable delegated administration. They allow for the classification of resources by department, function, or location, facilitating more efficient resource organization. This ensures administrators can readily manage resources relevant to their specific organizational segments. Although granular access control through scope tags might seem excessive for small to medium-sized organizations, it&#039;s incredibly beneficial for larger ones, enhancing security and compliance by restricting administrators&#039; access only to their designated resources. This reduces the likelihood of unauthorized access or alterations to crucial settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Create Your Scope Tags&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Start by generating your scope tags, envisioning them as segmentation tools that define which admins have access. Imagine a national company with offices across various regions. For this example, you&#039;ll create scope tags specifically for the administrative team stationed in this office that is responsible for managing the profiles and policies exclusive to the East Coast office. To configure this arrangement, you need to:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Create a member group called East Coast Admins which will contain the all admins of the east coast office that will have permission to manage policies and profiles for users and devices within the allotted scope. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Create a scope tag that will contain the east coast admin member group.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In this case I already have my east coast admin group. To create the scope tag using the Microsoft Intune Admin Center navigate to Tenant Administration &gt; Roles &gt; Scope Tags and create a scope tag and name it as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65bfb8c3130ac-scope2.png&quot; style=&quot;width: 550px; height: 307px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;The next step is to add member group to the scope tag as shown here:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65bfb95445059-scope5.png&quot; style=&quot;width: 550px; height: 224px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Next, finish the wizard to create your scope tag. With the scope tag established, you can apply it as necessary. The final step involves creating a configuration profile. When you reach the Scope Tag section this time, add the scope tag you&#039;ve just created.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65bfb926ad26f-scope4.png&quot; style=&quot;width: 550px; height: 250px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Then I will assign the device group that configuration profile will be applied to:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65bfb9771a0c9-scope5.png&quot; style=&quot;width: 550px; height: 224px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;After finishing the wizard, I&#039;ve set up a configuration profile targeted at East Coast computer devices. This allows East Coast admins to manage these devices specifically, utilizing the scope tag for focused oversight.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Manage Defender Updates with-ADMX </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/manage-defender-updates-withadmx</link>
        <pubDate>2023-12-18T15:31:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ With Windows 10, Group Policy administrators could configure whether Windows Defender receives its updates through standard Windows Update channels or alternative sources such as WSUS (Windows Server Update Services) or manually specified update locations. as shown below. You could set whether Windows Defender should receive updates through standard Windows Update channels, or through alternative means like WSUS (Windows Server Update Services) or manually specified sources.



In Windows 11 ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;With Windows 10, Group Policy administrators could configure whether Windows Defender receives its updates through standard Windows Update channels or alternative sources such as WSUS (Windows Server Update Services) or manually specified update locations.&lt;/span&gt; as shown below. You could set whether Windows Defender should receive updates through standard Windows Update channels, or through alternative means like WSUS (Windows Server Update Services) or manually specified sources.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65834e60a5e2a-WD1.png&quot; style=&quot;width: 750px; height: 262px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In Windows 11, Group Policy administrators are now provided with the capability to select specific channels for acquiring virus signatures for both daily and monthly updates. This new feature offers enhanced control over how and from where these crucial security updates are sourced, aligning with the organization&#039;s specific requirements and IT infrastructure. The process is quite similar to the process of assigning devices to channels for Windows Update for Business. The new settings reside in the root directory of Microsoft Defender Antivirus as shown here. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65834e8c45a94-WD2.png&quot; style=&quot;width: 750px; height: 217px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;First let’s talk about the different types of updates. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Daily Security Intelligence Updates&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; are frequent updates that provide the latest definitions for viruses, spyware, and other malware. These are essential for Microsoft Defender to recognize and protect against newly emerging threats once they have been identified. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ol start=&quot;2&quot;&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Monthly Engine Updates&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; enhance the capabilities of Microsoft Defender’s threat detection such as scanning functionality and detection algorithms. In addition to improving threat identification and remediation, these updates help optimize the Defender’s performance and resource usage. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ol start=&quot;3&quot;&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Monthly Platform Updates&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; introduce new functionality, features, and user interface modifications. They may also address identified bugs or vulnerabilities within the software itself. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;margin-top:14px; margin-bottom:14px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now, let’s talk about the various channels available.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-top:14px; margin-bottom:14px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Beta Channel&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;: Devices assigned to it will be the first to receive new updates. These devices should be used for testing environments. Devices subscribed to the Windows Insider program are assigned to this channel by default.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-top:14px; margin-bottom:14px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Current Channel (Preview)&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;: Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. This is recommended for devices in pre-production or validation environments.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-top:14px; margin-bottom:14px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Current Channel (Broad)&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;: Devices will be offered updates only after the gradual release cycle completes. Most of the devices in your production environment should be assigned here.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-top:14px; margin-bottom:14px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Current Channel (Staged)&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;: Devices assigned here will get &lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;updates later during the gradual release cycle&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; but prior to the release to the majority of devices. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Microsoft states that no more than 10% of your devices should be assigned to this channel.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-top:14px; margin-bottom:14px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Critical-Time delay&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;: Devices will be offered updates with a 48-hour delay. This is suggested for devices in critical environments only.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-top:14px; margin-bottom:14px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The channel selection process for Monthly Engine and Monthly Platform updates is the same as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65834ec7e628b-WD3.png&quot; style=&quot;width: 500px; height: 485px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-top:14px; margin-bottom:14px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Daily Security Intelligence Updates have fewer channel options as they are much more pertinent.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-top:14px; margin-bottom:14px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65834ef1de480-WD4.png&quot; style=&quot;width: 500px; height: 291px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Enforce the Touch Keyboard in Desktop Mode with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/enforce-the-touch-keyboard-in-desktop-mode-with-intune</link>
        <pubDate>2023-12-04T13:49:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Convertible 2-in-1 laptops, which seamlessly switch between desktop and tablet modes, offer great versatility for users requiring such adaptability. In tablet mode, these devices automatically display a touch keyboard when the physical keyboard is inaccessible. However, there are instances where activating the touch keyboard in desktop mode is beneficial. Some examples might include:


	In educational settings or other situations where a keyboard configured for a second language is needed.
	 ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Convertible 2-in-1 laptops, which seamlessly switch between desktop and tablet modes, offer great versatility for users requiring such adaptability. In tablet mode, these devices automatically display a touch keyboard when the physical keyboard is inaccessible. However, there are instances where activating the touch keyboard in desktop mode is beneficial. Some examples might include:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In educational settings or other situations where a keyboard configured for a second language is needed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For individuals with mobility or dexterity challenges, a touch-enabled keyboard can be more user-friendly than a traditional keyboard.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;At public kiosks or information stands, where a physical keyboard may be impractical or less hygienic.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;- Certain job roles may find a touch-enabled device more convenient, eliminating the need to alternate between a touch interface and a physical keyboard.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Although the touch keyboard is available in desktop mode by default, there are scenarios where you might prefer it to appear automatically for user convenience. In certain cases, access to the touch keyboard might be restricted due to default policy settings. To enable automatic appearance of the touch keyboard on specific Windows machines using the Microsoft Intune admin center navigate to Devices &gt; Configuration Profiles and create a new policy. Choose Windows 10 and later as the platform and Settings catalog as the Profile type. Name the policy and type “text input” into the settings picker. Then select “Enable Touch Keyboard Auto Invoke in Desktop Mode” as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f656b7bf9f06ca-key1.png&quot; style=&quot;width: 750px; height: 363px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Complete the setup wizard by assigning the policy to your designated groups. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Retrieve a Password in Azure LAPS </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-retrieve-a-password-in-azure-laps</link>
        <pubDate>2023-11-20T08:44:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ &amp;nbsp;

In my previous blog I showed how to setup LAPS for Azure AD. With everything configured correctly, now it is time to retrieve the password for the local administrator account that our policy addresses. To retrieve the password, go to your Azure portal and navigate to Devices &amp;gt; All Devices &amp;gt; Local administrator password recovery (Preview) and find the selected device. Click on Show local administrator password beside the listed device. Navigate to the right and either show the pas ]]>
        </description>
        <content:encoded>
            &lt;p&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In my previous blog I showed how to setup LAPS for Azure AD. With everything configured correctly, now it is time to retrieve the password for the local administrator account that our policy addresses. To retrieve the password, go to your Azure portal and navigate to Devices &gt; All Devices &gt; &lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Local administrator password recovery (Preview) and find the selected device. Click on Show local administrator password beside the listed device. Navigate to the right and either show the password or click the copy button as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65561c9b10590-sub1.png&quot; style=&quot;width: 800px; height: 396px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Armed with the specified password, you can now log into the device using the local administrator credentials and execute tasks that necessitate local admin privileges.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Configure Windows LAPS for Azure AD (when used with Intune) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-configure-windows-laps-for-azure-ad-when-used-with-intune</link>
        <pubDate>2023-11-13T15:25:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In an earlier blog I talked about Windows LAPS (LAPS2) that was released in April 2023. It was designed to replace the original version of LAPS, now known as Legacy LAPS. We explored its integration in an on-prem AD setting across multiple articles. Today, let&amp;#39;s pivot to applying it within the Azure AD framework.

Windows LAPS is designed to help bolster security by minimizing the risk associated with compromised local administrator passwords that could grant unwarranted access to networke ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;In an earlier blog I talked about &lt;a href=&quot;https://www.mdmandgpanswers.com/blogs/view-blog/why-you-need-to-checkout-laps2-to-shore-up-security-part-1&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;Windows LAPS&lt;/a&gt; (LAPS2) &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;that was released in April 2023. It was designed to replace the original version of LAPS, now known as Legacy LAPS. &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;We explored its integration in an on-prem AD setting across multiple articles. Today, let&#039;s pivot to applying it within the Azure AD framework.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows LAPS is designed to help bolster security by minimizing the risk associated with compromised local administrator passwords that could grant unwarranted access to networked Windows devices. A prevalent scenario in many enterprises is the use of a uniform local admin account across all Windows endpoints, characterized by an identical username and password. This poses a significant security gap because if a single account is breached, a threat actor could potentially gain administrative access to every interconnected device. In the case of a school district, once one student gets a hold of the local admin credentials, it doesn’t take long until the entire student body has admin rights, wreaking havoc on the machines. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows LAPS ensures each local admin account is assigned a unique password. For instance, if you oversee multiple Windows devices all having a local admin account labeled &#039;Admin1&#039;, Windows LAPS allows you to set a unique password for each of these accounts. Additionally, these passwords come with a specified expiration period, after which a new randomized password is created. While my earlier blog series delved into setting up LAPS via Group Policy, in this piece, we&#039;ll explore its configuration using Intune.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;PRE-REQUISITES FOR WINDOWS LAPS AZURE AD&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The prerequisites for Windows LAPS are few. There is nothing to install because Intune policies are used to configure the LAPS CSP already on the devices. Here is what you need:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;An Intune license&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;All computers need to be on Windows 10 or Windows 11 with the April 2023 Cumulative Update installed&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Requires one of the following roles in Azure AD: &lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Global Administrator, Cloud Device Administrator, or Intune Administrator.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Because Azure is cloud based, you can access Windows LAPS from anywhere and Intune’s scalability allows you to easily manage a great many systems. It is important to remember one downside and that is the dependency on the internet. If your internet service is down and you don’t have an alternative means to reach Azure, you will have no way to retrieve the LAPS password. That being said, let’s get to configuring Windows LAPS for Azure AD.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Configuring LAPS for Azure AD&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Before you create an Intune policy you must first access your Azure portal (&lt;a href=&quot;https://portal.azure.com/&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;portal.azure.com&lt;/a&gt;) and enable LAPS. Navigate to Devices &gt; Device Settings and scroll down. Then turn on the “Enable Azure AD Local Administrator Password Solution” as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65148141f187f-LAPSA1.png&quot; style=&quot;width: 700px; height: 463px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once that is completed, you can move on to Intune. Using the Microsoft Intune admin center navigate to Endpoint Security &gt; Account protection and click Create Policy. Choose “Windows 10 and later” as the Platform and “Local admin password solution Windows LAPS” as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6514816ab2d3a-LAPSA2.png&quot; style=&quot;width: 700px; height: 339px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;After naming the policy it is time to configure settings as shown below. Of course, in this instance we will choose &lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Azure AD only as the Backup Directory. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6514818bb573f-LAPSA3.png&quot; style=&quot;width: 700px; height: 499px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For the Administrator Account Name, I chose a custom account called fabadmin. If you are using Windows LAPS to manage any custom local administrator account, you must enter the name of that account here. You can leave this field blank if you are configuring LAPS for the built-in administrator, even if you have changed the name from its default name.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For Password Complexity there are four options:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Large letters&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Large letters + small letters&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Large letters + small letters + numbers&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Large letters + small letters + numbers + special characters&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-left:24px; text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Note that four options are the default if you don’t select an option. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Post Authentication Actions is used to &lt;span style=&quot;background:white&quot;&gt;specify the actions to take upon expiration of the configured grace period which is 12 days in this instance. There are three options here. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Reset password: upon expiry of the grace period, the managed account password will be reset.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Reset the password and logoff the managed account: upon expiry of the grace period, the managed account password will be reset and any interactive logon sessions using the managed account will be terminated. (Default behavior)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Reset the password and reboot: upon expiry of the grace period, the managed account password will be reset, and the managed device will be immediately rebooted.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Not configured.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-left:24px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If no selection is made, the setting will default to the logoff option. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Post Authentication Reset Delay Sets the delay in hours before the previous actions above is executed. The default is 24 hours which is also the maximum.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;With your settings configured, a&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;ssign relevant scopes, and deploy the rule to the Azure Ad group you want to manage with this policy.&lt;/span&gt;&lt;/span&gt; In my next blog I will talk about how to retrieve the password from Azure and how to audit LAPS retrieval. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Configure Visibility Settings in Group Policy and Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-configure-visibility-settings-in-group-policy-and-intune</link>
        <pubDate>2023-10-30T14:53:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Group Policy and Intune both offer multiple ways to hide various components of the Windows operating system. One of these is the &amp;quot;Settings Page Visibility&amp;quot; setting that is specifically designed for managing the visibility of individual pages within the Windows Settings app introduced in Windows 10. This is distinct from the practice of hiding individual applets within the traditional Control Panel. By controlling visibility, you can streamline the user experience by ensuring they only  ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Group Policy and Intune both offer multiple ways to hide various components of the Windows operating system. One of these is the &quot;Settings Page Visibility&quot; setting that is specifically designed for managing the visibility of individual pages within the Windows Settings app introduced in Windows 10. This is distinct from the practice of hiding individual applets within the traditional Control Panel. By controlling visibility, you can streamline the user experience by ensuring they only see the settings they need, thus minimizing potential confusion or mistakes.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Note that the &quot;Settings Page Visibility&quot; policy only determines whether a page is visible or hidden to users. If you hide a settings page, users cannot see or access it, but this does not deactivate or override the actual functionalities or policies that might be set elsewhere.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;I will show you how to configure the &quot;Settings Page Visibility&quot; policy in both Group Policy and Intune.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Group Policy &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; Control Panel &gt; Settings Page Visibility. You will then enable the policy and configure the settings as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f65298f2e153ad-v1.png&quot; style=&quot;width: 750px; height: 495px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You have two options for this setting.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Use the &lt;b&gt;hide:&lt;/b&gt; command to hide specific pages. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Use the &lt;b&gt;showonly:&lt;/b&gt; command to show only specific pages and hide all others.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You then follow either command by the Uniform Resource Identifier (URI) of the resource you want to apply the command to. For instance, if you want to hide the Window game bar you would type the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span mono=&quot;&quot; style=&quot;font-family:&quot; ubuntu=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Hide:&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:10.5pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span mono=&quot;&quot; style=&quot;font-family:&quot; ubuntu=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; ms-settings:gaming-gamebar&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you want to hide additional settings, simply separate each URI by a semicolon. For instance, if you want to hide the Windows gamebar as well as advanced network and internet settings, the command will look as follows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span mono=&quot;&quot; style=&quot;font-family:&quot; ubuntu=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Hide:&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:10.5pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span mono=&quot;&quot; style=&quot;font-family:&quot; ubuntu=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; ms-settings:gaming-gamebar&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;;ms-settings:network-advancedsettings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s use an example for the showonly: command. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.5pt&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span mono=&quot;&quot; style=&quot;font-family:&quot; ubuntu=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;showonly:display;bluetooth&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can add as many URIs as you need to the policy. Once completed, assign the GPO to your designated groups and you are ready to deploy. You can refer &lt;a href=&quot;https://learn.microsoft.com/en-us/windows/uwp/launch-resume/launch-settings-app#accounts&quot;&gt;here for a list &lt;/a&gt;of URIs.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Intune&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To configure the &quot;Settings Page Visibility&quot; equivalent in Intune go to your Microsoft Intune admin center portal and navigate to Devices &gt; Configuration profiles. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Create a new profile and choose “Windows 10 and later” as the Platform and choose “Settings catalog” as the Profile type. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Name the profile and click Add settings. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In the settings picker type “visibility”&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Choose between the 2 Page Visibility List options&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In this example I will choose Page Visibility List because I want to apply the profile to users as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f652991f1ac83b-v2.png&quot; style=&quot;width: 750px; height: 287px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Use the same command structure as in Group Policy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6529920c1ffa0-v3.png&quot; style=&quot;width: 600px; height: 268px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Then assign any scope tags, your designated groups and complete the creation process.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Audit for LAPS Grab in Azure AD (typically used with Intune) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-audit-for-laps-grab-in-azure-ad-typically-used-with-intune</link>
        <pubDate>2023-10-16T16:25:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ LAPS offers an effective method to limit local administrative privileges by generating a unique password for each Windows computer in your enterprise. However, for enhanced security and compliance, it&amp;#39;s advisable to monitor who is accessing the passwords for specific machines. For Azure-joined devices go to your Azure portal and navigate to Devices &amp;gt; Audit Logs and then search for &amp;ldquo;Recover device local administrator password&amp;rdquo; as shown in the example below. 



You can then ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;LAPS offers an effective method to limit local administrative privileges by generating a unique password for each Windows computer in your enterprise. However, for enhanced security and compliance, it&#039;s advisable to monitor who is accessing the passwords for specific machines. For Azure-joined devices go to your Azure portal and navigate to Devices &gt; Audit Logs and then search for “Recover device local administrator password” as shown in the example below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f651f1b370df66-AL1.png&quot; style=&quot;width: 750px; height: 367px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can then click on the event to view more information as shown here.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f651f1b967eb71-AL2.png&quot; style=&quot;width: 500px; height: 493px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;This system effectively restricts access to clear-text passwords, ensuring only individuals with specific administrative roles, like Global Administrators, Cloud Device Administrators, and Intune Administrators, can access them.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Configure Intune or Group Policy Audit Policies for Microsoft Defender for Identity </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/configure-intune-or-group-policy-audit-policies-for-microsoft-defender-for-identity</link>
        <pubDate>2023-10-02T12:19:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft Defender for Identity (formerly known as Azure Advanced Threat Protection or Azure ATP) is a cloud-based security service offered by Microsoft to help protect your on-prem Active Directory environment. It leverages artificial intelligence, network, and behavioral analytics to detect abnormal behavior and activities that could be potentially threatening. &amp;nbsp;It can then provide security alerts and actionable insights to protect against cyber threats targeting identities and credential ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Microsoft Defender for Identity (formerly known as Azure Advanced Threat Protection or Azure ATP) is a cloud-based security service offered by Microsoft to help protect your on-prem Active Directory environment. It leverages artificial intelligence, network, and behavioral analytics to detect abnormal behavior and activities that could be potentially threatening.  It can then provide security alerts and actionable insights to protect against cyber threats targeting identities and credentials. Some of its capabilities include the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align: justify;&quot;&gt;Analyze user behaviors and activities with learning-driven metrics&lt;/li&gt;
	&lt;li style=&quot;text-align: justify;&quot;&gt;Safeguard user identities and credentials within Active Directory&lt;/li&gt;
	&lt;li style=&quot;text-align: justify;&quot;&gt;Identify and investigate abnormal user behaviors and advanced threat patterns&lt;/li&gt;
	&lt;li style=&quot;text-align: justify;&quot;&gt;Provide incident details on a streamlined timeline for efficient resolution.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Requirements for Microsoft Defender for Identity&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;To use Microsoft Defender for Identity you will need a license &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;for Enterprise Mobility +&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt; Security E5 (EMS E5/A5), Microsoft 365 E5 (M365 E5/A5/G5) or Microsoft 365 E5/A5/G5. Standalone Defender for Identity licenses are also available. You will also need an &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Azure AD tenant with at least one global/security administrator&lt;/span&gt;&lt;/span&gt; with a Directory Service account with read access to all objects in the monitored domains.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;In this article I am only going to cover how to configure your on-prem Group Policy and AD environment for audit events. You can refer to this &lt;a href=&quot;https://learn.microsoft.com/en-us/defender-for-identity/quick-installation-guide&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;installation guide&lt;/a&gt; as to how to install Microsoft Defender for Identity on Active Directory or Active Directory Federation Services (AD FS) servers.&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Configuring Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;h3 style=&quot;text-align:justify; margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;For Microsoft Defender for Identity to fully function, you must enable and configure certain audit events in Group Policy. Microsoft Defender for Identity then uses this audit data to detect suspicious activities and security vulnerabilities in real-time. To configure the audit events, you need use Group Policy Management Editor to either create a new GPO and link it to the Domain Controllers OU or edit and configure the Default&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt; Domain Controllers Policy. In the example below I am choosing to modify the existing policy. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f650b19ad10487-MDI1.png&quot; style=&quot;width: 600px; height: 485px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Start by going navigating to&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt; &lt;/b&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Computer Configuration&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; &gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Policies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; &gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Windows Settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; &gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Security Settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt; &gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt; Advanced Audit Policy Configuration&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; &gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Audit Policies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt; Start with the &lt;b&gt;Account&lt;/b&gt; Logon policy and select “Audit Credential Validation.” Configure this and all the&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;following audit events&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; for both &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Success&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; and &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Failure&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; events as shown in the screenshot below. This will trigger Event ID 4776 in the security logs in Event Viewer. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f650b19eea7435-MDI2.png&quot; style=&quot;width: 700px; height: 508px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Next will be the&lt;b&gt; Account Management&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; audit policy where you will enable the following subcategories for both Success and Failure. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;table class=&quot;MsoTableGrid&quot; style=&quot;border-collapse:collapse; border:solid windowtext 1.0pt&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;border:solid windowtext 1.0pt; width:233.75pt; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Audit Computer Account Management&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;border:solid windowtext 1.0pt; width:233.75pt; border-left:none; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Event IDs 4741, 4743&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;border:solid windowtext 1.0pt; width:233.75pt; border-top:none; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Audit Distribution Group Management&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; width:233.75pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Event IDs 4753, 4763&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;border:solid windowtext 1.0pt; width:233.75pt; border-top:none; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Audit Security Group Management&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; width:233.75pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Event IDs &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#161616&quot;&gt;4728, 4729, 4730, 4732, 4733, 4756, 4757, 4758&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;border:solid windowtext 1.0pt; width:233.75pt; border-top:none; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Audit User Account Management&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; width:233.75pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;4726&lt;/span&gt;&lt;/span&gt; *&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Then move to the&lt;b&gt; &lt;/b&gt;DS Access&lt;/span&gt;&lt;/span&gt; audit policy and enable “&lt;b&gt;Audit Directory Service Access&lt;/b&gt;” for Event ID 4662 and then enable “&lt;b&gt;Audit Directory Service Changes&lt;/b&gt;” for Event ID 5136. Wrap things up by moving on to the &lt;b&gt;System&lt;/b&gt; audit policy and enable “Audit Directory Service Changes” audit for Event ID 5136. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Configure Object Auditing&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Note that to collect 4662 events you will need to configure object auditing on the user, group, and computer objects. This is performed using Active Directory Users and Computers. Make sure you select the View menu and select Advanced Features as shown below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f650b1a2db43a0-MDI3.png&quot; style=&quot;width: 500px; height: 304px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Then right click on your domain, select Advanced Features &gt; go to the Security Tab and click Advanced as shown here. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f650b1a64bfbef-MDI4.png&quot; style=&quot;width: 450px; height: 514px;&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;In Advanced Security Settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;choose the&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Auditing&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt; &lt;/b&gt;tab and Select&lt;b&gt; &lt;/b&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Add.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f650b1a9408cb3-MDI5.png&quot; style=&quot;width: 700px; height: 474px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Select Everyone as the principal. Upon returning to the Auditing Entry, configure these settings:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Choose &quot;Success&quot; for the &#039;Type&#039;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;For &#039;Applies to&#039;, opt for &#039;Descendant User objects&#039;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;In the Permissions section, navigate downwards and click the &#039;Clear all&#039; button.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Now scroll up and choose &quot;Full Control,&quot; which will auto-select all permissions. Next, deselect &quot;List contents,&quot; &quot;Read all properties,&quot; and &quot;Read permissions.&quot; Click OK. This action sets the Properties to &quot;Write&quot; mode. As a result, any pertinent changes to the directory services will register as 4662 events. The final configuration is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f650b1ab9ccbc7-MDI6.png&quot; style=&quot;width: 700px; height: 450px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Now complete the same steps but select the following object types for Applies to:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;list-style-type:none&quot;&gt;
	&lt;ul style=&quot;list-style-type:disc&quot;&gt;
		&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list -39.0pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Descendant Group Objects&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
		&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list -39.0pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Descendant Computer Objects&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
		&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list -39.0pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Descendant msDS-GroupManagedServiceAccount Objects&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
		&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list -39.0pt&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Descendant msDS-ManagedServiceAccount Objects&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Enable auditing on an ADFS object&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In the steps above we configured auditing for the entire Domain. Some detections only require auditing in &lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;specific Active Directory objects however. &lt;/span&gt;&lt;/span&gt;Return to the &lt;strong style=&quot;box-sizing:inherit; outline-color:inherit&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Active Directory Users and Computers&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt; console, and choose the domain you want to enable the logs on. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Navigate to Program Data &gt; Microsoft &gt; ADFS.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Right-click on ADFS and choose Properties.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Navigate to the Security tab and click on Advanced.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Within Advanced Security Settings, go to the Auditing tab and click Add.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Click on &#039;Select a principal&#039;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;In the field labeled &#039;Enter the object name to select&#039;, input &#039;Everyone&#039;. Click &#039;Check Names&#039;, and then click OK.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;You&#039;ll be taken back to the Auditing Entry. Configure the following settings:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;For &#039;Type&#039;, choose &#039;All&#039;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;For &#039;Applies to&#039;, pick &#039;This object and all descendant objects&#039;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;In the Permissions section, first click &#039;Clear all&#039;. Then select &#039;Read all properties&#039; and &#039;Write all properties&#039;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f650b1aee4e35f-MDI7.png&quot; style=&quot;width: 700px; height: 450px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Click OK out of all windows.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Enable auditing on the Configuration container&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;We just have one more step to go and here you will need to launch the ADSI Edit consol which you can access by typine &lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;ADSIEdit.msc in the Run Command.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align: justify; margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;From the Action menu, choose Connect to.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;In the Connection Settings pop-up, from the &#039;Select a well known Naming Context&#039; dropdown, choose Configuration, and then click OK.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Navigate to the Configuration container and expand it. Inside, you&#039;ll find the Configuration node, which starts with &quot;CN=Configuration,DC=...&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Right-click on this Configuration node and choose Properties as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f650b1b36401db-MDI8.png&quot; style=&quot;width: 700px; height: 467px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Now navigate to the Security tab and click &quot;Advanced.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Once inside Advanced Security Settings, opt for the Auditing tab and click &quot;Add.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Click on &quot;Select a principal.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;In the ensuing field, input &quot;Everyone&quot;, then click &quot;Check Names&quot;, followed by &quot;OK.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Now, back in the Auditing Entry, adjust these settings:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Set &#039;Type&#039; to &#039;All&#039;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Under &#039;Applies to&#039;, choose &#039;This object and all descendant objects&#039;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom: 11px;&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Within Permissions, first hit &#039;Clear all&#039;, then check &#039;Write all properties&#039; as shown in the example below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f650b1b5ca381a-MDI9.png&quot; style=&quot;width: 700px; height: 451px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Click OK out of all windows and you are done.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Assign Users their Proper Wireless Connection Using Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-assign-users-their-proper-wireless-connection-using-intune</link>
        <pubDate>2023-09-18T10:16:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Most organizations have more than one wireless SSID for their users. For example, a school might designate separate SSIDs for staff and students. Similarly, a business could have distinct SSIDs for regular employees and those with privileged access. These SSIDs are then paired with specific access policies, managed either through the native wireless manager or external tools like SD-WAN solutions. In our school scenario, the student&amp;#39;s SSID might provide direct internet access, whereas the st ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Most organizations have more than one wireless SSID for their users. For example, a school might designate separate SSIDs for staff and students. Similarly, a business could have distinct SSIDs for regular employees and those with privileged access. These SSIDs are then paired with specific access policies, managed either through the native wireless manager or external tools like SD-WAN solutions. In our school scenario, the student&#039;s SSID might provide direct internet access, whereas the staff&#039;s SSID offers connectivity to internal resources like printers. For IT teams or personnel requiring complete network access, there&#039;s typically an unrestricted SSID in place.&lt;/p&gt;

&lt;p&gt;With Intune, you can designate a specific wireless SSID for users. Additionally, Intune facilitates the use of WPA2-Personal wireless configurations, automatically supplying computers with the pre-shared key. This eliminates the need for users to manually enter it and allows for the implementation of intricate passwords of up to 64 characters, bolstering security. With this setup, you can also keep SSIDs hidden so that the visible SSID on your premises is for the guest network.&lt;/p&gt;

&lt;p&gt;To configure wireless policies using the Microsoft Intune Admin Center go to Devices &gt; Configuration profiles and click Create Profile. Select Windows 10 and later as your Platform and WiFi Templates as your Profile. Name your profile and then configure the settings as shown below. Here I have enabled “Connect automatically when in range” and “Connect to this network even when it is not broadcasting its SSID.”&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64d793df2adf4-wifi1.png&quot; style=&quot;width: 750px; height: 513px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once configured, assign the profile to your designated groups. When onboarding new computers using Autopilot or a package you will need to manually connect the Windows device to a wireless SSID. Once Intune delivers WiFi profile, the computer will possess the necessary SSID details to connect automatically to an assigned SSID depending on the user that signs in.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Creating Mapped Drives with Group Policy and Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/creating-mapped-drives-with-group-policy-and-intune-</link>
        <pubDate>2023-09-04T12:20:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Group Policy admins have been mapping drives for years, while trying to map network drives using an MDM has proved challenging. The good news is that you can use both Group Policy Preferences and Microsoft Intune to map network drives for your users. Its just a lot easier with Group Policy. 

Mapping Drives with Group Policy Preferences

Let&amp;rsquo;s start with Group Policy. Create a GPO using the Group Policy Management Console and go to User Configuration &amp;gt; Preferences&amp;gt; Windows Settin ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Group Policy admins have been mapping drives for years, while trying to map network drives using an MDM has proved challenging. The good news is that you can use both Group Policy Preferences and Microsoft Intune to map network drives for your users. Its just a lot easier with Group Policy. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:14.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Mapping Drives with Group Policy Preferences&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s start with Group Policy. Create a GPO using the Group Policy Management Console and go to User Configuration &gt; Preferences&gt; Windows Settings &gt; Drive Maps. As this is a brand-new mapping I will select Create as the Action. Then type in the UNC path of the shared folder you want users to access. Check the Reconnect box to make it a persistent connection that will appear every time they log on. Under Drive Letter, I assigned a specific drive letter as shown below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64e8d450dd043-md1.png&quot; style=&quot;width: 600px; height: 366px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Because I am using Group Policy Preferences I can take advantage of Item-level Targeting to target the GPO more specifically at the exact users I want. Item-level Targeting is a feature not available in traditional Group Policy or Intune. In this case I want to target it to members of the managers group, but only have the mapping applied to desktop computers running Windows 10. The screenshot below shows how I did this after clicking on the Common tab. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64e8d49246eda-md2.png&quot; style=&quot;width: 700px; height: 355px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Mapping Network Drives with Intune &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For users who solely use their laptops for mobile or remote functions, mapping a network drive to a laptop managed by an MDM may not be logical. However, if all your computers are joined to Azure Domain and you wish to map drives, Intune doesn&#039;t provide a straightforward menu-driven method. You&#039;ll need to rely on PowerShell. Begin by creating a PowerShell cmdlet, structured as follows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:deeppink&quot;&gt;New-PSDrive&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:gray&quot;&gt;-Name&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;M&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:gray&quot;&gt;-PSProvider&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;FileSystem&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:gray&quot;&gt;-Root&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;ADDRESSOFTHEFILESHARE&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:gray&quot;&gt;-Persist&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; line-height:107%; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In this instance, the cmdlet looks like this:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:deeppink&quot;&gt;New-PSDrive&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:gray&quot;&gt;-Name&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;M&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:gray&quot;&gt;-PSProvider&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;FileSystem&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:gray&quot;&gt;-Root&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#5e5e5e&quot;&gt; “\&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:blue&quot;&gt;\Fileserver1\Marketing”&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt; &lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; font-size:10.0pt; padding:0in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:gray&quot;&gt;-Persist&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;BTW – If you wanted to use PS to map a local drive, it would look like the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;pre style=&quot;margin-bottom:24px&quot;&gt;
&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#222222&quot;&gt;&lt;span style=&quot;letter-spacing:.1pt&quot;&gt;New-PSDrive -Name &quot;Document&quot; -PSProvider &quot;FileSystem&quot; -Root &quot;C:\Users\susan\Documents&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/pre&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Save your PS script and now go to the Microsoft Intune Admin Center. Go to Devices &gt; Scripts and Add a Windows 10 Script. Name the script and then configure the following settings as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64e8d4b88d801-md3.png&quot; style=&quot;width: 700px; height: 302px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Then assign the script to the designated users and finish out the wizard. For those who don’t want to use PowerShell, there are third-party solutions out there such as custom ADMX templates that you can download and then import into Intune&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Use Intune to Enforce Edge Typosquatting Protection </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/use-intune-to-enforce-edge-typosquatting-protection</link>
        <pubDate>2023-08-21T12:31:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Typosquatting, often referred to as URL hijacking or domain mimicking, involves registering domain names strikingly similar to well-known websites. It preys on users who mistype web addresses, leading them to imitation websites instead of their intended destinations. Once there, users might unknowingly enter sensitive information or inadvertently download malware.

Major browsers like Microsoft Edge have built-in typosquatting protection. If users enter a potentially harmful site address by mi ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Typosquatting, often referred to as URL hijacking or domain mimicking, involves registering domain names strikingly similar to well-known websites. It preys on users who mistype web addresses, leading them to imitation websites instead of their intended destinations. Once there, users might unknowingly enter sensitive information or inadvertently download malware.&lt;/p&gt;

&lt;p&gt;Major browsers like Microsoft Edge have built-in typosquatting protection. If users enter a potentially harmful site address by mistake, Edge alerts them. Though this feature is typically active by default, it&#039;s wise to verify its status. You can do this with Intune by creating a Configuration Profile.&lt;/p&gt;

&lt;p&gt;Create a new Configuration Profile and select ‘Windows 10 and later’ as the Platform and choose the Settings catalog as the Profile. Click ‘Add settings’ &gt; search for the word ‘typo’ and select:&lt;/p&gt;

&lt;p&gt;Microsoft Edge \Typosquatting Checker Settings.&lt;/p&gt;

&lt;p&gt;You can then choose either of the Configure Edge TyposquattingChecker options as shown in the example below. I chose both just to illustrate. Once selected you can enable the settings to the left. Then click Next and assign the policy to your designated groups and save it.&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64d66262716a3-typo1.png&quot; style=&quot;width: 750px; height: 273px;&quot; /&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Create Path Exclusion Policies for Windows Defender Using Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-create-path-exclusion-policies-for-windows-defender-using-intune</link>
        <pubDate>2023-08-07T12:37:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ You&amp;rsquo;ve just deployed a new application or client-side extension to your Windows laptops and suddenly their system performance and battery life begin to crater. The culprit could be Windows Defender. Windows Defender automatically scans new software and its activities for potential threats as part of its real-time scanning feature. Naturally, this scanning process will manifest as higher CPU usage. If the new software handles a lot of data, such as in the case of a web filter client app, it ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You’ve just deployed a new application or client-side extension to your Windows laptops and suddenly their system performance and battery life begin to crater. The culprit could be Windows Defender. Windows Defender automatically scans new software and its activities for potential threats as part of its real-time scanning feature. Naturally, this scanning process will manifest as higher CPU usage. If the new software handles a lot of data, such as in the case of a web filter client app, it could create perpetual CPU spikes that can degrade system performance and consume battery power. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you trust the new software you&#039;ve installed and don&#039;t want Windows Defender to continuously monitor it (and thereby use up CPU resources), you can set an exclusion path for it. An exclusion path tells Windows Defender to skip scanning the files and activities associated with a specific directory where trusted applications are installed. You can create an exclusion path policy using either Group Policy or an MDM such as Intune. Exclusions should always be used judiciously to maintain a strong security posture so only use them when you need to.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Creating Path Exclusions with Group Policy &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s use a scenario in which I need to create an exclusion path for a web filter client application simply called WebFilter. Create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; Windows Components &gt; Microsoft Defender Antivirus &gt; Exclusions and enable “Path Exclusions.”  Once enabled you must then add the path(s) to be excluded. In this case there are two paths.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;C:\Program Files (x86)\WebFilter\AuthenticationAgent\bin&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;C:\Program Files (x86)\WebFilter\MobileZoneAgent\bin&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The policy configuration is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64ca858619c27-EP1.png&quot; style=&quot;width: 750px; height: 420px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Another option is to create a process exclusion which would exclude a designated process or executable from being scanned. In this case the process path might be C:\ProgramFiles\WebFilter\WebFilter.exe. You can also use wildcards in a &lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;process exclusion list&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; such as&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; C:\ProgramFiles\WebFilter\*&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Creating Path Exclusions with Group Policy &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Using the Microsoft Intune Center, go to Devices &gt; Configuration Profiles &gt; and create a new profile using Windows 10 and later as the Platform and Administrative Templates for the Profile type. Name the policy and then navigate to Computer Configuration &gt; Windows Components &gt; Microsoft Defender Antivirus and Enable “Path Exclusions” as I did earlier with Group Policy as shown below&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64ca85cbc6a2d-EP2.png&quot; style=&quot;width: 750px; height: 279px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You will then be prompted to provide the exclusion paths as shown below. Process Exclusions are also available if you want to go that way.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64ca863f8a027-EP3.png&quot; style=&quot;width: 500px; height: 488px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;After implementing these path exclusions, you should witness a notable decrease in CPU utilization, effectively resolving the issue of CPU spikes and battery depletion. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Redirect to OneDrive for Business with Intune and Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/redirect-to-onedrive-for-business-with-intune-and-group-policy</link>
        <pubDate>2023-07-31T20:29:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Group Policy veterans will recall when it was common practice to redirect user files from the Windows known folders (like Desktop, Documents, and Pictures) to a central shared directory on an on-prem server. This allowed for roaming profiles, easier backups, and kept files off client devices. Well, you can also redirect those same files to OneDrive for Business to accommodate real-time collaboration and accessibility, compliance, and control. 

If you aren&amp;rsquo;t currently utilizing OneDrive, ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Group Policy veterans will recall when it was common practice to redirect user files from the Windows known folders (like Desktop, Documents, and Pictures) to a central shared directory on an on-prem server. This allowed for roaming profiles, easier backups, and kept files off client devices. Well, you can also redirect those same files to OneDrive for Business to accommodate real-time collaboration and accessibility, compliance, and control. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you aren’t currently utilizing OneDrive, you should as it offers a list of great features. First off, it maintains the user familiarity with file locations so folder navigation is the same. Because OneDrive is cloud bases, your users can access their files from anywhere on any device. It also offers file versioning and deleted items capabilities that allows users to perform self-service file recovering.  Here I will show you how to redirect the Windows known folders to OneDrive as well as a couple of other tips.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Using Group Policy to Manage OneDrive &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you have any existing Folder Redirection Group Policies, you will need to disable those before moving forward. Then make sure you have the necessary administrative template files. If you have OneDrive installed on your management machine you can get them using this file path.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;%localappdata%\Microsoft\OneDrive\BuildNumber\adm&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Which will look something like this in Windows Explorer. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64b9d04c28c71-od1.png&quot; style=&quot;width: 650px; height: 446px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Copy both template files to your central store and then create a GPO. In the Group Policy Management Editor, go to Computer Configuration &gt; Administrative Templates &gt; OneDrive. If you don’t see OneDrive, then you are missing the template files. The screenshot below shows the available settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64b9d077da11e-od2.png&quot; style=&quot;width: 700px; height: 236px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To redirect files from the Windows Known folders, enable the “Silently move Windows known folders to OneDrive” and provide the Tenant ID for your enterprise. By default, all three known folders are selected but you can choose to only redirect specific ones as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64b9d0a49702e-od3.png&quot; style=&quot;width: 550px; height: 511px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Before implementing this, you may want to alert users of your intention for them to transition to OneDrive for Business by enabling the “Prompt user to move Windows Known folders to OneDrive.” Once enabled, your tenant users that sync their OneDrive will see a popup message that reads “Your IT &lt;span style=&quot;background:white&quot;&gt;department wants you to protect your important folders&quot; the next time they sign in. A reminder notification will then appear in the activity center until all three known folders are moved. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Users also may have more than one OneDrive account so you may want to prevent them from uploading files to other organizations. You can do this by enabling the “Allow syncing OneDrive accounts to only specific organizations” and then list the allowed tenant IDs as is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64b9d0cab2ffb-od4.png&quot; style=&quot;width: 550px; height: 513px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Using Intune to Redirect Known Folders to Intune&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s do the same thing using Intune now. Using the Microsoft Intune Admin Center, navigate to Devices &gt; Configuration profile &gt; Create profile and select Windows 10 and later as the Platform and Administrative templates as the Profile type. Give a name to the profile and go to Computer Configuration &gt; OneDrive and enable the “Silently move Windows known folders to OneDrive” setting as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64b9d15e52064-od7.png&quot; style=&quot;width: 750px; height: 363px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;To discourage users from uploading excessively large files or questionable file types, you can enable “&lt;span style=&quot;color:#292827&quot;&gt;Exclude specific kinds of files from being uploaded” and input keywords for the designated file types as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64b9d102e1d31-od6.png&quot; style=&quot;width: 750px; height: 398px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Use Intune to Block Access to the C Drive </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/use-intune-to-block-access-to-the-c-drive</link>
        <pubDate>2023-07-17T17:28:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Blocking the C drive has always been one of the common restrictions that Group Policy admins enforced for standard user accounts. There are multiple reasons for restricting access to the C Drive for non admin users.


	The first is system stability because it prevents basic users from accessing, altering, or deleting critical system files on their computers, thus minimizing potential issues that disrupt desktop operations and initiate a help desk ticket.
	It reduces the chances of malware be ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Blocking the C drive has always been one of the common restrictions that Group Policy admins enforced for standard user accounts. There are multiple reasons for restricting access to the C Drive for non admin users.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The first is system stability because it prevents basic users from accessing, altering, or deleting critical system files on their computers, thus minimizing potential issues that disrupt desktop operations and initiate a help desk ticket.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;It reduces the chances of malware being introduced into the system and prevents users from installing unauthorized applications, opening suspicious files or clicking on malicious executables.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Blocking the C drive in some cases may be required by compliance regulations to restrict user access to certain system resources.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Keeping users out of the C drive can potentially simplify troubleshooting as it eliminates user file tampering.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For shared desktop computers it can help protect the data of other users who have logged onto the device&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Because Intune uses many of the same Windows Administrative Templates, it is easy to block C Drive access with Intune as well. Using the Microsoft Intune admin center, go to Devices &gt; Configuration Profiles and click “Create profile.”  Select “Windows 10 and later” as the Platform and Administrative Templates as the profile. Name the configuration profile and go to User Configuration &gt; Windows Components &gt; File Explorer as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f649f48ad7ef52-BC1.png&quot; style=&quot;width: 700px; height: 180px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Scroll down through the settings and select “Prevent access to drives from My Computer” and choose Enabled. You can then select the drives you wish to block access to as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f649f48da5c06f-BC2.png&quot; style=&quot;width: 700px; height: 375px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Click OK and click next. Then assign the configuration profile to the designated groups and you are done. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Enable Personal Data Encryption Using Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-enable-personal-data-encryption-using-intune</link>
        <pubDate>2023-07-03T13:32:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Personal Data Encryption (PDE) is a security feature introduced in Windows 11, version 22H2 that provides an additional encryption capability to Windows. PDE is different than BitLocker in that it encrypts individual files while BitLocker encrypts entire volumes. PDE utilizes Windows Hello for Business to link encryption keys with user credentials. This means you need only log on a single time while BitLocker requires a separate PIN be inputted. Another difference is that unlike BitLocker that r ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Personal Data Encryption (PDE) is a security feature introduced in Windows 11, version 22H2 that provides an additional encryption capability to Windows. PDE is different than BitLocker in that it encrypts individual files while BitLocker encrypts entire volumes. PDE utilizes Windows Hello for Business to link encryption keys with user credentials. This means you need only log on a single time while BitLocker requires a separate PIN be inputted. Another difference is that unlike BitLocker that releases data encryption keys at bootup, PDE releases them once a user signs in using Windows Hello for Business. Until then, users cannot access the protected file content. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There are 3 prerequisites for PDE:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The computer must be Azure AD joined&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;It must be running the Enterprise or Education edition of Windows 11, version 22H2 or later&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows Hello for Business Overview&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows Hello provides fully integrated biometric authentication based on either facial recognition or fingerprint matching. Many laptops today have fingerprint readers or integrated compatible cameras to support it. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You should consider PDE as just another encryption layer for Windows on top of BitLocker that administrators can use to safeguard sensitive data. Don’t be confused by its name because standard users cannot initiate PDE, nor can they protect personal files with it. When you stop to think about it, it makes sense as you wouldn’t want malicious insiders to use it to hide data they shouldn’t have on their corporate devices. PDE can only be implemented by administrators who also selectively choose which filles to encrypt. PDE is ideal for business applications that work with sensitive files and should be heavily considered by those organizations that must adhere to compliance requirements. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can enable PDE through Intune. By default, PDE on Windows 11 Devices in the Intune settings catalog is disabled. There are two ways to enable PDE in the Microsoft Intune Admin Center. The easiest way is to navigate to Devices &gt; Configuration profiles and choose the Settings catalog as the profile. Using the Settings picker, search for personal data encryption and select the PDE category. Then check enable “Personal Data Encryption” as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6497225ebebdf-pde1.png&quot; style=&quot;width: 700px; height: 242px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Assign the policy to the designated groups or users and save it. You can also use OMA-URI settings to create the policy using: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;./User/Vendor/MSFT/PDE/EnablePersonalDataEncryption&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;as the OMA-URI path.  Then choose integer as the data type with an assigned value as 1. The final configuration should look like the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f649723228be43-pde2.png&quot; style=&quot;width: 700px; height: 178px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;While support for PDE is limited currently, more applications will utilize it in the future.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Simple Policy Assignments with Azure Dynamic Groups </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/simple-policy-assignments-with-azure-dynamic-groups</link>
        <pubDate>2023-06-22T13:59:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you have ever worked with Window Group Policy, you may have used WMI filtering to target the application of your GPOs to a specific set of computers or users based on their characteristics. You could for instance create a WMI filter to apply a policy only to computers running a specific version of Windows or systems with a set amount of RAM or IP subnet. 

Microsoft Intune doesn&amp;rsquo;t utilize WMI filtering but it does use Azure Dynamic Groups which has a&amp;nbsp;similar outcome. Dynamic grou ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you have ever worked with Window Group Policy, you may have used WMI filtering to target the application of your GPOs to a specific set of computers or users based on their characteristics. You could for instance create a WMI filter to apply a policy only to computers running a specific version of Windows or systems with a set amount of RAM or IP subnet. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Intune doesn’t utilize WMI filtering but it does use Azure Dynamic Groups which has a similar outcome. Dynamic groups automatically manage group membership based on user or device attributes in Azure AD. The membership of a dynamic will automatically update when the designated attributes of a device or user change. Automated group management relieves administrators from the task of manually adding or removing users or devices from groups as their attributes change. Imagine if your company had a lot of employee turnover or recently implemented a laptop refresh? Dynamic groups can then be used to assign policies to a set of users or devices. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s start with a basic example. Let’s say you manage a fleet of corporate laptops running either Windows 10 or Windows 11 and you want to create policies that will specifically target each operating system. To create a Windows 11 dynamic group, use the Microsoft Intune admin center and go to Groups and click on New Group. Select “Security” as the Group type, give a group name and optional description and select Dynamic Device as the Membership type as shown in the screenshot below. Then click Add dynamic query.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64948a5ef2e27-DG1.png&quot; style=&quot;width: 550px; height: 418px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Here you will add the expression(s) that will govern the group’s membership. As shown in the screenshot below, I selected “deviceOSType” as the Property, “Starts With” as the Operator and typed 10.0.2 as the value. Notice that the input values automatically appeared in the Rule syntax underneath.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64948a8ddf7f6-DG2.png&quot; style=&quot;width: 700px; height: 253px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Before clicking Save to create the group, you can first validate the rule(s) to ensure that they will apply the desired result. Copy the Rule syntax and click on “Validate Rules.” Paste the text into the Rules syntax box and select a device to run the validation with. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64948aac28ed1-DG3.png&quot; style=&quot;width: 600px; height: 298px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once validated and saved, you can apply configuration policies to the new dynamic group. Let’s do another example where I want to create a dynamic group for three models of Dell laptops. In the example below I chose “deviceModel” from the Property drop down menu as well as the “Contains” Operator and then made an expression for each Dell model as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64948b2c4b93c-DG4.png&quot; style=&quot;width: 700px; height: 335px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Note that you cannot add more than 5 expressions using the rule builder. If you need to work with more than 5 expressions, you need to add them directly into the rule syntax box. Here is an example below in which the rule builder is no longer available to edit the rule.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64948add9b35e-DG5.png&quot; style=&quot;width: 700px; height: 269px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can create dynamic groups for users as well. Simply create a new group and select “Dynamic User” as the Membership type and click “Add dynamic query” as shown below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64948b7920efe-DG6.png&quot; style=&quot;width: 550px; height: 398px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Here you will see a separate set of properties available for users. In the example below I chose “department” and “city” as the two Property attributes and assigned them values so that only salespeople in the Atlanta office will be added to the group. Should someone be transferred to a different office, that account will be automatically removed from the group. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f64948bda58210-DG7.png&quot; style=&quot;width: 700px; height: 257px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;As you can see, dynamic groups can simply group management in large dynamic organizations. They are a great way to ensure that policies, access rights and licenses are delivered according to real-time user and device attributes. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Make a Basic Edge Browser Policy using Group Policy or Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-make-a-basic-edge-browser-policy-using-group-policy-or-intune-</link>
        <pubDate>2023-06-05T08:37:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ From websites to email and SaaS applications, the web browser is now the go-to app for your users. Optimizing the user digital experience often starts with optimizing their browser environment. Whether you implement Group Policy or Intune, you need to create a policy for your organization&amp;rsquo;s preferred browser, and we are going to do just that. I have chosen Edge because it is generally easier to secure with these two management tools. There are so many settings in Edge that GP and Intune ca ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;From websites to email and SaaS applications, the web browser is now the go-to app for your users. Optimizing the user digital experience often starts with optimizing their browser environment. Whether you implement Group Policy or Intune, you need to create a policy for your organization’s preferred browser, and we are going to do just that. I have chosen Edge because it is generally easier to secure with these two management tools. There are so many settings in Edge that GP and Intune can manage. We are just going to outline some of the basics that serve as a good start. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Enforce Bing and Google SafeSearch&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Most organizations want to filter out explicit or inappropriate content from search results. If you don’t have an enterprise web filter or just want to create a backup policy in case your filter goes down, you can enforce Bing SafeSearch and Google SafeSearch. For Intune, go to Devices &gt; Configuration profiles &gt; Create profile. Select Windows 10 and later as the platform and Templates &gt; Administrative Templates as the Profile type. Then go to User Configuration &gt; Microsoft Edge and find the settings “Enforce Bing SafeSearch” and “Enforce Google SafeSearch.” In the example below I chose moderate search restrictions which will filter adult images and videos but not text. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475eaefc87ba-edge1.png&quot; style=&quot;width: 700px; height: 352px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can do the same using Group Policy by following the same Administrative Template path as shown in the screenshot below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475ec378c01d-edge2.png&quot; style=&quot;width: 700px; height: 253px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Restrict Access to Developer Tools&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In our previous example, you had to sift through multiple pages of settings until you could access the Enforce SafeSearch settings. For instance, the first page of settings for Microsoft Edge only contains two settings as shown here.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475ec59ce783-edge4.png&quot; style=&quot;width: 700px; height: 101px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;This time we will restrict user access to the developer tools in the Edge browser. To make it easier to find the desired setting, let’s use the Settings catalog for the profile type rather than the Administrative templates. Using the Settings Catalog, do a search for the word “developer” and then click on Microsoft Edge in the results as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475ec9f88ac7-edge5.png&quot; style=&quot;width: 700px; height: 238px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Then enable the “Control where developer tools can be used (User) and select “Don’t allow using the developer tools” in the drop-down menu as I have done in the example below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475ec7b29e02-edge6.png&quot; style=&quot;width: 700px; height: 424px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In Group Policy, you can use the Filter to quickly find the exact setting you need. Simply filter the word developer as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475eced0ba19-edge7.png&quot; style=&quot;width: 450px; height: 578px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Then navigate to User Configuration &gt; Microsoft Edge and configure the “Control where developer tools can be used” setting as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475ed0e59ac9-edge8.png&quot; style=&quot;width: 700px; height: 449px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Managing Installed Web Extensions&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You want to have control over what browser extensions your users will have. Let’s start with which extensions will be allowed. Using Intune, use Administrative Templates once again as your profile type and navigate to Microsoft Edge &gt; Extensions and enable “Allow specific extensions to be installed.” You will then have to input the ID for each web extension. I the example below I have added the ID for Microsoft Translator (&lt;span style=&quot;background:#f7f7f8&quot;&gt;gjknjjomckknofjidppipffbpoekiipm)&lt;/span&gt;, followed by Adobe Acrobat (&lt;span style=&quot;background:#f7f7f8&quot;&gt;klcieihbeepdihlppjcammejcejholkl)&lt;/span&gt;. Note that the extension IDs are different for each web browser.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475ed3909a56-edge9.png&quot; style=&quot;width: 700px; height: 309px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;We can do the same thing using Group Policy for the LastPass web extension ID (&lt;span style=&quot;background:#f7f7f8&quot;&gt;nngceckbapebfimnlniiiahkandclblb). &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475ed5a52088-edge10.png&quot; style=&quot;width: 700px; height: 398px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You would then follow this up by enabling the “Blocks external extensions from being installed” setting to prevent all other extensions from installing as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475ed77e845d-edge11.png&quot; style=&quot;width: 700px; height: 305px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Configuring the Home Page&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;We will wrap up this discussion by assigning a mandatory home page for all users. You can find this setting in Group Policy by going to Administrative Templates &gt; Microsoft Edge &gt; Startup &gt; and enabling the “Configure the home page URL” setting and inputting the desired home page.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475ed99612b6-edge12.png&quot; style=&quot;width: 700px; height: 471px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can do the same with Intune as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6475edb800a4b-edge13.png&quot; style=&quot;width: 700px; height: 354px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Of course, there are many other settings you can add to your Edge policy. Always test your setting configurations first before implementing them in a production environment. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Enable Auditing for Privilege Escalation with Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/enable-auditing-for-privilege-escalation-with-group-policy</link>
        <pubDate>2023-05-29T13:15:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ A cyberattack isn&amp;rsquo;t a sudden single event, but a storyline compromised of multiple stages. First is the initial compromise, followed by the establishment of a foothold or beachhead that the attackers will base operations from. From there the attackers move laterally across the network to perform reconnaissance. The objectives here are to escalate privilege and identify high-value data to target. The final stage is the actual attack itself.

The initial compromise is usually conducted usi ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;A cyberattack isn’t a sudden single event, but a storyline compromised of multiple stages. First is the initial compromise, followed by the establishment of a foothold or beachhead that the attackers will base operations from. From there the attackers move laterally across the network to perform reconnaissance. The objectives here are to escalate privilege and identify high-value data to target. The final stage is the actual attack itself.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The initial compromise is usually conducted using a compromised standard user account that was captured using a credential stuffing attack or phishing email. To achieve their mission, attackers must work to escalate their privilege to gain access to all areas of the network. This means targeting a privileged user next such as a domain administrator or senior executive. This process may involve the taking over of multiple accounts in the process. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;This is why you should enable auditing that will target privilege escalation activities. One option is to enable “Audit Directory Service Changes” which will alert you when a change is made to an AD object. This could be adding a user account to a privilege group for instance or resetting a password. Any alert will provide information about the old and new properties of the changed objects. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To do so, create a GPO and navigate to Computer Configuration &gt; Windows Settings &gt; Security Settings &gt; Advanced Audit Policy Configuration as shown below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6470e8e244775-audit1.png&quot; style=&quot;width: 700px; height: 492px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can also enable auditing for “Privilege Use” which will alert you when a security principle is exercising a user right or privilege. You can do so by creating a GPO and going to Computer Configuration &gt; Windows Settings &gt; Local Policies &gt; Audit Policy as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6470e90aba54e-audit2.png&quot; style=&quot;width: 700px; height: 403px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Use Intune to Deploy Microsoft Take a Test </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/use-intune-to-deploy-microsoft-take-a-test</link>
        <pubDate>2023-05-15T08:45:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Many K12 school districts are concerned about providing a secure environment for online testing. The integrity of online testing relies on the ability to prevent students from opening a new browser tab to google for answers or copy exam question text to an archive. Take a Test is a secure browser provided by Microsoft that can be set up to only provide access to a single URL or a list of URLs. Students cannot perform the following actions when taking an exam using Microsoft Take a Test:


	Ac ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Many K12 school districts are concerned about providing a secure environment for online testing. The integrity of online testing relies on the ability to prevent students from opening a new browser tab to google for answers or copy exam question text to an archive. Take a Test is a secure browser provided by Microsoft that can be set up to only provide access to a single URL or a list of URLs. Students cannot perform the following actions when taking an exam using Microsoft Take a Test:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Access other applications&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Open another browser tab&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Print or use screen capture&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Change system settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Access Cortona&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Access content copied to the clipboard&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Take a Test is a secured instance of Intune, not an application. There are 2 modes for Microsoft Take a Test. The first is intended for a brief test or quiz that a teacher might wish to administer. By creating a secure assessment URL and sending it to students via email or OneNote, teachers may accomplish this task quickly and easily. The assessment link is constructed in three stages using Microsoft&#039;s &lt;/span&gt;&lt;a href=&quot;https://takeatest.blob.core.windows.net/takeatest-link-generator/testpage.html&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;secure link generator&lt;/a&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Paste the link to the assessment URL&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Select the options you want to allow during the test&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Generate the link by selecting the button Create link&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Below is a screenshot of the secure generator page.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f645ce2995e5b4-tat1.png&quot; style=&quot;width: 450px; height: 305px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;When the students click on the link, Edge will open a secure test taking session for the student to take the exam. Keep in mind that the student must be logged on to a Windows machine already. This deployment &lt;span style=&quot;color:#0d0d0d&quot;&gt;method would be a challenge for a large-scale exam such as a high school proficiency or college entrance exam. This is where the Take a Test in Kiosk Mode is better suited. This mode can be deployed using either regular Intune or Intune Education edition. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Intune Education edition is specifically designed to meet the needs of schools and provides a simpler interface than regular Intune. Intune Education edition is the easiest way to deploy Take a Test in kiosk mode as the settings are available in the menu interface. To configure devices for Take a Test, go to Groups and select a group to configure Take a Test for. Then go to Windows device settings &gt; Take a Test profiles and select “Assign a new Take a Test profile. Here you will specify a Profile Name, Account Name, Assessment URL, and an option Description. Finish it by selecting Create and assign profile as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f645ce2f3a0600-tat2.png&quot; style=&quot;width: 700px; height: 354px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Once deployed, test takers can log on to a Windows machine using the test taker profile. They will only be able to access the test in a single browser session. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can also deploy this mode using regular Intune as well although it is a little messier because you must provide the following OMA-URI settings as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;strong&gt;OMA-URI&lt;/strong&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;./Vendor/MSFT/Policy/Config/LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn&lt;br /&gt;
Data Type: Integer&lt;br /&gt;
Value: 1&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;strong&gt;OMA-URI&lt;/strong&gt;: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;./Vendor/MSFT/Policy/Config/WindowsLogon/HideFastUserSwitching&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Data type: Integer&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Value: 1&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;strong&gt;OMA-URI&lt;/strong&gt;: ./Vendor/MSFT/SharedPC/AccountModel&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Data type: Integer&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Value: 1&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;strong&gt;OMA-URI&lt;/strong&gt;: ./Vendor/MSFT/SharedPC/EnableAccountManager&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Data type: Boolean&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Value: True&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;strong&gt;OMA-URI&lt;/strong&gt;: ./Vendor/MSFT/SharedPC/KioskModeAUMID&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Data type: String&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Value: Microsoft.Windows.SecureAssessmentBrowser_cw5n1h2txyewy!App&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;strong&gt;OMA-URI&lt;/strong&gt;: ./Vendor/MSFT/SharedPC/KioskModeUserTileDisplayText&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Data type: String&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Value: Take a Test (or a string of your choice to display in the sing-in screen)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;strong&gt;OMA-URI&lt;/strong&gt;: ./Vendor/MSFT/SecureAssessment/LaunchURI&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Data type: String&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Value: &lt;provide testing=&quot;&quot; url=&quot;&quot;&gt;&lt;/provide&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;The screenshot below shows all OMA-URIs fully inputted. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f645ce358787ed-tat3.png&quot; style=&quot;width: 700px; height: 354px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Finish the creation wizard out by assigning the configuration profile to a group and you are done. Students will again only have access to the active test session in a locked down desktop environment. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is Legacy Microsoft LAPS Emulation Mode? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-legacy-microsoft-laps-emulation-mode</link>
        <pubDate>2023-05-01T13:54:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In my two previous blogs I outlined the improved features and capabilities of the latest version of LAPS that was introduced made available with the Windows Update released on April 11, 2023. The new version called Windows LAPS (that I refer to as LAPS2), addressed some of the limitations of the original version called Legacy LAPS (or LAPS1). Those who have relied on LAPS1 will certainly want to upgrade to the newest version but what happens when you bring LAPS2 into a LAPS1 environment? The sho ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;In my two previous blogs I outlined the improved features and capabilities of the latest version of LAPS that was introduced made available with the Windows Update released on April 11, 2023. The new version called Windows LAPS (that I refer to as LAPS2), addressed some of the limitations of the original version called Legacy LAPS (or LAPS1). Those who have relied on LAPS1 will certainly want to upgrade to the newest version but what happens when you bring LAPS2 into a LAPS1 environment? The short answer is that you cannot run both versions of LAPS on the same machine simultaneously. Any settings that are singular to one LAPS version are not accessible in the other one and vice versa. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;When you bring LAPS2 into an environment that has preexisting instances of LAPS1 you have two options. Either delete all instances of LAPS1 before implementing LAPS2 or use legacy Microsoft LAPS emulation mode to accommodate both to some degree. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Legacy Microsoft LAPS Emulation Mode Limitations&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The original LAPS was implemented by installing the Microsoft LAPS Group Policy Client Side Extension. It is that extension that retrieves the LAPS password information from AD and stores it in the computer’s local security database. You can detect whether a computer has the installed extension by looking for the following registry key:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions\{D76B9641-3288-4f75-942D-087DE603E3EA}&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once you deploy LAPS2 to a machine already running LAPS1, that computer is running in emulation mode. Legacy Microsoft LAPS emulation mode prevents both LAPS from running simultaneously as this would create a security risk. That means that while the computer has LAPS2 installed, it is still restricted to some of the limitations of LAPS1. This means that:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can only store passwords to local AD as only LAPS2 supports Azure AD and local AD.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ol start=&quot;2&quot;&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Passwords will be stored in clear-text form. LAPS1 does not support password encryption so while the newest version of LAPS does, you cannot take advantage of it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ol start=&quot;3&quot;&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The Windows Server Active Directory Users and Computer management console doesn&#039;t support reading or writing legacy Microsoft LAPS schema attributes&lt;/span&gt;&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;ol start=&quot;4&quot;&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You will not be able to use some of the newer LAPS2 scripts. For instance, &lt;span style=&quot;background:white&quot;&gt;cannot you use the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;text-align:justify; margin-left:48px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Set-LapsADPasswordExpirationTime&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; &lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;cmdlet to modify the existing legacy LAPS password expiration attribute. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol start=&quot;5&quot;&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;All Windows LAPS policy knobs that aren&#039;t supported by legacy Microsoft LAPS will default to their disabled or default settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px; margin-left:48px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Note that if you try to install LAPS1 on a machine that already has LAPS2, LAPS1 will be ignored. In other words, whichever version of LAPS is installed first takes precedence over the other.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can tell if a computer is in emulation mode by going to Event Viewer and navigating to &lt;em&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Application and Service Logs &lt;/span&gt;&lt;/em&gt;&gt;&lt;em&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt; Microsoft &lt;/span&gt;&lt;/em&gt;&gt;&lt;em&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt; Windows &lt;/span&gt;&lt;/em&gt;&gt; &lt;em&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;LAPS &lt;/span&gt;&lt;/em&gt;&gt;&lt;em&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt; Operational&lt;/span&gt;&lt;/em&gt; and look for the 10023 event which will show Legacy LAPS as the policy source. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Switching from Emulation Mode&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once you have implemented LAPS2, you will want to eventually move on from emulation mode. You can disable Microsoft LAPS emulation mode by creating a REG_DWORD registry value named &lt;/span&gt;&lt;/span&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;BackupDirectory&lt;span style=&quot;font-variant-ligatures:normal; text-align:start; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; under the:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;HKLM\Software\Microsoft\Windows\CurrentVersion\LAPS\Config&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; text-align:start; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; key&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;and set it to the value of zero. This will prevent LAPS2 from entering legacy Microsoft LAPS emulation mode regardless of whether the Windows LAPS CSE is installed or not. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Remember that the new Windows LAPS does not require you to install any type of CSE. Once a computer receives the April 2023 update and is joined to either Azure or Azure AD, it is LAPS2 capable. After that it just needs the LAPS policy to deliver the configured settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> A Further Deep Dive into Windows LAPS (LAPS2) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/a-further-deep-dive-into-windows-laps-laps2</link>
        <pubDate>2023-04-17T10:03:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I am extending my focus on the new Windows LAPS or as I call it, LAPS2. LAPS2 is Microsoft&amp;rsquo;s newest release of its Local Administrator Solution which fixes some of the shortcomings of its initial release years ago which is now referred to as Legacy LAPS or LAPS1. In Part 1 of this series, we looked at how to implement LAPS2 and configure the new Group Policy settings for it. Today I am going to finish our discussion on implementing LAPS2 in a traditional AD environment.

The New PowerShe ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;I am extending my focus on the new Windows LAPS or as I call it, LAPS2. LAPS2 is Microsoft’s newest release of its Local Administrator Solution which fixes some of the shortcomings of its initial release years ago which is now referred to as Legacy LAPS or LAPS1. In Part 1 of this series, we looked at how to implement LAPS2 and configure the new Group Policy settings for it. Today I am going to finish our discussion on implementing LAPS2 in a traditional AD environment.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;The New PowerShell Scripts&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The new LAPS introduces a new set of PowerShell scripts. To get the scripts you will need to add the new PowerShell module using the command: &lt;/span&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Get-Command -Module LAPS&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; as shown below in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f644e738440fc4-LAPS21.png&quot; style=&quot;width: 550px; height: 202px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Here are the scripts that you will find the most relevant:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;table class=&quot;MsoTableGrid&quot; style=&quot;border-collapse:collapse; border:solid windowtext 1.0pt&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;border:solid windowtext 1.0pt; width:233.75pt; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Get-LapsADPassword&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;border:solid windowtext 1.0pt; width:233.75pt; border-left:none; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Use it to query &lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Windows Server Active Directory &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;for Windows LAPS passwords.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;border:solid windowtext 1.0pt; width:233.75pt; border-top:none; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Get-LapsAADPassword&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; width:233.75pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Use it to query &lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Azure Active Directory for Windows LAPS passwords.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;border:solid windowtext 1.0pt; width:233.75pt; border-top:none; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Reset-LapsPassword&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; width:233.75pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Use it to initiate an immediate password rotation.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;border:solid windowtext 1.0pt; width:233.75pt; border-top:none; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Reset-LapsPassword&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;border-bottom:solid windowtext 1.0pt; width:233.75pt; border-top:none; border-left:none; border-right:solid windowtext 1.0pt; padding:0in 5.4pt 0in 5.4pt&quot; valign=&quot;top&quot; width=&quot;312&quot;&gt;
			&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#161616&quot;&gt;Use it to update a computer’s Windows LAPS password expiration tine in Windows Serve Active Directory&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now let’s put two of these scripts into action. LAPS2 introduces new AD attributes but first you need to update the schema using the &lt;/span&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Update-LapsADSchema&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; command in PowerShell as shown here.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f644e73cac8ba5-LAPS22.png&quot; style=&quot;width: 550px; height: 155px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Note that all domain controllers must have the &lt;/span&gt;&lt;a href=&quot;https://support.microsoft.com/en-au/topic/april-11-2023-kb5025229-os-build-17763-4252-e8ead788-2cd3-4c9b-8c77-d677e2d8744f&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;KB5025229&lt;/a&gt; &lt;span style=&quot;color:#0d0d0d&quot;&gt;update installed for the command to finish. If the command fails to complete, you can run the &lt;/span&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Update -LapsADSchema -Verbose &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;command. You can then read the output to either confirm the completion of schema update or find out where the process is erroring out. The screenshot shows a portion of the output which in this case was completed in its entirety. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f644e7404c7a07-LAPS23.png&quot; style=&quot;width: 550px; height: 381px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Next you need to grant permissions to the machines that will be updating their passwords. This is done by setting inheritable permission to the Organizational Unit(s) where the target machines reside using the &lt;/span&gt;&lt;code courier=&quot;&quot; new=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Set-LapsADComputerSelfPermission&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; text-align:start; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; command. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In the example below I assigned the permission to the Servers OU.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f644e742db3cfe-Laps24.png&quot; style=&quot;width: 550px; height: 130px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you don’t see the Distinguished Name in the output, then the command did not complete. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once the PowerShell commands have been run, deploy your LAPS GPO and you should be good to go. You can confirm the GPO settings were implemented by going to Event Viewer and confirming it in your LAPS file. You can navigate there by going to:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; &lt;em&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Application and Service Logs &lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;em style=&quot;box-sizing:border-box; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt; Microsoft &lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;em style=&quot;box-sizing:border-box; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt; Windows &lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;em style=&quot;box-sizing:border-box; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;LAPS &lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;em style=&quot;box-sizing:border-box; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt; Operational&lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The screenshot below shows that the LAPS policy has been successfully configured. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f644e74643e48a-Laps25.png&quot; style=&quot;width: 650px; height: 493px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now that the LAPS policy is implemented, its time to retrieve the passwords to login to the machines. There are two ways to do this. You can use the following command in PowerShell:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Consolas&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Get-LapADPassword -Identity Server2022 -AsPlainText&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f644e748e8616a-Laps26.png&quot; style=&quot;width: 550px; height: 173px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can also use Active Directory. Remember we updated the schema which created new AD attributes. Find the designated computer in Active Directory Users &amp; Computers and view its properties. Then click on the LAPS tab to view the LAPS settings as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f644e74f184368-Laps27.png&quot; style=&quot;width: 550px; height: 663px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Note that you can also modify the expiration date for the LAPS generated password using this tab as shown here.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f644e74cd11147-Laps28.png&quot; style=&quot;width: 550px; height: 661px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you are having trouble getting LAPS to work properly here are two possible gotchas:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Your LAPS password policy must be in line with your domain password policy. In other words, you cannot configure an 8-character password for LAPS if your domain requires a 10 character and you must enforce the same complexity requirements or greater.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Be sure to reboot the computers that you are assigning the LAPS policy to.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Emulation Mode&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If a machine has already been using the original LAPS (LAPS1) then the new features of LAPS2 will not be available to it. Running both versions within your environment is referred to as LAPS Emulation Mode.  If a LAPS2 policy is present on the machine, it will always take precedence, regardless of how it was applied. In other words, once a LAPS version is applied to a machine, the other one will not work. In our next installment I will discuss how to uninstall LAPS1 from your environment and escape this complexity.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Why You Need to Checkout LAPS2 to Shore Up Security (Part 1) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/why-you-need-to-checkout-laps2-to-shore-up-security-part-1</link>
        <pubDate>2023-04-03T10:07:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Local Administrator Password Solution (LAPS) has been around for a while now. LAPS was released by Microsoft as a way for companies to avoid the practice of using a common password for all local administrator accounts. If a local administrator credential is compromised, a threat actor can then move laterally across your enterprise accessing one system after another using that single account.

LAPS acts as a type of password manager that issues a different password for a local administrator acc ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Local Administrator Password Solution (LAPS) has been around for a while now. LAPS was released by Microsoft as a way for companies to avoid the practice of using a common password for all local administrator accounts. If a local administrator credential is compromised, a threat actor can then move laterally across your enterprise accessing one system after another using that single account.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;LAPS acts as a type of password manager that issues a different password for a local administrator account on each designated device. That means if bad guys get a local password for one machine, they can’t get into another, so the breach is contained. Like a password manager, you don’t have to know the unique password for every local admin account because LAPS gives you a way to securely retrieve the password.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;It would be nice if we didn’t need local administrator accounts at all, but unfortunately you can’t do everything through Group Policy, SCCM or an MDM. There is always going to be a task that calls for a support admin to log on to the machine to manually tweak something as an Admin... and that is where LAPS comes in. The original LAPS was a bolt on solution. You had to download the MSI from Microsoft and install it. The original release had a few shortcomings. The passwords could only be stored in Active Directory so those with Azure were out of luck. It also stored the password in plain text which leaves them potentially exposed. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;The New LAPS&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft just released the new version of LAPS in April 2023. It is designed to replace the original version which means we need a way to distinguish them both. Some refer to the original LAPS as “Legacy LAPS” but I prefer LAPS1. I will refer to the newest release as LAPS2 although Microsoft had named it Windows LAPS. One big differentiator is the fact that it also supports Azure Active Directory although it is currently only available in private preview. Since it isn’t universally available yet, we will focus on the new capabilities it brings to Windows Server Active Directory&lt;/span&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;How to Get LAPS2&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;One difference right out of the gate is the fact that LAPS2 is natively integrated into Windows with &lt;a href=&quot;https://support.microsoft.com/en-au/topic/april-11-2023-kb5025229-os-build-17763-4252-e8ead788-2cd3-4c9b-8c77-d677e2d8744f&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;KB5025229&lt;/a&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;, &lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;OS Build 17763.4252 that was released on April 11, 2023. There’s nothing to manually download or install. Once the update is completed you need to retrieve the LAPS ADMX template file which will be located in Windows &gt; PolicyDefinitions as shown in the screenshot below. Then just copy and paste the file in your central store. You will also need to copy the ADML file from your language folder, in my case, en-us. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f643ff2109075f-laps1.png&quot; style=&quot;width: 600px; height: 112px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;I want to take a second to comment on a common misconception out there that Microsoft has abandoned on-prem AD and is focusing solely on the cloud. The release of LAPS2 demonstrates their continued commitment to investing in AD technology. There are thousands of enterprises out there that continue to use AD and LAPS2 helps to fill a critical security gap. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Implementing LAPS2 with Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;KB5025299 adds a new Group Policy Object and AD schema attributes. If you are familiar with the LAPS1 then you were accustomed to navigating to Computer Configuration &gt; Administrative Templates &gt; LAPS where you had four settings to configure.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f643ff23979f9b-laps2.png&quot; style=&quot;width: 700px; height: 174px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Well forget that path because LAPS2 settings are accessed by going to Computer Configuration &gt; Administrative Templates &gt; System &gt; LAPS where we have more settings to choose from as shown below. To enable LAPS2 you must enable “Configure password backup policy. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f643ff25e531d5-laps3.png&quot; style=&quot;width: 700px; height: 418px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;It’s in this setting that you will choose your backup directory. In this case I chose Active Directory below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f643ff27ce7d68-laps4.png&quot; style=&quot;width: 550px; height: 511px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;The next step should be to specify the name of the local admin account that will be assigned the passwords as shown in the example below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f643ff2b5074e6-laps5.png&quot; style=&quot;width: 550px; height: 290px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;One new feature of LAPS2 is a configurable password history. This comes in handy if you need to restore a machine to a previous state in which the password was rotated. Group Policy lets you enable this feature and specify the size of your desired history (the maximum is 12) which I did below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f643ff5110e7ad-laps6.png&quot; style=&quot;width: 550px; height: 293px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;As mentioned, LAPS2 offers encryption to secure the passwords. This requires that you turn on the “Enable password encryption” setting. Another new feature is the ability to manage passwords for the Directory Service Restore Mode (DSRM) accounts. The “Enable password backup for DSRM accounts” setting has no effect unless the managed device is a domain controller and you have password encryption enabled. You can also configure “Post-authentication settings” to ensure that a password isn’t changed while a user is logged on by enforcing a delay or grace period after any successful login of a LAPS-managed account. When enabled, the policy allows you to state how long a grace period you want and select the designated action you want. In the example below I chose “Reset the password and logoff the managed account.”&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f643ff587b0c53-laps7.png&quot; style=&quot;width: 550px; height: 509px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In Part 2 of this discussion, we will look at the new PowerShell scripts that LAPS2 offers, the new LAPS property page in AD Users &amp; Computers as well as how to operate LAPS and LAPS2 together. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Intune Makes it Easier to Deploy Microsoft Store Apps </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/intune-makes-it-easier-to-deploy-microsoft-store-apps</link>
        <pubDate>2023-03-20T15:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ You can use Intune to manage and deploy apps from the Microsoft Store to your managed devices. These include default store apps as well as apps that you upload to your Microsoft Store for Business or Education. While it has always been relatively easy to deploy apps in this manner, Intune just made it even easier.

To deploy Microsoft Store apps in Intune you go to Apps &amp;gt; All apps &amp;gt; Add and select the desired App type. In this example, I will select &amp;ldquo;Microsoft Store app (legacy)&amp;rd ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can use Intune&lt;span style=&quot;background:#f7f7f8&quot;&gt; to manage and deploy apps from the Microsoft Store to your managed devices.&lt;/span&gt; These include default store apps as well as apps that you upload to your Microsoft Store for Business or Education. While it has always been relatively easy to deploy apps in this manner, Intune just made it even easier.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To deploy Microsoft Store apps in Intune you go to Apps &gt; All apps &gt; Add and select the desired App type. In this example, I will select “Microsoft Store app (legacy)” to demonstrate the former way of configuring app deployment. This gets you to the following screen:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6418b331a84b5-app1.png&quot; style=&quot;width: 700px; height: 477px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Here you need some required app details such as Name, Description, Publisher and Appstore URL. So how do you find the publisher and Appstore URL?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s say I want to deploy Python 3.11 to a team of developers or student group.  To find the Appstore URL I will go to the Microsoft Store and search for Python as shown below where I will choose Python 3.11.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6418b355b9967-app2.png&quot; style=&quot;width: 450px; height: 438px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;As you can see below, the app category is listed in the top left-hand corner. In the bottom right I will click the link for “Endpoint Manager” to get the Appstore URL.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6418b376cc3dd-app3.png&quot; style=&quot;width: 700px; height: 359px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#374151&quot;&gt;Then simply copy the link as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#374151&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6418b39cd09ad-app4.png&quot; style=&quot;width: 500px; height: 301px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;I then paste the URL into the App Information page. Then assign the app to the designated groups and complete the creation wizard. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now let’s add it again but this time I will choose “Microsoft Store app (new)” as the App type. That will bring me to the wizard screen once again as is shown below. Now in App information you need only click the Search hyperlink. I did a search for “Python” and selected Python 3.11. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6418b3f0d14d6-app5.png&quot; style=&quot;width: 700px; height: 215px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You will then paste the URL into the App Information page. Then assign the app to the designated groups and complete the creation wizard. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now let’s add it again but this time I will choose “Microsoft Store app (new)” as the App type. That will bring me to the wizard screen once again as is shown below. Now in App information you need only click the Search hyperlink. I did a search for “Python” and selected Python 3.11. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6418b416d3048-App6.png&quot; style=&quot;width: 700px; height: 503px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There is no need to surf the store itself or copy/paste links anymore. Again, finish out the creation wizard by assigning the app to your designated groups and you are done&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:#f7f7f8&quot;&gt;&lt;span style=&quot;font-family:-apple-system&quot;&gt;&lt;span style=&quot;color:#374151&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Use Intune to Restrict Access to the Advanced Startup Menu </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/use-intune-to-restrict-access-to-the-advanced-startup-menu</link>
        <pubDate>2023-02-21T23:34:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Some users will always try to get around the Windows setting restrictions you implement using Intune or Group Policy. A few will even attempt to reset their device. Denying standard users local admin rights is one way to prevent them from doing so using Recovery settings. That doesn&amp;rsquo;t prevent them from resetting their device using the Advanced Startup menu, however. There are several ways to access the Advanced Startup menu such as pressing the F8 key as the computer is booting up. From th ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Some users will always try to get around the Windows setting restrictions you implement using Intune or Group Policy. A few will even attempt to reset their device. Denying standard users local admin rights is one way to prevent them from doing so using Recovery settings. That doesn’t prevent them from resetting their device using the Advanced Startup menu, however. There are several ways to access the Advanced Startup menu such as pressing the F8 key as the computer is booting up. From there you navigate to Troubleshoot &gt; Reset this PC and make select the desired options such as “Keep my files” or choosing to remove everything. Besides the reset option, the Advanced Startup Menu gives users access to System Restore, Startup Repair, Command Prompt, and a few other things. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Fortunately, Intune provides a way to keep standard users out of this area. In Intune go to Devices &gt; Configuration profiles &gt; Create profile and select Windows 10 and later as the platform and Settings catalog as the profile type. Name the profile and go to Configuration Settings. Using the Settings picker do a search for “recovery” and choose the Security category and select both available options as shown in the screenshot below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Recovery Environment Authentication&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Recovery Environment Authentication (User)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63f59b822182e-a1.png&quot; style=&quot;width: 750px; height: 268px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Then assign the profile to your desired group(s) and wait for the profile to be delivered. Now when a user accesses the Advanced Startup Menu to do something such as resetting their device, they will be prompted to select a local admin account as shown in the picture below. In this case I am choosing the Tech Admin account.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63f59ba71c8f0-a2.jpg&quot; style=&quot;width: 450px; height: 338px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The user is then prompted for the credentials of that account as shown here.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63f59bdb386db-Reset10.jpg&quot; style=&quot;width: 450px; height: 286px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Unless the correct credentials are typed in, further access to the advanced startup options is not available.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Enable Alternative Authentication Methods using Group Policy and Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-enable-alternative-authentication-methods-using-group-policy-and-intune</link>
        <pubDate>2023-02-13T12:15:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ We know the vulnerabilities of passwords today. User accounts are constantly under siege by credential stuffing attacks and malicious code and tools like key loggers that aim to capture passwords as users type them in. That&amp;rsquo;s why it is essential to support password authentication with some type of multifactor authentication such as a text messaging, authenticator apps or FIDO keys.

For Windows 10 and Windows 11, there are alternative sign-in methods available. For instance, biometric lo ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;We know the vulnerabilities of passwords today. User accounts are constantly under siege by credential stuffing attacks and malicious code and tools like key loggers that aim to capture passwords as users type them in. That’s why it is essential to support password authentication with some type of multifactor authentication such as a text messaging, authenticator apps or FIDO keys.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For Windows 10 and Windows 11, there are alternative sign-in methods available. For instance, biometric logons might be a good choice for those users that have laptops with built-in fingerprint sensors. Picture passwords may appeal to some organizations as an alternative. The Windows picture password sign-in requires a user to duplicate several gestures on a selected picture. Then again, those organizations that want to enforce standard desktop for all users may not want this option to be available. For users that always log onto the same computer, a PIN may be lucrative as a PIN is local to a specific device so a compromised pin is only good for its assigned device. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The point of this blog is just to show you how to enable/disable these alternatives using Group Policy or Intune. Let’s start with picture passwords. If you want to disable this option using Group Policy, create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; System &gt; Logon and enable “Turn off picture password sign-in” as shown below. The PIN setting is in the same location. In the screenshot below, I have disabled both options. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63e1350e3924e-auth1.png&quot; style=&quot;width: 500px; height: 151px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You use the same Administrative Template path in for Intune as well. Create a configuration profile and select Windows 10 and later as the platform and Templates &gt; Administrative templates as the profile. Then navigate to Computer Configuration &gt; Administrative Templates &gt; System &gt; and enable Turn off picture password sign-in as shown in the screenshot below. Once again, the PIN setting is there as well. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63e1353599aa8-auth2.png&quot; style=&quot;width: 700px; height: 227px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For fingerprint scanning or other biometric authentication options, create a GPO and go to Computer Configuration &gt; Windows Components &gt; Biometrics and select “Allow the use of biometrics” and “Allow users to log on using biometrics.” In the screenshot below I have enabled both of these.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63e1355e0c474-auth3.png&quot; style=&quot;width: 700px; height: 214px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To manage biometric settings using Intune, create a configuration profile and select Windows 10 and later as the platform and Templates &gt; Identity protection as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63e1357cedb4e-auth4.png&quot; style=&quot;width: 500px; height: 414px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;After naming the profile, go an enable “Configure Windows Hello for Business. This will then provide access to all of its category settings. Then select, “Allow biometric authentication” with the result looking like the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63e135a445aa6-auth5.png&quot; style=&quot;width: 700px; height: 511px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Disable Nearby Sharing with Group Policy and Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-disable-nearby-sharing-with-group-policy-and-intune</link>
        <pubDate>2023-02-06T12:05:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Nearby Sharing is a feature in Windows 10 and Windows 11 that allows you to transfer documents, pictures, and links to other compatible devices that are near each other using a combination of Bluetooth and wireless communication. It&amp;rsquo;s a great feature that fosters collaboration between team members. Maybe. So indeed, there are some instances in which you don&amp;rsquo;t want to allow this feature such as an educational environment where students are taking an online exam for instance. We will l ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Nearby Sharing is a feature in Windows 10 and Windows 11&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; that allows you to transfer documents, pictures, and links to other compatible devices that are near each other using a combination of Bluetooth and wireless communication. It’s a great feature that fosters collaboration between team members. Maybe. So indeed, there are some instances in which you don’t want to allow this feature such as an educational environment where students are taking an online exam for instance. We will look at a couple of ways to disable this feature. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Nearby Sharing is found under Shared experiences in your system settings as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;vertical-align:baseline&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63e13309b6bf2-NS1.png&quot; style=&quot;width: 500px; height: 474px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To manage Nearby Sharing using Group Policy, create a GPO and go to &lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Computer Configuration &gt; Policies &gt; Administrative Templates &gt; System\Group Policy &gt; and disable “Continue experiences on this device&lt;/span&gt;&lt;/span&gt;” as shown in the screenshot below. &lt;span style=&quot;color:#0d0d0d&quot;&gt;When disabled, Windows device will not be discoverable by other devices and cannot participate in cross-device experiences.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63e13332ceede-NS2.png&quot; style=&quot;width: 700px; height: 243px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#415465&quot;&gt;If you want to use Intune, create a configuration profile, and select Windows 10 and later as the platform and choose Templates &gt; Administrative templates as the profile. Then follow the same template path - Computer Configuration &gt; Policies &gt; Administrative Templates &gt; System\Group Policy &gt; and disable “Continue experiences on this device&lt;/span&gt;&lt;/span&gt;” as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63e13353c04ab-NS3.png&quot; style=&quot;width: 700px; height: 217px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Users will no longer be able to transfer files amongst each other on their enterprise devices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Go and Get Rid of those Old Group Policies that are no Longer Used </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/go-and-get-rid-of-those-old-group-policies-that-are-no-longer-used</link>
        <pubDate>2023-02-02T13:45:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Many people have a hard time parting with stuff. That&amp;rsquo;s why the self-storage industry is so successful regardless of the what the economy is doing. Just as a lot of the stuff contained in storage units will never be used again, there are probably some unused group policies that are still lingering on your servers taking up space and creating unnecessary clutter. A couple good examples are GPOs that have settings disabled or are no longer linked to anything.

You can disable/enable settin ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Many people have a hard time parting with stuff. That’s why the self-storage industry is so successful regardless of the what the economy is doing. Just as a lot of the stuff contained in storage units will never be used again, there are probably some unused group policies that are still lingering on your servers taking up space and creating unnecessary clutter. A couple good examples are GPOs that have settings disabled or are no longer linked to anything.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can disable/enable settings for any GPO in the Details tab in Group Policy Management Console. As shown below, you can disable computer configuration settings, user configuration settings, or all settings configured within the GPO. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f637e69bc19f90-delete1.png&quot; style=&quot;width: 700px; height: 333px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Keep in mind that its best practice to only configure settings for one side or the other. A GPO that is configured on both sides should be split into two separate GPOs in the first place. Therefore, there’s no need to have one side disabled as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f637e69e5a2efb-delete2.png&quot; style=&quot;width: 700px; height: 219px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Disabling both sides of a GPO means that the GPO is essentially doing nothing. If these settings are no longer required, then they should be decommissioned entirely by deleting the GPO. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you have a well-designed AD with a well-defined OU structure, you need only link your GPOs to an applicable OU and assign it to the Authenticated Users group. This makes security filtering easy and straight forward. Unlinking a GPO is the same as turning it off for a designated OU. A GPO that isn’t linked anywhere is probably one that is no longer needed such as the GPO shown in the screenshot below. In this case, this GPO could probably be decommissioned entirely. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f637e6a0855a1d-delete3.png&quot; style=&quot;width: 700px; height: 296px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;There are some exceptions, however. For instance, you may use some GPOs for testing purposes that are only used for brief periods. You also may have some GPOs you only want turned on at various times of the year. An example might be a school system that enacts certain policies at the start or close of the school year only. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Remember that you must delete a GPO you must do so from the Group Policy Objects node where you can view all your GPOs in alphabetical order. Right clicking on a GPO link will only delete the link itself, not the GPO. Before you delete any GPO, make sure you have a backup of them just in case you find out down the road that you really do need that policy for something. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Verify Your Current Intune Service Release Version </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-verify-your-current-intune-service-release-version</link>
        <pubDate>2023-01-24T10:47:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Anyone that works with Microsoft Intune has experienced this. You read about a newly released Intune preview feature that sounds enticing. You then logon to your Intune portal only to find its not there. What&amp;rsquo;s the deal?

Microsoft regularly releases new updates to the Intune platform at least once a month. Each service release includes new features, capabilities and bug fixes. Like regular Windows updates, these service releases are deployed using a phased approach. Not all tenants rece ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Anyone that works with Microsoft Intune has experienced this. You read about a newly released Intune preview feature that sounds enticing. You then logon to your Intune portal only to find its not there. What’s the deal?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Microsoft regularly releases new updates to the Intune platform at least once a month. Each service release includes new features, capabilities and bug fixes. Like regular Windows updates, these service releases are deployed using a phased approach. Not all tenants receive these service releases simultaneously, however. For instance, government related tenants are updated last. Some geographcial parts of the world receive them before others as well. This methodical approach is done to identify issues before being released to all Intune customers. If your Intune portal lacks a new feature you just read about, chances are it’s because you’re not running the latest Intune service release version yet.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;The Tenant Status Page&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;There’s an easy way to find which service release version your Intune portal is currently running. Navigate to Tenant Administration and select Tenant Status. Here you will see the Service release version as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63c02b4675c2b-SR1.png&quot; style=&quot;width: 750px; height: 224px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Here you will also find other information such as your Tenant name, Tenant Location, the number of licensed users present and the number of Intune enrolled devices. If you find that your Service release version doesn’t match up with the latest one you read about, just be patient and check back in a week.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> 3 Ways to Enable/Disable LSA on Windows 10 and 11 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/3-ways-to-enabledisable-lsa-on-windows-10-and-11</link>
        <pubDate>2023-01-12T09:48:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft introduced a process called Local Security Authority (LSA) a while back for Windows 8.1. LSA performs security related tasks such as the verification of logon attempts and password changes. It also creates access tokens, enforces local security policies, and protects and adds security protection for stored credentials. With the growing threat landscape out there, it&amp;rsquo;s a good thing to enable for your Windows desktops and servers.

The good news is that LSA protection is enabled  ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft introduced a process called Local Security Authority (LSA) a while back for Windows 8.1. LSA performs security related tasks such as the verification of logon attempts and password changes. It also creates access tokens, enforces local security policies, and protects and adds security protection for stored credentials. With the growing threat landscape out there, it’s a good thing to enable for your Windows desktops and servers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The good news is that LSA protection is enabled by default for devices running Windows 11, 22H2 that meet the following conditions:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows 11, 22H2 was newly installed on the device and not upgraded from a previous release&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The device is enterprise joined be it AD domain joined, Azure AD domain joined or a hybrid configuration.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;While Microsoft advocates enabling LSA across your enterprise, they recommend that you first identify all LSA plug-ins &lt;span style=&quot;background:white&quot;&gt;and drivers that are in use within your organization and ensure that they are digitally signed with a Microsoft certificate and perform as expected. You can refer to &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;a href=&quot;https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;this document&lt;/a&gt; for more information. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;As of right now, there is no way to enable/disable LSA using Intune. Your three available management options for now are Windows Security, the registry, and Group Policy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Enabling LSA on a Local Device&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;If you just have a few computers to manage, you can enable them locally on the desktops themselves by going to Windows Security &gt; Device security &gt; Core isolation details and enable the toggle under the Local Security Authority protection section. In the screenshot below, LSA is currently disabled.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63c0180d020b6-LSA1.png&quot; style=&quot;width: 700px; height: 402px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Registry &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can manage LSA through the registry, either using the local registry editor or a GPO using Group Policy Preferences. The required key path is as follows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LSASS.exe&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-top:10px; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;box-sizing:inherit&quot;&gt;&lt;span style=&quot;outline-color:inherit&quot;&gt;&lt;span style=&quot;overflow-wrap:break-word&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you want to enable LSA using Auditing mode, click on the LSA key and create a value called AuditLevel. Select REG_DWORD as the value type and type &lt;strong&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;00000008 in the value data box. This is a good option to &lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;background:white&quot;&gt;identify LSA plug-ins and drivers that will fail to load in LSA Protection mode&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To fully enable LSA, create a value key called RunAsPPL, choose REG_DWORD and type &lt;/span&gt;&lt;strong&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;00000001 as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63c01837c25ac-LSA2.png&quot; style=&quot;width: 750px; height: 388px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can create a GPO and use Group Policy Preferences to push out these registry values. Go to Computer Configuration &gt; Preferences &gt; Registry &gt; right click and choose “New registry item” and input the required values as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63c01d4804b77-LSA3.png&quot; style=&quot;width: 750px; height: 454px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Group Policy ADMX&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can enable/disable LSA using Group Policy as well. In Group Policy Management Editor go to Computer Configuration &gt; Administrative Templates &gt; System &gt; Local Security Authority. The setting you want is “Configure LSASS to run as a protected process.” In the screenshot below you will notice a down arrow beside the setting title. The down arrow &lt;span style=&quot;background:white&quot;&gt;indicates that &lt;/span&gt;the setting is a preference setting and not stored in the typical group policy location in the registry. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63c01d7793155-LSA4.png&quot; style=&quot;width: 750px; height: 63px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Group Policy ADMX&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can enable/disable LSA using Group Policy as well. In Group Policy Management Editor go to Computer Configuration &gt; Administrative Templates &gt; System &gt; Local Security Authority. The setting you want is “Configure LSASS to run as a protected process.” In the screenshot below you will notice a down arrow beside the setting title. The down arrow &lt;span style=&quot;background:white&quot;&gt;indicates that &lt;/span&gt;the setting is a preference setting and not stored in the typical group policy location in the registry. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63c01da6cb97d-LSA5.png&quot; style=&quot;width: 750px; height: 689px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Conclusion&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Hackers are constantly trying to subvert the Windows logon process which is why you need to protect it from hackers as much as possible. LSA is a great out-of-the-box utility to help you achieve that.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> New Intune Feature - Multiple Admin Approval Process </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/new-intune-feature--multiple-admin-approval-process</link>
        <pubDate>2022-12-29T21:18:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ A new feature update was released in the 2211 November update for Intune. The feature is called, Multiple Admin Approval Process (MAA). The premise for the new feature is to protect against a possible compromised administrative account using something called Intune access policies. These access policies require that a change be approved by a second administrative account before being applied. &amp;nbsp;An access policy states what resource will be protected and which group of accounts are permitted  ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;A new feature update was released in the 2211 November update for Intune. The feature is called, Multiple Admin Approval Process (MAA). The premise for the new feature is to protect against a possible compromised administrative account using something called Intune access policies. These access policies require that a change be approved by a second administrative account before being applied.  An access policy states what resource will be protected and which group of accounts are permitted to approve the changes to those resources. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Currently, MAA is supported for the following resources&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Apps deployments&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Script deployments to devices running Windows of macOS&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Anytime any admin goes to create or edit an object that involves a resource that is protected by an access policy, it must be approved by an approver without exception. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s use a scenario to demonstrate how MAA works. First let’s create an access policy. To create an access policy, you must be assigned one of the following roles:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Intune Service Administrator&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Azure Global Administrator&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In the Microsoft Endpoint Management admin center, go to Tenant Administration &gt; Multi Admin Approval &gt; Access policies and click “Create” as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63ae49548247e-maa1.png&quot; style=&quot;width: 750px; height: 335px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Name the policy and then choose the resource you want to protect.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63ae4978c3607-maa2.png&quot; style=&quot;width: 650px; height: 370px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The final step is to choose an Approver group. Any user that is a member of this group can approve requests.  Now I have created my first MAA access policy as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63ae49a9c50be-Maa3.png&quot; style=&quot;width: 750px; height: 231px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For this demonstration, I created a temporary Intune administrator account.  When creating temporary accounts for testing purposes, it is good to define an active time window for these accounts so that they are deactivated automatically if forgotten. As shown in the example below, I created an account called testadmin and I defined a start and ending time for its active state. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63ae49d329032-Maa4.png&quot; style=&quot;width: 750px; height: 409px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Now, I will log on to Intune using the account I just created. I go to Apps &gt; All apps and click Add. I then create a policy to deploy Windows 365 apps to Windows machines. In the final Review + Create screen of the wizard, there is a Business Justification section at the bottom, prompting the requester to state the justification for doing this. Also note the outlined banner alerting requester that they must enter a business justification and that the request must be approved before being implemented. Once the business justification has been entered, click “Submit for approval” and the request is now sent to Received requests where it can be reviewed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In a separate session, I have logged into Intune using an account that is a member of the approver group. As shown in the screenshot below, the request now appears (in this example, I created two requests). To approve or deny the request, click the URL in the Business justification column.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63ae4a01a6e80-maa5.png&quot; style=&quot;width: 750px; height: 238px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;After clicking on the URL, the approver is shown the requested resource changes. The request can be approved or denied and the approver can add notes for feedback as shown in the screenshot below.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63ae4a30d853d-Maa6.png&quot; style=&quot;width: 750px; height: 410px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Switching back to the testadmin account, I can see the status of the requests made by that account. As shown below, one is approved while one still waits approval. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63ae4a546c59e-maa7.png&quot; style=&quot;width: 750px; height: 236px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Note that any individual who submits a request and is also a member of the approval group can see their own requests, however, they cannot approve their own requests. Should no action be taken on a request for 30 days, it becomes expired and must be resubmitted. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> New Feature: Send Organizational Messages to Your Users with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/new-feature-send-organizational-messages-to-your-users-with-intune</link>
        <pubDate>2022-12-18T11:26:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Intune has a new feature called Organizational Messages. It&amp;rsquo;s a way to send branded messages directly to Windows 11 devices using Intune. These messages notify and update users about key important information updates or provide onboarding information for employees. &amp;nbsp;This can be especially handy for organizations that utilize hybrid work strategies. There are three types of messaging to choose from.


	Taskbar messages appear just above the taskbar and remain viewable until the user ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Intune has a new feature called Organizational Messages. It’s a way to send branded messages directly to Windows 11 devices using Intune. These messages notify and update users about key important information updates or provide onboarding information for employees.  This can be especially handy for organizations that utilize hybrid work strategies. There are three types of messaging to choose from.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;Taskbar messages&lt;/b&gt; appear just above the taskbar and remain viewable until the user acts on them. Taskbar messages can be used to alert users about things like a critical Windows update that will be installed at the end of the week that will disrupt desktop operations.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Notification messages&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt; appear in the Notification Center as a popup before disappearing. Notification messages are good for informational messages such as a future training session.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt; &lt;b&gt;Get Started app messages&lt;/b&gt; appear in the Get Started app the first time a user initiates it once the device has been enrolled in Intune. These messages are good for sending welcome messages, device tips, company policy changes and new employee information.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;To access the Organizational Messages feature, go to Tenant Administration in Microsoft Endpoint Manager and select Organizational Messages (preview) as shown below in the screenshot.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f639f3d70d54b7-om1.png&quot; style=&quot;width: 350px; height: 527px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To configure Organizational Messages, you must be assigned one of the following roles.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Azure AD Global Administrator&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Intune Administrator&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Organizational messages manager (Microsoft Intune role)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Organizational messages writer (Azure AD role)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Prerequisites&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Organization messages are only supported on devices running Windows 11, versions 22H2 or later. You must also have one of the following licenses for your users.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft 365 E3&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft 365 E5&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Endpoint Management + Security E3 and Windows Enterprise E3&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Endpoint Management + Security E5 and Windows Enterprise E5&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Each message type requires a logo for branding and identification purposes. This is usually the company logo. Only PNG files are supported, and each message type has a different dimensions requirement.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Taskbar messages must be 64 x 64 pixels&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Notification area messages must be 48 x 48 pixels&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Get Started app messages must be 50 pixels long and 50 – 100 pixels wide.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;PNG files that don’t meet the exact dimension specifications will cause an error, preventing you from proceeding further in the message creation process as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f639f3db44aaf7-om2.png&quot; style=&quot;width: 750px; height: 286px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can include custom URLs in your messages, but they must be added to your list of verified Azure AD custom domain names. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Enabling Organizational Messages&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Before creating your messages, you must enable the policy that allows&lt;span style=&quot;background:white&quot;&gt; the delivery of organizational messages&lt;/span&gt;. To do this, go to Devices &gt; Configuration profiles and click “Create profile.” Select “Windows 10 and later” as the platform and “Settings catalog” as the profile type. Using the Settings picker, do a search for “experience” and then select it from the list of viewable categories. Then select “Enable delivery of organizational messages (User)” as shown in the screenshot below and complete the wizard by adding scope tags and user/group assignments. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f639f3de145307-om3.png&quot; style=&quot;width: 800px; height: 392px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Now you are ready to create your messaging. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Creating Organizational Messages&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Go to Tenant Administration &gt; Organizational messages (preview) and click on Message. You can then select the type of message you want to create as shown in the screenshot below. In this example we are creating a taskbar message.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f639f3e0b952bf-om4.png&quot; style=&quot;width: 750px; height: 167px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Next you will upload your logo, which is required. You will also select which domain you want to apply the messages to and choose your preferred language. You can then preview what the message will look like. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f639f3e3d02a5f-om5.png&quot; style=&quot;width: 750px; height: 669px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Next you will configure a schedule for the message as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f639f3e68417c5-om7.png&quot; style=&quot;width: 750px; height: 506px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Complete the creation wizard by assigning the message to your targeted groups or users. Then review your created message.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f639f3e94969bd-om8.png&quot; style=&quot;width: 650px; height: 732px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The created message will then appear as part of your list of messages. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f639f3ebb34bdc-om9.png&quot; style=&quot;width: 750px; height: 217px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;As mentioned previously, each of the three message types include different message templates. Below are some of the options for Notification messaging. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f639f3ee3312ce-om10.png&quot; style=&quot;width: 600px; height: 501px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Some Limitations Concerning Organizational Messages&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;There are some limitations and issues concerning organizational messages that you should be aware of.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You cannot send messages to devices or mixed groups. An organizational message sent to both users and devices will only be sent to the users.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Users that belong to more than 200 groups are not supported by organizational messages (who knows why?)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can’t assign priority levels to organizational messages so they will be received by users in random order.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Scope groups and scope tags aren&#039;t available in organizational messages.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
        </content:encoded>
    </item>
        <item>
        <title> Managing Windows Package Manage with Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/managing-windows-package-manage-with-group-policy</link>
        <pubDate>2022-11-28T14:16:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft made an announcement back in 2021 that Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. Microsoft wants organizations to transition to Windows Package Manager (WPM) instead. WPM is a command-line tool that utilizes either PowerShell or the Widows Package Manager Client terminal, also referred to as Winget-cli. If you are running Windows 10 version 1809 or greater, it should be installed on your computer through a prior update. ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#231f20&quot;&gt;Microsoft made an &lt;a href=&quot;https://learn.microsoft.com/en-us/microsoft-store/&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;announcement&lt;/a&gt; back in 2021 that Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. Microsoft wants organizations to transition to Windows Package Manager (WPM) instead. WPM is a command-line tool that utilizes either PowerShell or the Widows Package Manager Client terminal, also referred to as Winget-cli. If you are running Windows 10 version 1809 or greater, it should be installed on your computer through a prior update. You can also install it with the App Installer from the Microsoft Store.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#231f20&quot;&gt;There are two primary components when it comes to WPM. The first is the package, which represents an ap, application or program. The other is the manifest file, which contains &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#202124&quot;&gt;metadata used by the Windows Package Manager to install and upgrade software on the Windows operating system&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; WPM functions similarly to Linux package manager as it doesn’t actually host the packages. What is does is let you create manifests that form a script to download your desired apps from central repositories such as GitHub or the Microsoft Store. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#231f20&quot;&gt;The point of this brief article isn’t to get into the details of WPM but to show how you can manage it with Group Policy. To do this, you will first need the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Desktop App Installer Policies” Group Policy Administrative Template files, which you can download from the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;a href=&quot;https://www.microsoft.com/download/details.aspx?id=103034&quot; style=&quot;color:blue; text-decoration:underline&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#146cac&quot;&gt;Microsoft Download Center&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;. You will need to copy these files over to your central store. The create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; Windows Components &gt; Desktop App Installer. You will then see a variety of available settings as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6375365e09455-wpm1.png&quot; style=&quot;width: 700px; height: 357px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Let’s look at some of the most important settings here.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Enable App Installer&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;: Enable this policy so that users can use WPM. This and many of the WPM policy settings only require you to enable or disable them as shown in the screenshot below.&lt;br /&gt;
	&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6375368533e57-wpm2.png&quot; style=&quot;width: 550px; height: 327px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;br /&gt;
	 &lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Enable App Installer settings&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;: Enabling this setting will allow users to change settings for WPM&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-top:20px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Enable App Installer Default Source&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;. Note that the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;default source for Windows Package Manager is an open-source repository of packages located at &lt;a href=&quot;https://github.com/microsoft/winget-pkgs&quot; style=&quot;box-sizing:border-box; color:blue; text-decoration:underline&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#146cac&quot;&gt;https://github.com/microsoft/winget-pkgs&lt;/span&gt;&lt;/a&gt;. Disabling the policy will make the default source unavailable.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-top:20px; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Enable App Installer Microsoft Store Source&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;: When enabled, the Microsoft Store becomes available as a source.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-top:20px; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Enable App Installer Additional Sources: &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;When enabled, additional sources will be available. Note that once additional sources are added here, they cannot be removed. You must specify the source location as shown in the screenshot below.&lt;br /&gt;
	&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f637536cd45c71-wpm3.png&quot; style=&quot;width: 550px; height: 511px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	 &lt;/li&gt;
	&lt;li style=&quot;margin-top:20px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Enable Windows Package Manager Allowed Sources&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;: This policy is somewhat like the previous one. When enabled, users will be able to choose a source from a list of approved user sources. Here, you must also specify the approved source locations&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can refer to this &lt;a href=&quot;https://learn.microsoft.com/en-us/windows/package-manager/&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;site&lt;/a&gt; for the latest information regarding Windows Package Manager.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;text-align:justify&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How To Set Time Zones using Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-set-time-zones-using-intune</link>
        <pubDate>2022-11-16T12:47:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you&amp;rsquo;re using Intune as your endpoint management solution, there&amp;rsquo;s a good chance you are managing devices dispersed over a wide geographical area. That may include multiple time zones. So how do you go about ensuring that each machine is matched with its correct time zone?

There are a variety of ways to assign time zones to a Windows 10 computer.


	You can configure it within the registry by navigating to 


\HKLM\System\CurrentControlSet\Control\TimeZoneInformation

Th ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you’re using Intune as &lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;your &lt;em&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-style:normal&quot;&gt;endpoint management solution, there’s a good chance you are managing devices dispersed over a wide geographical area. That may include multiple time zones. So how do you go about ensuring that each machine is matched with its correct time zone?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There are a variety of ways to assign time zones to a Windows 10 computer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can configure it within the registry by navigating to &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p style=&quot;text-indent:.5in; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;\HKLM\System\CurrentControlSet\Control\TimeZoneInformation&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-indent:.5in; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Then create GPO using Group Policy Preference to deploy the registry settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol start=&quot;2&quot;&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In Windows 10/11 you can use the &lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Windows Time Zone Utility. This is a command-line tool that you run using an Administrator command prompt. The command is tzutil.exe. You can use the question mark to see the available commands.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;br /&gt;
	&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63752121bd37e-tz1.png&quot; style=&quot;width: 500px; height: 471px;&quot; /&gt;&lt;br /&gt;
	&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To see the list of time zones supported by Windows 10, you can use the /l switch. Keep this command in mind for future reference later in the article.&lt;br /&gt;
	&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63752165aa88f-tz2.png&quot; style=&quot;width: 500px; height: 663px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can also use PowerShell. The screenshot below shows a couple of available commands. The second command is used to assign the desired time zone. Note that I am using “Hawaiian Standard Time” that appeared using the tzutil /l command above.&lt;br /&gt;
	&lt;br /&gt;
	&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f637521bd8afb7-tz3.png&quot; style=&quot;width: 500px; height: 347px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;While you could deploy the PowerShell using Intune, there is a simpler way using the settings catalog.  Log onto the Intune portal and go to Devices &gt; Configuration Profiles and create a profile. Choose Windows 10 as the platform and Settings catalog as the Profile type. Name the profile and then click the “Add Settings” link. Using the Settings picker, do a search for “time zone” and choose “Time Language Settings” as the category. Then select “Configure Time Zone” as shown in the screenshot below.&lt;br /&gt;
	&lt;br /&gt;
	&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f637521ebaf8f5-tz4.png&quot; style=&quot;width: 700px; height: 262px;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
	&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#3a3a3a&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Then input the desired time zone as shown below. These are the same time zone names we saw using the tzutil command utility earlier. In the example below I am assigning Eastern Standard Time. Other possible assignments could be Central America Standard Time, Central Brazilian Standard Time, GMT Standard Time, Pacific Standard Time, etc.&lt;br /&gt;
	&lt;br /&gt;
	&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63752212e6246-tz5.png&quot; style=&quot;width: 700px; height: 303px;&quot; /&gt;&lt;br /&gt;
	Then like any configuration profile, select any optional scope tags, and assign the profile to the desired group or users.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ol&gt;
        </content:encoded>
    </item>
        <item>
        <title> Should You Delete or Retire Computers from Intune? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/should-you-delete-or-retire-computers-from-intune</link>
        <pubDate>2022-11-02T13:24:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ We often talk about adding devices to the Intune environment, but what about deleting them. What&amp;rsquo;s the best way to do it? There are several options. One option is to have inactive devices automatically removed from Intune using a cleanup rule. An inactive device means it hasn&amp;rsquo;t checked into Intune for a set number of days. You can configure the time window by going to Devices &amp;gt; Device clean-up rules and configuring the two required settings. You can input a number between 30 and 2 ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;We often talk about adding devices to the Intune environment, but what about deleting them. What’s the best way to do it? There are several options. One option is to have inactive devices automatically removed from Intune using a cleanup rule. An inactive device means it hasn’t checked into Intune for a set number of days. You can configure the time window by going to Devices &gt; Device clean-up rules and configuring the two required settings. You can input a number between 30 and 270. In the example below I have chosen 120 days as the cutoff. This means that day any device that has been inactive for 121 days or more will be deleted from Intune immediately. By clicking on the “View affected devices” link you can see the list of devices that will be deleted once the rule is saved. Device clean-up rules do not affect Android devices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6362a77a7be2d-retire1.png&quot; style=&quot;width: 700px; height: 346px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;To Delete or Retire?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;You can choose to delete or retire a computer from Intune at any time. What’s the difference? The answer is not much. Let’s outline what happens when a computer is retired.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;The device is removed from the company Intune portal&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Intune Endpoint Protection is removed&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Intune deployed certificates are removed&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Device configuration settings are no longer enforced or required so users can override them&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;The computer will no longer received its updates from the Intune service&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Apps can no longer be installed from the portal and any Intune client software is removed&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;WiFi and VPN profile settings are removed&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;When you retire a device, the retire process will begin the next time the device checks in and it will be removed from Intune once the steps outlined above in the list are completed. Delete means that the computer is removed from the Intune “All devices” list immediately. However, the retire process will begin the first time the device checks in. In other words, Delete performs the same tasks that Retire does. It just hastens the removal of the device from the listings page. The exception is cleanup rules that do delete devices immediately but do not retire them.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;To retire or delete a device, go to Devices &gt; All devices and select the computer you want to delete. Then choose the appropriate action you want as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6362a7ad42c49-retire2.png&quot; style=&quot;width: 600px; height: 284px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Import ADMX and ADML Templates into Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-import-admx-and-adml-templates-into-intune</link>
        <pubDate>2022-10-17T12:04:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Both Group Policy and Intune offer multiple Administrative Templates out of the box that provide settings for Microsoft operating systems and applications. Some third-party vendors provide ADMX and ADML templates that you can use to deploy settings for their products as well, but you must obtain them from the vendor and import them. &amp;nbsp;

Importing Administrative Templates into Group Policy

Importing third-party administrative templates into Group Policy simply requires that you paste the ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Both Group Policy and Intune offer multiple Administrative Templates out of the box that provide settings for Microsoft operating systems and applications. Some third-party vendors provide ADMX and ADML templates that you can use to deploy settings for their products as well, but you must obtain them from the vendor and import them.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Importing Administrative Templates into Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Importing third-party administrative templates into Group Policy simply requires that you paste the templates into the SYSVOL. Let’s say I wanted to manage settings for Zoom. I &lt;a href=&quot;https://support.zoom.us/hc/en-us/articles/360039100051-Mass-deploying-with-Group-Policy-Objects#h_4028bb63-77cc-4eec-ad1e-6311ec3f1b59&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;downloaded&lt;/a&gt; the templates and then placed them in the SYSVOL of one of my domain controllers as shown in the screenshot below. Note that you must also place the corresponding ADML templates into the appropriate language folder as well.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f636292c04c7fe-zoom1.png&quot; style=&quot;width: 600px; height: 103px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Then I use Group Policy Manager to create a GPO and the Zoom ADMX templates settings will appear automatically.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f636292e53ae74-zoom2.png&quot; style=&quot;width: 650px; height: 210px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;color: rgb(31, 55, 99); font-family: &quot;&gt;The Intune Importing Process&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The process for importing ADMX and ADML templates into Intune is of course completely different. First off there are few limitations at present to keep in mind.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can upload a maximum of 10 ADMX files&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can only upload one ADML file for each ADMX file &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Only en-us ADML files are supported currently&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Each file must be 1 MB or smaller&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Some ADMX files may have dependencies that must be uploaded first&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;After the matching ADMX and ADML templates are downloaded, go to Devices &gt; Configuration profiles and select “Import ADMX.”&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6362936e7c105-zoom3.png&quot; style=&quot;width: 650px; height: 192px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Click the Import link and navigate to the matching ADMX and ADML files as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6362939f64e66-zoom4.png&quot; style=&quot;width: 650px; height: 358px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Once completed, the imported ADMX template will now be listed. You must allot ample time for the templates to upload before using them as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f636293c173829-zoom5.png&quot; style=&quot;width: 650px; height: 183px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In this case, the upload failed. In the screenshot below I clicked on the link to find out the details of the error. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63629424c1c9e-zoom6.png&quot; style=&quot;width: 700px; height: 258px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;It says that an ADMX file reference file called &lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#6f6f6f&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;NamespaceMissing: Microsoft.Policies.Windows.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt; was not found. This is one of the gotchas I mentioned above. To fix this, you must first click the ellipsis to the right and delete it. Then you need to upload the Windows ADMX and ADML files. These files are in your SYSVOL folder by default.  Upload them the same way you did the Zoom template files.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f636293f307149-zoom7.png&quot; style=&quot;width: 700px; height: 368px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Once you complete the import wizard, click refresh until you see that the Windows.admx is available. Then upload the Zoom template once again. This time the upload process shouldn’t fail, and you will see both ADMX files available as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f63629451c3ce6-zoom8.png&quot; style=&quot;width: 650px; height: 188px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Now you can create Configuration profiles that use your imported ADMX files. Go to Profiles &gt; Create profile and choose Windows 10 and later as the platform and Templates as the profile type. Then select “Imported Administrative templates (Preview)“as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f636294aad76b7-zoom9.png&quot; style=&quot;width: 650px; height: 133px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Then you can select and configure the settings you want in your policy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f636294d6b2b32-zoom10.png&quot; style=&quot;width: 650px; height: 358px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Then complete the profile configuration process by assigning the profile to your designated users. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Setup Printing in the Cloud Using Universal Print (Part 3) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-setup-printing-in-the-cloud-using-universal-print-part-3</link>
        <pubDate>2022-10-03T13:14:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So, in our last article, we talked about registering printers with the Universal Print portal. We registered a couple of printers using the Universal Print Connector and then shared them to designated users through group assignment. Users can then browse the list of shared printers that they have access to and pick the appropriate printer according to factors such as location or printing capabilities. While this is fine for users needing to send something to a printer they normally don&amp;rsquo;t u ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;So, in our last article, we talked about registering printers with the Universal Print portal. We registered a couple of printers using the Universal Print Connector and then shared them to designated users through group assignment. Users can then browse the list of shared printers that they have access to and pick the appropriate printer according to factors such as location or printing capabilities. While this is fine for users needing to send something to a printer they normally don’t use, it’s easier for users to directly install printers on client machines. This is done by creating an Intune policy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Creating a Printer Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;All users that will be receiving the printer policy must be assigned a universal print license as mentioned in Part 1 of this series.  You also need the Printer Administrator role to create the policies and the target computers must have Windows 10 or Windows 11. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Using MEM go to Intune &gt; Devices &gt; Configuration profiles and create a new profile. Choose Windows 10 and later as the platform and Settings catalog as the Profile type. Name the policy, click “Add settings” and do a search for the word “printer” as shown below. Scroll down and select Printer Provisioning and select Printer Shared ID User.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f632de8c0c4377-print1.png&quot; style=&quot;width: 650px; height: 384px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You will need three bits of information about each printer you want to install. You can access this information from the overview section of each printer in the Universal Print portal as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f632de8ef6fc52-print_2.png&quot; style=&quot;width: 650px; height: 183px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Next, Input the Printer ID, Printer Share Name and Share Id in their designated boxes as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f632de920d50f0-print3.png&quot; style=&quot;width: 650px; height: 363px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;The final step is to assign the profile to the designated users.  You can then monitor the status of the policy using Intune as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f632de95d07ac2-print4.png&quot; style=&quot;width: 650px; height: 236px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;While Universal Print may not be a viable choice for large enterprises yet, it may be a good solution for SMBs that have moved to Azure AD in pursuit of a native cloud solution and want to deprecate their on-prem printing infrastructure.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Setup Printing in the Cloud Using Universal Print (Part 2) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-setup-printing-in-the-cloud-using-universal-print-part-2</link>
        <pubDate>2022-09-19T20:18:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In my previous article I outlined the prerequisites for Universal Print, a Microsoft 365 subscription-based service that you can use to centrally mange your printers using Azure. As mentioned, most printers require the Universal Print Connector to be registered in Azure for universal printing. You can download the UP Connector here. 



The prerequisites for the UP Connector are shown below.


	You can install it on Windows Server 2016 64-bit but Windows Server 2019 is recommended.
	You  ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In my previous article I outlined the prerequisites for Universal Print, a Microsoft 365 subscription-based service that you can use to centrally mange your printers using Azure. As mentioned, most printers require the Universal Print Connector to be registered in Azure for universal printing. You can download the &lt;a href=&quot;https://aka.ms/UPConnector&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;UP Connector here&lt;/a&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d269cc9a27-UPC1.png&quot; style=&quot;width: 550px; height: 215px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The prerequisites for the UP Connector are shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can install it on Windows Server 2016 64-bit but Windows Server 2019 is recommended.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You may also install it on Windows 10 64-bit Pro or Enterprise, version 1809 or later. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The host computer will also need .NET Framework 4.7.2 or later. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The host computer should have a permanent internet connection and have sleep/hibernate disabled&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once downloaded, simply run the installer&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d26cec0e0b-UPC2.png&quot; style=&quot;width: 400px; height: 278px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once installed you will see the screen below. Here will need to sign onto your Azure portal using an Azure AD account that is assigned to the Printer Administrator role. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d26f735c3a-UPC3.png&quot; style=&quot;width: 600px; height: 328px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once you are signed in, you will need to create a Connector Name as shown in the screenshot below. This could be the name of a building, a department, a site, or just about anything that has significance within your organization.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d272343b02-UPC4.png&quot; style=&quot;width: 600px; height: 422px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In this example I chose Central_Office. You will then register the Connector name.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d27483a296-UPC5.png&quot; style=&quot;width: 600px; height: 441px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once registered, you will be able to see the connector in your Azure Universal Printer portal. If you can’t readily find the UP portal in Azure, you can do a search for “Universal Print” to navigate to it as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d276ae04b8-UPC6.png&quot; style=&quot;width: 650px; height: 157px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Then click connectors to see your newly registered connector.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d279d1c887-UPC7.png&quot; style=&quot;width: 650px; height: 336px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now it’s time to register for the printers. You need to install the printers onto the computer hosting your connector.  These printers will then be shown as available printers within the UP Connector admin console. Select the printer or printers you want from the list and click register.  The printer(s) will now move to the registered printer list as shown below. The printer is now registered in Azure. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d27c55fef8-UPC8.png&quot; style=&quot;width: 650px; height: 350px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now we need to share the printer. Go to the Universal Print Portal and you will see that your printer is registered and ready but not shared.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d27eae1fbf-UPC9.png&quot; style=&quot;width: 650px; height: 169px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To share, select the printer’s checkbox and click Share as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d2824ef8fd-UPC10.png&quot; style=&quot;width: 650px; height: 247px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now you will give the printer a share name and select the groups or users that can access the share as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d28ec4153f-UPC13.png&quot; style=&quot;width: 600px; height: 291px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can then select Printer properties and provide descriptors so that users know where the printer is located within your enterprise. This allows them to search for printers according to location. I have filled out some of the properties in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d288592409-UPC11.png&quot; style=&quot;width: 650px; height: 679px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now the printer is shared and ready and will show all green as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f631d2929273f0-UPC12.png&quot; style=&quot;width: 650px; height: 221px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Registering Universal Printers Directly&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Printers that natively support Universal Print can be registered with Azure without going through the UP Connector. Simply access the printer’s admin console through a web browser. Every vendor’s admin portal is different but essentially you will need to name the printer and configure its network properties so it can access the Internet. Usually in the advanced settings, there will be a way to register the printer. The registration process will require you to logon to Azure with the proper credentials. The printer will then be registered and assigned a registration code. Once registered, you will then log onto Azure in the same manner I did earlier and share the printer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Next: Creating Intune Policies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In our third and final segment on Universal Print, we will review the process of installing registered universal printers on computers across the network.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Setup Printing in the Cloud Using Universal Print (Part 1) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-setup-printing-in-the-cloud-using-universal-print-part-1</link>
        <pubDate>2022-09-07T13:36:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So, you&amp;rsquo;ve migrated your enterprise&amp;rsquo;s on prem AD presence to Azure AD and now and are thinking that everything will be native cloud from here on out. There&amp;rsquo;s just one problem. Your users are still printing stuff and those printers rely on on-prem infrastructure. While many consider printing to be a legacy technology, organizations still depend on it. The problem is that printer management can be a time consuming and manually intensive ordeal having to deal with so many differen ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;So, you’ve migrated your enterprise’s on prem AD presence to Azure AD and now and are thinking that everything will be native cloud from here on out. There’s just one problem. Your users are still printing stuff and those printers rely on on-prem infrastructure. While many consider printing to be a legacy technology, organizations still depend on it. The problem is that printer management can be a time consuming and manually intensive ordeal having to deal with so many different types of printers, associated drivers, and spoolers. What’s more, assigning printers using Intune can be challenging at best. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Fortunately, there is an option available from Microsoft that allows you to upgrade your printer environment to a cloud-based print solution. It’s called Universal Print, a subscription-based service that runs on Microsoft Azure, providing a centralized print management for print administrators. Some of the benefits of Universal Print include the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;No &lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;need to install printer drivers on PCs as printing takes place using the Internet Printing Protocol (IPP). There’s also no need for print servers for supported printers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Provides remote users the ability to print at the corporate office and integrates with Windows 365 virtual PCs.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Printers can be assigned end-user locations at a granular level so users can easily find the right printer for their location whether it be a country, town, site, building, floor, etc. You can also assign printers using Intune.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Extensive reporting is available to monitor your print capacity as well as obtain a daily aggregated job count for each printer or user, giving you the visibility to understand what is happening in your print environment each month.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Enhanced security as machines must be joined to Azure AD to print and printing takes place over encrypted connections while all print data is contained in the same secure platforms that Online Exchange and Teams utilizes.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;margin-bottom:11px; margin-left:48px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There’s obviously a lot of benefits to Universal Print so let’s look at how to implement it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Prerequisites for Universal Print &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;h3 style=&quot;text-align:justify; margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s start with the printers themselves. Some printers can integrate directly with Universal Print out of the box. Here’s a list from Microsoft of &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/universal-print/fundamentals/universal-print-partner-integrations&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;Universal Print ready printers&lt;/a&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Chances are, most of your printers don’t support Universal print. In that case, you need to download the Universal Print Connector to an on-prem machine and add your printers to it. The Connector will serve as the intermediary between Azure and legacy printers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;h3 style=&quot;text-align:justify; margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Next you will need the right subscription. Universal Print is included with multiple commercial and educational Windows 365 and Windows 10 subscriptions. You can also purchase a standalone subscription as well. Applicable licenses include the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows 365 Enterprise F3, E3, E5, A3, A5&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows 10 Enterprise E3, E5, A3, A5&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft 365 Business Premium&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Universal Print (standalone)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can confirm whether your current license provides Universal Print access by going to your Azure portal and navigating to Azure Active Directory &gt; Licenses &gt; All products. Select a product from your list and click on “Service plan details.”&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6318d66b8b43f-MUP1.png&quot; style=&quot;width: 650px; height: 225px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Each print user will need an assigned license. A Universal Print license is also required for all print administrators regardless of whether they print or not. Keep in mind that the designated license doesn’t allot you unlimited printing. Universal Print uses the same OPEX model that is characteristic of cloud computing services in that you only pay for the resources that you use. Universal Print comes with a pool of print jobs that equates to 5 print jobs per user per month. That means that 100 licensed users will be able to print 500 print jobs each month. A print job constitutes a single printed document regardless of how many pages or the number of copies printed. A colored printed document counts the same as a standard print job and attributes such as single vs. double sided do not matter either. Note that there is currently no way to enforce a print quota on individual users. While the license allots 5 print jobs per user, one user can consume all the print jobs over the course of a month. It is believed that quota management will be introduced down the road.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To configure or manage Universal Print, an admin must be a global administrator or be assigned the Printer Administrator role. I had to assign myself the print administrator role even though I was a global administrator to complete the configuration steps for this article series. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Finally, client devices must be running Windows client OS, version 1903 or greater. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Next: Installation and Configuration&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;In the next article, I will show how to install the Universal Print Connector to an on-prem machine and configure the Universal Print service. We will then assign the printers using Intune. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> A Closer Look at Safeguard Holds </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/a-closer-look-at-safeguard-holds</link>
        <pubDate>2022-08-15T12:56:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ There are no guarantees in life. That&amp;rsquo;s certainly the case with software updates. Sometimes an update that offers a new operating system version just doesn&amp;rsquo;t&amp;rsquo; work out due to compatibility issues with a particular device. This can cause the update to either fail or rollback. Even worse, it could result in data loss or a loss of connectivity or key functionality. &amp;nbsp;That&amp;rsquo;s why Microsoft monitors quality and compatibility data to identify issues before they can affect to ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There are no guarantees in life. That’s certainly the case with software updates. Sometimes an update that offers a new operating system version just doesn’t’ work out due to compatibility issues with a particular device. This can cause the update to either fail or rollback. Even worse, it could result in data loss or a loss of connectivity or key functionality.  That’s why Microsoft monitors &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;quality and compatibility data to identify issues before they can affect too many machines. Issues may also be reported from Microsoft partners and customers as well. &lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once these issues are identified, Microsoft enacts a Safeguard Hold to prevent other devices with this known compatibility issue from being offered the designated feature update. The safeguard hold is enforced long enough to give Microsoft ample time to address the issue. Once a fix is derived and verified, the hold is lifted, and the Windows update will once again be readily offered to devices. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Disabling Safeguards&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;While its not necessarily recommended, you can disable safeguards so that devices will ignore them. Keep in mind that the update may likely fail. If you want to take the chance, however, create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; Windows Components &gt; Windows Update &gt; Windows Update for Business and enable the “Disable safeguards for Feature Updates” setting as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62f291031fad7-hold1.png&quot; style=&quot;width: 700px; height: 282px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can also do this using an MDM such as Microsoft Endpoint Manager with the DisableWUfBSafeguards CSP. The required custom OMA-URI settings are as follows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list -1.0in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; color:#0d0d0d; padding:0in&quot;&gt;OMA-URI&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;: ./Vendor/MSFT/Policy/Config/Update/DisableWUfBSafeguards&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list -1.0in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; color:#0d0d0d; padding:0in&quot;&gt;Data type&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;: Select &lt;i&gt;&lt;span style=&quot;border:none windowtext 1.0pt; padding:0in&quot;&gt;Integer&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list -1.0in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;border:none windowtext 1.0pt; color:#0d0d0d; padding:0in&quot;&gt;Value&lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;: 1&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;br /&gt;
&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62f29155e0ef0-hold2.png&quot; style=&quot;width: 650px; height: 154px;&quot; /&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Safeguards for Two Types of Issues&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;New Windows feature updates that are deployed using either Windows Update service or Windows Update for Business are subject to Safeguard holds for a known issue.  A “known issue” is a confirmed problem that may occur after an upgrade for a specific set of devices. In addition to known issues, there are also “likely issues.” A likely issue means that the problem has not been confirmed by Microsoft but has been discovered through machine learning out in the ecosphere. Issues could involve rollbacks, connectivity issues, app or driver malfunction as well as problems with graphics and audio. Once identified, a temporary safeguard hold is enabled on the designated update until either the issue has been confirmed and upgraded to a known issue (in which the safeguard hold is continued) or it has been identified as a false positive, in which case the hold is removed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;The Windows Update for Business Deployment Service&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The Windows Update for Business deployment service is a cloud service within the Windows Update for Business product family. It provides a next level of control concerning the approval, scheduling, and safeguarding of Windows updates. Here you can use safeguard holds against likely updates issues. You can also do things such as bypass preconfigured Windows Update for Business policies to manually deploy a security update on command across your organization should an emergency arise. To utilize this service, you must have one of the following subscriptions:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows 10/11 Enterprise E3 or E5 (included in Microsoft 365 F3, E3, or E5)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows 10/11 Education A3 or A5 (included in Microsoft 365 A3 or A5)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows Virtual Desktop Access E3 or E5&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft 365 Business Premium&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can then do a search for it in MEM and configure as you need to.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62f2919c53a36-Hold3.png&quot; style=&quot;width: 600px; height: 75px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;To see if you are affected by a Safeguard hold you can use Update Compliance in MEM to run a Safeguard Holds report that can provide insights into existing holds that are preventing devices from updating or upgrading. You can get more information about these reports &lt;a href=&quot;https://docs.microsoft.com/en-us/windows/deployment/update/update-compliance-safeguard-holds&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> 12 New Policies and Security Baseline for Microsoft Edge v104 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/12-new-policies-and-security-baseline-for-microsoft-edge-v104</link>
        <pubDate>2022-08-01T15:06:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft just released a security baseline for Microsoft Edge version 104.&amp;nbsp; Be aware that when you go to download it you won&amp;rsquo;t see version 104 listed because it still utilizes version 98 as none of the security policies have changed yet. Microsoft v104 introduced 12 new settings that can be used within Computer and User policies. The new setting policies are as follows:


	Allow import of data from other browsers on each Microsoft Edge launch
	Configure browser process code integ ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Microsoft just released a security baseline for Microsoft Edge version 104.  Be aware that when you go to &lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=55319&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;download&lt;/a&gt; it you won’t see version 104 listed because it still utilizes version 98 as none of the security policies have changed yet. Microsoft v104 introduced 12 new settings that can be used within Computer and User policies. The new setting policies are as follows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Allow import of data from other browsers on each Microsoft Edge launch&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Configure browser process code integrity guard setting&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Define domains allowed to access Google Workspace&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Double Click feature in Microsoft Edge enabled (only available in China)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Enable Drop feature in Microsoft Edge&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Get user confirmation before closing a browser window with multiple tabs&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Text prediction enabled by default&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;XFA support in native PDF reader enabled&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Enables Microsoft Edge mini menu *&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Get user confirmation before closing a browser window with multiple tabs *&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Restrict the length of passwords that can be saved in the Password Manager &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;* These policies are available as both mandatory and user override settings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;You can download the three ADMX templates new for Edge version 104 &lt;a href=&quot;https://www.microsoft.com/en-us/edge/business/download&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;here&lt;/a&gt; as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62f15e2a04a8c-1041.png&quot; style=&quot;width: 650px; height: 69px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;One of these settings, “Configure browser process code integrity guard setting” &lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;restricts the ability to load non-Microsoft signed binaries.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt; When enabled, there are three mode options:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Disabled (0) = Do not enable code integrity guard in the browser process.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Audit (1) = Enable code integrity guard audit mode in the browser process.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Enabled (2) = Enable code integrity guard enforcement in the browser process.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Administrators are encouraged to run this setting in Audit mode (1) early on for compatibility purposes. Audit mode is currently the default but a future security baseline will change this to Enabled (2) once Microsoft has enough data to proceed.  The setting options are shown in the screenshot below:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62f15e5e2e333-1042.png&quot; style=&quot;width: 650px; height: 437px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;If you haven’t yet imported the secruity baseline, you can do so by running the Baseline-ADImport.ps1 script as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62f15e86849fe-1043.png&quot; style=&quot;width: 650px; height: 151px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can refer to my blog on the &lt;a href=&quot;https://www.mdmandgpanswers.com/blogs/view-blog/new-microsoft-v95-security-baseline-for-group-policy&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;Security Baseline for Edge v95&lt;/a&gt; for more information about how to use security baselines for Microsoft Edge.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Use Group Policy or Intune to Reclaim Disk Space with Storage Sense </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/use-group-policy-or-intune-to-reclaim-disk-space-with-storage-sense</link>
        <pubDate>2022-07-19T21:26:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Storage Sense is a disk cleanup feature found in Windows 10 and Windows 11 to free up drive space. When enabled, it serves as a silent assistant that automatically gets rid of items that you&amp;nbsp;no longer&amp;nbsp;need such as temporary files and items in&amp;nbsp;your&amp;nbsp;Recycle&amp;nbsp;Bin.&amp;nbsp;When enabled with its default settings it will run whenever the device is low on disk space. It can also delete neglected cloud backed content; a process referred to as Cloud Content Dehydration. This is espec ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;Storage Sense is a disk cleanup feature found in Windows 10 and Windows 11 to free up drive space. When enabled, it serves as a silent assistant that automatically gets rid of items that you no longer need such as temporary files and items in your Recycle Bin. When enabled with its default settings it will run whenever the device is low on disk space. It can also delete neglected cloud backed content; a process referred to as Cloud Content Dehydration. This is especially valuable for users whose cloud storage far exceeds their local drives. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Using Group Policy to Manage Storage Sense&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;You can enable Storage Sense and configure settings using either Group Policy or Intune/MEM.  To enable it using Group Policy, create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; System &gt; Storage Sense and enable “Allow Storage Sense” as shown below&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62e87c918ef8b-SS1.png&quot; style=&quot;width: 700px; height: 248px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;Once enabled, Storage Sense will delete files from the Recycle Bin by default after 30 days. You can modify this period by enabling “Configure Storage Sense Recycle Bin cleanup threshold” and choose any digit between 0 and 365. A value of zero means that the files will never be deleted. You would do this if you wanted to enable Storage Sense but disable its Recycle Bin capabilities. The screenshot below shows the available policy settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62e87cb945624-SS2.png&quot; style=&quot;width: 550px; height: 511px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Storage Sense also deletes Temporary files by default as well so there is no need to enable the “Allow Storage Sense Temporary Files cleanup” but you do need to specifically disable it if you don’t want it utilized.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;One folder that Storage Sense doesn’t clean up by default is the Downloads folder. All those downloads become forgotten over time and can quickly add up, especially if it includes large ISO files. You can turn on this feature by enabling the “Configure Storage Storage Downloads Cleanup Threshold” and once again choosing 0 to 365 days. (BTW that isn’t a typo, the setting does repeat the world storage). &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Next, lets enable the “Configure Storage Sense Cloud Content Dehydration Threshold” setting. Here you will input the minimum number of days you want a cloud-backed file to be unopened before being deleted. I chose 90 days in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62e87cdd8411a-SS3.png&quot; style=&quot;width: 550px; height: 509px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;Finally, there is the “Configure Storage Sense Cadence” setting. By default, Storage Sense will run whenever it detects low disk space, but you can force it to run on a scheduled cadence using this setting as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62e87d018b020-SS5.png&quot; style=&quot;width: 550px; height: 507px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h1 style=&quot;margin-top:16px&quot;&gt;&lt;span style=&quot;font-size:16pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Intune/Endpoint Manager and Storage Sense &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can also manage Storage Sense using Intune/MEM as well.  Create a Configuration Profile and select Windows 10 and later as the platform and Settings as the Profile type. After naming the configuration profile, do a search for Storage Sense and select Storage as the category once found. Then choose the desired settings you want to configure. The process is illustrated in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62e87d2d4da01-SS6.png&quot; style=&quot;width: 700px; height: 319px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;Once the settings are configured, complete the wizard, and assign to the group your designated group(s). Now you won’t have to worry about forgotten files taking up footprints across your PC fleet.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> 4 Group Policy Settings That Can Help Prevent Ransomware </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/4-group-policy-settings-that-can-help-prevent-ransomware</link>
        <pubDate>2022-07-05T15:03:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ We all know how serious the ransomware threat is today and that unfortunately, there is no one magical solution to stop it. Protecting against ransomware requires a multilayer cybersecurity strategy, also referred to as defense in depth. This includes steps such as ensuring that all systems are up to date in their patching, enforcing MFA for email access, and not allowing local admin rights for standard users. There are also some group policy settings that you can use to incorporate into your st ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;We all know how serious the ransomware threat is today and that unfortunately, there is no one magical solution to stop it. Protecting against ransomware requires a multilayer cybersecurity strategy, also referred to as defense in depth. This includes steps such as ensuring that all systems are up to date in their patching, enforcing MFA for email access, and not allowing local admin rights for standard users. There are also some group policy settings that you can use to incorporate into your strategy as well. Below are four that can help in different ways.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;1. Enabling Network Protection&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Network protection is a Windows features that helps prevent users from using an application inadvertently to access dangerous domains that may host phishing scams, exploits, ransomware payloads and other malicious content.  It’s a component of Microsoft Defender for Endpoint and requires Windows 10 or 11 Pro (Pro and Enterprise) and Windows Server 2019+. The list of domains is supplied by Microsoft. Network protection blocks all HTTP and HTTPS traffic that attempts to connect to these contains. Think of it as web protection for non-browser applications. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To enable this feature, create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; Windows Components &gt; Microsoft Defender Antivirus &gt; Microsoft Defender Exploit Guard &gt; Network Protection. There there are two policies for you to configure. The first step is to enable “This setting controls whether Network Protection is allowed to be configured into blog or audit mode” as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62d99ff1a2e9f-RAN1.png&quot; style=&quot;width: 700px; height: 136px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You then need to choose between Block and Audit. Block is self-explanatory in that users will not be able to access the domains in question. Audit mode allows users to still connect to the flagged domains but records the event into a log file. This allows you to get a read on what sites your users are utilizing before blocking them entirely. The screen shot below shows how to select between the two options. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62d9a0645ffbf-Ran2.png&quot; style=&quot;width: 700px; height: 647px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;2. Enable Controlled Folder Access&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Controlled folder access was made available in Windows 10 and is supported in Window 11 as well as Server 2019 and 2022. It’s a component of Windows Defender Exploit Guard that prevents the data hosted in designated folders from being altered. In other words, if malware attempts to modify (encrypt) the files in these protected folders without authorization, the attempt is blocked, and an alert is generated. By default, certain system folders are protected such as a user’s Documents folder, Pictures, Desktop, etc. but you can also add folders as well. Note that the controlled folder access feature does not function if a third-party antivirus application is installed on the targeted system.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;To configure Controlled folder access simply create a GPO and go to Computer configuration &gt; Administrative templates &gt; Windows components &gt; Windows Defender Antivirus &gt; Windows Defender Exploit Guard &gt; Controlled folder access. Start by enabling “Configure controlled folder access” as shown below. You can choose to disable it, block it or choose Audit mode, both of which in the same fashion as Network Protection. You can also choose to only block or audit disk modifications which involve the writing to disk sectors by untrusted apps. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62d9a0a1b9b29-Ran3.png&quot; style=&quot;width: 600px; height: 558px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can add additional folders to the list by clicking “Configure Protected Folders” and add the folders you want protected.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62d9a15d093e6-RAN4.png&quot; style=&quot;width: 600px; height: 553px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The end result will look like the example below. Note that you can also choose “Configure allowed application” to specify applications that are allowed to alter the data contained in the protected folders.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62d9a198c52c0-Ran5.png&quot; style=&quot;width: 700px; height: 282px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-top:3px&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;3. Disable Remote Desktop&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once a ransomware variant takes hold in your network, it then works to spread laterally across your IT estate. One of the ways is through remote desktop connection. That’s one of the reasons why Windows 11 has an account lockout policy enabled that only allows for 10 failed sign-in attempts over a 10-minute period. This blocks RDP brute-force attacks. Because some ransomware variants utilize RDP connection to spread, it’s a good idea just to disable it unless required. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; Windows Components &gt; Remote Desktop Services &gt; Remote Desktop Session Host and disable “Allow users to connect remotely by using Remote Desktop Services” as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62d9a2769bdf3-Ran6.png&quot; style=&quot;width: 700px; height: 321px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-top:3px&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;4. Show Hidden File Extensions&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Cybercriminals use multiple nefarious tactics to get users to click on a malicious file. One of these methods includes the use of double file extensions. An example may be “letter.doc.exe” in which a user mistakes the file for a Word document if the executable extension is hidden. To ensure that file extensions are visible you can create a GPO and go to User Configuration &gt; Group Policy Preferences &gt; Control Panel Settings &gt; Folder Options and make sure that “Hide extensions for known file types” is unchecked as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62d9a2b6ce12d-Ran7.png&quot; style=&quot;width: 600px; height: 421px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;We’ve only touched the surface here. There are many other group policy settings available that can aid in preventing ransomware from bringing down your systems and we will cover more in the future.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Managing Removable Disks and Devices Using Group Policy and MEM </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/managing-removable-disks-and-devices-using-group-policy-and-mem</link>
        <pubDate>2022-06-29T11:50:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Your organization can invest in an entire portfolio of cybersecurity tools including email and web filtering, next generation firewall appliances and endpoint security solutions to protect your Windows computing devices. But deploying all those tools can still leave your machines vulnerable to zero-day attacks and malware infestations. That&amp;rsquo;s because all the filtering and firewall policies in the world won&amp;rsquo;t stop malicious code from being transferred from an insertable USB stick. The ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Your organization can invest in an entire portfolio of cybersecurity tools including email and web filtering, next generation firewall appliances and endpoint security solutions to protect your Windows computing devices. But deploying all those tools can still leave your machines vulnerable to zero-day attacks and malware infestations. That’s because all the filtering and firewall policies in the world won’t stop malicious code from being transferred from an insertable USB stick. The USB port remains a viable attack avenue for hackers and their malicious code creations to infiltrate computers thanks to users sharing USB drives. Fortunately, there are easy ways to manage removable storage access for your fleet of enterprise Windows devices. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;strong&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;Using Group Policy&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Let’s start with Group Policy. You can manage removable storage settings on the Computer or User side. A Computer policy would prevent IT personnel with admin privileges from using USB sticks, thus preventing them from performing some of their everyday tasks. The purpose of this policy is to prevent standard users from transferring malicious code, so a User Configuration policy makes the most sense. Create a GPO and go to User Configuration &gt; Administrative Templates &gt; System &gt; Removable Storage Access as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62bc73ee73642-RD1.png&quot; style=&quot;width: 700px; height: 249px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Let’s clear up any confusion concerning the various removable storage options listed. If you are younger than age 30 you probably don’t know what a floppy disk is and that’s a good thing. For most modern computers today, you need only worry about Removable Disks (USB sticks and external drives) and Windows Portable Devices which include things such as smart phones, cameras, etc. An example would be transferring pictures from a smart phone to a laptop. In the screenshot above I have enabled settings to deny read and write access to removable disks and denied write access to WPD devices. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Another option is to prevent users from installing removable devices onto their machines. You can only do this on the Computer side but there is a setting called “Prevent installation of devices not described by other policy settings” that is perfect for this situation. You can find it by going to Computer Configuration &gt; Administrative Templates &gt; System &gt; Device Installation Restrictions. The enabled policy is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62bc7417261a1-RD2.png&quot; style=&quot;width: 700px; height: 295px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;strong&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;Using MEM&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;You can also configure removable storage policies using Microsoft Endpoint Manager. There are a couple of ways to do it. The first is to go to Devices &gt; Configuration profiles and create a profile. Select “Windows 10 and later” as the platform and Templates as the Profile &gt; then choose Administrative Templates from the list of available templates.  Name the policy and then drill down to System. Here you will find both groups of desired settings as shown below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62bc7440202d3-RD3.png&quot; style=&quot;width: 700px; height: 337px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Drilling down into Device Installation we can enable the “Prevent installation of devices not described by other policy settings” policy for MDM enrolled devices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62bc746cb2496-RD4.png&quot; style=&quot;width: 700px; height: 332px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;You can then go up one level and scroll over to the Removable Storage Access settings. Below I have enabled the “Removable Disks: Deny execute access” setting.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62bc74a17c700-RD5.png&quot; style=&quot;width: 700px; height: 327px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;You can also configure these settings using the Settings picker.  Rather than choosing Templates as the profile type, select Settings. Then use the Settings picker to search for “Removable Storage” and select the correct category. Then choose the desired settings in the section below and configure them as shown in the screenshot below. You can do the same then for Device Installation settings.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;border:none windowtext 1.0pt; background:white; padding:0in&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62bc74c95d8e3-RD6.png&quot; style=&quot;width: 700px; height: 372px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Microsoft Endpoint Manager Offers Built-in Settings for Google Chrome </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/microsoft-endpoint-manager-offers-builtin-settings-for-google-chrome</link>
        <pubDate>2022-06-06T14:04:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft Endpoint Manager (Intune) has given admins the ability to manage and deliver Google Chrome settings for some time now.&amp;nbsp; Until recently however, one had to create a custom OMA-URI device configuration policy to do so, which no one considers a very fun thing to do.&amp;nbsp; For instance, if you wanted to enforce the home page in Chrome you would need to know the OMA-URI path which most people have to look up.

./Device/Vendor/MSFT/Policy/Config/Chrome~Policy~googlechrome~Startup/Home ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Endpoint Manager (Intune) has given admins the ability to manage and deliver Google Chrome settings for some time now.  Until recently however, one had to create a custom OMA-URI device configuration policy to do so, which no one considers a very fun thing to do.  For instance, if you wanted to enforce the home page in Chrome you would need to know the OMA-URI path which most people have to look up.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;i&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;./Device/Vendor/MSFT/Policy/Config/Chrome~Policy~googlechrome~Startup/HomepageLocation&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You would then configure the string value for the policy:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Data type: &lt;i&gt;String&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Value: &lt;i&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;enabled&gt; &lt;data background:white=&quot;&quot; id=&quot;HomepageLocation&quot; value=&quot;&lt;/span&gt;&lt;/i&gt; &lt;i&gt;&lt;span style=&quot;&gt;https://www.mdmandgpanswers.com/&quot;/&gt;&lt;/data&gt;&lt;/enabled&gt;&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Well good news, MEM now supports built in settings for Google Chrome and there are two ways to do this.  In MEM go to Devices &gt; Configuration profiles &gt; Create profile.  Choose “Windows 10 and later” as the platform and under profile type select either Settings catalog or Templates.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f629e4058c63a6-chrome1.png&quot; style=&quot;width: 650px; height: 317px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s first use the Settings catalog to set the home page.  Hit the Create button, name the profile, and click Next.  Here you need to click Add settings as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f629e407e26676-chrome2.png&quot; style=&quot;width: 650px; height: 333px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;This takes you to the Settings picker. While built in settings are preferable to configuring OMA-URI configuration profiles, it isn’t always easy to find the setting you want.  Rather than browsing through all the included settings, you should do a search to locate the settings as efficiently as possible. This is much like doing a Google search so the more specific you are the better.  For instance, you could do a search for “Chrome” and choose the Chrome Administrative Templates that users cannot override, but this would still narrow it down to only 516 setting results as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f629e40a6b4fbf-chrome3.png&quot; style=&quot;width: 650px; height: 318px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Therefore, it’s good to know the name of the setting to find it quickly.  In the example below I searched “configure home page”.  Then I clicked on the “Home page and New Tab page” category and chose “Configure the home page URL” on the user side.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f629e40cfddd06-chrome4.png&quot; style=&quot;width: 650px; height: 433px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;After finding the correct setting, I then configured it as shown in the screenshot below by enabling it and typing in the designated home page.  Click next and assign the profile to one or more groups and finish out the wizard to save it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f629e40ff67e2a-chrome5.png&quot; style=&quot;width: 650px; height: 357px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;We can accomplish the same thing using Administrative Templates option. Once again you will name the profile using the Wizard and click Next.  This time let’s make it a computer side policy setting so expand Computer Configuration &gt; Google &gt; Google Chrome &gt; &lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Startup, Home page and New Tab page&lt;/span&gt;&lt;/span&gt; &gt; Configure the home page URL&lt;span style=&quot;color:#0d0d0d&quot;&gt;.  Then enable and input the desired URL as last time.  The process is shown in the example below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f629e4123ee217-chrome6.png&quot; style=&quot;width: 650px; height: 310px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There are many setting options available in the Administrative Templates.  For instance, the screenshot below shows how to enforce Google SafeSearch for users.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f629e4152cfd9b-chrome7.png&quot; style=&quot;width: 650px; height: 289px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In another example, I have specified the minimum SSL version for Google Chrome under User Configuration as well.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f629e417fd38eb-chrome8.png&quot; style=&quot;width: 650px; height: 316px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;While you still must know where to go to find the desired settings you want, managing Google Chrome settings is a lot easier now under MEM.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Use Intune or GPOs to Move the Windows 11 Taskbar to the Traditional Left </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/use-intune-or-gpos-to-move-the-windows-11-taskbar-to-the-traditional-left</link>
        <pubDate>2022-05-23T10:25:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Users are creatures of habit. They expect things a certain way and when they aren&amp;rsquo;t, they often call the help desk. For years, users have been accustomed to the Windows taskbar and Start button tucked in the left-hand corner of the screen. Thus, the default position of the Windows 11 start menu in the center may throw some for a loop. There is an easy way to fix this as an individual user using the Personalization tab in the Settings menu. To do this for all your users requires a policy an ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Users are creatures of habit. They expect things a certain way and when they aren’t, they often call the help desk. For years, users have been accustomed to the Windows taskbar and Start button tucked in the left-hand corner of the screen. Thus, the default position of the Windows 11 start menu in the center may throw some for a loop. There is an easy way to fix this as an individual user using the Personalization tab in the Settings menu. To do this for all your users requires a policy and here are two ways to do it.  Each involves making a change to the registry.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Group Policy Preferences&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;We need to add a value called &quot;TaskbarAl&quot; that will reside in the following registry key path:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;It will be assigned a value “0”.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Using the Group Policy Management Editor go to User Configuration &gt; Preferences &gt; Registry.  Right click and choose New &gt; Registry Item.  Then fill out the property fields as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6286532118a9d-Left1.png&quot; style=&quot;width: 700px; height: 384px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;If you want to deploy the setting using Microsoft Endpoint Manager you will have to do it using a PowerShell script.  There are multiple ways to write the necessary script but below is one approach. This script format makes it easy to add other Start Menu and Taskbar values to the same registry location.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:darkgreen&quot;&gt;# Move the Windows 11 Taskbar to left&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:darkgreen&quot;&gt;#_____________________________________________________________________________________&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#a82d00&quot;&gt;$registryPath&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:dimgray&quot;&gt;=&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:darkred&quot;&gt;&quot;HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#a82d00&quot;&gt;$Al&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:dimgray&quot;&gt;=&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:darkred&quot;&gt;&quot;TaskbarAl&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:darkgreen&quot;&gt;# Shift Start Menu Left&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#a82d00&quot;&gt;$value&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:dimgray&quot;&gt;=&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:darkred&quot;&gt;&quot;0&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;text-autospace:none&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:blue&quot;&gt;New-ItemProperty&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:navy&quot;&gt;-Path&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#a82d00&quot;&gt;$registryPath&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:navy&quot;&gt;-Name&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#a82d00&quot;&gt;$Al&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:navy&quot;&gt;-Value&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#a82d00&quot;&gt;$value&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:navy&quot;&gt;-PropertyType&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:blueviolet&quot;&gt;DWORD&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:navy&quot;&gt;-Force&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:navy&quot;&gt;-ErrorAction&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style=&quot;font-size:9.0pt&quot;&gt;&lt;span console=&quot;&quot; lucida=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:blueviolet&quot;&gt;Ignore&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Paste the script into PowerShell ISE and save it. Using Microsoft Endpoint Manager go to Devices &gt; Scripts.  Click Add and select Windows 10 and later.  Name the policy and upload the script in the next screen as shown in the screenshot below. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f628653599f880-Left2.png&quot; style=&quot;width: 700px; height: 284px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Now assign the script to the designated group(s) and complete the wizard.  Be patient because it can take a little while for the script to force the bar to move over. It may seem like a trivial matter but it may save you some support calls.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Filter Windows 11 Machines with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-filter-windows-11-machines-with-intune</link>
        <pubDate>2022-05-09T13:21:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Unless you are an SMB, you are probably going to phase in your Windows 11 upgrade over time.&amp;nbsp; That means that you will have to manage both versions until the upgrade is complete, which might require you to manage their settings or application deployments differently.&amp;nbsp; If you are using Intune to manage your Windows machines, you can use filtering to reduce the complexity of doing so.&amp;nbsp; 

You can use Intune filters to target configurations, policies, and applications to specific de ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Unless you are an SMB, you are probably going to phase in your Windows 11 upgrade over time.  That means that you will have to manage both versions until the upgrade is complete, which might require you to manage their settings or application deployments differently.  If you are using Intune to manage your Windows machines, you can use filtering to reduce the complexity of doing so.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can use Intune filters to target configurations, policies, and applications to specific device attributes such as Manufacturer, Model and OS version.  In this case we will create two filters that each target a different OS version.  Using Microsoft Endpoint Manager go to Intune &gt; Tenant administration &gt; Filters and create a new filter and name it as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f626c1b27cc5df-filter1.png&quot; style=&quot;width: 700px; height: 302px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Create a rule and select &lt;b&gt;osVersion&lt;/b&gt; as the property, &lt;b&gt;StartsWith&lt;/b&gt; as the operator and &lt;b&gt;10.0.2&lt;/b&gt; as the value which I did myself in the screenshot below.  Then finish out the wizard to complete the filter.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f626c1c2ccd506-filter2.png&quot; style=&quot;width: 700px; height: 503px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now create a second filter.  There are a couple of options when creating these filters.  You could use the same approach as the previous filter and match it with the Windows 10 value.  In this example, we chose a different approach and instead used the &lt;b&gt;NotEquals&lt;/b&gt; operator, typing in 10.0.2 as the value.  This means that any Windows version other than Windows 11 will be included in this filter.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f626c1dadc4ad4-filter3.png&quot; style=&quot;width: 700px; height: 380px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now that you have the filters created, you can start applying them when needed.  In the example below, I have created a configuration profile that I have assigned to a computer group.  The group is made up of both Windows 10 and Windows 11 machines.  Because I want this profile to only apply to Windows 11 machines, I will click the filter link and choose “include filtered devices in assignment” and select the Windows 11 filter I created earlier. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f626c1e18de56e-filter4.png&quot; style=&quot;width: 700px; height: 254px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Finish out the wizard and the configuration profile will now only target Windows 11 devices.  Those familiar with Group Policy will note the similarity to WMI filtering.  Once you upgrade all your Windows 10 devices, simply delete its designated filter.   &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Prevent Users from Resetting Windows 10 Devices with Applocker and MEM </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-prevent-users-from-resetting-windows-10-devices-with-applocker-and-mem</link>
        <pubDate>2022-05-02T14:53:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Anyone who has been a Windows device admin for a school system that implements a student laptop program is aware of the constant battle to keep students in check when it comes to their devices.&amp;nbsp; A common ploy by the students is to reset their devices to factory default to bypass enforced security policies.&amp;nbsp; Even if students can&amp;rsquo;t get to system settings, they can always hold down the shift key while they use the mouse to select the Restart option from the Windows Start button.&amp;nbs ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Anyone who has been a Windows device admin for a school system that implements a student laptop program is aware of the constant battle to keep students in check when it comes to their devices.  A common ploy by the students is to reset their devices to factory default to bypass enforced security policies.  Even if students can’t get to system settings, they can always hold down the shift key while they use the mouse to select the Restart option from the Windows Start button.  This gets them to the Advanced Startup screen where they can then reset the device.  This of course starts the computer with a clean slate, giving students time to make local accounts on their device.  It also gives them access to the command prompt screen and other things.  For computers that are managed byGroup Policy, students that reset their devices off premise will enjoy a newfound freedom until the computer returns to campus and receives its assigned policies once again.  What’s more, a PC tech may have to manually deploy a package file to install the required applications, consuming precious time from both the student and the technician.  For those computers managed by an MDM provider, policies and applications will be deployed once the computer connects to the Internet, making any acquired freedom brief, but perhaps meaningful enough to be worth the effort to the student.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Even if you don’t work for a school system, you still might want to stop your users from resetting their devices.  Fortunately, there is an easy way to do it using AppLocker to create a policy that can be deployed using Group Policy or your preferred MDM solution that will prevent standard users from implementing a factory reset.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Create an AppLocker Executable Rule&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Using Windows Group Policy Management Editor, create a GPO and go to Computer Configuration &gt; Security Settings &gt; Application Control Policies &gt; AppLocker &gt; Executable Rules.  Right-click and select Create New Rule as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6259bdabd93e5-reset1.png&quot; style=&quot;width: 650px; height: 596px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Using the wizard, choose Deny as the action.  You can target a specific group or just go with the default Everyone group as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6259bde83ba91-reset2.png&quot; style=&quot;width: 500px; height: 251px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In the next screen choose “Path” as the primary condition.  There are two path executables we need to block.  Each will require their own rule.  For this rule let’s choose:&lt;br /&gt;
&lt;br /&gt;
C:\Windows\system32\systemreset.exe &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;as shown in the following screenshot.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6259be10462cd-reset3.png&quot; style=&quot;width: 500px; height: 201px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Continue with the Wizard.  Name the rule and click Create.  Now create another executable rule using the same process.  This time we will use environmental variables for the file path which is %SYSTEM32\ReAgentc.exe.  Now you will have two rules as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6259be311ddb1-reset4.png&quot; style=&quot;width: 650px; height: 351px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Now assign the GPO to the targeted computers.  But what about Windows 10 devices that are managed by Microsoft Endpoint Manager or similar MDM provider?  In that instance, you can export the AppLocker rules by right-clicking on AppLocker and exporting the policy as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6259be73b15bf-reset5.png&quot; style=&quot;width: 400px; height: 243px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Name the policy and save it as an XML file.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6259be945aba5-reset6.png&quot; style=&quot;width: 550px; height: 344px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Now import that XML file into MEM by going to Devices &gt; Configuration profiles &gt; Create policy &gt; Windows 10 and later &gt; Templates and choose Custom and click the Create button.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6259beb55635c-reset7.png&quot; style=&quot;width: 780px; height: 367px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Now open the saved XML file with a text editor and highlight and copy all the content within the AppLocker tags as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6259bed03c73b-reset8.png&quot; style=&quot;width: 600px; height: 200px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Using the wizard, name the policy and go to configuration settings.  Here you will need to add the OMA-URI settings.  In the OMA-URI textbox you will input the following path:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;i&gt;&lt;span style=&quot;color:black&quot;&gt;/Vendor/MSFT/AppLocker/AppLocker/ApplicationLaunchRestrictions/apps/EXE/Policy&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;Choose String as the Data type and then paste the XML code you copied into the Value box as shown below.  Then click next until you finish out the wizard and create the policy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6259befdab663-reset9.png&quot; style=&quot;width: 550px; height: 384px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You will then assign the policy to your targeted users.  The next time a student or user attempts a factory reset, they will receive a message informing them that the action is not allowed for their organization.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Managing Compliance Deadlines for Windows </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/managing-compliance-deadlines-for-windows-</link>
        <pubDate>2022-04-15T12:41:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Keeping your Windows devices updated is critical today, not only from a security point of view, but a productivity one as Microsoft continues to deliver new features that spawn greater user innovation.&amp;nbsp; Deploying these updates is only part of the equation when it.&amp;nbsp; A computer can download a feature update for instance, but unless the computer is rebooted, it won&amp;rsquo;t be fully installed.&amp;nbsp; Often, users will delay the rebooting process, thus prolonging the pending start status and ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Keeping your Windows devices updated is critical today, not only from a security point of view, but a productivity one as Microsoft continues to deliver new features that spawn greater user innovation.  Deploying these updates is only part of the equation when it.  A computer can download a feature update for instance, but unless the computer is rebooted, it won’t be fully installed.  Often, users will delay the rebooting process, thus prolonging the pending start status and preventing it from attaining compliance.  That’s why you must enforce compliance.  Both Group Policy and Microsoft Endpoint Manager (MEM) give admins the ability to create an enforceable compliance window to ensure that Windows update processes are fully completed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Deadlines and Grace Periods&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;These compliance policies allow you to configure a deadline that defines the number of days until a device is forced to restart to ensure compliance.  You can also configure an additional grace period to give users a little extra window if needed.  Note that you are restricted to defined ranges when assigning these time windows.  For Group Policy the ranges are as follows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For quality updates the deadline can be between 0 and 7 days.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For feature updates the deadline can be between 0 and 14 days&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Grace periods are limited to 0 to 3 days regardless of the type of update&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;MEM provides longer durations to accommodate mobile devices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For quality updates the deadline can be between 2 and 30 days.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For feature updates the deadline can be between 2 and 30 days&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Grace periods are limited to 0 to 7 days regardless of the type of update&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For quality updates, the deadline and grace period start once the update is offered to the computer.  In the case of feature updates, both start once the update has been installed and the computer reaches a pending restart state.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Configuring Compliance Policies&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;To enforce a compliance policy using the Group Policy Administrative Console, go to Computer Configuration &gt; Administrative Templates &gt; Windows Components &gt; Windows Update &gt; Manage end user experience and choose “Specify deadlines for automatic updates and restarts.”  You can then configure the deadline and grace periods for both quality and feature updates as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6245d9721109b-C1.png&quot; style=&quot;width: 650px; height: 368px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Note that you have other settings available concerning the restarting process that you can assign as well.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-right:16px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:21.0pt&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;To configure deadline and grace period durations using the Microsoft Endpoint Manager admin center and go to Devices &gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#323130&quot;&gt;Create Update ring for Windows 10 and later.  Turn on the Allow button to enable deadlines and then assign the deadline and grace period for each update category.    Note that the deadlines and grace periods are appended to any configured deferral period.  The process is shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:21.0pt&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#323130&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6245d99834423-C2.png&quot; style=&quot;width: 650px; height: 407px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;By enforcing update compliance&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; for your Windows machines through GP or MDM, you can ensure that required update processes are completed, keeping your computers secure and maximizing user productivity. &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Analyze your GPOs with Group Policy Analytics </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/analyze-your-gpos-with-group-policy-analytics</link>
        <pubDate>2022-04-04T10:45:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Many organizations are choosing to use some type of MDM provider to manage their mobile devices.&amp;nbsp; Some organizations are even turning to MDM for all of their client devices.&amp;nbsp; If you have been relying on Group Policy to deliver configuration and security settings to these your Windows devices, you should know that there is still a disparity gap between between Group Policy and an MDM such as Microsoft Endpiont Manager (MEM) when it comes to setting coverage.&amp;nbsp; While Microsoft has cl ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Many organizations are choosing to use some type of MDM provider to manage their mobile devices.  Some organizations are even turning to MDM for all of their client devices.  If you have been relying on Group Policy to deliver configuration and security settings to these your Windows devices, you should know that there is still a disparity gap between between Group Policy and an MDM such as Microsoft Endpiont Manager (MEM) when it comes to setting coverage.  While Microsoft has closed this gap considerably over the past couple of years, there are still a number of Group Policy settings that MEM and other MDM solutions don’t accommodate.   Obviously, you need to know what settings can’t be replicated when considering a move to MDM.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;MEM now provides an easy to use tool called Group Policy Analytics (Preview) that will analyze your on-premise GPOs and determine how they will translate into the cloud.  It will analyze a specific GPO and identify which settings are supported in the MDM, which ones have been deprecated and which ones are simply not available.  The first step is to select the GPO you want to test out in the Group Policy Management Console.  As shown in the screenshot below, simply right click on your selected GPO and choose “Save Report.”  Save it as an XML file.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6245bd7f2abf8-GPA1.png&quot; style=&quot;width: 450px; height: 342px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The next step is to import the XML file into MEM.  Using the MEM admin center, go to Devices &gt; Group Policy analytics (preview).  Select Import and point to the saved XML file as shown in the screenshot below.  Note that the saved XML cannot be larger than 4 MB.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6245bda6accb6-GPA2.png&quot; style=&quot;width: 650px; height: 261px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Click the X in the upper righthand corner and wait for the analyzation process to complete.  You will then see the percentage of settings are supported by the MDM.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6245be150d5ee-GPA3.png&quot; style=&quot;width: 650px; height: 130px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Now click on the stated percentage and review the status of all your settings.  The supported settings will list the corresponding CSP mapping in the righthand column as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6245be4a746f7-GPA4.png&quot; style=&quot;width: 650px; height: 338px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Group Policy analytics is a great tool to determine the MDM setting coverage of your GPOs.  If any of the non-supported settings are critical to your management or security policies, you may want to continue using Group Policy for a while longer or utilize a third-party settings management solution. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Everything you Want to Know about Managing Windows Updates (Part 4) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/everything-you-want-to-know-about-managing-windows-updates-part-4</link>
        <pubDate>2022-03-08T15:20:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In our final segment of this series, we are going to wrap up our discussion concerning Windows update management.&amp;nbsp; So now that you&amp;rsquo;ve configured your update rings and settings, you can create a compliance policy to reinforce them using Microsoft Endpoint Manager and going to the
&amp;ldquo;Devices |Overview&amp;rdquo; section and selecting Compliance policies near the bottom of the menu as shown below.&amp;nbsp; Here you can also click on Compliance status and view the compliance status of your  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;In our final segment of this series, we are going to wrap up our discussion concerning Windows update management.  So now that you’ve configured your update rings and settings, you can create a compliance policy to reinforce them using Microsoft Endpoint Manager and going to the&lt;br /&gt;
“Devices |Overview” section and selecting Compliance policies near the bottom of the menu as shown below.  Here you can also click on Compliance status and view the compliance status of your enterprise fleet&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6209665a7902f-update1.png&quot; style=&quot;width: 650px; height: 378px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Create a new policy and choose Windows 10 and later as the platform.  Name your policy and then go to Compliance settings &gt; Device Properties.  Here you can set the minimum OS version to be compliant.  You can also set a maximum if desired.  In the example below I have assigned 21H1 as the minimum OS version with 21H2 as the max.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6209667cac9f4-update2.png&quot; style=&quot;width: 650px; height: 278px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;You can then determine what your action will be for non-compliant status.  You can choose to either send an email to the user of the device or choose the hard-core action of retiring the device for noncompliance as shown in the screenshot below.  A grace period of 3 days has also been configured.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f620966cdcf3c8-update3.png&quot; style=&quot;width: 550px; height: 368px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The final step is to assign the compliancy policy to your designated group(s).  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Managing Updates in a Co-managed Environment&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Those enterprises that use &lt;/span&gt;&lt;span style=&quot;font-size:10.5pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Endpoint Manager&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;em&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-style:normal&quot;&gt;Configuration Manager&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/em&gt;&lt;em&gt;&lt;b&gt; &lt;/b&gt;&lt;/em&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;can utilize either WSUS or Windows Update as their update source.  Here’s a good example of the flexibility this offers.  Let’s create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; Windows Components &gt; Windows Update &gt; Manage updates offered from Windows Server Update Service.   Here you would configure settings to specify the IP address of the WSUS server.  The settings we want to focus on is “Specify source service for specific classes of Windows Updates” as is shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f620966feb44f9-update4.png&quot; style=&quot;width: 650px; height: 338px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Enable the policy and then choose the source service for each update class.  In the example below I am assigning the WSUS server as the feature update source and Windows Update for quality updates.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f62096733975db-update5.png&quot; style=&quot;width: 500px; height: 463px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;While we are in Group Policy, let’s look at some other useful settings.  If you are fully managing the update environment for your end user devices, there is no need to perpetually send Windows update notifications to users.  In the screenshot below I enabled the Display options for update notifications.  Note that I have also enabled “Speficy deadlines to use Windows Updates and restarts” where just as I demonstrated in MEM earlier, you can assign a deferral period and grace period for Quality updates and Feature updates.  I also chose to remove access to all Windows update features for good measure by enabling that policy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f620967631aa89-update6.png&quot; style=&quot;width: 650px; height: 306px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Here I chose to disable all update notifications other than restart warnings in order to give them a heads up about pending restarts.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6209678fd59d7-update7.png&quot; style=&quot;width: 500px; height: 463px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Conclusion&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Ensuring that all your Windows machines receive the latest quality updates is one of the most important steps you can do to secure your devices.  Quality updates fix bugs and improve the reliability of your machines so that they run optimally for users.  While feature updates are not as imperative, they cannot be ignored either as you need to make sure that users have access to new features that can help stimulate innovation and improve productivity.  It’s a big job, but Microsoft provides the management tools to ensure that your machines remain update accordingly.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Turn Back Time with Windows Known Issue Rollback </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/turn-back-time-with-windows-known-issue-rollback</link>
        <pubDate>2022-03-01T15:17:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ There are times when we all wish we had the ability to turn back time to undo a mistake.&amp;nbsp; This is certainly the case for Windows support teams that have had to deal with a sudden surge of help desk calls due to the havoc created by a recent non-security bug fix in a recent Windows update.&amp;nbsp; The traditional way to remediate such an issue has been to uninstall the update, a time-consuming process that overstretched IT personnel don&amp;rsquo;t have time for. &amp;nbsp;How great it would be if the ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There are times when we all wish we had the ability to turn back time to undo a mistake.  This is certainly the case for Windows support teams that have had to deal with a sudden surge of help desk calls due to the havoc created by a recent non-security bug fix in a recent Windows update.  The traditional way to remediate such an issue has been to uninstall the update, a time-consuming process that overstretched IT personnel don’t have time for.  How great it would be if there were a way to simply roll back to the prior state up the update by implementing a single policy.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Known Issue Rollback (KIR)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft released Known Issue Rollback (KIR) beginning with Windows 10, version 2004.  Its purpose is to improve support for non-security bug fixes and make life a little easier for internal IT by rolling back the undesired changes of an update.  KIR starts at the code level as every non-security bug fix retains the old code while adding the fix on top of that.  Fixes are enabled by default, thus disabling the old code.  A KIR policy, however, can disable the fix however and revert the OS back to the old code-path, problem averted. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now, when Microsoft determines that a non-security update has an issue, it generates a KIR to roll it back.  Microsoft’s goal is to deploy a KIR within 24 hours of identifying the root cause of a reported problem so that most users are never exposed to the bug.  For non-enterprise users, the process is completely automated, requiring them to do nothing.  In many cases the KIR will be implemented prior to the download being installed.  End users that have installed the update will be prompted to reboot their machines.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;KIR and the Enterprise&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The process is a little more involved for enterprise customers.  In this case, Microsoft releases a policy definition MSI file that admin teams can deploy using Group Policy (an Intune solution reportedly on its way).  These KIR policy definitions have a limited lifespan of only a few months as the aim for Microsoft is to quickly address the issue through a new update.  KIRs are announced by Microsoft through Windows Update KB articles and listed on the Known Issues list located on the &lt;/span&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/windows/release-health/&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;Windows Health Release Dashboard&lt;/a&gt; where you can find a link to download the MSI.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Creating a KIR Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Once downloaded, simply run the MSI which will install the ADMX/ADM template files into the local store at C:\Windows\PolicyDefinitions as is shown in the screenshot below:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f620814cc7da23-KIR1.png&quot; style=&quot;width: 550px; height: 329px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;You can use the Local Group Policy editor to create a KIR policy for the local machine.  To deploy the policy to multiple machines across your domain, you will need to copy the files to your central store located in your SYSVOL folder.  Be sure to include the ADML template file located in the EN-US folder.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In this example I am using a KIR that was released last year for Windows 10 version 2004.  I first made a GPO using the Group Policy Management Console and named it KIR Issue 001.  Then go to &lt;/span&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Computer Configuration&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt; &gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;strong style=&quot;box-sizing:inherit; outline-color:inherit; font-variant-ligatures:normal; font-variant-caps:normal; orphans:2; widows:2; -webkit-text-stroke-width:0px; text-decoration-thickness:initial; text-decoration-style:initial; text-decoration-color:initial; word-spacing:0px&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Administrative Templates&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;b&gt; &lt;/b&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&gt; and select the KB rollback issue listed as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f620815027ba8e-KIR2.png&quot; style=&quot;width: 650px; height: 131px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Then open the policy setting and choose Disabled. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f6208157f2c9f4-KIR3.png&quot; style=&quot;width: 550px; height: 511px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;You can create a WMI filter to specifically target machines running the designated Windows version. This is done in the Group Policy Management Console by right-clicking WMI Filters and selecting New.  Name the filter something like “Apply to all Windows 10, version 2004 devices.”   Then insert the following string:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-left:48px; text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;SELECT version, producttype from Win32_OperatingSystem WHERE Version = &quot;10.0.19041&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;The screenshot below shows the newly created WMI.  You can find out the build number of your Windows version &lt;a href=&quot;https://docs.microsoft.com/en-us/windows/release-health/release-information&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f620815b0bb3ec-KIR4.png&quot; style=&quot;width: 650px; height: 288px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Now go back and highlight the GPO you just created and look for the WMI Filtering section at the bottom where you will select the appropriate filter.  You can also use a third-party solution such as PolicyPak to for granular filtering as well.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Conclusion&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;KIR is a recent Windows servicing technology that can help you escape from the nightmare of a Windows update bug-fix gone bad.  This is also a good example of why you should manage your Windows updates using Windows Update for Business that gives you greater management control over when and how updates are implemented throughout your enterprise.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Everything you Want to Know about Managing Windows Updates (Part 3) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/everything-you-want-to-know-about-managing-windows-updates-part-3</link>
        <pubDate>2022-02-14T14:18:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In my last blog segment, I used MEM to configure some policies related to Windows updates.&amp;nbsp; Let&amp;rsquo;s now see what happens behind the scenes because there is an awful lot that goes on each time a policy assigned device goes seeking updates.

In this instance, I have a policy Feature Update Deployment policy assigned to a desktop PC that currently hosts Windows 10 21H1.&amp;nbsp; Since 21H1 was released back in April of 2021, it obviously needs updating. &amp;nbsp;Let&amp;rsquo;s say I have been wor ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In my last blog segment, I used MEM to configure some policies related to Windows updates.  Let’s now see what happens behind the scenes because there is an awful lot that goes on each time a policy assigned device goes seeking updates.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In this instance, I have a policy Feature Update Deployment policy assigned to a desktop PC that currently hosts Windows 10 21H1.  Since 21H1 was released back in April of 2021, it obviously needs updating.  Let’s say I have been working remotely from home for a using my laptop and haven’t been to the office in months.   In the &lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#020202&quot;&gt;&lt;span style=&quot;letter-spacing:.1pt&quot;&gt;feature update policy, I created I chose to deploy Windows 11.  I also chose a specific time frame that it would be made available as I want to give our IT team additional time to test for Windows 11 compatibility issues concerning our application portfolio.  In this case I chose February 21, 2022, as the earliest available date.  The PC is also assigned to a business update ring that has a quality update deferral period of 7 days.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#020202&quot;&gt;&lt;span style=&quot;letter-spacing:.1pt&quot;&gt;On February 11, I return to the office for a department meeting and power up the desktop.  MEM has already contacted Windows Update and provided the PCs ID and the targeted feature update to be deployed.  MEM also will deliver any new policies that have been assigned to the PC since the last time it was online.  In this case it includes the Business Update for Ring policy settings.  Next the PC will contact the cloud to seek possible updates.  In doing so, the PC informs Windows Update of any assigned deferral periods, its current OS version, and its revision status.  This entire process is outlined in the diagram below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#020202&quot;&gt;&lt;span style=&quot;letter-spacing:.1pt&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61f592b415906-updatep3.png&quot; style=&quot;width: 650px; height: 448px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#020202&quot;&gt;&lt;span style=&quot;letter-spacing:.1pt&quot;&gt;Let’s see what happens first regarding feature updates.  There are two feature updates available on February 11 for the PC - Windows 10 21H2 and Windows 11.  Because the targeted feature update policy dictates Windows 11, 21H2 is out of the picture.  Windows 11 would be made available if it wasn’t for the deployment period I specified which starts on February 21.  That means no feature updates for our desktop PC today.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#020202&quot;&gt;&lt;span style=&quot;letter-spacing:.1pt&quot;&gt;Now let’s look at Quality updates.  Since my computer hasn’t been powered up in quite a while, its missing a lot of quality updates so it’s revision status is quite outdated.  Fortunately, quality updates are cumulative, so I don’t have to download the updates released every single month since it was last powered on.  Quality updates are released on the 2&lt;sup&gt;nd&lt;/sup&gt; Tuesday of each month.  This means the most recent release date was February 8.  Because I have a deferral period of 7 days, February updates will have to wait a few more days before they are made available.  As a result, the January Quality updates will be applied to my desktop.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#020202&quot;&gt;&lt;span style=&quot;letter-spacing:.1pt&quot;&gt;I then spend the next few days using my laptop at home and return to the office on February 16.  Once again, my desktop PC checks in for Windows updates and because the deferral period is now over, February quality updates are now downloaded and installed.  Windows 11, however, will remain elusive until the 21&lt;sup&gt;st&lt;/sup&gt;.  On February 23&lt;sup&gt;rd&lt;/sup&gt;, I return to the office and Windows 11 is now available.  For the update to be issued, Windows Update must first determine if it is compatible or not.  This is performed automatically using Windows Update for Business.  If you have Update Compliance configured in Azure along with a Log Analytics Workspace, you can verify the compliance status of any listed device.  While the PC itself may exceed the compliancy requirements of Windows 11, the update can still be deferred due to a safeguard hold assigned by Microsoft.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Safeguard holds prevent devices with a known compatibility issue from receiving a new feature update.  For instance, an installed application on the device may have compatibility issues with Windows 11.  You can read more about safeguards &lt;a href=&quot;https://www.mdmandgpanswers.com/blogs/view-blog/gp-and-mdm-safeguard-holds&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;here in one of my other blogs&lt;/a&gt;.  In this instance, there is a safeguard hold assigned to my desktop so until a fix is released for that issue it will have to wait on Windows 11 for a while.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;More to it than Meets the Eye&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#020202&quot;&gt;&lt;span style=&quot;letter-spacing:.1pt&quot;&gt;As you can see, there are a lot of moving parts when it comes to Windows Updates for Business.  In our remaining segment, we will wrap up our discussion by looking talking about compliance deadlines, automatic restarts, and touch on Group Policy one last time.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Everything you ever Wanted to Know about Managing Windows Updates (Part 2) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/everything-you-ever-wanted-to-know-about-managing-windows-updates-part-2</link>
        <pubDate>2022-01-17T19:23:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Think of WSUS as version 1.0 for managing Windows updates.&amp;nbsp; Windows Update for Business can be considered version 2.0 as it is the next evolutionary step for managing updates for Windows 10 and Windows 11.&amp;nbsp; Unlike WSUS, clients connect directly with Microsoft Endpoint so there is no intermediary server involved. &amp;nbsp;All you need is a management tool such as Group Policy Management Console, an MDM tool such as Microsoft Endpoint Manager or a third-party management tool.&amp;nbsp; The mana ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Think of WSUS as version 1.0 for managing Windows updates.  Windows Update for Business can be considered version 2.0 as it is the next evolutionary step for managing updates for Windows 10 and Windows 11.  Unlike WSUS, clients connect directly with Microsoft Endpoint so there is no intermediary server involved.  All you need is a management tool such as Group Policy Management Console, an MDM tool such as Microsoft Endpoint Manager or a third-party management tool.  The management tool is where you create the update policies and assign them to designated device groups.  Once the clients receive the policy, they contact Microsoft endpoint which sends them one or more updates depending on the client’s provided inputs.  If you have the Windows Update for Business Deployment service installed, the manager can talk directly with Microsoft Endpoint as well.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61e6065282641-Updates1.png&quot; style=&quot;width: 596px; height: 398px;&quot; /&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Deferring and Pausing Updates&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;One of the enhanced features that Windows Update for Business provides is the ability to defer the installation of both feature and quality updates for a specified number of days.  The deferment period depends on the type of update as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Update Category                             Maximum deferral period&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Feature updates                                             365 days&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Quality updates                                                30 days&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Non-deferrable&lt;/span&gt;&lt;/span&gt;                                                   0 days&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;You can also choose to pause quality or feature updates all together.  This is similar to deferring an update except you specify an exact date.   Beginning on that date, updates are paused for 35 days.  This is useful if you discover that one of the recent updates is causing problems and you want to buy some time to conduct further testing.   You can configure the required settings to defer or pause an update using Group Policy.  Create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; Windows Components &gt; Windows Update &gt; Windows Update for Business where you will see several policy options.  In the screenshot below, we have configured a deferment period of 15 days as well as a specific date to start pausing Quality updates.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61e6066953d58-Updates2.png&quot; style=&quot;width: 450px; height: 420px;&quot; /&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Windows Update Rings&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Windows Update for Business also gives you the ability to create update rings to fine tune the deployment of quality and feature updates.  Rings specify how and when quality and Windows 10 and Windows 11 feature updates are applied.  For instance, let’s say you want to deploy the Windows 11 feature update.  For a large corporation you certainly wouldn’t want to install it on everyone’s computer at once right out of the gate.  You would probably want your IT personnel group to receive the update first to allow them to test it out first.  That would mean creating a fast update ring and assigning it to them.  You would next want to update devices for power users such as software developers, graphical artists, etc.  You would create a slower ring and, and so on.  Below is an example of a 3-ring architecture.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61e606832226b-Updates3.png&quot; style=&quot;width: 550px; height: 292px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;You can create these rings using the Group Policy Management Console.  Create a GPO and go to &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#171717&quot;&gt;Computer configuration &gt; Administrative Templates &gt; Windows Components &gt; Windows Update &gt; Windows Update for Business &gt; &lt;/span&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Select “When Preview Builds and feature updates are Received.”  Enable the policy and select the ring of your choice as is shown in the screenshot below.  Then assign a deferral period for that ring.  In the example below we have chosen a 2-day deferral period for the Fast Ring.  We would then choose a longer period of perhaps 45-days for the slow ring.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61e60638ec6ff-Updates42.png&quot; style=&quot;width: 550px; height: 356px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;To create rings for Quality Updates you would create a policy and go to &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#171717&quot;&gt;Computer configuration &gt; Administrative Templates &gt; Windows Components &gt; Windows Update &gt; Windows Update for Business &gt; &lt;/span&gt;&lt;strong&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Select when Quality Updates are Received.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Using MEM to Manage Windows Updates for Business&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;You can also use Microsoft Endpoint Manager to manage Windows Updates for Business.  If you open  MEM and go to Devices you will see 3 options.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61e606ac35954-Updates_5.png&quot; style=&quot;width: 312px; height: 185px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;A small enterprise may not feel the need to utilize multiple update rings.  If you want to simply deploy Windows 11 at large, click “Feature updates for Windows 10 and later” and select Windows 11 as the feature update.  You can then choose between pushing the update as soon as possible, making it available on a specific date or gradually dispersing the update across your enterprise.  In the example below I chose the third option and set a start and finish time for the deployment. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61e6078e90369-Updates6.png&quot; style=&quot;width: 650px; height: 431px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;If you want to use update rings, the process is similar.  Create a ring with your desired settings and assign it to a designated group.  Note below the addition of an uninstall period that you can assign.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61e607c8deb42-Updates7.png&quot; style=&quot;width: 650px; height: 399px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;You can also configure User Experience settings for each ring.  User experience settings give your users the ability to defer updates on their own when necessary.  This would be important for a sales executive that is attending a sales conference for instance and needs the full use of their computer for an extended time.  For instance, you can configure a grace period that specifies the number of days until a device is forced to restart.  This would be useful for users returning to the office from extended leave or a long holiday period.  You should first configure the active hours so that update-initiated reboots do not occur during this critical time window.  You can then configure deadlines.  In the screenshot below, users could defer feature updates on their own for 7 days, at which point the update would forcibly install.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61e60850f1a6c-updates8.png&quot; style=&quot;width: 650px; height: 414px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Service Channels&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Finally, there is something called Service Channels.  Service channels define when features updates will be available.  For instance, someone that is a member of the Windows Insider Program probably wants to receive feature updates in advance to preview them.  Internal IT needs access to new feature updates ASAP to validate them for their desktop environments.  These four channels are as follows:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;General Availability Channel – This is the default channel&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Windows Insider Dev&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Windows Insider Beta&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Windows Insider Release Preview&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;You can create policies using Group Policy or MDM to create policies that assign these channels.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;text-align:justify; margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;Putting it all Together&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Windows Update for Business obviously has a lot more moving parts than the media or WSUS methods.  Things can get complex quickly.  In part 3 of our ongoing series, we will look at an environment involving multiple Windows feature versions and deferral settings to see how the underlying processes occur to ensure that each device receives the updates it needs.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Everything you Want to Know about Managing Windows Updates (Part 1) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/everything-you-want-to-know-about-managing-windows-updates-part-1</link>
        <pubDate>2021-12-28T12:50:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Managing Windows updates is one of the most important functions for Windows admins today.&amp;nbsp; The methodologies available to manage and deliver updates to Windows servers, desktops and laptops has changed a lot over the years.&amp;nbsp; In this 4-part series, we will outline the different management options that are available today and break down how Windows Update Manager works and why it should be the preferred management alternative for today&amp;rsquo;s enterprises.&amp;nbsp; Before we get started, de ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Managing Windows updates is one of the most important functions for Windows admins today.  The methodologies available to manage and deliver updates to Windows servers, desktops and laptops has changed a lot over the years.  In this 4-part series, we will outline the different management options that are available today and break down how Windows Update Manager works and why it should be the preferred management alternative for today’s enterprises.  Before we get started, define what we mean by Windows updates.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Types of Windows Updates&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;There are two broad categories of Windows updates.  The first is quality updates.  These are the updates that are mostly released on what we have come to traditionally know as ‘Patch Tuesday.’  Quality updates are referred to cumulative updates or maintenance updates.  Most quality updates are released to either address a security issue or fix a problem to improve the reliability and security of Windows.  These are known as mandatory updates.  Other quality updates may provide some preview enhancements of existing features.  A reboot may be required once all the newly downloaded quality updates are installed.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Then there are feature updates.  Feature updates are made available twice a year and are known as semi-annual releases.  You can think of a feature update as a new version of Windows.  Feature updates can be deferred for up to 365 days although each new version is only supported by Microsoft for a period of 18 months which is another benefit of updating.  Feature updates can introduce new features as well as visual changes to the operating systems.  The objective here is to constantly improve the Windows operating system.  A feature update may require a series of reboots to complete the update process.   &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Now let’s look at the three primary ways of managing Windows updates.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Media &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;This is the most basic way of all to manage Windows updates.  Here the computer contacts Microsoft Endpoint directly to learn of any available updates.  The local admin of the computer can then choose to either download and install those updates at a designated time or defer them to the automated process.  This one-to-one relationship is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61d5da0dada66-WSUS1.png&quot; style=&quot;width: 275px; height: 475px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Obviously, this method is not suitable for enterprise environments as there is no way to centrally manage the updates of multiple machines.  It is designed for personal users or very small SOHO environments. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
 &lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Windows Server Update Services&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Windows Server Update Services (WSUS) has been around for a long time and used to be the primary way that admins managed Windows updates for enterprise environments.  WSUS was designed back in the days of a totally on-prem world.  Think of the WSUS server as a repository for Windows updates.  Rather than each Windows machine directly contacting Microsoft for updates and using a lot of precious bandwidth in the process, the WSUS server downloads all updates and retains them on local storage.  Besides the WSUS server itself, WSUS also requires a manager which can be one of the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;The WSUS Stand-alone console&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;MEM CONFIG Manager&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;A third-party management tool&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Regardless of which management tool you choose, you must create policies to govern the Windows update process.  The policy must identify the WSUS server and outline when updates will occur.  These policies can be assigned to either device groups or the devices themselves.  The admin then approves which updates they want to distribute.  The manager then then informs the WSUS server of the newly approved list.  When prompted by their assigned policies, Windows devices then scan their updates against the WSUS server itself.  The WSUS server then offers each device any approved updates that it is missing.  This process is outlined below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f61d5da40d3d73-WSUS2.png&quot; style=&quot;width: 450px; height: 507px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;WSUS was an ideal solution for managing Windows updates for enterprise environments at one time.  There are two primary limitations of WSUS currently.  The first is the fact that Microsoft has not provided any enhancements to WSUS in years, and it will eventually be deprecated.  The bigger factor however is that the world has changed in recent years.  WSUS cannot adequately service hybrid work models and remote work strategies as all Windows desktops must be connected in some way to the local network.  For this and other reasons, Windows Update for Business is a better choice in many cases.  In our next blog segment, we will look at the architecture of Windows Update for Business and how to implement it. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> New Microsoft v95 Security Baseline for Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/new-microsoft-v95-security-baseline-for-group-policy</link>
        <pubDate>2021-11-10T14:39:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft recently released the Chromium-based&amp;nbsp;Microsoft Edge 95&amp;nbsp;version to Stable channel for Windows and Mac, which coincides with a new security baseline for it as well.&amp;nbsp; Some of the new features of the new Edge version include the following:

&amp;nbsp;


	A new efficiency mode that becomes active when a laptop enters battery saver mode so that the two work in tandem to extend the battery life of the machine.
	The ability to pick up where you left off on PDF documents and re ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Microsoft recently released the Chromium-based Microsoft Edge 95 version to Stable channel for Windows and Mac, which coincides with a new security baseline for it as well.  Some of the new features of the new Edge version include the following:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;A new efficiency mode that becomes active when a laptop enters battery saver mode so that the two work in tandem to extend the battery life of the machine.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;The ability to pick up where you left off on PDF documents and resume your review of the documents.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;The ability to update your passwords with fewer clicks as the browser will navigate a user to the Change Password page for a given website assuming that the website supports that feature.  The browser will also suggest a strong, unique new password.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:115%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Supports free form text boxes within PDF documents that allows users to use them to fill out a form.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Because the browser today is the most frequently used application, it is critically important to keep your security baselines up to date to ensure you are running best practice.  &lt;span style=&quot;background:white&quot;&gt;MDM administrators that utilize Microsoft Endpoint Management (Intune) are familiar with the concept of Security Baselines.  A security baseline is a collection of Microsoft recommended configuration settings that help secure and protect enterprise users and devices.  Security baselines are an easy and effective way for admins to ensure that they are consistently enforcing a minimum-security level that will address fundamental security and compliance issues.  The Security Baselines for Group Policy are designed around the same principle as the MEM Security Baselines.  &lt;/span&gt;You can download the &lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=55319&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;&lt;span style=&quot;color:#056bd0&quot;&gt;new security baseline package here&lt;/span&gt;&lt;/a&gt; by selecting the &lt;span style=&quot;background:white&quot;&gt;Microsoft Edge v95 Security Baseline.zip file&lt;/span&gt;.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:13pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#2f5496&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;The Benefits of Using Security Baselines&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p style=&quot;text-align:start; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;font-variant-ligatures:normal&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;While it is perfectly ok to configure your own MDM profile or GPO to select and configure available settings, baselines are a quick and easy way to enforce a default baseline that prevents users from making changes that will result in an insecure state.  There are several benefits of using security baselines offered by Microsoft.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;They are already configured by Microsoft security experts&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;They enforce settings that mitigates contemporary security threats.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Baseline settings have been pretested to ensure that they do not cause operational issues that are worse than the risks they mitigate&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;tab-stops:list .5in&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;outline:none !important&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;They ensure that users and device configuration settings are compliant with the baseline&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Installing the Microsoft Edge v93 Security Baseline&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Once downloaded, you will see that the package contains multiple folder directories as is shown below.  Note that unlike other packages, this one doesn’t include a Template folder as this package does not include the ADMX/ADM template files.  You can download the template files &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://www.microsoft.com/en-us/edge/business/download&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;directly from the Microsoft website&lt;/span&gt;&lt;/a&gt; &lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;for any of the current Edge versions.  You must have the required template files in your central store for the package to work.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;box-sizing:border-box&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f618c1ea1b6d49-951.png&quot; style=&quot;width: 550px; height: 164px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The next step is to import the new security baselines.  You can import these policies either locally or into AD using the enclosed scripts.  I am choosing to import them into my AD environment using the appropriate scripts as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f618c1ec649c3e-952.png&quot; style=&quot;width: 550px; height: 195px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Then choose the location where you want to link the new policy and browse for the new MSFT Edge 95 – Computer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f618c1f578d396-957.png&quot; style=&quot;width: 450px; height: 442px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In my case, I chose the East Sales OU to link it.  Note that this is a computer side GPO, so it needs to be linked to an OU that contains computer objects.  The screenshot shows the enclosed settings below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f618c1f838a030-954.png&quot; style=&quot;width: 700px; height: 310px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There are two new security baseline settings.  The first is “Enable browser legacy extension point blocking” which blocks code injection from third party applications on the new Edge browser.  The setting is enabled by default as is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f618c1fbdda28d-956.png&quot; style=&quot;width: 700px; height: 173px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The other new enforced setting is “Specifies whether the display-capture permissions-policy is checked or skipped.  &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#333333&quot;&gt;It allows web applications using the getDisplayMedia() API to bypass a permission policy check required by the API specification&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; This setting is only temporary and will be &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#333333&quot;&gt;deprecated&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; after Microsoft Edge 100.  It is intended to block Enterprise users whose application is non-spec compliant.  The setting is enabled by default as is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f618c1fec484f6-956.png&quot; style=&quot;width: 700px; height: 173px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;All in all there were 1 new computer settings and 1 new user settings for Microsoft Edge version 95 with 3 settings being removed.  You can learn more about these settings &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:10.5pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span lato=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies&quot; style=&quot;color:#0563c1; text-decoration:underline&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color:#146cac&quot;&gt;here&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Use Security Baseline Releases for Windows 11-2 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-use-security-baseline-releases-for-windows-112</link>
        <pubDate>2021-11-05T13:28:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft has a new operating system, which means we need a new security baseline.&amp;nbsp; Microsoft released the new package on October 5 which features two new settings and some recommended setting changes.&amp;nbsp; The Security Baselines for Group Policy are designed around the same principle as the MEM Security Baselines. &amp;nbsp;They provide an easy and effective way for admins to ensure that they are consistently enforcing a minimum-security level that addresses fundamental security and complianc ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft has a new operating system, which means we need a new security baseline.  Microsoft released the new package on October 5 which features two new settings and some recommended setting changes.  &lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The Security Baselines for Group Policy are designed around the same principle as the MEM Security Baselines.  They provide an easy and effective way for admins to ensure that they are consistently enforcing a minimum-security level that addresses fundamental security and compliance issues.  The baseline settings are preconfigured by Microsoft security specialists and have been tested for proven compatibility.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Installing the Windows 11 Security Baselines&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Once you download the package you will see that it contains &lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;multiple folder directories as is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f617add02ef383-111.png&quot; style=&quot;width: 550px; height: 173px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;If you don’t have the Windows 11 ADMX/ADML templates, you can copy them from the Template folder and paste them into your central store.  The templates are shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f617add4ad9b77-112.png&quot; style=&quot;width: 550px; height: 147px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The real purpose of the package is to import the new security baselines.  You can import these policies either locally or into AD using the enclosed scripts.  I am choosing to import them into my AD environment using the appropriate scripts as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f617add6b826d4-113.png&quot; style=&quot;width: 550px; height: 204px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Domain Security GPO&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Let’s look at some of the settings included in the package.  The package includes a GPO called MSFT Windows 11 – Domain Security.  A big change here is the recommended password length.  While a 14-character password has been supported on multiple Windows 10 versions, Security Baselines have continued to enforce an 8-character password length only, which remains a standard in the industry.  The Windows 11 baseline has now increased the minimum password length to 14-characters as shown in the screenshot below.  Advanced password breaking applications powered by readily available increased CPU power has made the 8-character passwords far too vulnerable as they can be potentially cracked in mere hours.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f617adc97266eb-116.png&quot; style=&quot;width: 700px; height: 286px;&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;It is highly recommended that you confirm that all your systems and applications are compatible with a password of this length before you enact this policy.  It’s a good idea to first Enable the &lt;/span&gt;&lt;/span&gt;‘MinimumPasswordLengthAudit&lt;span style=&quot;font-variant-ligatures:normal; -webkit-text-stroke-width:0px&quot;&gt;&lt;span style=&quot;font-variant-caps:normal&quot;&gt;&lt;span style=&quot;orphans:2&quot;&gt;&lt;span style=&quot;widows:2&quot;&gt;&lt;span style=&quot;text-decoration-thickness:initial&quot;&gt;&lt;span style=&quot;text-decoration-style:initial&quot;&gt;&lt;span style=&quot;text-decoration-color:initial&quot;&gt;&lt;span style=&quot;float:none&quot;&gt;&lt;span style=&quot;word-spacing:0px&quot;&gt;’ Group Policy setting&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; which is located at &lt;span style=&quot;color:#0d0d0d&quot;&gt;Computer Configuration &gt; Windows Settings &gt; Security Settings &gt; Account Policies -&gt; Password Policy -&gt; Minimum password length audit.  Enabling this setting will provide insights into the potential impact of increasing your password length.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Restrict Printer Driver Installations&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;In July of 2021, Microsoft released &lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;CVE-2021-34527 which patched a remote code execution vulnerability in the Windows Print Spooler service.  Essentially, it prevents non-admin users from installing a print driver, which caused a great deal of havoc early on as enterprises that freely allowed standard users to install print drivers were inundated with calls to the helpdesk.  I wrote a blog back in August called &lt;/span&gt;&lt;/span&gt;the &lt;a href=&quot;https://www.mdmandgpanswers.com/blogs/view-blog/the-ultimate-guide-to-printnightmare-and-overcoming-it&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;Utlimate Guide to PrintNightmare&lt;/a&gt; that lists the options you now have as a result of the update.  Note that Microsoft has added this setting to the Windows 11 Security Baseline as is shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f617adcc2e458c-117.png&quot; style=&quot;width: 650px; height: 401px;&quot; /&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Microsoft Legacy Edge is No More&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#1e1e1e&quot;&gt;As Microsoft Edge Legacy reached EOL earlier this year, it is not a part of Windows 11.  That means that all its supported settings have been removed from the baseline.  Only Chromium Edge is now supported. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;Script Scanning&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;According to Microsoft, script scanning was a parity gap between Group Policy and MDM.  As the gap has now been closed, Microsoft is enforcing the enablement of script scanning in this baseline.  Enabling script scanning means that scripts are scanned before being executed to determine their threat status.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;margin-top:20px; text-align:justify&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span new=&quot;&quot; roman=&quot;&quot; style=&quot;font-family:&quot; times=&quot;&quot;&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;One thing lacking in the Group Policy version of Windows 11 Baseline Security is the ability to enable &lt;span style=&quot;background:white&quot;&gt;Microsoft Defender for Endpoint&#039;s tamper protection feature which is available using Microsoft Endpoint Manager.  Microsoft does encourage you to enable it however using other means.  More information &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:11.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span calibri=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#070707&quot;&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection?view=o365-worldwide&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;margin-top:20px; text-align:justify&quot;&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> New Microsoft v93 Security Baselines for Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/new-microsoft-v93-security-baselines-for-group-policy</link>
        <pubDate>2021-10-28T12:46:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Last month, Microsoft released a security baseline for Microsoft Edge version 93.&amp;nbsp; While there isn&amp;rsquo;t a whole lot new here it&amp;rsquo;s important to keep your security baselines up to date in order to ensure you are running best practice.&amp;nbsp; You can download the latest security baseline packages here by selecting the Microsoft Edge v93 Security Baseline.zip file.&amp;nbsp; The Security Baselines for Group Policy are designed around the same principle as the MEM Security Baselines. &amp;nbsp;T ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;Last month, Microsoft released a security baseline for Microsoft Edge version 93.  While there isn’t a whole lot new here it’s important to keep your security baselines up to date in order to ensure you are running best practice.  You can &lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=55319&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;download the latest security baseline packages here&lt;/a&gt; by selecting the &lt;span style=&quot;font-size:10.0pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Microsoft Edge v93 Security Baseline.zip&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; file.  &lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;The Security Baselines for Group Policy are designed around the same principle as the MEM Security Baselines.  They provide an easy and effective way for admins to ensure that they are consistently enforcing a minimum-security level that addresses fundamental security and compliance issues.  &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The baseline settings are preconfigured by Microsoft security specialists and have been tested for compatibility.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3 style=&quot;margin-top:3px&quot;&gt;&lt;span style=&quot;font-size:12pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span calibri=&quot;&quot; light=&quot;&quot; style=&quot;font-family:&quot;&gt;&lt;span style=&quot;color:#1f3763&quot;&gt;&lt;span style=&quot;font-weight:normal&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;Installing the Microsoft Edge v93 Security Baseline&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Once downloaded, you will see that the package contains multiple folder directories as is shown below.  Note that unlike other packages, this one doesn’t include a Template folder as this package does not include the ADMX/ADM template files.  You can download the template files &lt;a href=&quot;https://www.microsoft.com/en-us/edge/business/download&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;directly from the Microsoft website&lt;/a&gt; for any of the current Edge versions.  You must have the required template files in your central store for the package to work.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f617ad348dc48d-edge1.png&quot; style=&quot;width: 550px; height: 178px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The next step is to import the new security baselines.  You can import these policies either locally or into AD using the enclosed scripts.  I am choosing to import them into my AD environment using the appropriate scripts as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f617ad375f37aa-edge2.png&quot; style=&quot;width: 550px; height: 173px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;In my case, I chose the East Sales OU, and I linked the MSFT Edge Version 93 – Computer GPO.  Note that this is a computer side GPO, so it needs to be linked to an OU that contains computer objects.  Now let’s look at the preconfigured settings below.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f617ad3b4b5dcc-edge3.png&quot; style=&quot;width: 650px; height: 273px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There is only one newly enforced setting and that is the disabling of 3DES which is outlined in the screenshot above.  In Microsoft Edge version 95, the 3DES encryption cipher is completely removed and will no longer function so this is way to prepare you for the inevitable deprecation of it. The upcoming baseline security release will have the 3DES setting completely removed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The other thing new is an addition by subtraction setting.  Since Adobe Flash support has now ended and been removed from Microsoft Edge completely, there is no need to enforce the &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/deployedge/microsoft-edge-policies#pluginsallowedforurls&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;setting&lt;/a&gt; that disabled Flash.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;All in all there were 31 new computer settings and 26 new user settings for Microsoft Edge version 93 which you &lt;a href=&quot;https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-update-policies&quot; style=&quot;color:#0563c1; text-decoration:underline&quot;&gt;learn more about here&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify; margin-bottom:11px&quot;&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Microsoft will offer New Extended Stable Release for Microsoft Edge </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/microsoft-will-offer-new-extended-stable-release-for-microsoft-edge</link>
        <pubDate>2021-09-28T08:38:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Believe it or not, the new Chromium-based Microsoft Edge browser has grown by 1,300 percent in the past year.&amp;nbsp; One of the contributing reasons to its popularity surge is the perpetual release of innovation that Microsoft unveils on a regular basis in the form of feature updates.&amp;nbsp; At the same time, Microsoft is aware that many enterprises want to have some degree of control over how often these new features are distributed to their users.&amp;nbsp; 


	Stable Channel
	Beta Channel
	Dev ]]>
        </description>
        <content:encoded>
            &lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Believe it or not, the new Chromium-based Microsoft Edge browser has &lt;a href=&quot;https://www.bleepingcomputer.com/news/microsoft/new-microsoft-edge-grew-1-300-percent-this-year-overtaking-firefox/&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;grown by 1,300 percent&lt;/a&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;in the past year.  One of the contributing reasons to its popularity surge is the perpetual release of innovation that Microsoft unveils on a regular basis in the form of feature updates.  At the same time, Microsoft is aware that many enterprises want to have some degree of control over how often these new features are distributed to their users.  &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Stable Channel&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Beta Channel&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Dev Channel&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Canary Channel&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;The Canary Channel puts you on the bleeding edge, providing you with the newest innovations as quickly as possible.  At the top of the chain is the Stable Channel which is best suited for production environment and intended for broad deployment throughout your organization.  Microsoft has traditionally released feature updates every 6 weeks for the Stable Channel and Beta Chanel.  Microsoft is making some changes however starting with Microsoft Edge 94., which is currently scheduled to be released for the Beta Channel beginning the first week of September.  Those using the Stable Channel will have to wait until the week of September 23.  You can see the complete &lt;a href=&quot;https://docs.microsoft.com/en-us/deployedge/microsoft-edge-release-schedule&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;Microsoft Edge release schedule here&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Starting with Microsoft Edge 94, Microsoft is switching to a 4-week release cycle.  Part of this is in reaction to Google’s announcement to do the same thing for Chrome version 96 in the fourth quarter of 2021.  Another reason though is to feed the insatiable appetite that users have for new innovative features.  This of course is what agile software development is all about.  Microsoft knows however that not every enterprise is ready to adapt to a shortened release window.  For organizations that want to move more cautiously, Microsoft will bring a new release channel called “Extended Stable” which will provide a longer 8-week release timeline.  Like the current channels, admins can opt-in to this channel using either Group Policy or Microsoft Endpoint Manager.  If you don’t create a policy for the new channel, Microsoft Edge will default to the 4-week release cycle.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Those who go with the 8-week Extended Stable release option will receive cumulative feature updates aligned with even-numbered releases.  Any feature updates of an odd-numbered release will be then delivered as part of the subsequent numbered release.  Microsoft will continue to provide Assisted Support for the three most recent Stable Channel releases that equates to approximately 12 weeks.  Assisted Support will be available for the two most recent Extended Stable channel releases which equates to 16 weeks.  For more information you can refer to the &lt;a href=&quot;https://docs.microsoft.com/en-us/deployedge/microsoft-edge-support-lifecycle&quot; style=&quot;color:blue; text-decoration:underline&quot;&gt;Microsoft Edge Lifecycle Policy&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p style=&quot;text-align:justify&quot;&gt;&lt;span style=&quot;font-size:11pt&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span style=&quot;line-height:normal&quot;&gt;&lt;span style=&quot;font-family:Calibri,sans-serif&quot;&gt;&lt;span style=&quot;background:white&quot;&gt;&lt;span segoe=&quot;&quot; style=&quot;font-family:&quot; ui=&quot;&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Keep in mind that security patches and fixes operate independently and will continue to be deployed as needed.  If you don’t use Windows Update for Business to manage updates, you can always download Microsoft Edge updates using Windows Services Update Server (WSUS).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The Ultimate Guide to PrintNightmare (and overcoming it) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-ultimate-guide-to-printnightmare-and-overcoming-it</link>
        <pubDate>2021-08-24T21:16:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Background and Timelines

Printing is something that most admins don&amp;rsquo;t want to think about. This tweet (which is a single picture) sums up most admins&amp;rsquo; perspective about printers:

https://twitter.com/nixcraft/status/1428786599479988227&amp;nbsp;

That being said, the original gory details of WHAT the vulnerability is, which include a privilege escalation and remote code execution can be found here: https://www.csoonline.com/article/3623760/printnightmare-vulnerability-explained-ex ]]>
        </description>
        <content:encoded>
            &lt;h2&gt;Background and Timelines&lt;/h2&gt;

&lt;p&gt;Printing is something that most admins don’t want to think about. This tweet (which is a single picture) sums up most admins’ perspective about printers:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://twitter.com/nixcraft/status/1428786599479988227&quot; target=&quot;_blank&quot;&gt;https://twitter.com/nixcraft/status/1428786599479988227&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;That being said, the original gory details of WHAT the vulnerability is, which include a privilege escalation and remote code execution can be found here: &lt;a href=&quot;https://www.csoonline.com/article/3623760/printnightmare-vulnerability-explained-exploits-patches-and-workarounds.html&quot; target=&quot;_blank&quot;&gt;https://www.csoonline.com/article/3623760/printnightmare-vulnerability-explained-exploits-patches-and-workarounds.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can be forgiven for not wanting to go too too deep here. But the gist is: If the bad guys convinced your users to click on a thing, that would automatically install an “evil driver” which would then give the bad guy full admin access. I’m summarizing a little bit, but that’s the gist.&lt;/p&gt;

&lt;p&gt;Essentially: you are / were open to attack and have to fix it. &lt;/p&gt;

&lt;p&gt;Okay. Got it. So what does fixing it look like? &lt;/p&gt;

&lt;p&gt;There’s three dates we have to take into consideration for the discussion:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;
	&lt;p&gt;Anything before July 6th.&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;Between July 6th and Aug 10.&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;Anything after Aug 10.&lt;/p&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let’s break down each date and method here.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Before July 6: How would you mitigate Printnightmare WITHOUT any patches&lt;/h2&gt;

&lt;p&gt;Microsoft’s recommendations which would at least “Shut the door” on possible attacks (BEFORE the July and Aug patches.)&lt;/p&gt;

&lt;p&gt;Tip: These are / were PREVIOUS recommendations (applicable if you don’t have patches everywhere:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;
	&lt;p&gt;Completely disable the Print Spooler Service:&lt;/p&gt;

	&lt;ol&gt;
		&lt;li&gt;
		&lt;p&gt;DCs because they’re important&lt;/p&gt;
		&lt;/li&gt;
		&lt;li&gt;
		&lt;p&gt;Everywhere else because they’re important too.&lt;/p&gt;
		&lt;/li&gt;
	&lt;/ol&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;Use the “Allow Print Spooler to accept client connections” and set to DISABLE. This will keep the the print spooler service running, but prevent REMOTE connections to the Print Spooler Service. And, moreover, it still works LOCALLY from the machine for local print jobs. It just prevents sharing printers for OTHER machines. This setting is actually a good mitigation on workstations, which in most cases do not need to share their printers with anyone else.  Note that after this setting is deployed it requires a reboot of the system or at least a restart of the spooler service.  (Thanks to Haemish Edgerton for the clarity adjustment here.)&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;You can use GPPrefs SERVICES or Powershell scripts or whatever to also do the same thing. &lt;/p&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Now the print spooler services are stopped dead. Printing has now stopped. &lt;/p&gt;

&lt;p&gt;Now what?&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Dateline: July 6th - The Patch Arrives&lt;/h2&gt;

&lt;p&gt;The July 6th patch seemed like it would get the problem solved. From the July patch notes: &lt;a href=&quot;https://support.microsoft.com/en-us/topic/kb5005010-restricting-installation-of-new-printer-drivers-after-applying-the-july-6-2021-updates-31b91c02-05bc-4ada-a7ea-183b129578a7&quot; target=&quot;_blank&quot;&gt;https://support.microsoft.com/en-us/topic/kb5005010-restricting-installation-of-new-printer-drivers-after-applying-the-july-6-2021-updates-31b91c02-05bc-4ada-a7ea-183b129578a7&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;After putting the July 6th patch everywhere, Microsoft ALSO suggested that you use “Point and print Restrictions” policy setting to force “Show warning and elevation prompt” as follows:&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh4.googleusercontent.com/7clpeaR2SX5IGJueYL3A44wcPO2grSTXJut5x1_YlT2JuCjNKAZ6eYwZD5mCTlwdQD-BHvr9c36iA5WPikV2ONgKdTb1hYb6f8-n8HoYyV4-kUl7la_4ntaYCCntR8M97QuWifKi=s0&quot;&gt;&lt;img src=&quot;https://lh4.googleusercontent.com/7clpeaR2SX5IGJueYL3A44wcPO2grSTXJut5x1_YlT2JuCjNKAZ6eYwZD5mCTlwdQD-BHvr9c36iA5WPikV2ONgKdTb1hYb6f8-n8HoYyV4-kUl7la_4ntaYCCntR8M97QuWifKi=s0&quot; style=&quot;height:943px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Result:&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;blockquote&gt;Setting the value to 0, or leaving the value undefined, allows non-administrators to install signed and unsigned drivers to a print server but does not override the Point and Print Group Policy settings. This is the default value. Consequently, the Point and Print Restrictions Group Policy setting can override this to allow non-administrators to be able to install signed and unsigned print drivers to a print server.&lt;/blockquote&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;But one day later, this was overcome with some example code. Here’s the original tweet and video: &lt;a href=&quot;https://twitter.com/gentilkiwi/status/1412771368534528001&quot; target=&quot;_blank&quot;&gt;https://twitter.com/gentilkiwi/status/1412771368534528001&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Ack ! Back to Printnightmare and re-shut down all print servers ! OMG.. run for the hills !&lt;/p&gt;

&lt;p&gt;Now the print spooler services are stopped dead. Printing has now stopped. &lt;/p&gt;

&lt;p&gt;Now what?&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Dateline: Aug 10 - Patch 2 is released (Aka Slam the door shut / no more non-admin access for Print Drivers.)&lt;/h2&gt;

&lt;p&gt;That’s it, no more Mr. Nice guy. Microsoft decides to go nuclear at this problem. They release another Patch for Aug 10.&lt;/p&gt;

&lt;p&gt;From: &lt;a href=&quot;https://support.microsoft.com/en-us/topic/august-10-2021-kb5005031-os-build-18363-1734-8af726da-a39b-417d-a5fb-670c42d69e78&quot; target=&quot;_blank&quot;&gt;https://support.microsoft.com/en-us/topic/august-10-2021-kb5005031-os-build-18363-1734-8af726da-a39b-417d-a5fb-670c42d69e78&lt;/a&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;blockquote&gt;Changes the default privilege requirement for installing drivers when using Point and Print. After installing this update, you must have administrative privileges to install drivers.&lt;/blockquote&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Net results: &lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;
	&lt;p&gt;You need to be a local admin to do anything Printer-y. Technically this was already true; as standard users could never install, say, local print drivers from some unusual source.&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;Users who are used to finding printers by the Click to Print method are simply blocked at showtime.&lt;/p&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Now, there’s a little SIDE NOTE here (Tip of the Hat to Hasain Alshakarti from TRUESEC security @Alshakarti). The door MAY NOT EVEN BE COMPLETELY SHUT. MS released &lt;a href=&quot;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36958&quot; target=&quot;_blank&quot;&gt;CVE-2021-36958&lt;/a&gt; Aug 11, 2021 that describes the LPE/RCE Windows Print Spooler Remote Code Execution Vulnerability.  Depending on the version of the driver the elevation prompt is not triggering as shown by Benjamin Delphi as seen here &lt;a href=&quot;https://twitter.com/gentilkiwi/status/1425154484167188480&quot; target=&quot;_blank&quot;&gt;https://twitter.com/gentilkiwi/status/1425154484167188480&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
Here’s what it looks like (in pictures, not a video) when a user attempts to click to print on a printer (where the drivers have never been installed).&lt;/p&gt;

&lt;p&gt;Step 1: Find the printer and get initial prompt&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh4.googleusercontent.com/mcsFJaS3O06MV_jkpR6ms9mf8j1Ixedr1bWTXE97ye09JsrMz_BCrMPvY9-AOL7RAsrsg9ndsCwTU_vekEyvdD75Nz1mf5Bm_TkM0_aTY7HBqV_t3DbCLFFTHAcUaGaPXo6nJIML=s0&quot;&gt;&lt;img src=&quot;https://lh4.googleusercontent.com/mcsFJaS3O06MV_jkpR6ms9mf8j1Ixedr1bWTXE97ye09JsrMz_BCrMPvY9-AOL7RAsrsg9ndsCwTU_vekEyvdD75Nz1mf5Bm_TkM0_aTY7HBqV_t3DbCLFFTHAcUaGaPXo6nJIML=s0&quot; style=&quot;height:519px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 2: Final prompt requiring local admin access to proceed&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh3.googleusercontent.com/UeGCQxhKbLxs46ZZiApF8G0hxLdLU3hKqOyWoAocwKFwe94vm_CJw49Yw2SjTZweTF5oJWt2uWMEyYKAxTQuO7-2Ix6IehI0DmbltqoAC0TUvtpyy_PiWTull0TaTGjBRo60LHgr=s0&quot;&gt;&lt;img src=&quot;https://lh3.googleusercontent.com/UeGCQxhKbLxs46ZZiApF8G0hxLdLU3hKqOyWoAocwKFwe94vm_CJw49Yw2SjTZweTF5oJWt2uWMEyYKAxTQuO7-2Ix6IehI0DmbltqoAC0TUvtpyy_PiWTull0TaTGjBRo60LHgr=s0&quot; style=&quot;height:843px; width:705px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So, the August 10th patch really did close the door for the good guys.&lt;/p&gt;

&lt;p&gt;Now what? How do we let them back in?&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Now that the door is shut, how do we open it for SOME people?&lt;/h2&gt;

&lt;p&gt;So first thing’s first. If the spooler is stopped by ANY of those original methods above, then, nothing else is ever going to work. You’ll have to back out any change which killed the printer spooler.  &lt;/p&gt;

&lt;p&gt;Then, after that I’ve rounded up a few POSSIBLE workarounds. Some anecdotally and others from Microsoft’s guidance here (&lt;a href=&quot;https://support.microsoft.com/en-gb/topic/kb5005652-manage-new-point-and-print-default-driver-installation-behavior-cve-2021-34481-873642bf-2634-49c5-a23b-6d8e9a302872&quot; target=&quot;_blank&quot;&gt;https://support.microsoft.com/en-gb/topic/kb5005652-manage-new-point-and-print-default-driver-installation-behavior-cve-2021-34481-873642bf-2634-49c5-a23b-6d8e9a302872&lt;/a&gt;) which we’ll review in a bit.&lt;/p&gt;

&lt;p&gt;Additionally, I want to show how there’s also a slew of other workarounds if you happen to be a PolicyPak Customer. I’ll field these at the end.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Tip 1: Just keep using Group Policy Preferences to deliver printers to those who need it. (Maybe. Will likely work.)&lt;/h2&gt;

&lt;p&gt;So this whole Printnightmare is basically trying to solve the problem of a user making a choice where to print (and that vector being insecure.) &lt;/p&gt;

&lt;p&gt;But there isn’t any problem with real admins making choices to deliver printers via Group Policy Preferences (even after the patches are in place.) That still works. Sure, I realize this is a little “Apples and Oranges.” Because GP Preferences is not “Click to Print”.&lt;/p&gt;

&lt;p&gt;But if you could use Group Policy Preferences to mass-deliver printers like this to your domain-joined machines, you could still be a-ok. Here’s an example.&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh3.googleusercontent.com/fyeBQIRJVHWO1rkKMp9DPPsjQk1-Z9iUo6JeyA7x3eU2LPVSmT4QMqe7YBIWRvicgIvLXE-Djrm-m4Ala7u3pyKN9b0WTNJIrI69lDWUZ9A5sR2Cw3dwY67uK1WdSKNTjBY72pyq=s0&quot;&gt;&lt;img src=&quot;https://lh3.googleusercontent.com/fyeBQIRJVHWO1rkKMp9DPPsjQk1-Z9iUo6JeyA7x3eU2LPVSmT4QMqe7YBIWRvicgIvLXE-Djrm-m4Ala7u3pyKN9b0WTNJIrI69lDWUZ9A5sR2Cw3dwY67uK1WdSKNTjBY72pyq=s0&quot; style=&quot;height:375px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note there still can be problems. If the server is 2016 (or OLDER, like 2012, 2012R2)... and the drivers are “v3” drivers, then… users are still prompted to re-install them as admins. Gah ! The workaround is to upgrade your server’s print drivers to v4 drivers if they are available (which, there may not be.) &lt;br /&gt;
&lt;br /&gt;
Tip: If you want to see what version of the drivers you&#039;re using, on a target machine run the Print Manager utility (again, this is on the endpoint where you already use the printers.) Then, see this column to determine driver type.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.policypak.com/wp-content/uploads/2021/09/image.png&quot; style=&quot;width: 950px; height: 257px;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The details are documented here by MVP Susan Bradley (@susanbradley): &lt;a href=&quot;https://www.computerworld.com/article/3630629/windows-print-nightmare-continues-enterprise.html&quot; target=&quot;_blank&quot;&gt;https://www.computerworld.com/article/3630629/windows-print-nightmare-continues-enterprise.html&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;I’ll update this space if there’s more on this story.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Tip 2 (which didn’t work for me): Use Point and Print Restrictions to specify the GOOD servers&lt;/h2&gt;

&lt;p&gt;I mention this tip, because it really looks like it SHOULD work, but just.. Doesn’t.  Read thru it anyway, because we’ll make some lemonade out of lemons here in a minute.&lt;/p&gt;

&lt;p&gt;Maybe this worked AFTER the July patch but stopped working AFTER the August patch but I didn’t expressly test that.&lt;/p&gt;

&lt;p&gt;The idea would be to simply specify the GOOD servers, so the user wouldn’t be able to print to any BAD servers. Example configuration below (again, doesn’t work) which would specify the servers, but then also NOT prompt for elevation.&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh4.googleusercontent.com/g84pf2_1Ga4BIsKIR-4bNkk0sbJOGLMTzqlO2dI9HVeW51VuoRO4z3_Ur4IgFGy0eiE1468sE0lnjZPyGOu0rn8CrBEnqUhq4NnP-vV2PAgdn9WIx4QStdLxEIegfjDNW5N215AA=s0&quot;&gt;&lt;img src=&quot;https://lh4.googleusercontent.com/g84pf2_1Ga4BIsKIR-4bNkk0sbJOGLMTzqlO2dI9HVeW51VuoRO4z3_Ur4IgFGy0eiE1468sE0lnjZPyGOu0rn8CrBEnqUhq4NnP-vV2PAgdn9WIx4QStdLxEIegfjDNW5N215AA=s0&quot; style=&quot;height:470px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Microsoft’s text says:&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;blockquote&gt;
&lt;ol&gt;
	&lt;li&gt;
	&lt;p&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Printers\PointAndPrint&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;NoWarningNoElevationOnInstall = 0 (DWORD) or not defined (default setting)&lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;UpdatePromptSettings = 0 (DWORD) or not defined (default setting)&lt;/p&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;NoWarningNoElevationOnInstall set to 1 makes your system vulnerable by design.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;The result on endpoints would be something like this..&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh3.googleusercontent.com/RZyEw7Pri_5Ln8eM_M7Oc2reeM1gLNqyZZv6tYRWArd7TAtWaJQm9FHowFVFjO02b79AxW0zTd-qeqSC8A0p7ub-kxaX7XGzmRXAfFWgDmFc3jBcsFhhyGR6OE5v7jl3kV_aOB8R=s0&quot;&gt;&lt;img src=&quot;https://lh3.googleusercontent.com/RZyEw7Pri_5Ln8eM_M7Oc2reeM1gLNqyZZv6tYRWArd7TAtWaJQm9FHowFVFjO02b79AxW0zTd-qeqSC8A0p7ub-kxaX7XGzmRXAfFWgDmFc3jBcsFhhyGR6OE5v7jl3kV_aOB8R=s0&quot; style=&quot;height:407px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Again: This proposed workaround did not work for me, your experience might be different.&lt;/p&gt;

&lt;p&gt;If I was asked how to solve this problem within Microsoft engineering, this is how I would have proposed to do it: Specify ONLY the good servers and make it so Standard Users couldn’t make changes from that list.&lt;/p&gt;

&lt;p&gt;Mayyyybe Microsoft will fix the problem (again) this way, but no signs yet.&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
 &lt;/p&gt;

&lt;h2&gt;Tip 2 (From Microsoft):  “Just screw it” and let Standard Users do whatever they want anyway (NOT RECOMMENDED)&lt;/h2&gt;

&lt;p&gt;So, of course it sounds like, and would be a terrible idea to just turn off the new August 10th protection, even after you’re patched. If you wanted to do that, the advantage of course is that Standard Users could click to print on whatever servers they wanted. Which of course, would also be bad if the bad guys used this against you.&lt;/p&gt;

&lt;p&gt;This tested out a-ok as you can see here.&lt;/p&gt;

&lt;p&gt;Again, not a great idea, but it does work, even if the August patch is on the machine.&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh3.googleusercontent.com/ngqMitxtrOdToUUcb7tLER_rrseI7QEYLOEAyNkk6nxcO_gMuxFQzTIFMSZXFJEBXHq8lZc1-9ElvgUjly_E1sK7qb7wHxevZrwupPqurCt7M5P4nY8HxkAGVyrAVpaMDc0bYdqR=s0&quot;&gt;&lt;img src=&quot;https://lh3.googleusercontent.com/ngqMitxtrOdToUUcb7tLER_rrseI7QEYLOEAyNkk6nxcO_gMuxFQzTIFMSZXFJEBXHq8lZc1-9ElvgUjly_E1sK7qb7wHxevZrwupPqurCt7M5P4nY8HxkAGVyrAVpaMDc0bYdqR=s0&quot; style=&quot;height:370px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt; &lt;/h2&gt;

&lt;h2&gt;Tip 3: Combine (non-working) Tip 2 and (working) Tip 3 to attempt to make something (reasonably) secure&lt;/h2&gt;

&lt;p&gt;So Tip 2 where we specified the GOOD server didn’t work. And Tip 3 where we specified that non-admins could overcome this driver thing… that worked.  &lt;/p&gt;

&lt;p&gt;I’m trying here to specify a SPECIFIC server that’s good, and therefore everything else is bad.&lt;/p&gt;

&lt;p&gt;I’m then using the special bypass registry key to let non-admins install the drivers.&lt;/p&gt;

&lt;p&gt;This should work, right ?&lt;/p&gt;

&lt;p&gt;Let’s break it down.&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh4.googleusercontent.com/Qle9zGpWkniUo-sEs0FNP2AGrahhdWclqG3wsHc_ydriE546JSkdpkvSxJ2nG_bU9Yu_c127mTm7ddOFkx3LMpWMLW1dddZY8PWae8O0aaXSODykN1VHYYsHzpHrBUNPuEW5aIhl=s0&quot;&gt;&lt;img src=&quot;https://lh4.googleusercontent.com/Qle9zGpWkniUo-sEs0FNP2AGrahhdWclqG3wsHc_ydriE546JSkdpkvSxJ2nG_bU9Yu_c127mTm7ddOFkx3LMpWMLW1dddZY8PWae8O0aaXSODykN1VHYYsHzpHrBUNPuEW5aIhl=s0&quot; style=&quot;height:702px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Well, this works when 100% by itself. If I attempt to connect to some rogue server, I do get blocked. Yay.&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh3.googleusercontent.com/_UxwDSs2LxQWjYu5DcOE4pFv35pakS9iTOujppDA9-Wl0p26wCQR1fltmpjrXbH6t7Ia1lj48KVPblTE6NBaEorU1Ui7dPTjfh5-SB4UAHj78JLfpk3fV1J3XEmKCAKgdooMFUh4=s0&quot;&gt;&lt;img src=&quot;https://lh3.googleusercontent.com/_UxwDSs2LxQWjYu5DcOE4pFv35pakS9iTOujppDA9-Wl0p26wCQR1fltmpjrXbH6t7Ia1lj48KVPblTE6NBaEorU1Ui7dPTjfh5-SB4UAHj78JLfpk3fV1J3XEmKCAKgdooMFUh4=s0&quot; style=&quot;height:673px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But then when I add the bypass registry item….  It doesn’t work.. YET !&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh5.googleusercontent.com/JiHzSd70AkK2FCxWIjxrQhK2r8SWNnHDzhVwt9cH8XE-_JEsO_rKifhAgnNnqt3xvkxIdemNScypyLOc1_SzcVYsfjnAf5WaDAIpIZvRIBF1TdL1n80kNk-tk4puZLEPtlat3y9C=s0&quot;&gt;&lt;img src=&quot;https://lh5.googleusercontent.com/JiHzSd70AkK2FCxWIjxrQhK2r8SWNnHDzhVwt9cH8XE-_JEsO_rKifhAgnNnqt3xvkxIdemNScypyLOc1_SzcVYsfjnAf5WaDAIpIZvRIBF1TdL1n80kNk-tk4puZLEPtlat3y9C=s0&quot; style=&quot;height:661px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So far, this is equally bad as just letting non-admins install their own drivers.&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh6.googleusercontent.com/SzOZTrdhiOV-d12QehbW-Ok2BWeO_RqtlOgZKEcoZMBwQBJJi7d8kIaeoQE9mBljaSJhLGIxDG0JvUSL_qewVLoz4A_oM7aYs9LTrJctWS44tBWJRvPkFocHUrb0zJMrXUgr20w8=s0&quot;&gt;&lt;img src=&quot;https://lh6.googleusercontent.com/SzOZTrdhiOV-d12QehbW-Ok2BWeO_RqtlOgZKEcoZMBwQBJJi7d8kIaeoQE9mBljaSJhLGIxDG0JvUSL_qewVLoz4A_oM7aYs9LTrJctWS44tBWJRvPkFocHUrb0zJMrXUgr20w8=s0&quot; style=&quot;height:435px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The secret to making this work is a SECOND setting, which expresses where the “Package Point and print - Approved servers” are.&lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh3.googleusercontent.com/Zqq4DTE_hMbByTa2Whq2ZR5SnlOo2zzs2oBD83mKnRTYefMNiywgV8UfqmVt6p4-VijaySqCI_EZh6aqAuA-vUHU6Z60Omt1iY9KbCwAhYf7oOm7B_noRhX9NTaeMB2uW21yadyT=s0&quot;&gt;&lt;img src=&quot;https://lh3.googleusercontent.com/Zqq4DTE_hMbByTa2Whq2ZR5SnlOo2zzs2oBD83mKnRTYefMNiywgV8UfqmVt6p4-VijaySqCI_EZh6aqAuA-vUHU6Z60Omt1iY9KbCwAhYf7oOm7B_noRhX9NTaeMB2uW21yadyT=s0&quot; style=&quot;height:489px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then, I get the basic / final / good result I want:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;
	&lt;p&gt;Non-Admins can point to good “specified” servers &lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;Non-Admins cannot point to rogue servers&lt;/p&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even though I showed how to do this, Microsoft does go out of their way to say : “Important There is no combination of mitigations that is equivalent to setting RestrictDriverInstallationToAdministrators to 1.”&lt;/p&gt;

&lt;p&gt;I don’t know exactly what the differences are between the super secure admin only method and the “open the doggie door to the right people” method I just stepped though, and maybe Microsoft doesn’t want us to know. :-) &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Okay: Really, what are some OTHER SECURE workarounds?&lt;/h2&gt;

&lt;p&gt;First of all the method I showed above is only “OK” because Microsoft stated that you aren’t really in a totally secure state. The second problem with the method I showed is that you have to keep on top of your print servers all the time and update the TWO policy settings to accommodate. Maybe this is fine in a small or static environment. Or maybe this could get out of hand quickly.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Solid Workaround 1: Using PolicyPak Least Privilege Manager + Printer Helper Tool&lt;/h2&gt;

&lt;p&gt;I’m going to jump RIGHT TO THE END, and tell you what I think is the ideal solution problem, and, sorry to say, this is not a free solution. And, I’m the founder and CTO of the solution, so, maybe I’m a little biased.&lt;/p&gt;

&lt;p&gt;But in short, here’s a video where you can use PolicyPak Least Privilege Manager to elevate the installation of printers on any server, while the person is a standard user. &lt;/p&gt;

&lt;p&gt;[youtube_player yt_code=&quot;AM5fPLQch4U&quot; kb_url=&quot;https://kb.policypak.com/kb/article/1160&quot;]&lt;/p&gt;
&lt;!--- p&gt;[youtube_player yt_code=&quot;AM5fPLQch4U&quot; kb_url=&quot;https://kb.policypak.com/kb/article/1160&quot;]&lt;/p ---&gt;

&lt;p&gt;&lt;a href=&quot;https://kb.policypak.com/kb/article/1160&quot; target=&quot;_blank&quot;&gt;Overcome Print Nightmare Standard User UAC Prompts&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Why is this the best method? &lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;
	&lt;p&gt;First, you don’t have to enable this for all users; just the users who need to do this from time to time. &lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;Second, you don’t need to really be opening up admin rights everywhere; it’s just for this key case. &lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;Third, it quacks like the native tool, but does require one click to get it started, instead of “Print to click.” &lt;/p&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;p&gt;And lastly, this technique also works for installing LOCAL printers, which might also come in handy.&lt;/p&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This also dovetails nicely into the whole “Zero Trust” model. Let only the users who need this technique get this technique. Remove local admin rights and reduce your attack surface.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Solid Workaround 2: Pre-install the drivers to the machine (somehow)&lt;/h2&gt;

&lt;p&gt;If you are able to magically pre-install the drivers into the machine’s local cache then you get a hall pass here.&lt;/p&gt;

&lt;p&gt;You can do this in your image, or, if you already have 10,000 machines out there, you can script your way to glory.&lt;/p&gt;

&lt;p&gt;Tip of the hat to my friends at PDQ for the inspiration for this tip. You can find their lashup here: &lt;a href=&quot;https://www.pdq.com/blog/using-powershell-to-install-printers/&quot; target=&quot;_blank&quot;&gt;https://www.pdq.com/blog/using-powershell-to-install-printers/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The idea I tested manually, worked awesome, as you can see here. The gist is to use PNPUtil to get the drivers pre-installed as an admin. Then the user can click on the network printer and they’re done. No prompts. It just works.&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;a class=&quot;zoom-enable&quot; href=&quot;https://lh6.googleusercontent.com/2emjMMDdF0mCfcBavMEeTyI20Ka5LPnh4lQ5alGWQUHDfU7NnYP-5EXh6CsFrWpM6AFTgHUs0C-vS7FDSc-xpJq92MyoK6D6Dd7keMmQC4L14BJNgwY_9CF0dMG4ksAmGsdvkF3V=s0&quot;&gt;&lt;img src=&quot;https://lh6.googleusercontent.com/2emjMMDdF0mCfcBavMEeTyI20Ka5LPnh4lQ5alGWQUHDfU7NnYP-5EXh6CsFrWpM6AFTgHUs0C-vS7FDSc-xpJq92MyoK6D6Dd7keMmQC4L14BJNgwY_9CF0dMG4ksAmGsdvkF3V=s0&quot; style=&quot;height:648px; width:950px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There’s another method that I found, which involves getting a machine prepped with all your drivers and backing up the driver store and preparing them as a “package.”  Printbrm.exe and PrintbrmUI.exe are the in-box utilities which do this. A good write up if you want to do this is here (&lt;a href=&quot;https://lakeforestconsulting.com/adminprintnightmare/&quot; target=&quot;_blank&quot;&gt;https://lakeforestconsulting.com/adminprintnightmare/&lt;/a&gt;). You can then deploy the package using SCCM, Intune, PolicyPak or another method of your choice. &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Solid Workaround 3: Use the same printer driver as many times as you can&lt;/h2&gt;

&lt;p&gt;I found this one from here: &lt;a href=&quot;https://community.spiceworks.com/topic/2328739-best-way-to-deploy-printnightmare-proof-printers-to-non-admin-users?page=1#entry-9250842&quot; target=&quot;_blank&quot;&gt;https://community.spiceworks.com/topic/2328739-best-way-to-deploy-printnightmare-proof-printers-to-non-admin-users?page=1#entry-9250842&lt;/a&gt; (Courtesy &lt;a href=&quot;https://community.spiceworks.com/people/ethanharris&quot; target=&quot;_blank&quot;&gt;https://community.spiceworks.com/people/ethanharris&lt;/a&gt;). I’ll just quote him and make this easier for everyone:&lt;/p&gt;

&lt;p&gt;“We get around it by using the same universal HP driver on our print server for all black &amp; white printing.  Since they already have the print driver installed they get no admin prompt when they add other printers.&lt;/p&gt;

&lt;p&gt;For each color printer we create two printers on the print server, &quot;PrinterName&quot; and &quot;PrinterName-Color&quot; with the actual driver for that printer model used on the -Color version.  It is understood by staff that anyone can add a printer to print in B&amp;W but IT needs to enter the admin password if they need to add a printer to print in color.  This also helps to cut down on printing costs as color printing costs 10x as much as B&amp;W on our printing contract.“&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Are there Workarounds if I’m not domain joined?&lt;/h2&gt;

&lt;p&gt;Yes, Here’s the others I’m able to come up with. If you have more to add, let me know and I’ll add them here and give you credit.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Using an MDM Service + PowerShell&lt;/h2&gt;

&lt;p&gt;If you use an MDM service like Intune, then you could use the script method from the PDQ guys (see above). That’s a little more than I want to get into here, but it should get you near the goal. &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Using PolicyPak + Least Privilege Manager&lt;/h2&gt;

&lt;p&gt;I already mentioned the Least Privilege Manager and the Helper Tool; here&#039;s a link to an alternate video which shows a few more magic tricks of the Helper Tools.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://kb.policypak.com/kb/article/889-overcome-network-card-printer-and-remove-programs-uac-prompts/&quot;&gt;https://kb.policypak.com/kb/article/889-overcome-network-card-printer-and-remove-programs-uac-prompts/ &lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Using PolicyPak + Remote Work Delivery Manager&lt;/h2&gt;

&lt;p&gt;We’ve had this KB around for a while; but it works great to overcome Printnightmare. The gist is that you copy install files from, say, Dropbox, Amazon S3 or Azure storage, then script the install.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://kb.policypak.com/kb/article/1103-how-to-deploy-a-tcp-ip-printer-using-policypak-remote-work-delivery-manager/&quot; target=&quot;_blank&quot;&gt;https://kb.policypak.com/kb/article/1103-how-to-deploy-a-tcp-ip-printer-using-policypak-remote-work-delivery-manager/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Using PP Scripts to Deploy Printers for Users (so they don’t have to.) &lt;/h2&gt;

&lt;p&gt;This method is similar to the PP + REmote Work Delivery Manager Method, but could be useful if you only have PP Scripts and Triggers and not Remote Work Delivery Manager. &lt;/p&gt;

&lt;p&gt;[youtube_player yt_code=&quot;km6Oac4jDDk&quot; kb_url=&quot;https://kb.policypak.com/kb/article/928&quot;]&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Using PolicyPak Cloud + GPPRefs TCPIP Printers &lt;/h2&gt;

&lt;p&gt;This could help some people, so I’m adding it here.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://kb.policypak.com/kb/article/788-how-to-deploy-a-tcpip-printer-using-group-policy-preferences-in-policypak-cloud/&quot; target=&quot;_blank&quot;&gt;https://kb.policypak.com/kb/article/788-how-to-deploy-a-tcpip-printer-using-group-policy-preferences-in-policypak-cloud/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;Final thoughts about Printnightmare&lt;/h2&gt;

&lt;p&gt;The world is heading toward Zero Trust. Which means every piece of the network needs (or should have) explicit allow rules.&lt;/p&gt;

&lt;p&gt;We believe in this idea at PolicyPak, and can do blocking by default for regular downloads, Windows Store downloads, and even block stuff on USB sticks.&lt;/p&gt;

&lt;p&gt;With the Printnightmare patch, they are basically saying the same thing: trust no one but your admins. But if you give someone local admin rights on the box, you’re shooting yourself in the foot.&lt;/p&gt;

&lt;p&gt;Remove local admin rights and get to Least Privilege land (using PolicyPak Least Privilege Manager). And then give back what you need to with rules to open up specific admin-like-things to your end-users (like adding printers) as needed.&lt;/p&gt;

&lt;p&gt;Hope this guide helps you out.&lt;/p&gt;

&lt;p&gt;Special thanks to my two Technical Reviewers: &lt;a href=&quot;https://twitter.com/headburgh&quot; target=&quot;_blank&quot;&gt;Viktor Hedberg&lt;/a&gt; and &lt;a href=&quot;https://twitter.com/Alshakarti&quot; target=&quot;_blank&quot;&gt;Hasain Alshakarti&lt;/a&gt; for help with the article.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is Cloud Config? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-cloud-config</link>
        <pubDate>2021-07-20T15:45:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Not everyone needs to be a power user.&amp;nbsp; Some employees just need a basic computer to get the job done.&amp;nbsp; Examples include front line workers, home based users or those who access everything over a web browser.&amp;nbsp; While these users may only need the very basics, internal IT doesn&amp;rsquo;t want to skimp on security for them either.&amp;nbsp; It is for these types of situations that Microsoft began offering Windows 10 in cloud configuration.&amp;nbsp; Windows 10 Cloud Config simplifies the deskt ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Not everyone needs to be a power user.  Some employees just need a basic computer to get the job done.  Examples include front line workers, home based users or those who access everything over a web browser.  While these users may only need the very basics, internal IT doesn’t want to skimp on security for them either.  It is for these types of situations that Microsoft began offering Windows 10 in cloud configuration.  Windows 10 Cloud Config simplifies the desktop experience for end users as well as the management experience for admins.   You can use it to configure new devices or reuse existing hardware in order to extend the life of older machines.   Because Windows 10 in cloud config is a Microsoft-recommended device configuration, you also know that it is secure.  Windows 10 Cloud Config is suited for the following types of scenarios:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Devices that do not require complex setting configurations&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Are not dependent on any type of on-premise infrastructure&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Uses a basic set of apps that are curated by internal IT such as Microsoft Teams and Edge&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;To be clear, cloud config is not Windows “lite.”  It is the full Windows experience.  You deploy devices with it or assign it to existing devices using Microsoft Endpoint Manager.  From there you manage these machines just like any other MDM enrolled device.  These devices are configured with Windows 10 endpoint security settings and &lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;automatically updated through Windows Update for Business.  Admins don’t have to do a thing.  All user data is stored and redirected to OneDrive.  For this reason, Microsoft does not recommend cloud config be used for shared devices.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Cloud config can be deployed to any device running any one of the following operating systems.   &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows 10 Professional&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows 10 Enterprise&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows 10 Education&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Cloud config requires the following licenses:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Azure Active Directory Premium P1 &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Intune &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Teams &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;OneDrive for Business &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows 10 Pro (minimum)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Note that Microsoft recommends Enterprise Mobility + Security E3 and Office 365 E3.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There are two ways to deploy Windows 10 cloud config in Microsoft Endpoint Manager.  The easiest way uses the new guided scenarios feature.  Cloud config is one of the sets of customized steps that admins can use to quickly deploy devices for a given scenario.  You can also configure cloud config manually in order to deploy it using the following steps:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Create an Azure AD group&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Configure device enrollment&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Deploy a script to configure Known Folder Move and remove built-in apps &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Deploy apps &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Deploy endpoint security settings &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Configure Windows Update settings &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Deploy a Windows 10 compliance policy &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Additional optional configurations&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For this example, we are going to use guided scenario.  You will find it by going to Troubleshooting + support &gt; Guided scenarios.  The first time you access this section you may have to click the “Got it” button as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60eb932096c39-CC1.png&quot; style=&quot;height:252px; width:600px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;Then choose Deploy Windows 10 in cloud configuration by clicking the Start button for that scenario.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60eb9342d4800-CC2.png&quot; style=&quot;height:297px; width:500px&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;The first step involves the naming of the devices during the Windows Autopilot enrollment process.  If you choose not to use the device name template, all devices will use the OEM name.  If you select “Yes” however, you can then create a unique pattern to name the devices.  You can use the %RAND:x% variable to include a string of random characters after Fabrikam.  The X represents the number of random characters allocated.  In the example below we are appending 4 random characters to Fabrikam.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60eb9370e4289-CC3.png&quot; style=&quot;height:487px; width:700px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The next step is to select the apps you want to deploy to these devices. Because Cloud Config is about keeping things simple, Microsoft recommends keeping the list of included apps to a minimum so that your cloud config devices are simple to use and manage.  By default, the guided scenario includes Edge and Teams.  As you cannot remove them when using the guided scenario, you must uninstall them at a later time if you don’t want them.  You can then select additional Microsoft 365 optional apps as is shown in the screenshot below.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60eb9399636e9-CC4.png&quot; style=&quot;height:504px; width:700px&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;Next is the Assignment phase in which you will assign the cloud config devices to a group.  Here you can either create a new group or choose an existing group as is shown below. &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60eb93d11c029-CC5.png&quot; style=&quot;height:493px; width:700px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;After you create your group and click “Next” you will be presented with a Summary showing all of your selections.  &lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;You can go back to the other tabs, and change any values you added.&lt;/span&gt;&lt;/span&gt;  Once you verify your settings then click Deploy.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60eb940eaea23-CC6.png&quot; style=&quot;height:589px; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;You can then watch as the resources are being created along with their status.  &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#171717&quot;&gt;If there&#039;s an error, then the guided scenario isn&#039;t deployed, and all changes are reverted.  Once deployed successfully you can use the monitoring and reporting features in the Endpoint Manager.  If you want to remove any of your chosen settings, go to each policy created by the cloud config guided scenario and configure the settings to Not Configured.  Then redeploy the policies.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;In the end, cloud config is just a recommended set of configuration settings for Windows 10 for standardized deployments that are easy to manage.  While it isn’t for everyone, it is an ideal fit for specific user scenarios.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Managing News and Interests on the Windows Taskbar </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/managing-news-and-interests-on-the-windows-taskbar</link>
        <pubDate>2021-07-10T09:41:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Those who have updated to Windows 10 Build 19042.964 via Windows 10 KB 10 KB5001391 have noticed the addition of the News and Interest Feed on the Windows taskbar.&amp;nbsp; The feed is announced on the taskbar by a weather icon by default that represents nearby current sky conditions.&amp;nbsp; With a click of the mouse you can gain access to nearby weather and traffic conditions, updates on your personal stocks as well as stories on professional or personal interests.&amp;nbsp; &amp;nbsp;You can customize the ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Those who have updated to Windows 10 Build 19042.964 via Windows 10 KB 10 KB5001391 have noticed the addition of the News and Interest Feed on the Windows taskbar.  The feed is announced on the taskbar by a weather icon by default that represents nearby current sky conditions.  With a click of the mouse you can gain access to nearby weather and traffic conditions, updates on your personal stocks as well as stories on professional or personal interests.   You can customize the stories and publisher sources by clicking on “Manage Interests” at the top as shown in the screenshot below.  A web browser will then open allowing you to tune your fee.  You can also select “More options” on headlines and article in order to share or save them.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60acfcdc1599e-NF1.png&quot; style=&quot;height:411px; width:400px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Users can also customize how the newsfeed appears on the taskbar.  By default, the weather conditions icon and temperature are shown.  By right clicking on the icon, users can modify this in the context menu as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60acfd325eaf4-NF2.png&quot; style=&quot;height:62px; width:350px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows admins will understandably want to manage the appearance of this new feature.  This can be done through either Windows Group Policy or Microsoft Endpoint Manager.  In order to access the associated Group Policy you need to obtain the Feeds.admx file.  You can access it by navigating to C:\Windows\PolicyDefinitions on a machine that has the update installed.  Copy the Feeds.admx file and paste it into your group policy central store.  You will also need the Feeds.adml file as well.  Those in the U.S. will find this file in the en-US directory.  The two locations are shown below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60acfd7779421-NF3.png&quot; style=&quot;height:216px; width:600px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You must then create a computer side policy by going to Computer Configuration &gt; Administrative Templates &gt; Windows Components &gt; News and interests &gt; Enable news and interests on the taskbar.  You can then choose to enable or disable the feature.  Enabling the policy will allow News and interests on the taskbar and give users access to the applicable context menu.  This will give users the ability to turn it off if they wish.  The policy is enabled in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60acfe2fc5578-NF4.png&quot; style=&quot;height:211px; width:600px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can also manage News and interests in Microsoft Endpoint Manager as well by creating a Configuration profile.  Select Windows 10 and later as the platform and choose Settings catalog (preview) as the profile type.  After naming the policy, select “Add settings” to access the Settings Picker as shown below. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60acfdfdddcd7-NF5.png&quot; style=&quot;height:294px; width:600px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Then do a search for “news” and select “News and interest” and enable the setting as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60acfe8217409-NF6.png&quot; style=&quot;height:338px; width:600px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;You can also manage News and interests via the registry.  Go to:&lt;/p&gt;

&lt;p&gt;HKEY_LOCAL_MACHINE\SOFTWARE\POLICIES\Policies\Microsoft\Windows\Windws Feeds. &lt;/p&gt;

&lt;p&gt;Then assign a value accordingly:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;0 – show icon and text&lt;/li&gt;
	&lt;li&gt;1 – show only icon&lt;/li&gt;
	&lt;li&gt;2 – disabled&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Of course these registry values can be deployed using Group Policy Preferences as well.  The screenshot below shows the designated registry key.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60acfeb6104e8-NF7.png&quot; style=&quot;height:158px; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> GP and MDM Safeguard Holds </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/gp-and-mdm-safeguard-holds</link>
        <pubDate>2021-06-11T09:33:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ While the phrase, &amp;ldquo;between a rock and a hard place&amp;rdquo; stems from ancient Greek Mythology, it could easily apply to the task of applying Windows feature updates.&amp;nbsp; A new feature update can integrate new innovation and added value to your users.&amp;nbsp; On the other hand, that same update may also cause an rebellion amongst your helpdesk team as a ticket monsoon is created from that update going bad.&amp;nbsp; It&amp;rsquo;s a pendulum that can swing both ways.

What are Safeguard Holds?

 ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;While the phrase, “between a rock and a hard place” stems from ancient Greek Mythology, it could easily apply to the task of applying Windows feature updates.  A new feature update can integrate new innovation and added value to your users.  On the other hand, that same update may also cause an rebellion amongst your helpdesk team as a ticket monsoon is created from that update going bad.  It’s a pendulum that can swing both ways.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;&lt;span style=&quot;color:#2e74b5&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;What are Safeguard Holds?&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;That’s one reason why Microsoft developed Safeguard holds.  Safeguard holds prevent devices with a known compatibility issue from receiving a new feature update.  By doing so, it protects users from a potentially poor desktop experience should the updated feature not be a harmonious match for their particular device.  Microsoft uses quality and compatibility diagnostic data to identify issues of possible incompatibility.  When such a device is identified, it is placed on hold, which serves as a safeguard.  Devices that are placed on hold are prevented from installing the designated Windows 10 feature in order to preserve the user experience for the time being.  Microsoft then uses the captured diagnostic data to release a fix that addresses the compatibility issue and at some point, the hold will be released.  At that point, the update can then be delivered.  Microsoft also uses holds when a customer or partner reports a disruptive issue directly related to an update for which an immediate workaround is not available.  Those enterprises that utilize Microsoft Endpoint Manager can use &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Update Compliance reporting retrieve data related to current safeguard holds. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Keep in mind that safeguard holds only apply to Windows devices that use Windows Update for Business.  Safeguard holds do not pertain to feature updates that are deployed through other channels such as Windows Server Update Services (WSUS) or installation media.  Most enterprises should be using Windows Update for Business as it offers administrators the ability to define Windows Update service rings in order to manage update delivery schedules for different user classifications.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h2&gt;&lt;span style=&quot;color:#2e74b5&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Opting out of Safeguard Holds&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt;&lt;span style=&quot;color:#2e74b5&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Safeguard holds are a good thing.  However, there are instances when you might not want them.  For instance, internal IT may want to validate the newest feature on a test device (for those who have it, it is best to validate feature updates using the Windows Insider Program for Business Release Preview Channel).  Allowing the update to go through will allow you to experience the compatibility issue firsthand as well as assess other implications concerning the update.  For those who want to bypass holds for special circumstances, Microsoft released a Disable safeguards for Feature Updates Group Policy late last year.  The policy is applicable to any Windows Update for Business device running Windows 10, version 1809 or later with the October 2020 security update installed.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;&lt;span style=&quot;color:#2e74b5&quot;&gt;Deploying the Policy&lt;/span&gt;&lt;/h2&gt;

&lt;p&gt;There are several ways to deliver the Disable Safeguards policy to your devices.  For domain-joined devices, Group Policy is easy.  Create a GPO and go to &lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#3e3e3e&quot;&gt;Computer Configuration&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#3e3e3e&quot;&gt; &gt; Administrative Templates &gt;Windows Components &gt; Windows Update &gt; Windows Update for Business and enable “Disable safeguards for Feature Updates” as shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#3e3e3e&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60671c59821df-SH1.png&quot; style=&quot;height:331px; width:800px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Administrators can also use an MDM such as Microsoft Endpoint Manager to manage your devices, you can create a custom profile to deploy the policy.  While the involved settings do not appear in the management interface, you can create a &lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#3a3a3a&quot;&gt;custom device configuration profile&lt;/span&gt;&lt;/span&gt; using OMA-URI settings.  Using Microsoft Endpoint Manager go to Devices and create a custom profile for the Windows 10 platform.  Provide a name for the OMA-URI setting and optional description if desired.  Then add the following settings as shown in the screenshot below.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#3a3a3a&quot;&gt;OMA-URI&lt;/span&gt;&lt;span style=&quot;color:#3a3a3a&quot;&gt;: ./Vendor/MSFT/Policy/Config/Update/DisableWUfBSafeguards&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#3a3a3a&quot;&gt;Data type&lt;/span&gt;&lt;span style=&quot;color:#3a3a3a&quot;&gt;: Select &lt;em&gt;Integer&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#3a3a3a&quot;&gt;Value&lt;/span&gt;&lt;span style=&quot;color:#3a3a3a&quot;&gt;: 1&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#3a3a3a&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60671cd20a5b1-SH2.png&quot; style=&quot;height:197px; width:800px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Another way is to modify the registry.  You can do this manually or deploy the modification using Group Policy Preferences.  Start by going to the following key:&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;Go to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;Right click on WindowsUpdate and select New &gt; Dword (32-bit) Value&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;Name it DisableWUfBSafeguards&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;Set its value to “1” and reboot.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;The finished result is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#555555&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60671d0d63b5a-SH3.png&quot; style=&quot;height:361px; width:800px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;For those enterprises that utilize both domain-joined and non-domain joined machines, there are third party solutions such as PolicyPak that you can use to deploy the &lt;span style=&quot;color:#171717&quot;&gt;Disable Safeguards policy to any internet connected Windows 10 device.  In this case, the &lt;/span&gt;PolicyPak editors are built inside the Group Policy Management Editor&lt;span style=&quot;color:#171717&quot;&gt; so creating the policy is simple and straightforward.  Once created, you can deploy it using standard Group Policy, your chosen MDM solution or PolicyPak Cloud.  The screenshot below shows the creation process that utilizes the ADMX templates.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f60671d3fb9452-SH4.png&quot; style=&quot;height:283px; width:800px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;To be clear, you shouldn’t disable Safeguard Holds to rush out feature updates to standard users, but this policy does provide administrators with greater the flexibility they need at times. &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Microsoft Endpoint Policy Types Explained (Part 2) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/microsoft-endpoint-policy-types-explained-part-2</link>
        <pubDate>2020-09-11T09:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Welcome to Part 2 of this article series in which we take a look at the primary policy types that you can create and utilize in Microsoft Endpoint Microsoft (Intune).&amp;nbsp; In Part 1 we looked at Configuration Profiles and how they are the rough equivalent of GPOs in a traditional AD on premise domain in which some things were hidden, others revealed.&amp;nbsp; Here we will examine some of the other major components of MEM, all pertaining to security.

Security Baselines

Also referred to Securi ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Welcome to Part 2 of this article series in which we take a look at the primary policy types that you can create and utilize in Microsoft Endpoint Microsoft (Intune).  &lt;a href=&quot;https://www.mdmandgpanswers.com/blogs/view-blog/microsoft-endpoint-policy-types-explained-part-1&quot;&gt;In Part 1&lt;/a&gt; we looked at Configuration Profiles and how they are the rough equivalent of GPOs in a traditional AD on premise domain in which some things were hidden, others revealed.  Here we will examine some of the other major components of MEM, all pertaining to security.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Security Baselines&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Also referred to Security Profiles, Security Baselines are sets of Windows settings that are preconfigured by Microsoft Security engineers.  There are currently 3 Security Baselines as is shown below.  They are&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Windows 10 Security Baseline&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Defender ATP Baseline&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Edge Baseline&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f1b10a35e3d0-MEM2-1.png&quot; style=&quot;height:129px; width:650px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The baselines by themselves don’t really do anything until you use one of them to create a security policy.  To create a profile you simply click on the appropriate baseline and then create your desired policy.  Baselines should be looked at as minimum security standards, although for most enterprises, they would work admirably.  You can change any of the settings, but keep in mind that when you unconfigure a setting, you are making it less secure.  In most cases, you should simply accept the settings as is and deploy the policies to their targeted users and devices.  The screenshot below shows the preconfigured BitLocker settings within the Windows 10 Security Baseline.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f1b10d30b342-MEM2-2.png&quot; style=&quot;height:554px; width:550px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Compliance Policies&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Compliance Policies are used to determine whether a device is compliant with a pre-defined baseline.  Compliance Policies vary on the platform of the device.  Some examples of Windows 10 compliant baselines can include the following:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;BitLocker enabled&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Minimum OS version&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Password qualities&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Firewall enabled and configured &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Location of the device&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can then select a noncompliance action such as an email notification sent to the user informing them of their device’s noncompliance state.  You can even lock or retire a device that has been noncompliant for a specified duration.  An example of a Compliance Policy requiring a minimum Windows 10 OS version is shown below:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f1b116fe3d58-MEM2-3.bmp&quot; style=&quot;height:350px; width:500px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Conditional Access Policies&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Conditional Access Policies work hand-in-hand with Compliance Policies.  They prevent access to noncompliant devices.  For instance, you can prevent devices connecting from anywhere outside of the U.S. for instance.  You can also list other conditional access requirements such as the installation of approved applications or MFA as shown in the screenshot below.  You should always test your Conditional Access Policies first as you could deny everyone access including yourself.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f1b12e8f1a37-MEM2-4.png&quot; style=&quot;height:523px; width:275px&quot; /&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Enrollment Restrictions&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;Although not a “policy” per se, Enrollment Restrictions play an important role in MEM security.  By default, authorized users can enroll 2 devices into the MEM portal.  If don’t want the default, you can create enrollment restrictions that will allow users to enroll anywhere from 1 to 15 devices.  You can also assign Device Type Restrictions that will prevent users from enrolling either personal devices, or designated device version platforms as is shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f1b1201d260d-MEM2-5.png&quot; style=&quot;height:194px; width:650px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;br /&gt;
&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Creating a MEM Strategy&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;As you can see, there are a lot of moving parts in MEM.  The key is to ensure that all of your policies and restrictive settings work in conjunction of one another in order to safeguard your organization as well as ensure that your users can perform their required digital workloads.  While MEM alone falls short of the granular setting coverability of Group Policy, it can play an important role for new startups and established companies that have significant numbers of mobile and remote devices.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Microsoft Endpoint Policy Types Explained (Part 1) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/microsoft-endpoint-policy-types-explained-part-1</link>
        <pubDate>2020-09-02T10:08:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft Endpoint Manager (the Intune part), is a powerful device management and endpoint security system that is constantly evolving.&amp;nbsp; What began as a portal to manage and secure mobile devices can now manage desktop computers, virtual machines and even servers.&amp;nbsp; It can now deliver a broad spectrum of configuration and security settings as well as intelligent cloud actions.&amp;nbsp; Because of this, it&amp;rsquo;s hard to keep abreast of all of the changes and informational resources are pe ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Endpoint Manager (the Intune part), is a powerful device management and endpoint security system that is constantly evolving.  What began as a portal to manage and secure mobile devices can now manage desktop computers, virtual machines and even servers.  It can now deliver a broad spectrum of configuration and security settings as well as intelligent cloud actions.  Because of this, it’s hard to keep abreast of all of the changes and informational resources are perpetually outdated.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Endpoint offers multiple policy types.  With so much confusion out there concerning which policies do what, I thought it might be a good time to take a snapshot of the state of Microsoft Endpoint as it is today.  This two-part series will cover a quick review, (or for some an introduction), on the various parts of this rapidly expanding management ecosphere. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Configuration Profiles&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;br /&gt;
&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;This has long been the bread and butter of Intune.  Configuration policies are the equivalent of Group Policy Objects.  A configuration profile is created to deploy managed settings to targeted devices or users.  Like other MDM solutions, Microsoft Endpoint supports more than just Windows.  When you go about creating a configuration profile, you can choose between multiple platforms including Android, iOS, iPadOS, macOS and Windows as is shown in the screenshot below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f14622c9a0f6-configprofile1.png&quot; style=&quot;height:249px; width:450px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;For the sake of this article, we will focus on Windows 10.  You then select which profile type you want to configure settings for.  The list of profiles has greatly expanded over the years.  Some of the profiles available at this time include:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;Device Restrictions (Think Group Policy restrictions)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;Edition upgrade and mode switch&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;Endpoint Protection&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;VPN&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;Wi-Fi&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Below is an example of the available Control Panel Settings than you can block within the Device Restrictions policy.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f14615a9c081-configprofile2.png&quot; style=&quot;height:604px; width:650px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;A wizard then guides you through the process of configuring your desired settings and deploying them to the applicable targets.  While the number of available settings offered within Microsoft Endpoint has exponentially grown over the years, it still doesn’t come close to the more than 10,000 settings offered by the culmination of Group Policy and Group Policy Preferences combined.  While its capabilities and offerings may fall short for on-prem AD enterprises, it does provide ample coverage for many mobile and non domain-joined devices.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Administrative Templates&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;Administrative Templates is one of the available Configuration profiles but I want to focus on it separately.  These are ADMX settings, some of the same ones you are accustomed to configuring in Group Policy Administrative Templates that includes both Computer and User side settings.  Here you can configure settings for things such as Microsoft Edge, One Drive, Word, Excel, etc.  In the screenshot below you will notice the same hierarchical structure you are familiar with in Group Policy Administrative Templates.  Again, while the list of available ADMX settings has grown substantially, it still falls far short of what is currently available in native Group Policy. (Hint: &lt;a href=&quot;https://kb.policypak.com/kb/article/482-policypak-and-microsoft-intune/&quot;&gt;Use PolicyPak MDM to take 100% of real on-prem GPO settings and use them with Intune&lt;/a&gt;.)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f1461a261c58-configprofile3.png&quot; style=&quot;height:366px; width:650px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Custom Profiles&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;One more Configuration Profile type I want to focus on is Custom Profiles because a lot of people find them confusing.  Windows 10 devices contain Configuration Service Provider (CSP) settings and it is these settings that MDM solutions actually manage.  MDM has the ability to manage any CSP setting, but not all of these settings are currently built into the Microsoft Endpoint interface.  That is where custom profiles come into play.  If you want to deliver settings to an available CSP that isn’t accessible within the Microsoft Endpoint, you can create a custom profile which does require some input the following settings:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Name:  The name is for your own reference to help you identify it.  Use any name you wish.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Description:  Enter a short summary of what the profile does and any other pertinent details&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;OMA-URI:  The OMA-URI settings are unique for each platform be it Android, iOS, Windows, etc.    It is also case sensitive so be careful to type in the setting path correctly.  To configure settings for a Windows 10 device you would type the path: &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color:#171717&quot;&gt;Vendor/MSFT/Policy/Config&lt;/span&gt;&lt;strong&gt;&lt;span style=&quot;color:#171717&quot;&gt;/&lt;/span&gt;&lt;/strong&gt;&lt;em&gt;&lt;span style=&quot;color:#171717&quot;&gt;AreaName/PolicyName&lt;/span&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Data type:  The data type will vary based on the OMA-URI setting.  The options are String, String (XML file), Date and time, Integer, Floating point, Boolean and Base 64 (file)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Value: Here is where you associate the OMA-URI value you wish to enforce.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Below is what the Custom Profile creation process looks like in Microsoft Endpoint.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f1462013525e-configprofile4.png&quot; style=&quot;height:142px; width:650px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;So that sums up our look at Configuration Profiles. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;In case you want a more in-depth view of these, I suggest you &lt;a href=&quot;https://MDMandGPanswers.com/book&quot;&gt;check out my MDM book.... www.MDMandGPanswers.com/book&lt;/a&gt; where I give more details and examples.&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#1d1d1b&quot;&gt;In Part 2 of this series, we will look at the other policy types such as security and conditional access.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> A Great Little Windows Privacy Tool Called Spydish </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/a-great-little-windows-privacy-tool-called-spydish</link>
        <pubDate>2020-08-18T11:55:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I came upon this cool little app the other day and wanted to share it.&amp;nbsp; It is a Windows 10 privacy tool called Spydish.&amp;nbsp; It&amp;rsquo;s a very small app that you can download from the developer&amp;rsquo;s GitHub site.&amp;nbsp; It runs as an EXE file so there&amp;rsquo;s not installation necessary.&amp;nbsp; The premise of the app is straightforward as it simply checks if privacy related policies are enabled on your Windows 10 machine.&amp;nbsp; It also gives you the option to enable any of the included sett ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I came upon this cool little app the other day and wanted to share it.  It is a Windows 10 privacy tool called Spydish.  It’s a very small app that you can download from the developer’s &lt;a href=&quot;https://github.com/mirinsoft/spydish/releases&quot;&gt;GitHub site&lt;/a&gt;.  It runs as an EXE file so there’s not installation necessary.  The premise of the app is straightforward as it simply checks if privacy related policies are enabled on your Windows 10 machine.  It also gives you the option to enable any of the included settings or return them to their default state.  The application can only be run locally so you cannot use it to access privacy settings of remote machines.  It doesn’t require Group Policy so you can run it on a Windows 10 Home version.  While you wouldn’t use it to manage the privacy settings of your enterprise fleet of laptops, it’s a quick way to see which privacy settings are set on a designated Windows 10 system and modify them.   &lt;/p&gt;

&lt;p&gt;Once opened, Spydish lists a series of privacy related policies in a sidebar on the left.  Settings are grouped in different categories such as Privacy, Cortana, Bloatware, App Permissions, etc.  You can choose the entire allotment of Local Computer Policies, a selected group or groups or pick individual settings.  Then click the Analyze button as is shown in the screenshot below.  A readout appears almost instantly, showing the current settings for each policy. &lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f35623d1248d-spydish1.png&quot; style=&quot;height:423px; width:700px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;As easy as it is to obtain the current state of your privacy settings, it is just as easy to apply or revert them.  In the screenshot below I have selected the Microsoft Edge group of settings.  As you can see, none of the settings are currently configured.  Now simply click the “Apply selected” button as is shown below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f35626aee4f4-spydish2.png&quot; style=&quot;height:421px; width:700px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Spydish will then apply all of the settings as shown here.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5f3562a45d1bf-spydish3.png&quot; style=&quot;height:422px; width:700px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Clicking “Revert selected will revert any settings back to their default state.  While users can modify Windows 10 privacy settings manually, Spydish is a way to get the job done quick and effortless.  Check it out.  &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Windows 10 (and Server) Event Logs to Azure Log Analytics Walkthru </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/windows-10-and-server-event-logs-to-azure-log-analytics-walkthru</link>
        <pubDate>2020-07-06T20:52:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ It&amp;rsquo;s a Cloud, Cloud, Cloud, Cloud, Cloud, Cloud world. Except actually most of your stuff is still likely mostly on-prem, or acts that way. Take Windows 10 for instance. Windows 10 has events in the event logs, and maybe you already know about on-prem Event Forwarding.

Tip: If you want to learn more about on-prem Event Forwarding, you can see my Walkthrough of that here video and text.

But how do we take on-prem events from Windows 10 (or Windows Server) and get the up to the cloud f ]]>
        </description>
        <content:encoded>
            &lt;p&gt;It’s a Cloud, Cloud, Cloud, Cloud, Cloud, Cloud world. Except actually most of your stuff is still likely mostly on-prem, or acts that way. Take Windows 10 for instance. Windows 10 has events in the event logs, and maybe you already know about on-prem Event Forwarding.&lt;/p&gt;

&lt;p&gt;Tip: If you want to learn more about on-prem Event Forwarding, you can see my Walkthrough of that here &lt;a href=&quot;https://kb.policypak.com/kb/article/199-03-using-windows-event-forwarding-to-search-for-interesting-events/&quot;&gt;video&lt;/a&gt; and &lt;a href=&quot;https://kb.policypak.com/kb/article/846-how-to-forward-interesting-events-for-least-privilege-manager-or-anything-else-to-a-centralized-location-using-windows-event-forwarding/&quot;&gt;text&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;But how do we take on-prem events from Windows 10 (or Windows Server) and get the up to the cloud for later analysis? If you have 24, 250, or 25,000 domain joined (or even NON-domain joined) machines, say with Windows Intune or PolicyPak Cloud… how can you do the equivalent of event forwarding to some central place?&lt;/p&gt;

&lt;p&gt;That is the job of Azure Log Analytics. I’m going to call it “LA” for short.&lt;/p&gt;

&lt;p&gt;LA had an original name, OMS which stood for Operations Management Suite, but as near as I can tell, that’s over. But its good to know LA’s original name, because you’ll see OMS pop up from time to time in the walkthrough, docs, and software. Additionally, it’s also good to know that what you’ll see here is build upon the original System Center Microsoft Operations Manager (SCOM); but I won’t be using that function.&lt;/p&gt;

&lt;p&gt;The official documentation for LA can be found &lt;a href=&quot;https://docs.microsoft.com/en-us/azure/azure-monitor/platform/agent-windows&quot;&gt;here&lt;/a&gt;; but I had a few stumbles. Some tips o’ the hat to Travis Roberts’ video and blog which also helped give me a leg up. The blog is &lt;a href=&quot;https://www.ciraltos.com/collect-custom-windows-event-logs-in-log-analytics/&quot;&gt;here&lt;/a&gt; and the helpful video series on Azure Log Analytics (though a little old now because of the name and UI changes) can be found at: &lt;a href=&quot;https://www.youtube.com/watch?v=6hgvjgPBNzE&amp;list=PLnWpsLZNgHzVXXyN9a0jm9xNNDrikHf8I&quot;&gt;https://www.youtube.com/watch?v=6hgvjgPBNzE&amp;list=PLnWpsLZNgHzVXXyN9a0jm9xNNDrikHf8I&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;My goal in researching this project was to give some PolicyPak MDM Customers a quick guide to research interesting events that PolicyPak automatically logs to its own event log. But in this guide, I’m also going to show you how to collect some standard and also some extra event logs.&lt;/p&gt;

&lt;p&gt;To get started you need a Log Workspace. This is basically a security block between this collection of logs, and say another collection of logs. Each Log Workspace has a GUID based Workspace ID and two keys (Primary and Secondary.) You’ll use these to send, say, YOUR Windows 10 machines’ event logs to your workspace. And the other Azure admins … you know, those SQL server people or Exchange or whatever … they’ll send their event logs to their workspaces.&lt;/p&gt;

&lt;p&gt;To get started use the big search thingie to find “Log Analytics workspaces” like what’s seen here.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570b7ec45-img-01.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Then, there’s a little Wizard (not shown) to help you get started. Basically it’s asking you for names and which Azure region you want to keep the data in. Then after it gets going you’ll see “Your deployment is underway” like what’s seen here.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bb83ef-img-02.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Then you should be thrown into the Advanced settings like what’s seen here. If not, find the Workspace you just created and click Advanced in the left-side menu. It should get you to this place. Note then the “WORKSPACE ID” and “PRIMARY KEY” like what’s seen here. Hang on to those, you’ll need these in a bit. Then also download the Windows Agent 64-bit or 32-bit to get started for your example machines.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bb8f55-img-03.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;In this example, we’ll be installing the LA Agent by hand on a test machine. In real life you could use, say Windows Intune to deploy it with command line options to just chuck in your Workspace ID and Primary Keys and do the whole thing silently and automatically.&lt;/p&gt;

&lt;p&gt;Once you have the download, get it over to your test machine. Machine can be real or virtual. Note that you shouldn’t do this (nor do you need to) for WVD virtual machines. Those have a magical connector to accept event logs to LA; and you shouldn’t need to use this method. (Docs: &lt;a href=&quot;https://docs.microsoft.com/en-us/azure/virtual-desktop/diagnostics-log-analytics&quot;&gt;https://docs.microsoft.com/en-us/azure/virtual-desktop/diagnostics-log-analytics&lt;/a&gt; and a blog &lt;a href=&quot;https://www.mdmandgpanswers.com/blogs/view-blog/windows-10-and-server-event-logs-to-azure-log-analytics-walkthru&quot;&gt;https://www.mdmandgpanswers.com/blogs/view-blog/windows-10-and-server-event-logs-to-azure-log-analytics-walkthru&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bc2bfc-img-04.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Then, Up, Up and away. Launch the agent.. which requires admin rights. (Or, pro tip: Use PolicyPak Scripts to install it automatically where the script is elevated. &lt;a href=&quot;https://kb.policypak.com/kb/article/901-policypak-scripts-deploy-software-via-vpn-or-with-policypak-cloud/&quot;&gt;https://kb.policypak.com/kb/article/901-policypak-scripts-deploy-software-via-vpn-or-with-policypak-cloud/&lt;/a&gt; )&lt;/p&gt;

&lt;p&gt;You’ll need to select “Connect the agent to Azure Log Analytics (OMS)” like what’s seen here.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bad3be-img-05.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Then, it’s time to chuck in your Workspace ID and Workspace Key. And you’ll likely keep the default of Azure Cloud: Azure Commercial. Pull the pulldown if you have something unusual to select here.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bbca1c-img-06.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Yes, you want to check for updates when MS Update kicks in….&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bc37d5-img-07.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;And.. you’re basically done.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570be8938-img-08.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Now let’s make sure we’re talking in both directions. The Microsoft Monitoring Agent is found in Control Panel… which is a weird place, but, hey… that’s okay.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570be4088-img-09.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Then click the Azure Log Analytics (OMS) tab and … see you’re talking outbound.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bec541-img-10.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Back in Azure, in the Advanced Settings page, the zero should be one !&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bdece8-img-11.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Now it’s time to add in the actual event logs you want to capture. Note that the more you capture, the more you pay. Strictly speaking for the PolicyPak customer I made this blog entry for, he only needed to capture the PolicyPak log (which I do last.) But just for completeness and testing, I’ll capture some more too, since you might not have the PolicyPak Log. (And, why don’t you!? Come on over and check out PolicyPak for Pete’s sake. Really, your sake to be honest.)&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bc37d5-img-12.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;So just type Application then +. Then System and + and bingo. Those are “well known” logs which LA knows about and pre-populates this list. But PolicyPak? Not as common.. (Yet !) Therefore you could take a guess that our event logs are named PolicyPak (they are…). But how would you know?&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570be8938-img-13.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The trick is to find the log you want to capture in Windows, and go to its properties and get its Full Name like what’s seen here. Yeah, this one was easy.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570be4088-img-14.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;But some are harder. I also wanted to capture the MDM event log which has a goofy and weird name. To get it, I went into an Event inside that log and captured its name microsoft-windows-devicemanagement-enterprise-diagnostics-provider/Operational and its brother microsoft-windows-devicemanagement-enterprise-diagnostics-provider/admin.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bec541-img-15.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;You can see that second log here…&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570bdece8-img-16.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Once I pasted in all the logs and added them, I clicked Save and got this !&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570b7ec3c-img-17.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Data.. data? Do we have data ? Click on Logs and close the sample queries. Let’s just see what have. All of it (which shouldn’t be much.)&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570b7ee5e-img-18.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;In the top box, type&lt;br /&gt;
&lt;code&gt;SEARCH *&lt;/code&gt;&lt;br /&gt;
Then click Run. Bingo.. out should pop all the events that have been captured. You can change the Display Time to make sure that you’re getting the right events, right now.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570b7e690-img-19.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;It took a little while for the non-well-known logs to show up. But maybe it will work faster for you than for me. If you want to give it a shot and try your non-well-known logs, like this, give it a go.&lt;br /&gt;
&lt;code&gt;Event | where Eventlog == &quot;PolicyPak&quot;&lt;/code&gt;&lt;br /&gt;
Then click Run again.&lt;br /&gt;
Pow! Here come your logs.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570b7ed35-img-20.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Then I can also dig into an event, and … hey look ! EastSalesUser1 ran Procmon, and PolicyPak did the elevation ! Amazeballs !&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.mdmandgpanswers.com/uploads/f5f03570b7e4f0-img-21.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;That’s it. Well, that’s basics anyway.&lt;/p&gt;

&lt;p&gt;Remember this blog is a simple walkthrough / getting started. This isn’t “Magic Tricks with Windows Analytics.” But if I had this guide, I would have been up and running about 10x faster. So I hope this helps you out and shows how you can take on-prem or “Always on the go” Windows 10 machines and record their logs, then sort thru them for actionable items and trends.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> ADMX Windows 2020 and GPPreferences Escalation Bug CVE-2020-1317 Fixed </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/admx-windows-2020-and-gppreferences-escalation-bug-cve20201317-fixed</link>
        <pubDate>2020-06-12T10:21:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ There were two big news items this week in GP-land:

&amp;nbsp;

1. The Windows &amp;quot;May 2020 Release&amp;quot; for ADMX templates is out.&amp;nbsp; You can get them here. Martin Briklmann on gHacks.Net already did a breakdown of what&amp;#39;s new in the ADMX templates, so I don&amp;#39;t have to. That review / overview is here. Nice job.

&amp;nbsp;

2. A research team uncovered a flaw in GPPrefs CSE User Based items.The basic gist is that GPPrefs User Side items (were) storing&amp;nbsp;user policies in a user-w ]]>
        </description>
        <content:encoded>
            &lt;p&gt;There were two big news items this week in GP-land:&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;1. The Windows &quot;May 2020 Release&quot; for ADMX templates is out.  You can &lt;a href=&quot;https://www.microsoft.com/en-us/download/101445&quot;&gt;get them here&lt;/a&gt;. Martin Briklmann on gHacks.Net already did a breakdown of what&#039;s new in the ADMX templates, so I don&#039;t have to. That review / &lt;a href=&quot;https://www.ghacks.net/2020/06/12/administrative-templates-admx-for-windows-10-may-2020-update-released/&quot;&gt;overview is here&lt;/a&gt;. Nice job.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;2. A research team uncovered a flaw in GPPrefs CSE User Based items.The basic gist is that GPPrefs User Side items (were) storing user policies in a user-writable &lt;code&gt;%localappdata%\Microsoft\Group Policy\History&lt;/code&gt; directory when &lt;em&gt;Remove this Item when it is no longer applied&lt;/em&gt; option is enabled. When GPupdate is called, the contents are read. If &quot;evil&quot; contents are present, the GPupdate process will perform the processing of those evil contents. As such, Microsoft fixed this in CVE-2020-1317. More reading about it and the direct download links to the patches &lt;a href=&quot;https://dirteam.com/sander/2020/06/11/group-policy-elevation-of-privilege-vulnerability-cve-2020-1317-important/&quot;&gt;can be found here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;This isn&#039;t an underlying problem in GP &quot;the engine&quot; itself; but rather GPPrefs and then specifically the user-side policies, and specifically, the printer policies. The patch will then change the location from user-space to ProgramData space when GPPrefs User side stores these values.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Hope this helps you out !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Establishing Edge v83 Security Baselines with Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/establishing-edge-v83-security-baselines-with-group-policy</link>
        <pubDate>2020-06-09T12:20:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ MDM administrators that utilize Microsoft Endpoint Management (Intune) are familiar with the concept of Security Baselines.&amp;nbsp; A security baseline is a collection of Microsoft recommended configuration settings that help secure and protect enterprise users and devices.&amp;nbsp; For instance, MEM offers security baselines for Windows 10, Microsoft Defender ATP and Edge.&amp;nbsp; Security baselines are an easy and effective way for admins to ensure that they are consistently enforcing a minimum secur ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#5f5e5e&quot;&gt;MDM administrators that utilize Microsoft Endpoint Management (Intune) are familiar with the concept of Security Baselines.  A security baseline is a collection of Microsoft recommended configuration settings that help secure and protect enterprise users and devices.  For instance, MEM offers security baselines for Windows 10, Microsoft Defender ATP and Edge.  Security baselines are an easy and effective way for admins to ensure that they are consistently enforcing a minimum security level that will address fundamental security and compliance issues.  Some admins may be surprised that security baselines are available for Group Policy as well.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;The Benefits of Using Security Baselines&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;br /&gt;
&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#5f5e5e&quot;&gt;While it is perfectly ok to configure your own MDM profile or GPO to select and configure available settings, baselines are a quick and easy way to enforce a default baseline that prevents users from making changes that will result in an insecure state.  There are a number of benefits of using security baselines offered by Microsoft.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#5f5e5e&quot;&gt;They are already configured by Microsoft security experts&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#5f5e5e&quot;&gt;They enforce settings that mitigates contemporary security threats.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#5f5e5e&quot;&gt;Baseline settings have been pretested to ensure that they do not cause operational issues that are worse than the risks they mitigate&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#5f5e5e&quot;&gt;They ensure that users and device configuration settings are compliant with the baseline&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Security Baselines are not just for MDM&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#5f5e5e&quot;&gt;Microsoft has been releasing Security baselines since the Windows XP days.  Because Group Policy offers far more settings than MDM, the simplification that they offer for AD environments is even more of a benefit.  For instance, there are more than 200 Microsoft Edge Group Policy settings for Windows, but only some of these are security related.   By implementing Microsoft Edge baselines, you can rest assure that you are deploying the most up-to-date security settings for Microsoft Edge using your GPO environment.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Security Baseline for Microsoft Edge v83&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#5f5e5e&quot;&gt;Microsoft just recently announced the release of the Microsoft v83 of Microsoft Edge.  Microsoft continues to release new versions and settings for the new Chromium Edge browser.  Version 83 includes 19 new computer and user based settings.  The accumulated total of Edge settings currently stands at 311 Computer policy settings and 286 User configuration policy settings.  The current baseline involves 12 of these settings which are identical to the v80 security baseline.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#5f5e5e&quot;&gt;To obtain the security baseline for Microsoft Edge, you need to download the &lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=55319&quot;&gt;Security Compliance Kit&lt;/a&gt;.  The compliance kit the following: &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Importable GPOs&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;A script to apply the GPOs to local policy&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;A script to import the GPOs into Active Directory Group Policy&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;A spreadsheet documenting all recommended settings in spreadsheet form&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Policy Analyzer rules&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;GP Reports&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Documentation&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5edd12f9e0363-Edge1.png&quot; style=&quot;height:139px; width:600px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Implementing the Baseline into your AD Environment&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Keep in mind that you must have the Edge v83 ADMX files contained within your Central Store as a prerequisite.  Once you download the toolkit, open the Scripts folder and run either the local policy script or the AD import script as shown below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5edd13291f060-Edge2.png&quot; style=&quot;height:112px; width:600px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;In this example we using the Baseline-ADimport script.  The script will then import a GPO called MSFT Edge version 80 – Computer that involves the following Administrative Templates.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5edd135857e27-Edge3.png&quot; style=&quot;height:432px; width:1000px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;Some of the configured settings include the following:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5edd13867e547-Edge4.png&quot; style=&quot;height:351px; width:1000px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;The toolkit includes a GP Reports Folder that contains an HTML report of GPO templates available in the baseline.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5edd13b7cc0b4-Edge5.png&quot; style=&quot;height:466px; width:1000px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#5f5e5e&quot;&gt;It is recommended that you stay current with the latest security baselines of Edge and Windows 10.  You can keep abreast of future baselines as they become available through the Microsoft website.   &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;You can learn about the newest policy settings available with Edge v83 on the &lt;a href=&quot;https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-policies&quot;&gt;Microsoft website&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> MSIX App Attach:  Walkthru (Walk Before You Run) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/msix-app-attach-walkthru-walk-before-you-run</link>
        <pubDate>2020-06-03T10:23:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ MSIX App Attach: How do you do it?  Find out in this blog.

That being said, let&amp;#39;s first understand the problem MSIX App Attach tries to solve: 

For a long time, golden images were used with a myriad of applications... leading to a myriad of golden images.

NOT a great way to streamline. Images can quickly become bloated and the task of updating and maintaining them is cumbersome and overly time consuming.  VDI and application streaming has been another alternative, but these requi ]]>
        </description>
        <content:encoded>
            &lt;p&gt;MSIX App Attach: How do you do it?  Find out in this blog.&lt;/p&gt;

&lt;p&gt;That being said, let&#039;s first understand the problem MSIX App Attach tries to solve: &lt;/p&gt;

&lt;p&gt;For a long time, golden images were used with a myriad of applications... leading to a myriad of golden images.&lt;/p&gt;

&lt;p&gt;NOT a great way to streamline. Images can quickly become bloated and the task of updating and maintaining them is cumbersome and overly time consuming.  VDI and application streaming has been another alternative, but these require complex infrastructure that has to be implemented and maintained. Now with remote work on everyone&#039;s mind, we need an easier way deliver applications. &lt;/p&gt;

&lt;p&gt;As such, Microsoft recently unveiled their new MSIX App Attach solution and is positioning it as their main technology for modern application packaging and provisioning.  As its name implies, it allows you to attach an application to the OS.  Some of the benefits of MSIX App Attach include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;No special deployment servers are needed&lt;/li&gt;
	&lt;li&gt;No agents: Everything is just &quot;built into Windows&quot; natively.&lt;/li&gt;
	&lt;li&gt;You can use existing MSIX packages without altering or repackaging them.&lt;/li&gt;
	&lt;li&gt;There is ultra-low / no performance impact.&lt;/li&gt;
	&lt;li&gt;Can be used on-premise or cloud&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To help you get started with this new methodology approach to application delivery, I have composed a called “MSIX: Walk before you run” to help you get familiar with the basic approach of how it works.  To keep things simple, we aren’t going to create any MSIX packages here but will use existing ones just to show how to implement an MSIX App Attach solution.&lt;/p&gt;

&lt;!--p&gt;&lt;&lt;video &gt;&gt;&gt;&lt;/p--&gt;
&lt;p&gt;&lt;iframe width=&quot;854&quot; height=&quot;480&quot; style=&quot;margin:20px auto;&quot; src=&quot;https://www.youtube.com/embed/qfWFkuMNrWc&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen&gt;&lt;/iframe&gt;&lt;/p&gt;

&lt;p&gt;Then you can use the material below to &quot;follow along&quot; and try this yourself.&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Step 1: Get a compatible OS&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;So first and foremost, you need an OS that supports it all.  That means getting a copy of Windows 2004 which is the latest version of Windows 10.  Then you need to upgrade to Build 19631 which at this time may require you to utilize the Windows Insider Program to get it.&lt;br /&gt;
 &lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Step 2: Get MSIX packages&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;So of course we need some MSIX packages.  Now we could use the MSIX Packaging Tool that you can download from Microsoft, but I am skipping that step for take advantage of some existing packages already available.  There is a great Microsoft repository site called &lt;a href=&quot;https://github.com/microsoft/winget-pkgs/tree/master/manifests&quot;&gt;Github Winget Package Manifest Page&lt;/a&gt; that features all types of prepackaged applications.  Pull the page up in a browser and do a search for MSIX.  In my video, I then chose &lt;a href=&quot;https://github.com/microsoft/winget-pkgs/blob/0f690e3f3a750d971c6542250b4b56042c12a4db/manifests/PascalBerger/MSIXCommander/1.0.7.5.yaml&quot;&gt;MSIX Commander&lt;/a&gt; as my feature application and copied it’s &lt;a href=&quot;http://msixcommander.azurewebsites.net/winget/MSIX%20Commander-x64.msix&quot;&gt;URL&lt;/a&gt; in order to download it.  Now I have an MSIX package that I can use for my example.  Place it and all other downloads in a separate folder.  In my video, I am using a directory called “Demo.”&lt;br /&gt;
 &lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Step 3:  Using the Script&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;I went and logged on my local my machine as a domain admin in order to perform the remaining tasks.  Throughout my video I refer to a conglomerated script that I pieced together for you.  I obtained the script from several sources.  I got some from the official &lt;a href=&quot;https://docs.microsoft.com/en-us/azure/virtual-desktop/app-attach&quot;&gt;Microsoft Setup Document&lt;/a&gt; which guides you along in much the same format that I take in the video.  I also used several scripts made available by &lt;a href=&quot;https://github.com/TomHickling/appattach&quot;&gt;Tom Hickling’s Github page&lt;/a&gt;.  I then cobbled all of these scripts together and I have included the final script in its entirety at the end of this blog. Now let’s go through the script.&lt;br /&gt;
 &lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Step 4: Create a VHD Package&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;While you see MSIX App Attach associated with Azure and WVD a lot, keep in mind that what we are doing can be performed on local desktops or laptops as well as VDI and WVD machines.  I am doing everything locally in this video.  You will need to download the &lt;a href=&quot;https://aka.ms/msixmgr&quot;&gt;MSIXMGR Tool&lt;/a&gt; and place it in the same directory as your MSIX file (in my case MSIX Commander).  Now we need to utilize the script to create the VHD.  To do this, I used Tom Hickling’s script.  Since he was using VLC as his package, I modified it to accommodate MSIX Commander.  Go create the VHD, I am using the section titled “&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;Make an MSIX into a VHD”&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;Open an elevated PowerShell session and go to the directory that contains all of the required files I mentioned earlier.  Then paste the VHD script and let PowerShell do its thing.  Now your MSIX VHD file is created with your MSIX file expanded into the VHD.  The VHD will already be mounted.  In my case it mounted as drive E so you can browser its contents.  Be sure to view the package name and copy that name and paste it into Notepad for future reference.  You will also need to know the Volume ID of the VHD file which you can find by using the “mountvol” command.  Then paste in your Notepad as well.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&lt;span style=&quot;color:#1f4d78&quot;&gt;Step 5: Package Staging&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;In this video, I chose to skip the Certificate section for simplicity which takes us to the next step called Staging.  First go ahead and unmount the VHD.  You will find that the Stage section of the script is broken down into regions.  I advise you to paste the script into PowerShell region by region.  For first region, you will need to modify the VHD name, package name and volume ID you recorded earlier.  Below is what my first region looked like:&lt;/p&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#MSIXCOMMANDER&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;$vhdSrc=&quot;c:\ApplicationVHDs\MSIXCOMMANDER.vhdx&quot;&lt;/span&gt;&lt;/strong&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$parentFolder = &quot;MSIXCOMMANDER&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;$packageName = &quot;PascalBerger.MSIXCommander_1.0.7.5_x64__ajjbhed1xnq88&quot; &lt;/span&gt;&lt;/strong&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$parentFolder = &quot;\&quot; + $parentFolder + &quot;\&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;$volumeGuid = &quot;5f51883c-6f50-4c6a-9afb-9513c6e7c565&quot;&lt;/span&gt;&lt;/strong&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#NOTE: GET VOLUMEGUID after mounting VHD then use MOUNTVOL command to get volume GUID. Remove {}&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$msixJunction = &quot;C:\temp\AppAttach\&quot; &lt;/span&gt;&lt;/pre&gt;

&lt;p&gt;The second region will mount the disk and the third region will perform what is called the junction.  The final “stage region” will perform the actual attaching.&lt;br /&gt;
 &lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Step 6: Register Script&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;So now we have attached the app, but we don’t have it within the user space.  I have the variables assigned to the values I mentioned earlier to run MSIX Commander so let’s copy the Register region and paste it into PS.  Once completed, you will then see MSIX Commander in the Windows Start Menu like in the video.  If I log on another user, in this case a standard user, I can’t see the MSIX app because the register script only applied to the user account I was logged on at the time.  So for this demonstration, I will simply open PowerShell logged on as a standard user and paste the Register region script in once again.  While I may have to dig a little through the Start menu to see it, it now appears for the user at hand.&lt;/p&gt;

&lt;p&gt;Step 7:  Undoing the MSIX App Attach Environment&lt;/p&gt;

&lt;p&gt;Any MSIX package that can be registered can be deregistered as well.  To do so, simply copy the De-Reregister region of the script and paste it into PowerShell and run it.  Now the app will disappear from the start menu.  In the video, I switched over to my original domain admin account and ran the deregistering process as well.  The final step of undoing everything will be to de-stage it so it cannot be applied to users any longer.&lt;/p&gt;

&lt;p&gt;That completes the demonstration.  Go ahead and use the script I have included.  Just remember to modify the mentioned variables within the script when working with other MSIX files and such.  With a few run-throughs, you will be running in no time.&lt;/p&gt;

&lt;p&gt;Jeremy’s Compiled Script below for reference... !&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;Make an MSIX into a VHD&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;#Go and package your app using the MSIX App packager&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;#Generate a VHD or VHDX package for MSIX&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;#vlc&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;new-vhd -sizebytes 2048MB -path C:\ApplicationVHDs\MSICOMMANDER.vhdx -dynamic -confirm:$false&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;$vhdObject = Mount-VHD C:\ApplicationVHDs\MSIXCOMMANDER.vhdx -Passthru&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;$disk = Initialize-Disk -Passthru -Number $vhdObject.Number&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;$partition = New-Partition -AssignDriveLetter -UseMaximumSize -DiskNumber $disk.Number&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;Format-Volume -FileSystem NTFS -Confirm:$false -DriveLetter $partition.DriveLetter -Force&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;#Create a folder with your Appname as the name of the folder in root drive mounted above&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;new-item -path &#039;E:\MSIXCOMMANDER&#039; -ItemType Directory&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;#Expand MSIX in CMD in Admin cmd prompt - Get the full package name&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;.\msixmgr.exe -Unpack -packagePath &quot;.\MSIX Commander-x64.msix&quot; -destination &quot;E:\MSIXCOMMANDER&quot; -applyacls&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;#Cert&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;New-SelfSignedCertificate -Type CodeSigningCert -Subject &quot;CN=JeremyTest&quot;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;1. STAGE&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;---&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#MSIXCOMMANDER&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$vhdSrc=&quot;c:\ApplicationVHDs\MSIXCOMMANDER.vhdx&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$parentFolder = &quot;MSIXCOMMANDER&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$packageName = &quot;PascalBerger.MSIXCommander_1.0.7.5_x64__ajjbhed1xnq88&quot; &lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$parentFolder = &quot;\&quot; + $parentFolder + &quot;\&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$volumeGuid = &quot;5f51883c-6f50-4c6a-9afb-9513c6e7c565&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#NOTE: GET VOLUMEGUID after mounting VHD then use MOUNTVOL command to get volume GUID. Remove {}&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$msixJunction = &quot;C:\temp\AppAttach\&quot; &lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#endregion&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;

 &lt;/pre&gt;

&lt;pre&gt;
&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;#region mountvhd&lt;/span&gt;&lt;/strong&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;try &lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;{&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;    Mount-Diskimage -ImagePath $vhdSrc -NoDriveLetter -Access ReadOnly                 &lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;    Write-Host (&quot;Mounting of &quot; + $vhdSrc + &quot; was completed!&quot;) -BackgroundColor Green &lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;}&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;catch&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;{&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;    Write-Host (&quot;Mounting of &quot; + $vhdSrc + &quot; has failed!&quot;) -BackgroundColor Red&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;}&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#endregion&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;

 &lt;/pre&gt;

&lt;pre&gt;
&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;#region makelink&lt;/span&gt;&lt;/strong&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$msixDest = &quot;\\?\Volume{&quot; + $volumeGuid + &quot;}\&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;if (!(Test-Path $msixJunction)) &lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;{&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;    md $msixJunction&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;}&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$msixJunction = $msixJunction + $packageName&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;cmd.exe /c mklink /j $msixJunction $msixDest&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#endregion&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;

 &lt;/pre&gt;

&lt;pre&gt;
&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;#region stage&lt;/span&gt;&lt;/strong&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;[Windows.Management.Deployment.PackageManager,Windows.Management.Deployment,ContentType=WindowsRuntime] | Out-Null&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;Add-Type -AssemblyName System.Runtime.WindowsRuntime&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$asTask = ([System.WindowsRuntimeSystemExtensions].GetMethods() | Where { $_.ToString() -eq &#039;System.Threading.Tasks.Task`1[TResult] AsTask[TResult,TProgress](Windows.Foundation.IAsyncOperationWithProgress`2[TResult,TProgress])&#039;})[0]&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$asTaskAsyncOperation = $asTask.MakeGenericMethod([Windows.Management.Deployment.DeploymentResult], [Windows.Management.Deployment.DeploymentProgress])&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$packageManager = [Windows.Management.Deployment.PackageManager]::new()&lt;/span&gt;  &lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$path = $msixJunction + $parentFolder + $packageName # needed if we do the pbisigned.vhd&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$path = ([System.Uri]$path).AbsoluteUri&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
  &lt;span style=&quot;color:black&quot;&gt;$asyncOperation = $packageManager.StagePackageAsync($path, $null, &quot;StageInPlace&quot;)&lt;/span&gt;                                                                                                                &lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$task = $asTaskAsyncOperation.Invoke($null, @($asyncOperation))&lt;/span&gt;    &lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$task&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#endregion&lt;/span&gt;&lt;/pre&gt;

&lt;p&gt; &lt;/p&gt;

&lt;pre&gt;
&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;2. REGISTER&lt;/span&gt;&lt;/strong&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;----&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#MSIX app attach registration sample&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#region variables &lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#PBI&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#$packageName = &quot;PowerBI_1.0.0.0_x64__74tjgdb1s5w2y&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#MSICOMMANDER&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$packageName = &quot;PascalBerger.MSIXCommander_1.0.7.5_x64__ajjbhed1xnq88&quot; &lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$path = &quot;C:\Program Files\WindowsApps\&quot; + $packageName + &quot;\AppxManifest.xml&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#$path = &quot;E:\VLC\&quot; + $packageName + &quot;\AppxManifest.xml&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#endregion&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#region register&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;Add-AppxPackage -Path $path -DisableDevelopmentMode -Register&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#endregion&lt;/span&gt;&lt;/pre&gt;

&lt;p&gt; &lt;/p&gt;

&lt;pre&gt;
&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;3. DE-REGISTER&lt;/span&gt;&lt;/strong&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;---&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#MSIX app attach deregistration sample&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#region variables&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$packageName = &quot;PascalBerger.MSIXCommander_1.0.7.5_x64__ajjbhed1xnq88&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#endregion&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#region deregister&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;Remove-AppxPackage -PreserveRoamableApplicationData $packageName&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#endregion&lt;/span&gt;&lt;/pre&gt;

&lt;p&gt; &lt;/p&gt;

&lt;pre&gt;
&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;4. De-stage&lt;/span&gt;&lt;/strong&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;--&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#MSIX app attach de staging sample&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#region variables&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$packageName = &quot;PascalBerger.MSIXCommander_1.0.7.5_x64__ajjbhed1xnq88&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;$msixJunction = &quot;C:\temp\AppAttach\&quot;&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#endregion&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#region deregister&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;Remove-AppxPackage -AllUsers -Package $packageName&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;cd $msixJunction&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;rmdir $packageName -Force -Verbose&lt;/span&gt;&lt;/pre&gt;

&lt;pre&gt;
&lt;span style=&quot;color:black&quot;&gt;#endregion&lt;/span&gt;&lt;/pre&gt;

&lt;p&gt; &lt;/p&gt;

        </content:encoded>
    </item>
        <item>
        <title> How to Kill PUA on your Windows 10 Devices using Group Policy, Powershell and Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-kill-pua-on-your-windows-10-devices-using-group-policy-powershell-and-intune</link>
        <pubDate>2020-05-26T13:06:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Few things in this world are black and white and that includes software you download.&amp;nbsp; 

There is a lot of &amp;quot;gray-ish&amp;quot; stuff residing on computers today.&amp;nbsp; A good example is software that comes bundled with the computer or was installed by another software application of a different vendor.&amp;nbsp; 

Most of the time these applications aren&amp;rsquo;t something you want in the first place.&amp;nbsp; Other examples include advertising software or evasion software that actively tries  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Few things in this world are black and white and that includes software you download.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;There is a lot of &quot;gray-ish&quot; stuff residing on computers today.  A good example is software that comes bundled with the computer or was installed by another software application of a different vendor.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Most of the time these applications aren’t something you want in the first place.  Other examples include advertising software or evasion software that actively tries to dodge the detection of your cybersecurity tools.   While these software files may not pose a direct threat to your computer in the same way that malware, Trojans and other types of malicious software do, these unwanted applications can impede the performance of your endpoints.  These unwanted software servings are referred to as Potentially Unwanted Applications (PUA).  A PUA is an application that has a poor reputation.  These applications can serve as a time consuming distraction of cleaning up these files.  Over time, these applications can increase the risk to your network.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Windows 10 Defends Against PUAs&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;Windows 10 (Professional and Enterprise editions) can detect and block possibly harmful third party and unwanted applications using Windows Defender and does so without requiring &lt;span style=&quot;color:#16161d&quot;&gt;Defender ATP or Enterprise licenses.  &lt;/span&gt;When activated, the PUA security feature looks for certain file structures and conditions that include the following:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;The file is being scanned from the browser&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;The file is in a folder with &quot;downloads&quot; in the path&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;The file is in a folder with &quot;temp&quot; in the path&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;The file is on the user&#039;s desktop&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;The file does not meet one of these conditions and is not under %programfiles%, %appdata% or %windows%&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;Should these conditions be met, the file in question is then quarantined and not allowed to be installed until approved.  &lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Using PowerShell to Enable PUA&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;You can use PowerShell to enable PUA within Windows Defender.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5ecd48708d115-PUA1.png&quot; style=&quot;height:156px; width:606px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;The command options are as follows:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;code&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Set-MpPreference -PUAProtection Enabled&lt;/span&gt;&lt;/code&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;code&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Set-MpPreference -PUAProtection AudiMode&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color:#16161d&quot;&gt;The PS command will add and modify the DWORD value in the protected registry key as is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows Defender\MpEngine\MpEnablePus.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color:#16161d&quot;&gt;And assigns one of the following values.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;Disabled: 0 (Does not block PUAs)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;Enabled: 1 (Blocks PUAs)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;Audit Mode: 2 (PUA events are reported in Windows Event Viewer.  PUAs will not be blocked however)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;Of course, you can make the changes directly in the registry itself.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The end result is as follows:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5ecd48a8054c6-PUA2.png&quot; style=&quot;height:199px; width:1098px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Enabling PUA with Group Policy&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;For domain-joined machines, you can enable PUA protection through Group Policy.  Simply create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; Windows Defender Antivirus and enable “Configure protection for potentially unwanted applications.”&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5ecd48d9a9802-PUA3.png&quot; style=&quot;height:335px; width:900px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;Then choose which your desired option:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5ecd49069ab7e-PUA4.png&quot; style=&quot;height:603px; width:650px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#16161d&quot;&gt;You can also use Configuration Manager to deploy the setting as well.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:white&quot;&gt;05:07&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Enabling PUA with Microsoft Endpoint Manager (Intune)&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;You can configure the Def&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;ender/PUA Protection CSP for your Intune enrolled devices.  You can either create a configuration profile or use the preferred method of enabling and configuring a security baseline.  To create a configuration profile choose Windows 10 as the platform and Device restrictions as the profile type.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5ecd49c591183-PUA5.png&quot; style=&quot;height:473px; width:900px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;To deploy PUA using a security baseline, go to Endpoint Security &gt; Security Baselines &gt; Microsoft Defender ATP baseline &gt; Profile configure the “Defender potentially unwanted app action” setting as is shown below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5ecd4a529c5db-PUA6.png&quot; style=&quot;height:555px; width:800px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Enable PUA in Chromium-based Microsoft Edge&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;br /&gt;
The new Edge browser (version 80 and greater) contains its own PUA protection ability.  Go to your browser settings and select Privacy and services.  Then enable the “Block potentially unwarned apps” as is shown in the screenshot below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5ecd4af4c1388-PUA7.png&quot; style=&quot;height:424px; width:750px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;You can also deploy this Edge setting using Group Policy as well.  Simply create a GPO and go to Computer Configuration &gt; Administrative Templates &gt; Microsoft Edge &gt; SmartScreen settings and enable “Configure Microsoft Defender SmartScreen to block potentially unwanted apps.”&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5ecd4bb1d0484-PUA8.png&quot; style=&quot;height:365px; width:900px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;To enable the same setting using Microsoft Endpoint Manager, create a configuration profile and choose Windows 10 as the platform and Administrative Templates as the profile type.  Then go to Microsoft Edge &gt; SmartScreen Settings and enable “Configure Microsoft Defender SmartScreen to block potentially unwanted apps.&quot;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5ecd4c03a455c-PUA9.png&quot; style=&quot;height:347px; width:900px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;You should enable these PUA tools as a part of your multilayer security strategy.  Hardening your desktop devices and reducing their attack surface exposure is critically important.  Another way to stop PUA (or, really any unwanted file download) is application control via PolicyPak Least Privilege Manager.  You can check it out &lt;a href=&quot;https://www.policypak.com/products/least-privilege-manager.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Block regedit with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/block-regedit-with-intune</link>
        <pubDate>2020-03-02T09:15:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The last thing that standard users need on Windows 10 machines is access to REGEDIT.&amp;nbsp; It is one of the first things we block access to with Group Policy.&amp;nbsp; Surprising though, there is no native way in Intune to block it however.&amp;nbsp; The good news is that you can do it by creating a custom profile in Intune or any MDM.&amp;nbsp; I have included the information you need to create it below.&amp;nbsp; Now you can be rest assured that users won&amp;#39;t be causing issues and circumventing policies by ]]>
        </description>
        <content:encoded>
            &lt;p&gt;The last thing that standard users need on Windows 10 machines is access to REGEDIT.  It is one of the first things we block access to with Group Policy.  Surprising though, there is no native way in Intune to block it however.  The good news is that you can do it by creating a custom profile in Intune or any MDM.  I have included the information you need to create it below.  Now you can be rest assured that users won&#039;t be causing issues and circumventing policies by messing with the registry.&lt;/p&gt;

&lt;p&gt;OMA-URI:  &lt;code&gt;./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/IntuneEdu/EXE/Policy&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Data Type:  String (XML file)&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;&lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;RuleCollection&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Type&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;Exe&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;EnforcementMode&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;NotConfigured&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathRule&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Id&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;fd686d83-a829-4351-8ff4-27c7de5755d2&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Name&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;(Default Rule) All files&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Description&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;Allows members of the local Administrators group to run all applications.&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;UserOrGroupSid&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;S-1-5-32-544&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Action&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;Allow&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;          &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;Conditions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;            &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathCondition&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Path&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;*&quot;&lt;/span&gt; &lt;span style=&quot;color:maroon&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;          &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;Conditions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathRule&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathRule&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Id&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;ce9d9fd5-d765-48df-b87b-e1bafd5653ed&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Name&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;All files&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Description&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;Allows members of the Everyone group to run applications that are located in any folder.&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;UserOrGroupSid&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;S-1-1-0&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Action&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;Allow&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;          &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;Conditions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;            &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathCondition&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Path&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;*&quot;&lt;/span&gt; &lt;span style=&quot;color:maroon&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;          &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;Conditions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;                        &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;Exceptions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;     &lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePublisherCondition&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;PublisherName&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;ProductName&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;MICROSOFTÂ® WINDOWSÂ® OPERATING SYSTEM&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;BinaryName&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;REG.EXE&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;          &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;BinaryVersionRange&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;LowSection&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;*&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;HighSection&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;*&quot;&lt;/span&gt; &lt;span style=&quot;color:maroon&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePublisherCondition&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;                &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;Exceptions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathRule&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;     &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;RuleCollection&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Block CMD prompt with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/block-cmd-prompt-with-intune</link>
        <pubDate>2020-03-01T20:36:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Group Policy admins have been blocking access to command prompt for standard users since the beginning.&amp;nbsp; That is why it is frustrating for MDM admins having no native way in Intune to block it in the same fashion of Group Policy.&amp;nbsp; Well in actuality, you can block the cmd prompt, it just takes a custom profile, which is something that not everyone likes to do much.&amp;nbsp; Below is how you set it up so feel free to use the settings. &amp;nbsp;

OMA-URI:&amp;nbsp; ./Vendor/MSFT/AppLocker/Applica ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Group Policy admins have been blocking access to command prompt for standard users since the beginning.  That is why it is frustrating for MDM admins having no native way in Intune to block it in the same fashion of Group Policy.  Well in actuality, you can block the cmd prompt, it just takes a custom profile, which is something that not everyone likes to do much.  Below is how you set it up so feel free to use the settings.  &lt;/p&gt;

&lt;p&gt;OMA-URI:  &lt;code&gt;./Vendor/MSFT/AppLocker/ApplicationLaunchRestrictions/IntuneEdu/EXE/Policy&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Data Type:  String (XML file)&lt;/p&gt;

&lt;p&gt;Here is the XML code to paste in:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;&lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;RuleCollection&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Type&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;Exe&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;EnforcementMode&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;NotConfigured&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathRule&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Id&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;fd686d83-a829-4351-8ff4-27c7de5755d2&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Name&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;(Default Rule) All files&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Description&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;Allows members of the local Administrators group to run all applications.&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;UserOrGroupSid&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;S-1-5-32-544&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Action&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;Allow&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;          &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;Conditions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;            &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathCondition&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Path&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;*&quot;&lt;/span&gt; &lt;span style=&quot;color:maroon&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;          &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;Conditions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathRule&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathRule&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Id&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;ce9d9fd5-d765-48df-b87b-e1bafd5653ed&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Name&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;All files&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Description&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;Allows members of the Everyone group to run applications that are located in any folder.&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;UserOrGroupSid&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;S-1-1-0&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Action&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;Allow&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;          &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;Conditions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;            &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathCondition&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;Path&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;*&quot;&lt;/span&gt; &lt;span style=&quot;color:maroon&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;          &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;Conditions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;                        &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;Exceptions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;                    &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePublisherCondition&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;PublisherName&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;ProductName&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;MICROSOFTÂ® WINDOWSÂ® OPERATING SYSTEM&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;BinaryName&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;CMD.EXE&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;          &lt;span style=&quot;color:blue&quot;&gt;&lt;&lt;/span&gt;&lt;span style=&quot;color:maroon&quot;&gt;BinaryVersionRange&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;LowSection&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;*&quot;&lt;/span&gt; &lt;span style=&quot;color:red&quot;&gt;HighSection&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;=&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&quot;*&quot;&lt;/span&gt; &lt;span style=&quot;color:maroon&quot;&gt;/&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePublisherCondition&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;                &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;Exceptions&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;        &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;FilePathRule&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;&lt;span style=&quot;background-color:#fffffe&quot;&gt;     &lt;span style=&quot;color:blue&quot;&gt;&lt;!--&lt;/span--&gt;&lt;span style=&quot;color:maroon&quot;&gt;RuleCollection&lt;/span&gt;&lt;span style=&quot;color:blue&quot;&gt;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What are Azure Security Defaults and Who Should Use Them? (Part 2) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-are-azure-security-defaults-and-who-should-use-them-part-2</link>
        <pubDate>2020-02-25T14:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In Part 1, of our blog series outlining the details of Azure security defaults, we left off on the topic of MFA registration, which utilizes the Microsoft Authenticator app.&amp;nbsp; While all users MUST register for MFA, MFA is not required for all users every time.&amp;nbsp; Security defaults does enforce MFA for privileged accounts every time they log on as these accounts have increased access to your environment.&amp;nbsp; Security defaults requires added authentication for the following nine Azure adm ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;color:#404040&quot;&gt;In Part 1, of our blog series outlining the details of Azure security defaults, we left off on the topic of MFA registration, which &lt;/span&gt;utilizes the Microsoft Authenticator app.  While all users MUST register for MFA, MFA is not required for all users every time.  Security defaults does enforce MFA for privileged accounts every time they log on as these accounts have increased access to your environment.  Security defaults requires added authentication for the following nine Azure administrator roles.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;Global administrator&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;SharePoint administrator&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;Exchange administrator&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;Conditional Access administrator&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;Security administrator&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;Helpdesk administrator or password administrator&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;Billing administrator&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;User administrator&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;Authentication administrator&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;color:#171717&quot;&gt;MFA should be standard policy for all Azure admin account as account takeover attacks are one of the leading types of threats today.  Cybercriminals specifically target privileged accounts so special attention is needed.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Protecting all users&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Security defaults is about improving the protection for all users, not just admin accounts.  While MFA is not required of every logon attempt, non-admin users are prompted for additional authentication when connecting from a new device or app.  There may be other instances that trigger MFA for standard users as well.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Limitations of MFA using security defaults&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;As mentioned, security defaults gives you free access to Azure AD MFA.  Free however, has its limitations.  Some of these shortcomings are listed below.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Admins have no control over verification methods&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;SMS and phone calls are not available as second factors&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;You cannot configure trusted IPs for MFA exclusion&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;An exclusion account for emergency access&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;No MFA reports or fraud alerts&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Again, keep in mind that Azure security defaults gives you the bare security minimum.  To obtain more features and control over MFA, you will need to ante up some additional money.  If you have a license for Conditional Access but have not yet enabled it, you can use security defaults as a temporary security band-aid until you are ready to enable Conditional Access policies.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Blocking legacy authentication&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#171717&quot;&gt;The majority of compromising sign-in attempts come from legacy authentication.  These credential &lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;stuffing or account takeover attacks tend to be automated and performed by bot nets.  Legacy authentication utilizes protocols that only use basic authentication.  These outdated protocols only require single factor authentication and cannot enforce a second factor as part of the natural authentication flow.  This is in contrast to modern authentication, which does support second factor authentication.  Using legacy authentication, an imposter can simply bypass your active MFA policy.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Client applications or services that use legacy authentication also have a blaring vulnerability in that credentials are collected and then stored until validated against an authority.   Apps or services that utilize modern authentication never store credentials.  Instead, they only present them.  In other words, modern authentication never trusts the app or service that is requesting your credentials.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;For these reasons, it is highly recommended that legacy authentication protocols such as IMAP, SMTP and POP3 be blocked.  This means that clients cannot use an older version of Office 2010 but can use a more current version such as Office 2016.  Some email/faxing software and other types of applications require the use of these older protocols.  Make sure that none of your applications are using legacy authentication protocols before enabling security defaults.   &lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Protecting privileged actions&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;color:#171717&quot;&gt;We mentioned how security defaults uses MFA to protect privileged user accounts.  It also protects privileged actions as well.  This is important because non-admin users can be delegated to Azure Resources.  Azure services can be managed through the Azure Resource Manager API.  These services include:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;Azure portal&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;Azure PowerShell&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#171717&quot;&gt;Azure CLI&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;color:#171717&quot;&gt;These services give users tenant wide powers such as the ability to modify configurations, service settings and billing subscriptions.  This is why it is imperative to verify the identity of users that utilize them.  When enabled, security defaults will require added authentication before allowing delegated access. &lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Conclusion&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;color:#171717&quot;&gt;Azure AD security defaults certainly has its shortcomings and should not be considered a long-term solution for any sizable organization.  It also does not provide the rich security protections that many organizations need to satisfy security policies or compliances.  It does provide a “one-click” easy button that new tenants can use to protect themselves right out of the gate while they begin to learn their solution options.  While it may provide ample protection for small organizations, tenant owners should view it as a transitory measure only.  Security defaults is a great first step and one that hopefully, will better secure the entire O365 community as well.  &lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What are Azure Security Defaults and Who Should Use Them? (Part 1) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-are-azure-security-defaults-and-who-should-use-them-part-1</link>
        <pubDate>2020-02-25T13:20:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The old adage, &amp;ldquo;You can lead a horse to water but you can&amp;rsquo;t make them drink,&amp;rdquo; certainly applies to cybersecurity today.&amp;nbsp; &amp;nbsp;You can provide users and organizations with all types of cybersecurity tools and policies, but as long as they are optional, you cannot make them utilize them.&amp;nbsp; A case in point is the enforcement of multifactor authentication (MFA) for Azure.&amp;nbsp; Despite the fact that Microsoft attests that MFA will prevent 99.9 percent of account compromis ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;color:#404040&quot;&gt;The old adage, “You can lead a horse to water but you can’t make them drink,” certainly applies to cybersecurity today.   You can provide users and organizations with all types of cybersecurity tools and policies, but as long as they are optional, you cannot make them utilize them.  A case in point is the enforcement of multifactor authentication (MFA) for Azure.  Despite the fact that Microsoft attests that MFA will prevent 99.9 percent of account compromises, only around 8 percent of administrative accounts in Azure AD use it.  In a world in which credential stuffing attacks initiate billions of malicious login attempts on a monthly basis, MFA should be an enforced policy for every organization.  The hard truth is that we live in a digital world in which security is no longer optional.  &lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;Depreciation of Baseline Security Policies&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;Microsoft has already been providing a set of predefined policies to help organizations protect themselves against common attacks.  There were four baseline policies.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:#404040&quot;&gt;Require MFA for admins (preview)&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#404040&quot;&gt;End user protection (preview)&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#404040&quot;&gt;Block legacy authentication (preview)&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#404040&quot;&gt;Require MFA for service management (preview&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Azure admins could enable or disable them for their Azure userbase.  Unfortunately, too many organizations have not taken advantage of these policies or the rich set of security capabilities such as Conditional Access.  This not only makes them more vulnerable, but adds to the collective threat environment for everyone else as well.  Every computer that is compromised serves as one more potential attack vehicle that perpetrators can use for malicious deeds towards others.  The IT industry is starting to recognize that organizations not only have a responsibility to protect their own users, but share in the universal collective effort to make the world a less vulnerable place.  By hardening up our own attack surfaces, we harden the world as well.  As a result, Microsoft is depreciating these predefined policies on February 29, 2020, replacing them with the new “Security Defaults.”&lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;What are Azure Security Defaults?&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;The intention of Security Defaults is simple; provide an enforced default security state for all Azure organizations that do not implement security policy initiatives on their own.  S&lt;span style=&quot;color:#171717&quot;&gt;ecurity Defaults are available to all tenants and like &lt;/span&gt;Baseline Security policies, are offered at no additional cost.  New tenants will automatically have security defaults enabled by default.  If your tenant was created on or after October 22, 2019, chances are that security defaults is already enabled.  In the coming phase, Microsoft will begin retroactively enabling it for existing domains who have failed to enact any security measures on their own.  These security defaults enforce the following:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Unified Multi-Factor Authentication registration&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Multi-Factor Authentication enforcement&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Blocking legacy authentication&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Protecting privileged actions&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you are an existing tenant prior to the October date and currently and currently do not utilize security policies of any kind, you will need to enable Security Defaults for now.  You can do this by going to Azure Active Directory &gt; Properties &gt; “Manage Security defaults” and set the Enable security defaults toggle to Yes as is shown below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e38691df075d-SecurityDefaultedit_002.png&quot; style=&quot;height:799px; width:1283px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;If you currently utilize Conditional Access, Classic or Identity Protection policies that consist of settings that may conflict with any of the security default offerings, you will receive an error message when trying to enable default security policies as is shown below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e274090b50b5-MFA2.png&quot; style=&quot;height:470px; width:541px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Note that you will have to disable Security defaults before creating conditional access or other security policies that involve conflicting settings.  Keep in mind too that Security defaults is a bare minimum.  While they may be appropriate for small organizations, medium or large enterprises should expand into policies that are more comprehensive. &lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;MFA Registration&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;Let’s start with multifactor authentication.  Security defaults require all users within the tenant to register for MFA.  MFA requires a user to use a second method of authentication to prove their identity in addition to their logon credentials.  The most popular method currently is SMS MFA in which the user must type in a unique one-time code sent to their cell phone after logging on with their assigned credentials.  While this and other methods are available in Azure Conditional Access policies, it is not an available option under Security defaults.  Azure Security defaults only utilizes the Microsoft Authenticator app&lt;/p&gt;

&lt;p&gt;Once you enable Security defaults, users are required to register for MFA within 14 days.  The 14-day clock starts from the time the user logs on for the first time once the security defaults are enabled.  Should a user fail to register within this required time frame, the user will not be able to logon until the FMA registration is completed.  The screenshot below shows what users will see during the 14-day registration period.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e2740c5f2748-MFA3.png&quot; style=&quot;height:349px; width:537px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;In addition to completing the MFA registration process, users must also install the Microsoft Authenticator app on their cell phone.  We will cover &lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#171717&quot;&gt;Multi-Factor Authentication enforcement&lt;/span&gt;&lt;/span&gt; in Part 2 of this blog series. &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> MSIX … What it means for you… and managing those Applications </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/msix--what-it-means-for-you-and-managing-those-applications</link>
        <pubDate>2020-01-08T13:03:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ MSIX &amp;hellip; What it means for you&amp;hellip; and managing those Applications

Do not be alarmed if you see a file with an .msix extension to it.&amp;nbsp; MSIX is the latest application installer for Windows applications.&amp;nbsp; Now that you know what it is, the next question is probably, why does the world need another application installer? 

Good question.&amp;nbsp; After all, we already have three installer formats.


The current set of Installer Choices

The former trilogy of application ins ]]>
        </description>
        <content:encoded>
            &lt;h1&gt;&lt;span style=&quot;color:#2e74b5&quot;&gt;MSIX … What it means for you… and managing those Applications&lt;/span&gt;&lt;/h1&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;Do not be alarmed if you see a file with an .msix extension to it.  MSIX is the latest application installer for Windows applications.  Now that you know what it is, the next question is probably, why does the world need another application installer? &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;Good question.  After all, we already have three installer formats.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;br /&gt;
&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;The current set of Installer Choices&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;The former trilogy of application installers include EXE, MSI and AppX packages.  EXE installers are the most recognized and best suited for manual installs.  They incorporate GUI driven wizards that guide users through the installation process.  This allows for customized options such as multiple languages, add-ons and selected file paths.  EXE installers can also detect previous installations.  Because they are so accommodative to customization, they are also complex.   This makes unattended installs challenging.  EXE files also make admins very nervous in a malware world.  &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;MSI installers are simple, which is why they are best-suited silent unattended installations.  They too use graphical interfaces but do not offer extras or customized options, nor can MSI installers detect prior installations.  Finally, there are AppX installers.  These are used for Universal Windows apps and have similar characteristics to MSI installers in that they are simple and straightforward.  One thing that sets them apart from the other two is that they rely on container technology.  This isolates them from the rest of the operating system.  This makes them much more secure.  Unfortunately, AppX packages can only be used for Windows 10 so legacy machines cannot utilize them.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;br /&gt;
&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;The new alternative called MSIX&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;MSIX is the new kid in town.  It is not very popular as of yet as it was just released in 2018.  It is the alternative to the current three and Microsoft intends that the MSIX packaging solution to be the centerpiece of its deployment toolset eventually.  Like many great ideas from Microsoft, new tools and ways of doing things take time for organizations to digest them.  The MSIX installer platform does not have a great market presence as of yet.   That does not take away from its many benefits however.  MSIX has definite improvements over its predecessors as it combines the best features of MSI and APX into a single format.  Basically, it installs like an MSI file, but behind the scenes, installs like an AppX.  You can create MSIX packages with either an interactive user interface or command line sequence.  Let’s look at the advantages associated with this new installer format. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;h3&gt;&lt;br /&gt;
&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;Advantages of the MSIX Installer&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;One thing common to traditional applications is that tend to leave a footprint.  This footprint consist of AppData files and registry entries that never seem to get deleted after the application is uninstalled.  This clutter then lives on for the lifetime of the hosted machine.  MSIX has alleviated this.  Like AppX, MSIX is based on a containerized model.  This simplifies both the install and uninstall processes.  Uninstalling an MSIX package will remove any files and registry entries created by the app within the AppData folder, reducing machined clutter.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Unlike AppX installers, MSIX installers work on more than just Windows 10 machines and they support 32-bit applications.  Microsoft has released an SDK, which provides all API’s necessary to unpack an app package on multiple platforms.  Its cross-platform compatibility includes iOS, MacOS, Android, Linux and Windows 7.  In addition, the process of converting older applications to the MSIX format is far easier than to AppX.  You can also convert AppX applications to MSIX as well.  &lt;/span&gt;&lt;span style=&quot;color:#0a0a0a&quot;&gt;MSIX package bundling allows a single package to contain multiple language or device specific items, except unlike EXE installs, they options can be automatically selected by Windows. &lt;/span&gt; &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#000000&quot;&gt;MSIX can also hand over the updating process to the operating system.  This streamlines the updating process by making it more secure and reliable.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#000000&quot;&gt;Security is at the epicenter of MSIX.  MSIX applications are tamper proof because they must be digitally signed regardless of how the packages are installed.  For software vendors creating MSIX packages to publish in the Microsoft Store, Microsoft will sign the package once the approval process has been is complete.  Organizations intending to publish MSIX for direct download or internal network distribution must sign it with a valid code-signing certificate purchased from a certificate authority.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;&lt;span style=&quot;color:#1f4d78&quot;&gt;&lt;span style=&quot;background-color:white&quot;&gt;The MSIX Packaging Tool&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;

&lt;p&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;You can download the MSIX packaging tool from the Microsoft Store.  The package tool requires Windows 1809 and later.  Microsoft &lt;span style=&quot;background-color:white&quot;&gt;recommends that you create a clean VM for the conversion host.  Keep in mind that the MSIX Packaging Tool will assume the processor architecture of the Windows 10 OS version in which the conversion process is taking place. You must convert your installers in the same environment where you expect to deploy them.  &lt;/span&gt;Once installed, simply open the tool to begin the packaging wizard.  You will be first be asked to choose the selected task.  In this example, we are creating a new application package.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0e2f0db9dd8-MSIX1.png&quot; style=&quot;height:454px; width:893px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;You will then choose the desired packaging method.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0e2f3515dd5-MSIX2.png&quot; style=&quot;height:395px; width:791px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;The packaging tool will perform an assessment of the machine that will handle the conversion process.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0e2f5eb7c2e-MSIX3.png&quot; style=&quot;height:738px; width:979px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;You will then set out to create the package.  You need to select the installer you want to package.  Then you must select a signing preference.  Your choices are as follows:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0e2f84720d7-MSIX4.png&quot; style=&quot;height:150px; width:369px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;In the example below, we have selected an MSI installer with no arguments.  We are signing using a certificate from a certificate authority with the assigned password.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0e2fa57c3dc-MSIX5.png&quot; style=&quot;height:734px; width:973px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;Next, fill out required packaging information.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0e2fbbe74f2-MSIX6.png&quot; style=&quot;height:734px; width:975px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;Click “Next” and the installation process will begin. During this process, the packager will capture the registry or any files needed to install or configure the app. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0e30064c578-MSIX7.png&quot; style=&quot;height:401px; width:973px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#333333&quot;&gt;At this point, the conversion process will listen for any executables that are triggered at the initial launch of the application.  This is why it is essential use a quiet machine for the conversion process.  Captured executables will be displayed on the screen.  It is here that you will manage any first launch tasks.  You should launch the application at least one time in order to capture any first launch tasks.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0e302a02e2f-MSIX8.png&quot; style=&quot;height:384px; width:975px&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;Upon clicking “Next” you will asked to confirm that you wish to culminate the listening process.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0e304f63b26-MSIX9.png&quot; style=&quot;height:191px; width:601px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;Now choose a destination folder for the final package and click Create.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;background-color:white&quot;&gt;&lt;span style=&quot;color:#404040&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0e3069663f6-MSIX10.png&quot; style=&quot;height:738px; width:976px&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;That completes the MSIX packaging process.  Be prepared to see MSIX packages a lot more down the road.  &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Two Worlds Unite to Form Microsoft Endpoint Manager </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/two-worlds-unite-to-form-microsoft-endpoint-manager</link>
        <pubDate>2020-01-02T13:07:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ It is a wonderful thing when new initiatives benefit both the company behind the implementation and the customers they serve.&amp;nbsp; Such is the case with the announcement at Ignite 2019 that ConfigMgr and Intune are melding together to become one.&amp;nbsp; Together, the idea is that they will form a single management conglomerate tool called Microsoft Endpoint Manager.&amp;nbsp; 

The MEM console will show a single view of all devices managed by either product through a single interface.&amp;nbsp; Here&amp;# ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;It is a wonderful thing when new initiatives benefit both the company behind the implementation and the customers they serve.  Such is the case with the announcement at Ignite 2019 that ConfigMgr and Intune are melding together to become one.  Together, the idea is that they will form a single management conglomerate tool called Microsoft Endpoint Manager.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The MEM console will show a single view of all devices managed by either product through a single interface.  Here&#039;s an example.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/f5e0f596854a39-mem1.png&quot; style=&quot;height:541px; width:1120px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;So the idea is that you can now manage ConfigMgr devices through the MEM interface.  Of course, you can still manage through one or the other if you wish and there are some features that cannot be replicated amongst the two.  Separately, the two tools will be known as:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Endpoint Manager Microsoft Intune&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; (MEMMI)&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;Microsoft Endpoint Manager Configuration Manager&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt; (MEMCM)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;The merging of these two management systems now forms a new modern device management system that is exactly what internal IT needs to manage the modern workplace of today.  Modern management for the modern workspace.  That was a common theme at Ignite.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Branding and Licensing Simplification&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Some may say that the merging is a recognition by Microsoft that vast majority of companies continue to stick to ConfigMgr and Group Policy to manage enterprise desktop devices.  While Intune is capable of managing your entire Windows 10 environment, many companies continue to limit its management scope to mobile devices. &lt;/p&gt;

&lt;p&gt;For Microsoft, bringing the two management systems together under one roof allows them to simplify their branding under one incorporated name.  By integrating ConfigMgr into the Intune Portal itself, Microsoft is undoubtedly hoping that enterprises can better amalgamate themselves with the capabilities and functionality of MEMMI. &lt;/p&gt;

&lt;p&gt;Users will enjoy the simplification of both licensing and experience.  Those enterprises that currently have ConfigMgr licenses will automatically have Intune licenses too, allowing them to co-manage their desktop devices with both tools.  From a product perspective, admins will be able to view their mobile devices and ConfigMgr controlled PC’s from a single interface.  No more having to bounce repeatedly back and forth between interfaces throughout the course of the day.  Says Brad Anderson, Corporate Vice President at Microsoft, “&lt;span style=&quot;color:#333333&quot;&gt;It’s all about simplifying — and we’re taking that simplifying deep and broad from a branding, licensing and product perspective,”&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;By implementing the new co-existing licensing model, Microsoft is encouraging those companies that need to need leave existing systems in place to provision new machines as cloud-managed devices.  Regardless of how the device managed however, MEM provides a single view of all devices managed by either product.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;span style=&quot;color:#333333&quot;&gt;Examining the Licensing Structure&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So when you think of the new licensing model, think of the management scope of ConfigMgr.  ConfigMgr specializes in PC desktop management, so your PC devices are now automatically licensed for Intune as well so you can go ahead and enable co-management if you want. Note: Phones and non-Microsoft devices are still the exclusive domain of Intune (MEMMI) so those devices &lt;strong&gt;are not applicable&lt;/strong&gt; to receive dual licensing.   Note you will still need Azure Active Directory P1 licensing for your users.  Mobile devices, iOS and Linux machines will remain exclusively licensed under MEMMI.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Intelligence Driven &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Modern management systems must be intelligence based in order to maximize the user experience.  There are currently 190 million devices managed by either ConfigMgr or Intune.  The convergence of ConfigMgr and Intune greatly scales the potential use of telemetry power that Internal IT can utilize in its PC deployments and problem solving.  MEM will be introducing an array of intelligent actions that will give admins granular analysis as well as new comparative insights to their environments versus others. &lt;/p&gt;

&lt;p&gt;One example of this is Productivity Score.  Productivity Score will allow organizations to evaluate their employee and technology experiences into measurable metrics that Internal IT can use to justify the value that it brings to the organization.  From the perspective of the user experience, it will quantify how people are collaborating on content, developing a meeting culture and communicating with one another.  Real measured results concerning these types of user experiences can offer insights into how to enhance the user experience and increase productivity.    The technology experience will provide insights into assessing policies, device settings, device boot times, application performance and adherence to security compliances&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MEM is an Endpoint &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many of us predicted this would happen one day.  As companies strive towards digitally transforming their organizations from the ground up, it was only a matter of time until something was done to streamline the management of on-premise and mobile desktops in scale.   One point that Anderson emphasized his Intune presentation MEM is that the merging of these two management system giants is not a temporary arrangement.  Says Anderson,&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#393839&quot;&gt;&quot;Let me be very clear -- this vision includes both ConfigMgr and Intune.  Co-management isn&#039;t a bridge; it&#039;s a destination.&quot;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;MEM allows you to start utilizing cloud intelligence without making a single change to your ConfigMgr policies.  Working collaboratively together, yet visible and accessible through a single interface, MEM provides the modern management system that Windows enterprises need. End-to-end management and automation is now available in a converged license package.  Look for the MEM transformation to emerge within your Intune environment. &lt;/p&gt;

&lt;p&gt;     &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How I scraped a device out of Autopilot (the hard way) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-i-scraped-a-device-out-of-autopilot-the-hard-way</link>
        <pubDate>2019-11-21T15:23:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I have a few Azure + Intune tenants for testing. So I decided to take a laptop and move it from one tenant to another.

As you&amp;rsquo;ll recall from my book in Chapter 8, every device has a serial number and hardware ID. You manufacture this into a CSV file from a Powershell script. When I uploaded the CSV into my other tenant, I got this.



Okay. No problem. I&amp;rsquo;ll just&amp;hellip; go to the original tenant where I know this device lives and find it and be on my merry way.

No. No. And  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I have a few Azure + Intune tenants for testing. So I decided to take a laptop and move it from one tenant to another.&lt;/p&gt;

&lt;p&gt;As you’ll recall from my book in Chapter 8, every device has a serial number and hardware ID. You manufacture this into a CSV file from a Powershell script. When I uploaded the CSV into my other tenant, I got this.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img-1.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Okay. No problem. I’ll just… go to the original tenant where I know this device lives and find it and be on my merry way.&lt;/p&gt;

&lt;p&gt;No. No. And no.&lt;/p&gt;

&lt;p&gt;Let’s talk about what you should do, then I’ll explain what I had to do.&lt;/p&gt;

&lt;h2&gt;What you should do&lt;/h2&gt;

&lt;p&gt;The first thing to do is to look at the serial number in the CSV file from the machine you want to transfer over. In my case, the serial number was PC012345 (or something like that.) You can see that here.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img-19119-2.jpg&quot; /&gt;&lt;/p&gt;

&lt;p&gt;What you’re supposed to do next is merely go to Intune | Device enrollment | Windows enrollment and see the list of Autopilot devices. There, you can search for the serial number.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Remember:&lt;/strong&gt; My serial number was PC012345. But if you look below, there is no computer with that serial number. There’s PBW-something-something. But no PC0-something-something.&lt;/p&gt;

&lt;p&gt;Note also that there is no other search possible; it’s serial number or nothing.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img-19119-3.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Ohhhkay. So maybe this is at least hanging out in Azure AD. Let’s check. Nope. No luck.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img-19119-4.jpg&quot; /&gt;&lt;/p&gt;

&lt;p&gt;But I knew it was, in fact using Autopilot to get connected to my Fabrikam1000.com tenant. How do I know? Because I set up branding (also explained in Chapter 8 of &lt;a href=&quot;https://www.mdmandgpanswers.com/books&quot;&gt;my MDM book&lt;/a&gt;)! This is critical, so you know you’re not going crazy. Branding really helps you identify that your machine really is under your Autopilot control.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img-19119-5.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Then now in Azure AD, you can see the computer show up here.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img-19119-6.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;But the darn computer still wasn’t in Windows Autopilot devices.&lt;/p&gt;

&lt;p&gt;I was stumped.&lt;/p&gt;

&lt;p&gt;I got some help from some fellow MVPs, the final “winner” being &lt;a href=&quot;https://twitter.com/sandy_tsang?lang=en&quot;&gt;Sandy Zang, another Enterprise Mobility MVP&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Sandy suggested I click on every computer I have in Autopilot to see if something popped out. Because I didn’t have too, too many… I did just that, and found this.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img-19119-7.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Holy crap. What’s happening here?&lt;/p&gt;

&lt;h1&gt;What I needed to do...&lt;/h1&gt;

&lt;p&gt;Well somehow in Autopilot’s brain, my computer’s hardware ID is swapped with some other computer. I don’t claim to know how or why this happened. But at least I had a clue now!&lt;/p&gt;

&lt;p&gt;So, okay.. Next would be to nuke that machine.. Which I attempted to, and this happened.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img-19119-8.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Then I remembered there’s another whole portal to check for Autopilot. In the Microsoft Store for Business. Those two records PBXXXX (not my computer) were indeed there. And, clicking on them and pressing delete made them vaporize !&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img-19119-9.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;I then went back to Intune and Autopilot and clicked Sync then Refresh.. and Bingo !! Phantom machines obliterated !&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img-19119-10.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Kudos to Sandy for the thought. I wouldn’t have gotten there without the idea.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Microsoft Endpoint Manager and Group Policy (or what I learned at Ignite 2019) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/microsoft-endpoint-manager-and-group-policy-or-what-i-learned-at-ignite-2019</link>
        <pubDate>2019-11-18T13:50:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So Ignite 2019 is behind me (and us).&amp;nbsp; And I wanted to give you some of my insights into what I took away (and how I participated.)

First, Microsoft is such a huge company that this year, with all the new stuff coming out (or changes to existing products) Microsoft put out a &amp;ldquo;book of news&amp;rdquo; which is a giant PDF of all the what&amp;rsquo;s new. It&amp;rsquo;s only 85 pages. Ow ow ow ow ow.

https://news.microsoft.com/wp-content/uploads/prod/sites/563/2019/11/Ignite-2019-Book-of-News- ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So Ignite 2019 is behind me (and us).  And I wanted to give you some of my insights into what I took away (and how I participated.)&lt;/p&gt;

&lt;p&gt;First, Microsoft is such a huge company that this year, with all the new stuff coming out (or changes to existing products) Microsoft put out a “book of news” which is a giant PDF of all the what’s new. It’s only 85 pages. Ow ow ow ow ow.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://news.microsoft.com/wp-content/uploads/prod/sites/563/2019/11/Ignite-2019-Book-of-News-2.pdf&quot; style=&quot; padding-left: 30px&quot;&gt;https://news.microsoft.com/wp-content/uploads/prod/sites/563/2019/11/Ignite-2019-Book-of-News-2.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That being said, I’m going to cut to the chase for what I specialize in and think most about: Windows desktop management with Group Policy and MDM.&lt;/p&gt;

&lt;p&gt;It starts off with this announcement: Microsoft SCCM and Microsoft Intune are now under a unified product umbrella called “MEM”: Microsoft Endpoint Manager. With this, naturally, there are going to be some questions:&lt;/p&gt;

&lt;ul style=&quot;padding: 10px 0 20px 40px;&quot;&gt;
	&lt;li&gt;What does this mean for you?&lt;/li&gt;
	&lt;li&gt;What does this mean for on-prem (SCCM and Group Policy) worlds?&lt;/li&gt;
	&lt;li&gt;And what does this mean for existing SCCM and existing Intune customers?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let me try to answer that in this blog. To do that, I want to quote Microsoft leadership (VP Brad Anderson) in his kickoff address:&lt;/p&gt;

&lt;blockquote style=&quot;margin-left: 40px;&quot;&gt;
&lt;p&gt;&lt;em&gt;&quot;Modern management does not mean cloud-only.  It does not mean a migration away from ConfigMgr, or a migration to Intune.  Modern management puts the cloud intelligence that comes from organizations like Microsoft to work to automate  tasks,  prioritize your efforts, connect the IT and Security teams, and continually improve the user experience.  We do believe the destination many organizations will arrive at over time will be a cloud-only management solution with Intune and Microsoft 365 at the center, but we want to enable you to take advantage of our cloud capabilities incrementally at your own pace – without replacing infrastructure as some of you may not be ready for a full cloud migration.  This enables you to  get cloud value along with your on-prem deployments, on the road to full cloud/modern transformation.&quot;&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Let’s break this down (my words interpreting Brad; this is not Brad himself):&lt;/p&gt;

&lt;ul style=&quot;padding: 10px 0 20px 40px;&quot;&gt;
	&lt;li&gt;“Hey Microsoft Customer”: what you’re doing now is okay. (SCCM &amp; Group Policy still has a place, works as expected and continues to work for desktops, onprem servers, VDI etc.)&lt;/li&gt;
	&lt;li&gt;“Hey Microsoft Customer”: Cloud is great. If you’re ready for it, great. When you start to use it you’ll get added cloud benefits.&lt;/li&gt;
	&lt;li&gt;“Hey Microsoft Customer”: You don’t have to DUMP AND JUMP what you’ve built to cloudland. We think you’ll get there eventually.&lt;/li&gt;
	&lt;li&gt;&quot;Hey Microsoft Customer&quot;: The tools you use today, like Group Policy and SCCM, aren’t going away.  &lt;strong&gt;In fact, they can&#039;t go away.&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is ALL good news. For all scenarios and customers: What you’re doing isn’t going away, but there’s options for you if you want to take advantage of the cloud. Indeed, the newest philosophy and guidance (which I took away from multiple sessions) appears to be:&lt;/p&gt;

&lt;ul style=&quot;padding: 10px 0 20px 40px;&quot;&gt;
	&lt;li&gt;Keep your PCs / servers / Citrix/ VDI / everything in Group Policy / SCCM land for now.&lt;/li&gt;
	&lt;li&gt;Cloud attach / Hybrid Azure AD join to gain some cloud attached features, increased security, reporting, and insights.&lt;/li&gt;
	&lt;li&gt;From a policy (and workload) management perspective: pick one. Group Policy or MDM or SCCM for the particular job.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;On stage, at least two Microsoft-led sessions referenced &lt;a href=&quot;http://mdmandgpanswers.com/book&quot;&gt;my new MDM book&lt;/a&gt; (whoa! Thanks Microsoft friends!) and expressed (my sentiment) that trying to untangle a machine with both Group Policy **AND** MDM settings on the same box is a difficult problem. And one that should be avoided.&lt;/p&gt;

&lt;p&gt;In Ghostbuster’s parlance:&lt;/p&gt;

&lt;blockquote style=&quot;margin-left: 40px;&quot;&gt;
&lt;p&gt;“Don’t cross the streams…it would be bad. Try to imagine all life as you know it stopping instantaneously and every molecule in your body exploding at the speed of light.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;(Full scene here: &lt;a href=&quot;https://www.youtube.com/watch?v=wyKQe_i9yyo&quot;&gt;https://www.youtube.com/watch?v=wyKQe_i9yyo&lt;/a&gt; )&lt;/p&gt;

&lt;p&gt;Maybe not that bad, but.. in that ballpark.&lt;/p&gt;

&lt;p&gt;So what does this mean for you? The “take away” advice I felt I got was: once you’re settled and have the cloud / Azure/ MDM  (Intune or other) &lt;strong&gt;reasonably handled&lt;/strong&gt;, then NEW deployments of Windows 10 can be cloud only … from a management and policy perspective.&lt;/p&gt;

&lt;p&gt;So how can Group Policy, Azure, MDM and SCCM be used at the same time… but take on different (non-conflicting) roles? Here’s an example:&lt;/p&gt;

&lt;ul style=&quot;padding: 10px 0 20px 40px;&quot;&gt;
	&lt;li&gt;Roll out a machine using Azure and Autopilot and perform a hybrid Azure AD join.&lt;/li&gt;
	&lt;li&gt;Machine gets on-prem Group Policy setting for Windows-y and security things.&lt;/li&gt;
	&lt;li&gt;Machine gets software deployment settings from MDM.&lt;/li&gt;
	&lt;li&gt;Machine gets patching and updates from SCCM.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Again: That’s just one way to slice it. There are surely others.&lt;/p&gt;

&lt;p&gt;So… the message to customers from Microsoft would now be (again, my interpretation; not one person directly.):&lt;/p&gt;

&lt;ol style=&quot;padding: 10px 0 20px 40px; line-height: 30px;&quot;&gt;
	&lt;li&gt;Get ready for, understand, and use the cloud when you can.&lt;/li&gt;
	&lt;li&gt;Attach your on-prem universe to the cloud for cloud-attached benefits.&lt;/li&gt;
	&lt;li&gt;Yes, we realize utilizing the cloud could actually be a long, long time before you get there and are comfortable. Perhaps many years.&lt;/li&gt;
	&lt;li&gt;Once you’re there in cloudland, we recommend new PC deployments can be in the cloud.&lt;/li&gt;
	&lt;li&gt;Even then, we realize Group Policy will always be used for some circumstances, and we’re cool with that. (So, once again, Group Policy isn’t somehow ‘going away.’). Indeed, even today Windows Virtual Desktop requires on-prem Active Directory and Group Policy even though the WVD machines are in Azure / the cloud. (You can see my &lt;a href=&quot;https://www.policypak.com/pp-blog/windows-virtual-desktop&quot;&gt;walkthrough and gettings started with WVD here&lt;/a&gt; if you want to give it a try!)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;That being said, Microsoft is trying to make it easier for you to take your existing Group Policy settings and see if it’s possible to use them in MDM-land if you choose to do it. Already, they have &lt;a href=&quot;http://github.com/WindowsDeviceManagement/MMAT&quot;&gt;the MMAT tool &lt;/a&gt;which can analyze your existing Group Policy Objects (or an endpoint) and give you a report on what will, and what won’t transition to MDM-land. .. and I talk about it in my MDM book, chapter 5. &lt;a href=&quot;http://www.MDMandGPanswers.com/book&quot;&gt;Get your signed copy now&lt;/a&gt;.?)&lt;/p&gt;

&lt;p&gt;What was announced this week with regards to Group Policy and Intune are two items:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1.&lt;/strong&gt; Microsoft is going to ship a “CSE TOOL” which customers can add-into Windows 10, when a machine is born, or after the fact. This CSE Tool will then be able accept &lt;em&gt;some directives&lt;/em&gt; from your MDM service (like Intune or others) and poke at SOME Microsoft Group Policy  CSEs to instantiate some Group Policy functions. The first items that Microsoft is tackling are:&lt;/p&gt;

&lt;ol style=&quot;padding: 10px 0 20px 40px;&quot;&gt;
	&lt;li&gt;Drive maps.&lt;/li&gt;
	&lt;li&gt;NON “Microsoft policies keys” in Registry (think unusual ADM / ADMX files).&lt;/li&gt;
	&lt;li&gt;Auditing.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;These items are interesting if the idea is to stop using Group Policy for these items and then use MDM instead. (Again, don’t cross the streams.) What is interesting though is that (again) the MDM provider will have to call this CSE tool, which then actually performs the work in the Group Policy CSE. &lt;strong&gt;Which, once again, friends … means that Group Policy cannot die.&lt;/strong&gt; This essentially guarantees it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2.&lt;/strong&gt; Microsoft also demonstrated a future feature in Intune, which is SIMILAR in practice to MMAT I mentioned above. The gist is that you can show Intune a GPO backup which Intune can now analyze. Then if the settings in the GPO exist, an Intune profile will be made (with    the equivalent settings in Intune land.)&lt;/p&gt;

&lt;p&gt;That being said, as was repeated several times across multiple sessions: &lt;strong&gt;If you’re going to attempt a transition from Group Policy to MDM, don’t “lift and shift” over your settings without making proper decisions to keep or kill a setting.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Then, additionally, if you’ve now lifted and shifted Group Policy to MDM… here we go again… &lt;strong&gt;don’t cross the streams&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;With any tool which makes things easier, use it wisely with a heap of planning to know what your destination should look like. Don’t just use the tool (any tool) because it’s there.&lt;/p&gt;

&lt;p&gt;My little inner fear here is that many companies won’t heed this advice, and very quickly be in the same place like “&lt;strong&gt;I’ve got too many MDM profiles where I don’t know what they’re doing !&lt;/strong&gt;!” as they already do in the “&lt;strong&gt;I’ve got too many GPOs where I don’t know what they’re doing!!&lt;/strong&gt;” &lt;em&gt;place they are right now&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;So in summary, here’s what I learned at Ignite 2019:&lt;/p&gt;

&lt;ul style=&quot;padding: 10px 0 20px 40px;&quot;&gt;
	&lt;li&gt;Intune and SCCM are now under one umbrella: Microsoft Endpoint Manager. Indeed, if you’re an existing SCCM customer, you now automatically get Windows Intune licenses for managing Windows devices via Intune. Note that this doesn’t mean you magically get, say, iOS or Mac or other non-Windows PC licenses. Also note this requires an Azure Active Directory P1 (at least) subscription  for your organization.&lt;/li&gt;
	&lt;li&gt;It’s okay to be on-prem, and it’s okay to be cloud. Cloud is a destination, but destinations take a long time to manifest.&lt;/li&gt;
	&lt;li&gt;Microsoft is increasing their tooling for Group Policy understanding and to take on some better Group Policy to MDM migration scenarios for those who feel they are ready to go there.&lt;/li&gt;
	&lt;li&gt;(&lt;strong&gt;once again&lt;/strong&gt;) &lt;em&gt;Group Policy isn’t dead&lt;/em&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, take a deep breath. You’re doing fine. If you’ve got no toes in, or one toe in, or nine toes into the cloud… you’re doing fine. And, yes, I realize, you cannot put toes into cloud, but just  go with me here.&lt;/p&gt;

&lt;p&gt;I hope this blog entry helps you out and you’ll share it with your friends, your boss, and anyone else who wants to learn what’s new in management this year from Ignite 2019.&lt;/p&gt;

&lt;p&gt;PS: Here’s some pictures of me at Ignite:&lt;/p&gt;

&lt;ul style=&quot;padding: 10px 0 20px 40px;&quot;&gt;
	&lt;li&gt;First in the Microsoft Endpoint manager booth (&lt;a href=&quot;https://twitter.com/jeremymoskowitz/status/1192204319745024005&quot;&gt;https://twitter.com/jeremymoskowitz/status/1192204319745024005&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Second at the bookstore with my Group Policy and MDM books &lt;a href=&quot;https://twitter.com/jeremymoskowitz/status/1191776777452032002&quot;&gt;https://twitter.com/jeremymoskowitz/status/1191776777452032002&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Third, petting a therapy animal who is there for some down time with the geeks &lt;a href=&quot;https://twitter.com/jeremymoskowitz/status/1191782442354532353&quot;&gt;https://twitter.com/jeremymoskowitz/status/1191782442354532353&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Ignite 2019 was really bananas, and it was awesome seeing many of you in person !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Two (not Jeremy) blog posts about Windows Update for Business&#039; Rings </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/two-not-jeremy-blog-posts-about-windows-update-for-business-rings</link>
        <pubDate>2019-07-10T15:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Windows Update for Business is the method where you can use Group Policy, SCCM or Intune to describe &amp;quot;rings&amp;quot; for your business. In these rings, you express &amp;quot;who is going to go first&amp;quot; to get updates.

Then, who will go next, and so on.

I explain these rings in details in my new MDM book.

But I wanted to share two Microsoft blog entries on this important topic, since it comes up from time to time. These are good extra sources of information.

https://techcommunity.mic ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Windows Update for Business is the method where you can use Group Policy, SCCM or Intune to describe &quot;rings&quot; for your business. In these rings, you express &quot;who is going to go first&quot; to get updates.&lt;/p&gt;

&lt;p&gt;Then, who will go next, and so on.&lt;/p&gt;

&lt;p&gt;I explain these rings in details in my &lt;a href=&quot;http://gpanswers.com/book&quot;&gt;new MDM book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;But I wanted to share two Microsoft blog entries on this important topic, since it comes up from time to time. These are good extra sources of information.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Deployment-rings-The-hidden-strategic-gem-of-Windows-as-a/bc-p/664595&quot;&gt;https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Deployment-rings-The-hidden-strategic-gem-of-Windows-as-a/bc-p/664595&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;-&lt;a href=&quot;https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Tactical-considerations-for-creating-Windows-deployment-rings/ba-p/746979&quot;&gt;https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Tactical-considerations-for-creating-Windows-deployment-rings/ba-p/746979&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hope these help you out!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Interesting Microsoft Internal IT talk about their transition to Modern Management </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/interesting-microsoft-internal-it-talk-about-their-transition-to-modern-management</link>
        <pubDate>2019-06-19T11:15:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I found this 200% by accident.. It&amp;#39;s pretty interesting.. about Microsoft&amp;#39;s own transition to Microsoft Management. What&amp;#39;s going well, what isn&amp;#39;t, and so on.

Someone dares to ask the question of &amp;quot;When will Microsoft completely walk away from traditional management?&amp;quot; The answer ... is toward the end ...&amp;nbsp;

Spoiler alert: It&amp;#39;s gonna be a while.&amp;nbsp;

Still interesting, and they&amp;#39;re putting one foot in front of the other.

https://www.microsoft.com/en- ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I found this 200% by accident.. It&#039;s pretty interesting.. about Microsoft&#039;s own transition to Microsoft Management. What&#039;s going well, what isn&#039;t, and so on.&lt;/p&gt;

&lt;p&gt;Someone dares to ask the question of &quot;When will Microsoft completely walk away from traditional management?&quot; The answer ... is toward the end ... &lt;/p&gt;

&lt;p&gt;Spoiler alert: It&#039;s gonna be a while. &lt;/p&gt;

&lt;p&gt;Still interesting, and they&#039;re putting one foot in front of the other.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.microsoft.com/en-us/itshowcase/it-expert-roundtable-modern-desktop-and-device-management&quot;&gt;https://www.microsoft.com/en-us/itshowcase/it-expert-roundtable-modern-desktop-and-device-management&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> A Short Tour of the Intune Customer Adoption Pack </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/a-short-tour-of-the-intune-customer-adoption-pack</link>
        <pubDate>2019-06-18T09:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Intune has come a long way since its inception and now offers a lot of great features to manage your organization&amp;rsquo;s mobile and Windows 10 devices.&amp;nbsp; The MDM approach to device management is a real change from years ago in which computing devices were either managed through the traditional AD joined domain model or were simply allowed to operate independently at the discretion of the user.&amp;nbsp;

Intune continues to introduce cloud based services that streamline and secure your device ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Intune has come a long way since its inception and now offers a lot of great features to manage your organization’s mobile and Windows 10 devices.  The MDM approach to device management is a real change from years ago in which computing devices were either managed through the traditional AD joined domain model or were simply allowed to operate independently at the discretion of the user. &lt;/p&gt;

&lt;p&gt;Intune continues to introduce cloud based services that streamline and secure your devices, but users are often slow to accept changes into their environment.  In order to better educate users about the importance and need for device management and mobile security, Microsoft just recently updated the Intune Customer Adaption Pack in order to make the change in approach more palatable and decrease the transition time of Intune enrollment.  The adaption pack is especially valuable to organizations that previously did not require mobile devices to be enrolled for work access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What’s in the Intune Customer Adaption Pack&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Adaption Pack is essentially a comprehensive communication plan that sets out to accomplish three objectives:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Education users in how to enroll their particular devices in Intune&lt;/li&gt;
	&lt;li&gt;Reassure users about their privacy concerning what type of device data is shared with IT&lt;/li&gt;
	&lt;li&gt;Explains the safeguards in place to protect user privacy and company resources&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The adaption kit is suited for IT admins, management and trainers to educate, prepare and guide their users for the enrollment process.&lt;/p&gt;

&lt;p&gt;You can download the Intune Adaption Pack &lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=58348&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#222222&quot;&gt;IT admins, management, and trainers&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;The link downloads a zip file that includes a variety of documents, videos, posters and templates that can be leveraged to spread Intune adaption throughout your organization.   The enclosed contents are shown in the screenshot below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/AK1.png&quot; style=&quot;height:256px; width:899px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The Welcome document outlines what is in the adaption kit.  The kit includes two email templates that can be used to communicate with your users about the coming transition to Intune.  You can use them as written or customize them according to your needs.  An example of email #1 is shown below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/ak2.jpg&quot; style=&quot;height:268px; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;As part of the&lt;/span&gt;&lt;span style=&quot;color:#c00000&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;, all employees worldwide will soon transition to Microsoft Intune, a unified mobile device management platform. Intune enables you to work productively and securely from anywhere, at any time and across all of your devices. All other mobile device management platforms used worldwide to secure&lt;/span&gt;&lt;span style=&quot;color:#c00000&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;documents, devices, and corporate data will be retired.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;The email goes on to explain some of the benefits and expectations of Intune as well as a schedule of the coming steps that they will be asked to complete at the appropriate time.  This opening email also provides an&lt;span style=&quot;color:#333333&quot;&gt; opportunity to showcase any other new services whose access will be granted on devices managed by Intune.  &lt;/span&gt;These required actions are then outlined in the second email template that also reinforces the benefits and strategic reasons for the migration and provides users a timeline for the outlined process. &lt;/p&gt;

&lt;p&gt;The Intune Deployment Guide provides a wealth of information for your users that is compressed into two palatable pages that they can quickly read and apprehend.  The guide also includes a Word version that allows you to customize and include your internal resources and contact information.  Some of the topics outlined include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;What information about their personal devices can and cannot be seen by IT?  This includes a link to the Intune privacy policy. &lt;/li&gt;
	&lt;li&gt;How internal IT will use the company portal or app store to install work apps&lt;/li&gt;
	&lt;li&gt;What users can do if their mobile device is lost or stolen&lt;/li&gt;
	&lt;li&gt;Security steps IT can take to secure data residing on enrolled devices&lt;/li&gt;
	&lt;li&gt;Intune enrollment links for each applicable operating system&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An example of the guide is shown below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/ak3.png&quot; style=&quot;height:349px; width:1726px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Training Videos&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you’ve had concerns about how to train your users to complete the enrollment process, the enclosed videos in the Adaption Pack will be a welcome tool.  The videos are step-by-step YouTube videos that show users how to easily enroll their devices in Intune.  Below is a screenshot of the Windows 10 video.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/ak4.png&quot; style=&quot;height:663px; width:1176px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Two videos demonstrate how to either enroll an Android device for full management or enroll for Work Profile management.  An example of the Android device management is shown below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/ak5.png&quot; style=&quot;height:657px; width:1178px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The videos not only provide step-by-step directions on how to complete the enrollment process, but also summarizes again what information Intune has access to when it comes to user devices.  An example of this is shown in the MacOS video.  Note that there is also a separate video concerning iOS devices as well.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/ak6.png&quot; style=&quot;height:647px; width:1174px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A Great Tool to Assure a Smooth Transition&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Intune Customer Adaption Kit gives you out-of-the-box training tools to educate your users about why Intune enrollment is so important.  It can help ensure that all targeted devices are enrolled quickly without the constant prodding of your users asking “what to do.”  By effectively communicating the necessary messages and information to your users, you will be able to begin enforcing compliance through conditional policies for all of your targeted devices.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Interesting Rando-News </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/interesting-randonews</link>
        <pubDate>2019-06-14T09:12:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Interesting Rando-News&amp;nbsp;

First, I know in my last email I said writing my book took &amp;quot;none&amp;quot; months. I meant nine. Nine months.
These newsletters don&amp;#39;t have an editor, or even a good spellchecker. So they&amp;#39;re a bit off the cuff.
My book has eyeballs and eyeballs of real pros looking at it. Even THEN there will be errors, but, hey.. they&amp;#39;re nicely shellacked !

Next, here&amp;#39;s a bunch of items I&amp;#39;ve been sitting on for a bit.&amp;nbsp;

Item 1: Windows 1903
---
I ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Interesting Rando-News &lt;/p&gt;

&lt;p&gt;First, I know in my last email I said writing my book took &quot;none&quot; months. I meant nine. Nine months.&lt;br /&gt;
These newsletters don&#039;t have an editor, or even a good spellchecker. So they&#039;re a bit off the cuff.&lt;br /&gt;
My book has eyeballs and eyeballs of real pros looking at it. Even THEN there will be errors, but, hey.. they&#039;re nicely shellacked !&lt;/p&gt;

&lt;p&gt;Next, here&#039;s a bunch of items I&#039;ve been sitting on for a bit. &lt;/p&gt;

&lt;p&gt;Item 1: Windows 1903&lt;br /&gt;
---&lt;br /&gt;
I know you already know that Windows 1903 is out. Buuut.. it seems a little mysterious how to GET it and what&#039;s IN IT. Well, here&#039;s a blog which explains both. Be sure to click on &quot;What&#039;s new for IT Pros in Windows 10, 1903&quot; for all the best stuff.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#Sot6SPqZhUjM7lSa.97&quot;&gt;https://blogs.windows.com/windowsexperience/2019/05/21/how-to-get-the-windows-10-may-2019-update/#Sot6SPqZhUjM7lSa.97&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Item 2: 1903 Baselines are out&lt;br /&gt;
---&lt;br /&gt;
So Baselines are preconfigured advice which can be delivered via Group Policy or an MDM service like  Intune. (And, YES, of course with ALL CAPS I cover this in my &quot;Group Policy (with a side of MDM)&quot; training class, AND also in Chapter 10 of my new MDM/Intune/Autopilot/Azure book !)&lt;/p&gt;

&lt;p&gt;Those baselines are here:  &lt;a href=&quot;https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines&quot;&gt;https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And, here&#039;s the official blog entry on it:&lt;br /&gt;
&lt;a href=&quot;https://blogs.technet.microsoft.com/secguide/2019/05/23/security-baseline-final-for-windows-10-v1903-and-windows-server-v1903/&quot;&gt;https://blogs.technet.microsoft.com/secguide/2019/05/23/security-baseline-final-for-windows-10-v1903-and-windows-server-v1903/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But, it&#039;s Item #3, that&#039;s related to Item #2 that&#039;s the big interesting thing.&lt;/p&gt;

&lt;p&gt;Item #3: Microsoft no longer recommends password rotation for regular users. &lt;br /&gt;
--&lt;br /&gt;
Yep, so inside the Baselines, Microsoft has taken a step back from requiring that users rotate their passwords. At first glance you might think &quot;Wow, that really sounds like it LOWERS my security posture.&quot; But then, the real reason why this can be a good idea is found when you dig into Aaron Margosis&#039; blog: &quot;If an organization has successfully implemented banned-password lists, multi-factor authentication, detection of password-guessing attacks, and detection of anomalous logon attempts, do they need any periodic password expiration? And if they haven’t implemented modern mitigations, how much protection will they really gain from password expiration?&quot;&lt;/p&gt;

&lt;p&gt;There you go. So, if you&#039;re already implementing password rotation.. I guess &quot;keep doing it&quot; if you haven’t implemented the other mentioned security functions; but STOP if you HAVE implemented these other security measures. I found a few other&#039;s takes on this advice:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.forbes.com/sites/daveywinder/2019/04/27/microsoft-confirms-change-to-windows-10-passwords-that-nobody-saw-coming/#4c0a682d7bf2&quot;&gt;https://www.forbes.com/sites/daveywinder/2019/04/27/microsoft-confirms-change-to-windows-10-passwords-that-nobody-saw-coming/#4c0a682d7bf2&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.scmagazine.com/home/security-news/privacy-compliance/some-cybersecurity-experts-argue-this-may-be-one-of-the-last-global-password-days/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=SCUS_Newswire_20190502&amp;hmSubId=c_Ol5WdI-AA1&amp;email_hash=1640a0a38d3b4b638fd2beadfc5e9dc7&amp;mpweb=1325-7621-514959&quot;&gt;https://www.scmagazine.com/home/security-news/privacy-compliance/some-cybersecurity-experts-argue-this-may-be-one-of-the-last-global-password-days/?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=SCUS_Newswire_20190502&amp;hmSubId=c_Ol5WdI-AA1&amp;email_hash=1640a0a38d3b4b638fd2beadfc5e9dc7&amp;mpweb=1325-7621-514959&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Item #4: Windows 1903 and Blurred Backgrounds&lt;br /&gt;
---&lt;br /&gt;
What do you think of those Blurred Backgrounds in Windows 1903 at login time? Don&#039;t like them?&lt;br /&gt;
Computer | Admin Templates | System | Logon | Show Clear logon background and set it to ENABLED.&lt;/p&gt;

&lt;p&gt;Ah.. but what if you don&#039;t have the Windows 1903 ADMX files? &lt;/p&gt;

&lt;p&gt;Item #5: No Windows 1903 ADMX files yet.&lt;br /&gt;
---&lt;br /&gt;
They&#039;re not available yet for download. So you can always take a Windows 10 1903 machine and use the ADMX and ADML items from there if you&#039;re in a hurry. But I advise to wait for the download. I’ll let you know when that occurs.&lt;/p&gt;

&lt;p&gt;Item #6: Super cool Windows 10 thing to broadcast your screen &quot;over there.&quot; &lt;br /&gt;
---&lt;br /&gt;
This is one of those things I&#039;m wondering if everyone on the planet knew, except maybe.. Me. &lt;br /&gt;
Basically, you can &quot;project your whole screen&quot; to an app .. &quot;over there&quot; on another Windows 10 machine. I tested this and it&#039;s so freeking cool. Just. So. Cool. My. Head. Exploded.  &lt;br /&gt;
Tip: Both computers have to be on the same Wifi or Bluetooth network. &lt;br /&gt;
&lt;a href=&quot;https://techcommunity.microsoft.com/t5/Core-Infrastructure-and-Security/How-to-Use-an-Additional-Computer-as-a-Secondary-Display/ba-p/681152&quot;&gt;https://techcommunity.microsoft.com/t5/Core-Infrastructure-and-Security/How-to-Use-an-Additional-Computer-as-a-Secondary-Display/ba-p/681152&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And now.. time for the plugs... :-)&lt;/p&gt;

&lt;p&gt;- My CLASS (next Group Policy+ MDM class Chicago Sep 16 - 18th [three days].. Sign up today at &lt;a href=&quot;http://www.MDMandGPanswers.com/class&quot;&gt;www.MDMandGPanswers.com/class &lt;/a&gt;) &lt;br /&gt;
- Nor did I plug my new MDM: Intune, Autopilot and Azure book which is coming out in July (&lt;a href=&quot;http://www.MDMandGPanswers.com/book&quot;&gt;www.MDMandGPanswers.com/book&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;No time like the present. Sign up for class and/or get your book. :-)&lt;/p&gt;

&lt;p&gt;Happy Friday everyone !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Co-Management Today with SCCM and Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/comanagement-today-with-sccm-and-intune</link>
        <pubDate>2019-03-21T10:49:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ While we used to actively block devices from registering with Intune and SCCM or Group Policy at the same time, we more than welcome this duality of management capabilities today.&amp;nbsp; Outside of cloud-only enterprises, Microsoft not only allows, but encourages the practice of allowing settings management from multiple sources. Microsoft refers to this current practice as co-management.&amp;nbsp;

The advantage of Hybrid MDM was that it allowed you to manage SCCM exclusive and MDM exclusive devic ]]>
        </description>
        <content:encoded>
            &lt;p&gt;While we used to actively block devices from registering with Intune and SCCM or Group Policy at the same time, we more than welcome this duality of management capabilities today.  Outside of cloud-only enterprises, Microsoft not only allows, but encourages the practice of allowing settings management from multiple sources. Microsoft refers to this current practice as co-management. &lt;/p&gt;

&lt;p&gt;The advantage of Hybrid MDM was that it allowed you to manage SCCM exclusive and MDM exclusive devices from a single console.  Essentially it was a a product of convenience more than anything.  With co-management, the two work in cohesion.  Clients can now have the Configuration Manager client installed and be enrolled in Intune.  For those organizations that have a considerable investment in time and resources in SCCM, Co-management adds greater functionality to your SCCM structure by incorporating cloud functionality.&lt;/p&gt;

&lt;p&gt;Co-management requires version 1710 or later and requires all involved Windows 10 devices to be Azure AD-joined or joined to on-premise AD and registered with Azure AD.  For new Windows 10 devices, you can simply join them to Azure AD, enroll them in Intune and install the Configuration Manager client for co-management ability.  When it comes to Windows 10 devices that already have the Configuration Manager client installed the path is more complex, but basically requires you to setup hybrid Azure AD and enrolling them into Intune. Whichever way you get there; the end result is that you get the best of both worlds. &lt;/p&gt;

&lt;p&gt;Co-management is about more than just increased functionality however.  It gives IT administrators the flexibility to choose which management solution works best for their organization, devices and workloads they have to manage.  This facility of choice is exemplified in the screenshot below that shows the workloads tab of the SCCM admin screen.  As you can see, with co-ecomanagement you can switch the authority from Configuration Manager to Intune for select workloads.  This puts the SCCM admin in charge of which tool will manage what policies by simply moving the slider to the selected choice.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/slides.png&quot; style=&quot;height:567px; width:550px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Note the presence of the “Pilot Intune” option.  As MDM is relatively new to most admins, Pilot Intune gives you the ability to pilot things first in order to ensure everything operates as expected.  Once results are confirmed, you can throw the switch all the way.  Eventually, Microsoft hopes that all the siders will be moved to the right, with everything hosted and managed in the cloud.  Those who are intimidated by SCCM might say that’s not a bad thing. &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Solving the Mystery of MDMWinsOverGP Basics with Intune </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/solving-the-mystery-of-mdmwinsovergp-basics-with-intune</link>
        <pubDate>2019-03-13T11:03:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Surprises are great when you are engrossed in a captivating movie.&amp;nbsp; A good novel always has multiple twists that you don&amp;rsquo;t see coming.&amp;nbsp; For the most part though, the world prefers predictability, especially when it comes to managing corporate enterprises.&amp;nbsp; The whole purpose of deploying settings is to ensure conformity to your enterprise client devices.&amp;nbsp; Group Policy and MDM were made to deliver a level of certainty to the enterprise. &amp;nbsp;

So what happens when Grou ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Surprises are great when you are engrossed in a captivating movie.  A good novel always has multiple twists that you don’t see coming.  For the most part though, the world prefers predictability, especially when it comes to managing corporate enterprises.  The whole purpose of deploying settings is to ensure conformity to your enterprise client devices.  Group Policy and MDM were made to deliver a level of certainty to the enterprise.  &lt;/p&gt;

&lt;p&gt;So what happens when Group Policy Settings and MDM settings collide with one another?  Because Windows 10 can potentially be a member of an on-prem active directory domain and be MDM enrolled as well, that is a distinct possibility.  Starting with the 1709 release, Microsoft unveiled a GPO setting that allows hybrid joined devices to be automatically MDM enrolled.  So let’s say we have a hybrid environment of Windows 10 laptops and just for grins we disabled Cortana using an MDM policy setting and enabled it using a Group Policy Setting.  Which policy do you would win out?  &lt;/p&gt;

&lt;p&gt;If you had to guess, you would probably say Group Policy since it is the elder of the two.  If you did, you would be sort of wrong.  You would also be sort of wrong if you said MDM. &lt;/p&gt;

&lt;p&gt;How can you be sort of wrong you ask? &lt;/p&gt;

&lt;p&gt;Because when MDM and GP settings conflict, we honestly have no idea which one is going to win out. &lt;/p&gt;

&lt;p&gt;In fact, that is the default, expected behavior.  Yes, the default behavior is &lt;strong&gt;uncertainty&lt;/strong&gt;.  Just like the stock market doesn’t like uncertainty, neither do network admins.&lt;/p&gt;

&lt;p&gt;So in order to add some stability to these conflicting scenarios, Microsoft introduced a Policy CSP called ControlPolicyConflict/MDMWinsOverGP.&lt;strong&gt;  &lt;/strong&gt;It uses an integer based data type for which there are two supported values:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;0 (default state of uncertainty)&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;1 - The MDM policy is used and the GP policy is blocked.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;To enable this policy, we have to create a custom OMA-URI setting as shown in the screenshot below.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/MDMWin.png&quot; style=&quot;height:285px; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;So if MDM and the same Group Policy setting are contending to assign the SAME value to the SAME setting .. then you can use MDMWinsOverGP to force the MDM to always regardless of what GP is trying to do.  &lt;/p&gt;

&lt;p&gt;If you are managing a hybrid environment with MDM and GPO, it may in fact be good practice to enable this CSP for good measure just to ensure that certainty will always prevail.  In the IT world, certainty is a good thing.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The Original Co-Management Model of SCCM and Intune Hybrid </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-original-comanagement-model-of-sccm-and-intune-hybrid</link>
        <pubDate>2019-03-05T09:52:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Long, long ago, well, actually not so long ago, there were two worlds.&amp;nbsp; There was the on-prem world and the mobile world, and the two would never become one, until of course they did one day.&amp;nbsp; Up until Windows 10 version 1607, a device could either be on premise AD or Azure AD.&amp;nbsp; This made sense at the time.&amp;nbsp; Back then, MDM enrolled machines was pretty much restricted to mobile devices as administrators wanted the extensive management control that Group Policy or SCCM provided ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;span style=&quot;color:#000000&quot;&gt;Long, long ago, well, actually not so long ago, there were two worlds.  There was the on-prem world and the mobile world, and the two would never become one, until of course they did one day.  Up until Windows 10 version 1607, a device could either be on premise AD or Azure AD.  This made sense at the time.  Back then, MDM enrolled machines was pretty much restricted to mobile devices as administrators wanted the extensive management control that Group Policy or SCCM provided them for enterprise desktops. Mobile devices were better served in the cloud and outside of device resets and remote wipe capabilities, there wasn’t much you could do with MDM early on.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#000000&quot;&gt;It wasn’t thought a good idea at the time to have settings delivered from multiple sources.  In order to prevent that from happening, devices were blocked from the ability to simultaneously register with SCCM and Intune at the same time.  In fact, the activation of the SCCM client on a Windows device automatically disabled any built-in MDM capabilities.  Devices were segregated to one or the other.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#000000&quot;&gt;If your company’s IT staff had separated SCCM administrators and mobile device administrators, then everything was fine.  But if you had to manage both desktops and tablets, you had to switch back and forth between the Configuration Manager console and the MDM console.  So Microsoft set about to integrate Configuration Manager with Intune with what was called “hybrid configuration” so that both on-prem and mobile devices could be managed from the same console.  Co-management between the two was born.  Note that Intune was the only MDM supported in this scenario.  The merging of these two platforms is illustrated below.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/MDM_Connector.png&quot; style=&quot;height:409px; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#000000&quot;&gt;But as in everything, things change.  Microsoft put more focus into MDM as time went on, and as a result, more setting capabilities and features were built into Intune.  Organizations also started recognizing the value of migrating more computers to the cloud than just mobile devices.  Microsoft also began figuring out that it was in their interest to encourage customers to move to the cloud.  Because of these and other factors, the usefulness of allowing devices to co-exist in both on-prem AD and Azure AD was realized.  Starting with 1607, computers could be a part of both at the same time.  Then came 1709 in which the SCCM client could now run on a device without its MDM capabilities being disabled.  This made it possible for a computer to receive setting input from both sources.  This signaled the end of Hybrid MDM.  In August of 2018, Hybrid MDM became a deprecated feature and Microsoft began blocking the registering of new Hybrid MDM customers in November of the same year. &lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Creating ADMX-backed policies is hard in Intune. Here&#039;s some guides to help you. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/creating-admxbacked-policies-is-hard-in-intune-heres-some-guides-to-help-you</link>
        <pubDate>2019-01-25T14:42:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I have to admit... making a simple registry change in Intune can be ... difficult.&amp;nbsp;

The Administrative Templates function is nice, for those (under 300 settings) that support them.&amp;nbsp;

But for the rest of the simple settings ... you might have hand-create custom OMA-URIs and usin ADMX backed policies to do it.

Here are some others&amp;#39; great guides to help you &amp;quot;follow the leaders&amp;quot; and convert your ADMX and/or use an ADMX-backed policy:

Those resources, show how to te ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I have to admit... making a simple registry change in Intune can be ... difficult. &lt;/p&gt;

&lt;p&gt;The Administrative Templates function is nice, for those (under 300 settings) that support them. &lt;/p&gt;

&lt;p&gt;But for the rest of the simple settings ... you might have hand-create custom OMA-URIs and usin ADMX backed policies to do it.&lt;/p&gt;

&lt;p&gt;Here are some others&#039; great guides to help you &quot;follow the leaders&quot; and convert your ADMX and/or use an ADMX-backed policy:&lt;/p&gt;

&lt;p&gt;Those resources, show how to tear into an ADMX and ADML file and create a more complex ADMX-backed policy:&lt;/p&gt;

&lt;ul style=&quot;list-style-type:square&quot;&gt;
	&lt;li&gt;https://docs.microsoft.com/en-us/windows/client-management/mdm/understanding-admx-backed-policies&lt;/li&gt;
	&lt;li&gt;https://docs.microsoft.com/en-us/windows/client-management/mdm/enable-admx-backed-policies-in-mdm&lt;/li&gt;
	&lt;li&gt;https://www.petervanderwoude.nl/post/allow-users-to-connect-remotely-to-this-computer-via-windows-10-mdm-admx-style/&lt;/li&gt;
	&lt;li&gt;https://www.petervanderwoude.nl/post/deep-dive-configuring-windows-10-admx-backed-policies/&lt;/li&gt;
	&lt;li&gt;http://carlbarrett.uk/admx-backed-policies-quickish-reference-guide&lt;/li&gt;
	&lt;li&gt;http://thesccm.com/use-intune-policy-csp-manage-windows-10-settings-internet-explorer-site-to-zone-assignment-list/&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Office 2016 ADMX templates, seemingly broken for Outlook ADMX </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/office-2016-admx-templates-seemingly-broken-for-outlook-admx</link>
        <pubDate>2019-01-22T10:13:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I got a tip from&amp;nbsp;Pat DiPersia at&amp;nbsp;www.dipersiatech.com&amp;nbsp;and Susan Bradley, MVP about this one.

In short, I tested it myself, but the latest Office 2016 ADMX files seem to have got a messed up XML tag, rendering the Outlook policy useless. I tested both the 32 and 64 bit templates. They both have problems with Outlook.

I&amp;#39;ve reached out to report this issue.

At least now you know if you&amp;#39;re trying it yourself... you&amp;#39;re not crazy !

The error when adding to your P ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I got a tip from Pat DiPersia at &lt;a href=&quot;https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.dipersiatech.com&amp;data=02%7C01%7Cjeremym%40policypak.com%7C05b32374856f4b12f6e808d68068c3f2%7C6d43b23f316e4187b59e846c83476c9e%7C1%7C0%7C636837584793749884&amp;sdata=bjq%2BXyI3VkMUwJr9ay%2BQqhXnbKkJtHLo%2BGAy81HHRP8%3D&amp;reserved=0&quot;&gt;www.dipersiatech.com&lt;/a&gt; and &lt;a href=&quot;https://mvp.microsoft.com/en-us/PublicProfile/7500?fullName=susan%20elise%20bradley&quot;&gt;Susan Bradley&lt;/a&gt;, MVP about this one.&lt;/p&gt;

&lt;p&gt;In short, I tested it myself, but the latest Office 2016 ADMX files seem to have got a messed up XML tag, rendering the Outlook policy useless. I tested both the 32 and 64 bit templates. They both have problems with Outlook.&lt;/p&gt;

&lt;p&gt;I&#039;ve reached out to report this issue.&lt;/p&gt;

&lt;p&gt;At least now you know if you&#039;re trying it yourself... you&#039;re not crazy !&lt;/p&gt;

&lt;p&gt;The error when adding to your Policy store looks like this after you click on Admin Templates.&lt;/p&gt;

&lt;p&gt;TIP:&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;The issue is the /policies closing tag is before the final /policy closing tag.  Looks like someone added a policy after the fact, and didn’t put it in the right spot.  The /policies tag on line 6285, should be on line 6296 (Followed by /policydefinitions.) See screenshot below.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/office2016-broken.png&quot; style=&quot;height:688px; width:1000px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/office2016-policyfix.jpg&quot; style=&quot;height:454px; width:947px&quot; /&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Intune’s new ADMX and Admin Template Support </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/intunes-new-admx-and-admin-template-support</link>
        <pubDate>2019-01-17T10:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This week an Intune feature I have been playing with for a while has finally gone live for Preview.
It&amp;rsquo;s called &amp;ldquo;Administrative Templates&amp;rdquo; and &amp;hellip; oh wow, that sounds a lot like Group Policy Administrative Templates, and, oh yes. You&amp;rsquo;re right&amp;hellip; mostly.

Now, before you go bananas saying &amp;ldquo;Jeremy, clearly Intune now has total Group Policy support!&amp;rdquo; Or, worse, beat the old trope that &amp;ldquo;Group Policy must be dead.&amp;rdquo;

As anything new, it&amp;rs ]]>
        </description>
        <content:encoded>
            &lt;p&gt;This week an Intune feature I have been playing with for a while has finally &lt;a href=&quot;https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Support-tip-ADMX-backed-admin-templates-in-preview/ba-p/313328&quot;&gt;gone live for Preview.&lt;/a&gt;&lt;br /&gt;
It’s called “Administrative Templates” and … oh wow, that sounds a lot like Group Policy Administrative Templates, and, oh yes. You’re right… mostly.&lt;/p&gt;

&lt;p&gt;Now, before you go bananas saying “Jeremy, clearly Intune now has total Group Policy support!” Or, worse, beat the old trope that “&lt;a href=&quot;https://www.mdmandgpanswers.com/blogs/view-blog/the-why-group-policy-is-not-dead-manifesto&quot;&gt;Group Policy must be dead&lt;/a&gt;.”&lt;/p&gt;

&lt;p&gt;As anything new, it’s worth investigation and to ensure it does what you think it’s going to do.&lt;/p&gt;

&lt;h2&gt;Let’s talk about the good stuff first !&lt;/h2&gt;

&lt;p&gt;So, to set the stage, you have to first understand what ADMX backed settings are within Intune / MDM.&lt;br /&gt;
It starts with the idea that some settings which are curated by the MDM team. Now, this is weird so stick with me. Because the MDM team is not the Intune team.&lt;br /&gt;
You can think of the MDM team as the “receiving platform” which decides upon the settings within the platform.&lt;/p&gt;

&lt;p&gt;You can think of the Intune team as “expressing” those settings with knobs and buttons. And this is because Intune isn’t the only MDM game in town; for instance, VMware Workspace one, MobileIron, SOTI and others.&lt;/p&gt;

&lt;p&gt;So, these ADMX-backed settings are, as you can imagine, real Group Policy settings which are supported by the target application, say, Explorer or Office.&lt;/p&gt;

&lt;p&gt;But these settings are curated by the MDM team as “guaranteed to work and supported as such.”&lt;/p&gt;

&lt;p&gt;If you want to see the official docs on Administrative Templates feature you can find it here: https://docs.microsoft.com/en-us/intune/administrative-templates-windows&lt;br /&gt;
Here’s the best part from the docs:&lt;/p&gt;

&lt;blockquote&gt;These templates are similar to group policy (GPO) settings in Active Directory (AD), and are &lt;a href=&quot;https://docs.microsoft.com/windows/client-management/mdm/understanding-admx-backed-policies&quot;&gt;ADMX-backed settings&lt;/a&gt; that use XML. But, the templates in Intune are 100% cloud-based. They offer a more simple and straight-forward way to configure the settings, and find the settings you want.&lt;/blockquote&gt;

&lt;p&gt;This is really nice. What’s not to like? Indeed, if you wanted to achieve these ADMX-backed settings before this feature came to be, you needed to know how to perform the dark arts of custom OMA-URI (a different topic for a different day.) Now, with Administrative Templates in Intune, for all those settings, those values are just click and go. +1 for that !&lt;/p&gt;

&lt;p&gt;If you look at the docs, you’ll see the following line:&lt;/p&gt;

&lt;blockquote&gt;The administrative templates include hundreds of settings that control features in Internet Explorer, Microsoft Office programs, remote desktop, access to OneDrive, use a picture password or PIN to sign in, and more.&lt;/blockquote&gt;

&lt;p&gt;The key word here is hundreds. Why is it hundreds, and not thousands or “all”?&lt;/p&gt;

&lt;p&gt;Well, you need to go back to something I said earlier. All settings in MDM (and by extension, Intune) are curated. Each setting must be vetted to work as expected and then guaranteed by the MDM platform.&lt;/p&gt;

&lt;p&gt;Also, at last count the number of exposed Administrative Template settings is 237. (Note: I did not re-count it before publishing this; the number could have gone up somewhat.). As the docs state, most of the settings seem to revolve around Office, OneDrive, Internet Explorer, and a handful of system settings.&lt;/p&gt;

&lt;p&gt;As such you will likely see this list grow over time, but my understanding is that this is not meant to overtake or subsume all existing Group Policy settings.&lt;br /&gt;
If you are looking for a setting which doesn’t exist in Intune.. either a native clickable one or via Administrative Templates, don’t despair or throw in the towel, yet.&lt;/p&gt;

&lt;p&gt;If you want to make any real Group Policy, Group Policy Security and/or Group Policy Preference setting work thru Intune, you need to &lt;a href=&quot;http://www.policypak.com/video/policypak-and-microsoft-intune.html&quot;&gt;enhance Intune with a 3rd party tool. Here&#039;s a video for how it&#039;s done.&lt;/a&gt; An equallty effective option &lt;a href=&quot;https://www.policypak.com/video/policypak-cloud-use-policypak-cloud-to-make-any-admx-policy-setting.html&quot;&gt;is to use this other 3rd party option&lt;/a&gt;, which works with MDM or whenever there is no MDM present.&lt;/p&gt;

&lt;h2&gt;Let’s talk about what’s missing, last.&lt;/h2&gt;

&lt;p&gt;If you get a chance to play with this feature, click upon Intune | Device Configuration | Profiles | Create Profile and select Administrative Templates (Preview) like what’s seen here.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img1.png&quot; style=&quot;margin-left:auto; margin-right:auto; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Then under Settings, you will see the list of Administrative Template settings like what’s seen here.&lt;br /&gt;
Top of the page…&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img2.png&quot; style=&quot;margin-left:auto; margin-right:auto; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Bottom of page….&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/img3.png&quot; style=&quot;margin-left:auto; margin-right:auto; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;At the top of the page begins an alphabetical list of the curated ADMX policy settings and a Search (Filter) bar.&lt;br /&gt;
So, if you wanted to quickly search of OneDrive, you can find those settings.&lt;br /&gt;
But what you cannot do, like Group Policy, is see these settings hierarchical.&lt;/p&gt;

&lt;p&gt;I can see both sides of this; this flat view reduces clutter. But my preference would be to see the settings hierarchical, so I could maybe find related settings around the primary setting I’m searching for.&lt;/p&gt;

&lt;h2&gt;Summary about Admin Templates in Intune&lt;/h2&gt;

&lt;p&gt;In summary, Administrative Templates a nice step forward in Intune. Just know that it’s not designed to attempt to take on all of Group Policy settings, but be on the lookout for increased coverage over the long haul as new interesting scenarios pop-up.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Cortana now quiet with Windows OOBE except for Windows Home (important for Autopilot) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/cortana-now-quiet-with-windows-oobe-except-for-windows-home-important-for-autopilot</link>
        <pubDate>2019-01-07T15:26:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Starting in Windows build 18309, Cortana doesn&amp;#39;t start talking &amp;quot;at you.&amp;quot;... unless you&amp;#39;re using Windows Home.

Why is this important? Well, check out this (hysterical) video for why not ...

https://youtu.be/Rp2rhM8YUZY

Before this you had to set a registry key. I&amp;#39;ve updated the Microsoft docs to reflect the change. :-)

https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/cortana-voice-support&amp;nbsp; ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Starting in Windows build 18309, Cortana doesn&#039;t start talking &quot;at you.&quot;... unless you&#039;re using Windows Home.&lt;/p&gt;

&lt;p&gt;Why is this important? Well, check out this (hysterical) video for why not ...&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://youtu.be/Rp2rhM8YUZY&quot;&gt;https://youtu.be/Rp2rhM8YUZY&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before this you had to set a registry key. I&#039;ve updated the Microsoft docs to reflect the change. :-)&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/cortana-voice-support &quot;&gt;https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/cortana-voice-support &lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> MDM Registration Error Code list (helpful for Intune Registration Troubleshooting) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/mdm-registration-error-code-list-helpful-for-intune-registration-troubleshooting</link>
        <pubDate>2018-12-19T11:38:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I stumbled across this awesome ilst of MDM registration errors.

If you&amp;#39;re seeing enrollment problems with MDM, check out this error list.

Bonzer !

https://docs.microsoft.com/en-us/windows/desktop/mdmreg/mdm-registration-constants ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I stumbled across this awesome ilst of MDM registration errors.&lt;/p&gt;

&lt;p&gt;If you&#039;re seeing enrollment problems with MDM, check out this error list.&lt;/p&gt;

&lt;p&gt;Bonzer !&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/windows/desktop/mdmreg/mdm-registration-constants&quot;&gt;https://docs.microsoft.com/en-us/windows/desktop/mdmreg/mdm-registration-constants&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Why you can use LAPS and banish logging on as Domain Admin when doing remote help </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/why-you-can-use-laps-and-banish-logging-on-as-domain-admin-when-doing-remote-help</link>
        <pubDate>2018-12-19T11:08:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So, okay.. you don&amp;#39;t want to log on with your Domain Admin credentials to Mr. End User&amp;#39;s machine.

Doing so increases the risk of Pass the Hash attacks.

My pal Aaron Margosis from Microsoft shows how you can use Group Policy to block logins from anyone EXCEPT local admins.

AND, because you&amp;#39;re using LAPS to maintain local admin passwords, only that account can log on.

Brilliant.

Here&amp;#39;s the blog entry to increase your security:

https://blogs.technet.microsoft.com/s ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So, okay.. you don&#039;t want to log on with your Domain Admin credentials to Mr. End User&#039;s machine.&lt;/p&gt;

&lt;p&gt;Doing so increases the risk of &lt;a href=&quot;https://blogs.msdn.microsoft.com/aaron_margosis/2012/12/11/mitigating-pass-the-hash/&quot;&gt;Pass the Hash attacks.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;My pal Aaron Margosis from Microsoft shows how you can use Group Policy to block logins from anyone EXCEPT local admins.&lt;/p&gt;

&lt;p&gt;AND, because you&#039;re using LAPS to maintain local admin passwords, only that account can log on.&lt;/p&gt;

&lt;p&gt;Brilliant.&lt;/p&gt;

&lt;p&gt;Here&#039;s the blog entry to increase your security:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/secguide/2018/12/10/remote-use-of-local-accounts-laps-changes-everything/&quot;&gt;https://blogs.technet.microsoft.com/secguide/2018/12/10/remote-use-of-local-accounts-laps-changes-everything/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> RSAT is now downloadable.. what if you cannot download RSAT? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/rsat-is-now-downloadable-what-if-you-cannot-download-rsat</link>
        <pubDate>2018-12-19T11:02:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So starting in Windows 1809, a bunch of features are &amp;quot;on demand.&amp;quot;

This is all great.. until you want to install the GPMC but cannot download RSAT.

Don&amp;#39;t panic.

There is a way to install RSAT even if the computer is offline and not connected to the internet. (This is also called Disconnected Environment.)

Here&amp;#39;s the scoop.. Click here ! ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So starting in Windows 1809, a bunch of features are &quot;on demand.&quot;&lt;/p&gt;

&lt;p&gt;This is all great.. until you want to install the GPMC but cannot download RSAT.&lt;/p&gt;

&lt;p&gt;Don&#039;t panic.&lt;/p&gt;

&lt;p&gt;There is a way to install RSAT even if the computer is offline and not connected to the internet. (This is also called Disconnected Environment.)&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/askpfeplat/2018/12/18/rsat-on-windows-10-1809-in-disconnected-environments/&quot;&gt;Here&#039;s the scoop.. Click here &lt;/a&gt;!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is ADMX File Ingesting in Intune? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-admx-file-ingesting-in-intune</link>
        <pubDate>2018-12-11T12:29:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ What is ADMX File Ingesting in Intune?

&amp;nbsp;

We&amp;rsquo;ve talked about how Intune has incorporated ADMX backed policies to manage even more settings in your Windows 10 devices.&amp;nbsp; But what if you want to deliver settings that aren&amp;rsquo;t part of the &amp;ldquo;in the box&amp;rdquo; policies from Microsoft.&amp;nbsp; Well, if you are familiar with Group Policy, then you are aware that you can garner more policy setting opportunities by importing new ADM or ADMX files.&amp;nbsp; For instance, Microsoft  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;strong&gt;What is ADMX File Ingesting in Intune?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;We’ve talked about how Intune has incorporated ADMX backed policies to manage even more settings in your Windows 10 devices.  But what if you want to deliver settings that aren’t part of the “in the box” policies from Microsoft.  Well, if you are familiar with Group Policy, then you are aware that you can garner more policy setting opportunities by importing new ADM or ADMX files.  For instance, Microsoft Office has an ADMX file as does other third party applications such as Adobe Reader and to some extent, Mozilla Firefox.   Well you can import additional ADMX files for MDM as well, although its currently not as easy as there is no central store for MDM like is the case for Group Policy.  There is no way (at present) to add additional ADMX templates with a couple clicks of the mouse, but with just a little bit of trouble, you can do it.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;The process of importing ADM or ADMX files into MDM is called &lt;em&gt;“ingesting.”  &lt;/em&gt;The ingesting process goes like this:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We create a Custom Windows 10 policy&lt;/li&gt;
	&lt;li&gt;We ingest the custom ADMX through the Policy CSP&lt;/li&gt;
	&lt;li&gt;We apply the settings we want to enforce&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So how do we ingest an ADMX file?  Well, in this case, ingesting means copy/paste.  You obtain the ADMX file you need and then open it in some type of editor such as Notepad.  For this example, I’m going to use the OneDrive.admx file.  I’m not going to show what the entire file looks like in Notepad, but here is what the first part of it looks like:&lt;/p&gt;

&lt;p&gt;&lt;!--?xml version=&quot;1.0&quot; encoding=&quot;utf-8&quot;?--&gt;&lt;/p&gt;

&lt;p&gt;&lt;!--?xml version=&quot;1.0&quot; encoding=&quot;utf-8&quot;?--&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/ingest2.png&quot; style=&quot;height:75px; width:800px&quot; /&gt;&lt;br /&gt;
    &lt;br /&gt;
As discussed earlier, creating a custom policy means creating a Custom OMA-URI.  To ingest an ADMX file we must use the following format:&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#444444&quot;&gt;./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/{AppName}/{SettingType}/{AdmxFileName}. &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#444444&quot;&gt;I don’t want to get into the boring details concerning the naming of these variables.  Just follow the basic guideline that you should assign the (setting type) variable as “policy” and the other two variables should be meaningful names such as the actual name of the App and the actual name of the ADMX file.  You can name them anything you want actually but its always best to use names that are intuitive for other personnel.  In the case of our OneDrive ADMX example, that would translate to this:&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#111111&quot;&gt;./Device/Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/OneDrive/Policy/OneDriveAdmx&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#111111&quot;&gt;As you mentioned, copy the entire contents of the opened ADMX file in Notepad and paste it into the value text box as shown below:&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/ingest1.png&quot; style=&quot;height:430px; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#444444&quot;&gt;Once the new profile is created, we can then use it to deliver the new supported settings using that profile.   &lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Azure and Intune Assigned Groups (and how Groups are related to Intune) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/azure-and-intune-assigned-groups-and-how-groups-are-related-to-intune</link>
        <pubDate>2018-12-07T13:07:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ One of the principles of proper AD administration is to congregate your users into groups to make it easier to assign permissions and rights.&amp;nbsp; We use groups within Intune as well for this same reason.&amp;nbsp; In this case, Intune uses Azure AD to manage access to your company&amp;rsquo;s resources which is controlled using roles in the directory.&amp;nbsp; There are two default groups within every implementation of Intune.


	All devices
	All users


If you are using Intune for Education and y ]]>
        </description>
        <content:encoded>
            &lt;p&gt;One of the principles of proper AD administration is to congregate your users into groups to make it easier to assign permissions and rights.  We use groups within Intune as well for this same reason.  In this case, Intune uses Azure AD to manage access to your company’s resources which is controlled using roles in the directory.  There are two default groups within every implementation of Intune.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;All devices&lt;/li&gt;
	&lt;li&gt;All users&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you are using Intune for Education and you use School Data Sync to import you school records, you have two additional default groups.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;All teachers&lt;/li&gt;
	&lt;li&gt;All users&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These default groups represent a very broad scope and by themselves probably aren’t of much use.  That is why we need to create custom groups that can be tailored to the needs of our organization. There are two types of custom created groups in Intune, one being Assigned Groups.  Assigned groups are used when you want to manually add specific users or devices to a group.  You can create groups by a number of criteria such as geographic location, department, hardware characteristics, etc.  For instance, you could create one assigned group for your Windows 10 devices and one for your iPads.  You could create one for your desktop PCs and one for your mobile devices.  You can separate users into separate groups as well such as HR, Finance and Marketing.  You can then use those groups to assign policies to users or deploy apps to a set of devices.  Note that the ability to create custom groups is available in any MDM service, not just Intune.&lt;/p&gt;

&lt;p&gt;Creating a group is easy.  Go to the Groups section of Intune and click “New Group.”  Then add the required information for that group.  In this case we would select “Assigned” as the membership type. &lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Assigned_group_3.png&quot; style=&quot;height:491px; width:393px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Once the group is made, you can then assign users to that group.  Note that just as in domain joined AD, you can nest groups within one another.  These subgroups can be used to break down large groups into smaller more manageable sizes.  Groups have a hierarchical structure to them in Intune which allows for inheritance.  Parent groups are at the top of the hierarchy and any settings applied to these parent groups are passed down to the subgroups.  This settings inheritance feature makes it easer to apply settings to large numbers of users and devices.  Know that you can only create subgroups under assigned groups.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Azure and Intune Dynamic Groups </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/azure-and-intune-dynamic-groups</link>
        <pubDate>2018-12-04T16:05:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So Assigned Groups are great and there are many uses for them.&amp;nbsp; But we live in a dynamic world today and our Azure/Intune environments are often reflective of that.&amp;nbsp; Things change, and sometimes we need our groups to adapt to those changes.&amp;nbsp; That is why we also have Dynamic Groups.&amp;nbsp; Rather than specifying the users or devices to add to a group, we set criteria to define the members of a Dynamic Group.&amp;nbsp; &amp;nbsp;When the specified condition applies for a user or device, it i ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So Assigned Groups are great and there are many uses for them.  But we live in a dynamic world today and our Azure/Intune environments are often reflective of that.  Things change, and sometimes we need our groups to adapt to those changes.  That is why we also have Dynamic Groups.  Rather than specifying the users or devices to add to a group, we set criteria to define the members of a Dynamic Group.   When the specified condition applies for a user or device, it is added to the group automatically.  Should a member no longer satisfy the rule, it is removed from the group.  The use of Dynamic Groups can greatly reduce the administrative overhead of constantly adding and removing users for large enterprise environments that perpetually change.&lt;/p&gt;

&lt;p&gt;There are a couple of things that are different when creating Dynamic Groups.  First off, P1 or P2 licensing is required to create and use Dynamic groups.  Second of all, we must make separate groups for users and devices as is shown below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Dynamic_Group1.png&quot; style=&quot;height:567px; width:449px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Once we create our Dynamic Group, we need to populate it.  Remember, we don’t select the users or devices ourselves.  We cannot manually add or remove a member from a Dynamic group.  We create membership rules which will then populate the groups by querying Azure AD to find the members that meet the criteria of that rule.  Make note again that we cannot create a rule that contains both users and devices.&lt;/p&gt;

&lt;p&gt;There are two types of rules, Simple and Advanced.  I assume everyone wants to start with the easier one first so let’s create a Simple Rule.&lt;/p&gt;

&lt;p&gt;A membership rule has 3 components:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A property&lt;/li&gt;
	&lt;li&gt;An operator&lt;/li&gt;
	&lt;li&gt;A value&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Say we wanted to create a dynamic group to include all current users of the HR Department.  In this case the property would be “department,” the operator would be “equals,” and the value would be HR.  If this isn’t sounding very simple, think again, because the Simple Rule creator interface does a great job of guiding you through the process.  You just simply choose which option you want from each component menu.  This of course means that your rules are limited to the choices made available in the GUI.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Dynamic_group_2.png&quot; style=&quot;height:681px; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;So what about Advanced Rules?  Well sometimes you may want to run extensive queries that go beyond the confines of the Simple rule creation process.  Creating Advanced rules may look a little intimidating because there is no easy to follow GUI menu to guide you.  Instead you only get a text box where you write out your rule.  Actually its not that intimidating.  We could have created an Advanced rule for our previous example for those users who belong to the HR Department.  The “rule equation” per say would be as follows:&lt;/p&gt;

&lt;p&gt;(user.department -eq &quot;HR&quot;)&lt;/p&gt;

&lt;p&gt;A good example of when you might need to use an Advanced rule would be if you are applying multiple criteria in a single rule.  For instance, you want to create a Dynamic device group for Windows 1809 devices.  In this example, the rule would have to first query for Windows devices and then perform a subsequent query for the build number, which in this case is “10.0.17758.”  The resulting rule would then be as follows:&lt;/p&gt;

&lt;p&gt;(device.deviceOSType -eq “Windows”) -and (device.deviceOSVersion -startsWith “10.0.17758”)&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Buy a Laptop for the Normal Person.. in 2019 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-buy-a-laptop-for-the-normal-person-in-2019</link>
        <pubDate>2018-11-30T08:22:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This is a yearly re-post / re-edit. It started in 2009 and has been updated yearly. This started out as a post to just my closest friends but has become one of my popular blog entries of all time. Here&amp;rsquo;s my fully updated guide to end-of-year 2018&amp;nbsp;into 2019.

Quick updates for 2018-2019:


	Snapdragon &amp;quot;Always on / Always Connected&amp;quot; PCs
	What is M.2 storage?
	Jeremy&amp;#39;s laptop update&amp;nbsp;... one year later... after 7 years with his old one.
	The laptop I use around  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;em&gt;This is a yearly re-post / re-edit. It started in 2009 and has been updated yearly. This started out as a post to just my closest friends but has become one of my popular blog entries of all time. Here’s my fully updated guide to end-of-year 2018 into 2019.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Quick updates for 2018-2019:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Snapdragon &quot;Always on / Always Connected&quot; PCs&lt;/li&gt;
	&lt;li&gt;What is M.2 storage?&lt;/li&gt;
	&lt;li&gt;Jeremy&#039;s laptop update &lt;em&gt;... one year later... after 7 years with his old one.&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;The laptop I use around the office for regular people (Spoiler alert.. it&#039;s NOT a Dell).&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;—&lt;/p&gt;

&lt;p&gt;If you’re an IT geek like me, you’re often asked “What kind of laptop should I buy?”&lt;/p&gt;

&lt;p&gt;If you’re NOT an IT geek, you’re likely asking an IT geek friend “What kind of laptop should I buy?”&lt;/p&gt;

&lt;p&gt;This is a guide for both of you.&lt;/p&gt;

&lt;p&gt;If you’re in IT, this question might not directly affect you, since many IT organizations dole out laptops to the whole staff, including you. However, since you’re seen walking around with a laptop, or have that geeky-vibe about you, I’m guessing you’ve been asked more than once “What kind of laptop should I buy?”&lt;/p&gt;

&lt;p&gt;You might be tempted to say “Buy a Macbook” – if only for the reason that you DON’T have a Macbook, and therefore would be unable to help the person in the future. (See this for the example of the problem: &lt;a href=&quot;http://theoatmeal.com/comics/computers&quot;&gt;http://theoatmeal.com/comics/computers&lt;/a&gt;) That being said, Macbooks are pretty awesome, and if you want to real work on a Macbook, you can do that. That’s just not the point of this article. This is about how to buy a Windows PC laptop. Macs are great, if you want to go there.&lt;/p&gt;

&lt;p&gt;If you’re NOT in IT, your problems are substantial too. If you ask three geeks, you might get THREE answers.&lt;/p&gt;

&lt;p&gt;With that in mind, here’s “Jeremy’s Guide to Buying a new PC-based Laptop in 2017-2018.” Again, there are a LOT of ways someone COULD do this task. This is what I send to people in my inner circle (friends, family, etc.) when I get the question.&lt;/p&gt;

&lt;p&gt;Seriously. I just email them a link to this blog entry, and .. I’m done.&lt;/p&gt;

&lt;p&gt;These suggestions should be “good enough” for the common man / woman / student for the foreseeable near term future. Any one person’s particular needs may vary, but you, the IT Pro, should be able to “print out and hand over” these suggestions and have them work for about 90+% of the people you come in contact with.&lt;/p&gt;

&lt;p&gt;If you’re NOT an IT geek, you’re looking at the Internet and catalogs and think that desktop and laptops could be “infinitely configured.”&lt;/p&gt;

&lt;p&gt;And you don’t have time for that. You want to get back to real work. So, here is a document you can send to anyone who has ever asked that question with some “straight dope answers.”&lt;/p&gt;

&lt;p&gt;Yes: This document is long. But, you want to make a GOOD decision which will last you the next 2-4 years, right? So, just read it. Really READ it. Then go shopping.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Jeremy’s Guide to Buying a new PC-based Laptop in 2019&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;We’re going to answer some questions here like:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Laptop or Ultrabook ?&lt;/li&gt;
	&lt;li&gt;What &quot;Chip&quot; should I get in my laptop?&lt;/li&gt;
	&lt;li&gt;Laptop or iPad or Surface (Windows Tablet)?&lt;/li&gt;
	&lt;li&gt;Should I get a $200 Windows laptop?&lt;/li&gt;
	&lt;li&gt;What is / should I get a Microsoft Surface?&lt;/li&gt;
	&lt;li&gt;What’s the deal with Android Tablets and Google Chromebook Laptops?&lt;/li&gt;
	&lt;li&gt;iPad Pro? Will that work for me?&lt;/li&gt;
	&lt;li&gt;Where can I get good deals?&lt;/li&gt;
	&lt;li&gt;What kind of hardware (and warranty) should I get?&lt;/li&gt;
	&lt;li&gt;Should I get Windows 10 or hunt down a laptop with Windows 7?&lt;/li&gt;
	&lt;li&gt;Should I get 32-bit or 64-bit?&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;&lt;strong&gt;Part I: Laptop, Ultrabook or Netbook ?&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;To make sure we all understand the marketing vocabulary you’re likely to encounter as you go to buy a machine:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Laptops: You know what a laptop is.&lt;/li&gt;
	&lt;li&gt;Ultrabook: Just like a laptop, but thinner and lighter.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For most people, they want Laptops. They’re mid priced, mid weight and have a full sized keyboard.&lt;/p&gt;

&lt;p&gt;If you pay a little more, you can get an Ultrabook, which is just like a laptop — except lighter.&lt;/p&gt;

&lt;p&gt;I think there are a ton of great options out there where you don’t have buy a HEAVY laptop, or buy an EXPENSIVE Ultrabook.&lt;/p&gt;

&lt;p&gt;Said another way, you can get a great laptop, which approaches the weight of an Ultrabook, at a “Laptop cost.”&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Part II:  Non-Windows tablets (iPad, Android, Chromebooks)&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Before we talk about ACTUAL laptops, let’s take a quick turn and chat about your “second” device.&lt;/p&gt;

&lt;p&gt;In fact, you might be thinking “Maybe I don’t need a laptop at all, and instead, I’ll just get an iPad, iPad Pro, or Chromebook.” And, what’s the deal with “Microsoft Surface?”&lt;/p&gt;

&lt;p&gt;In short, nothing beats a laptop for ACTUAL WORK.&lt;/p&gt;

&lt;p&gt;The iPad can be FORCED into a device that can help kinda-sorta help you to do ACTUAL WORK. There’s the iPad, iPad Mini and “jumbo” iPad Pro which.. is just a REALLY BIG iPad and pen with some specialty apps to help you try to do ACTUAL WORK. &lt;/p&gt;

&lt;p&gt;But honestly, I’ve tried a lot of stuff, and NOTHING BEATS A LAPTOP for ACTUAL WORK.&lt;/p&gt;

&lt;p&gt;For me, I tend to use my iPad Mini when on the airplane and on the road, watching movies and quick dash emails. &lt;/p&gt;

&lt;p&gt;The bonus of a laptop over an iPad is… its just better at creating and editing documents. Yes, you CAN create documents, deliver slideshows, or make a spreadsheet on an iPad. For me, when it comes to creating content, even simple emails… I need a keyboard. Yes, yes, you can get Bluetooth keyboards that sync with the iPad (and I have one), but still the content creation software and experience isn’t the same as a Netbook, laptop or desktop.&lt;/p&gt;

&lt;p&gt;That being said, you might have a friend who &quot;gets away with&quot; having an iPad instead of a laptop. Indeed, Apple tried to suggest this was possible with this ad (&lt;a href=&quot;https://www.youtube.com/watch?v=Jd7cgSQg7JU&quot;&gt;link to video&lt;/a&gt;).. where a child in the future doesn&#039;t even understand te concept of a computer. Spoiler alert: Most people completely hate this ad.&lt;/p&gt;

&lt;p&gt;So, here’s my verdict if you want a “Not Full Windows Machine”:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If I had “real work” to do, and had to only pick one travel machine for the next 5 years, then, sorry iPad, I’d have to go laptop.&lt;/li&gt;
	&lt;li&gt;If I’m sitting on a beach, bus or couch and want to read, game, surf or NetFlix.. I use my iPad.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;&lt;em&gt;How about Android Tablets? Are those good choices?&lt;/em&gt;&lt;/h2&gt;

&lt;p&gt;Possibly. So, I’m (personally) not a huge fan of the current Android world. But I actually believe it’s a very personal choice / taste.&lt;/p&gt;

&lt;p&gt;But, I actually recognize I’m in the minority.&lt;/p&gt;

&lt;p&gt;That is, apparently more portable devices run Android than anything else out there. But I don’t own one, so I can’t personally recommend it.&lt;/p&gt;

&lt;p&gt;I will say that Android devices (Phones and tablets) &lt;a href=&quot;https://www.wandera.com/malware-on-android/&quot;&gt;seem to get a lot of viruses and crap&lt;/a&gt; that iPads simply do not. For that reason alone, I wouldn’t recommend them to most people.&lt;/p&gt;

&lt;p&gt;If you’ve got a friend with one, ask to play around on it. But even if I loved it, I’m not sure I’d want it as my only content-creation machine.&lt;/p&gt;

&lt;h2&gt;&lt;em&gt;What’s the deal with the “Google Chromebook Laptop”?&lt;/em&gt;&lt;/h2&gt;

&lt;p&gt;Whew. This is a tough one. So, non-IT folks… stick with me here.&lt;/p&gt;

&lt;p&gt;Every year I get a lot of comments telling me that I don’t give Google Chromebooks enough “discussion.”&lt;/p&gt;

&lt;p&gt;Fine. Okay.. Here’s the Wall Street Journal article entitled “&lt;a href=&quot;http://www.wsj.com/articles/you-can-ditch-your-pc-now-1415570187&quot;&gt;You can ditch your PC now&lt;/a&gt;” which demonstrates for some people its possible to use a Chromebook for many (most) tasks.&lt;/p&gt;

&lt;p&gt;Google has a “full size laptop thing” running an OS called the Chrome OS.&lt;/p&gt;

&lt;p&gt;Here’s the deal: It has no hard drive, and ALMOST everything you do is in the cloud. Meaning, really, that when you save stuff you’re saving to a website which stores your stuff for later access.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Does it run Windows applications? No.&lt;/li&gt;
	&lt;li&gt;Does it run Mac applications? No.&lt;/li&gt;
	&lt;li&gt;Does it run iPad apps? No.&lt;/li&gt;
	&lt;li&gt;Does it run Android apps?  See below.&lt;/li&gt;
	&lt;li&gt;Might you want one anyway? Possibly.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A recent addition to the Android arsenal is the new idea where SOME Chromebooks can run Android apps. &lt;a href=&quot;https://www.androidcentral.com/these-are-chromebooks-can-run-android-apps&quot;&gt;Here’s a list of currently supported devices&lt;/a&gt;. Of course I don’t maintain that list and who knows when it gets updated.&lt;/p&gt;

&lt;p&gt;But that’s kind-of-sort of interesting for me, if there was some key application I wanted to use while in my submarine or the WiFi goes down.&lt;/p&gt;

&lt;p&gt;Back to their core usage: Where are these Chromebook devices GREAT? In school (K-12) environments. They run Google apps and all the Google-y stuff you already use.&lt;/p&gt;

&lt;p&gt;So teachers just give ‘em to students and if they break? O well. There’s nothing stored on them anyway. Since the Internet is always on (usually) in the school, it makes a lot of sense there.&lt;/p&gt;

&lt;p&gt;For me, though, it’s not how I want to work. But some people can and do use a Google Chromebook is their “daily driver” for all things. And with the addition of Android apps you can take on-the-go with you, it’s a serious iPad contender and possible laptop replacement for some.&lt;/p&gt;

&lt;p&gt;But not me personally. I have several friends who love them and give them to their parents as their “daily driver” for all things. In fact, I tried this.. I tried to suggest to an &quot;older friend&quot; to give a Chromebook a try, but she didn&#039;t love it. I&#039;m not exactly sure why.. but maybe it was just too different from her usual (old) experience and went back to Windows.&lt;/p&gt;

&lt;p&gt;Okay: Back to laptops and Netbooks.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Part III: Which laptop brand should I get?&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Read this part first, before we get to the “Should I try really hard to get Windows 7 on my laptop” section. We’ll answer that in a minute.&lt;/p&gt;

&lt;p&gt;Okay: Here’s the thing about all laptops. All of them: basically, they’re all the same.&lt;/p&gt;

&lt;p&gt;Shocker, I know. But so are cars. They are all basically, almost exactly, 99% the same. Some of the “differences” might be:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Extra ports or USB 3.0 vs. USB 2.0.&lt;/li&gt;
	&lt;li&gt;USB “C” port(s). (None of my laptops have this, and I do just fine, thank you very much.)&lt;/li&gt;
	&lt;li&gt;One or two “video chips” (don’t get me started).&lt;/li&gt;
	&lt;li&gt;Keyboard twists / converts to make it a tablet.&lt;/li&gt;
	&lt;li&gt;Keyboard snaps off to make it a tablet.&lt;/li&gt;
	&lt;li&gt;Keyboard doesn’t exist at all (so it *IS* a tablet) and you ADD a keyboard.&lt;/li&gt;
	&lt;li&gt;Some are a little faster or a little slower.&lt;/li&gt;
	&lt;li&gt;Some are heavier. Others are lighter.&lt;/li&gt;
	&lt;li&gt;Some have 10-key keypads build in and some do not.&lt;/li&gt;
	&lt;li&gt;Some have BIG power supplies (which add to the overall weight of travel). Others have small wee ones.&lt;/li&gt;
	&lt;li&gt;Some are “bigger” and have a full sized keyboard. Others are smaller (Netbooks.)&lt;/li&gt;
	&lt;li&gt;Some laptops have touch screens, some do not.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But… again 99% of all laptops running Windows are EXACTLY the same “guts” and what they’re capable of.&lt;/p&gt;

&lt;p&gt;Since they all do the same basic thing, for the MAJORITY of “Joe and Jane users” you almost &lt;strong&gt;CANNOT GO WRONG&lt;/strong&gt; in buying a new laptop nowadays.&lt;/p&gt;

&lt;p&gt;This is going to sound totally weird, but my primary suggestion to prospective buyers of laptops and desktops is: &lt;strong&gt;UNDERSTAND THE WARRANTY&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;We’ll cover this in the next part of this talk.&lt;/p&gt;

&lt;p&gt;Of course, you’re also looking for a good deal. So, here are my top five &lt;strong&gt;deals&lt;/strong&gt; for anyone looking for a computer:&lt;/p&gt;

&lt;p&gt;1. &lt;strong&gt;New Dell Inspiron laptops.&lt;/strong&gt; They’re cheap, decent, fast, and have Dell’s warranty (again, more on this in a second.) &lt;a href=&quot;http://www.dell.com/p/inspiron-laptops-netbooks.aspx?c=us&amp;cs=04&amp;l=en&amp;s=bsd&amp;~ck=mn&quot;&gt;Click here to see them.&lt;/a&gt; I wouldn’t recommend _all_ of them. Some of them have the “wrong” processor type. (again, more on this in a second.) And this year and until I&#039;m dead, I’m recommending ONLY disks without moving parts (SSD) .. again, more on this in a bit.&lt;/p&gt;

&lt;p&gt;2. &lt;a href=&quot;http://www.dell.com/us/dfh/p/?cs=22&amp;c=us&amp;l=en&amp;s=dfh&amp;redirect=1&amp;dgc=IR&amp;cid=259637&amp;lid=4662700&quot;&gt;&lt;strong&gt;Dell Factory Outlet &lt;/strong&gt;&lt;/a&gt; This is Dell’s “island of lost toys.” This usually mans “Jane Doe couldn’t afford her new laptop for her son Johnny Doe after all, so she sent it back after 9 days of light use.” It doesn’t really mean “It was dropped, so it’s now crap.”  Even if it did, Dell still puts an original warranty on everything they sell there, which is the most important part of owning a laptop. I’ve literally bought 4 Dell laptops using the Outlet store.&lt;/p&gt;

&lt;p&gt;3. &lt;strong&gt;Tigerdirect.com and NewEgg.&lt;/strong&gt; They do sell new computers, but also “fell off the truck, if ya know what I mean”, off-lease (meaning, used) or are market closeouts in some way. But, holymoly.. lots and lots of awesome deals here. I promise you won’t find better deals than Tigerdirect. You will get the MOST bang for your buck, especially if you’re looking for something “higher end” at “lower cost.” But here’s the trick: Tigerdirect doesn’t warranty these. They’re always “factory direct warranties” whatever that means. And since they sell all brands, I don’t know what to tell you – even if you find a great deal. You’ll have to manually inspect the warranty yourself, call the company and see what their story is. Don’t expect Tigerdirect to help you when you have a problem. They sell it to you. They mail it to you. That’s the extent of your relationship.&lt;/p&gt;

&lt;p&gt;4. &lt;strong&gt;Retail:&lt;/strong&gt; Best Buy, hhGregg, Office Max, Office Depot, Staples: Even if they swore “up and down” that they had the most amazing warranty of all time, PLUS a killer deal  I still wouldn’t buy the computer and warranty from any of them. Plain and simple: There are KIDS working in these stores, and this is YOUR business / personal laptop. Sorry, but I can’t trust any of these outfits with my most precious business instrument. Not to mention that these kinds of stores turn over equipment types and makes and models so, so quickly. Will the kid behind the desk know what to do when you bring yours in from 1.5 years ago?&lt;/p&gt;

&lt;p&gt;5. &lt;strong&gt;Other Internet sites&lt;/strong&gt;: NewEgg.com, Buy.Com, Woot.com and others. Again almost always ONLY manufacturer’s warranty or some kind of 30-90 day only warranty. Again, not my cup of tea... as a RECOMMENDATION for most people. (More on this later.)&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Part IV: Understanding the warranty (the most important part of your laptop.)&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Let’s talk about Dell, specifically, for a second though. Why have I, historically, always owned a Dell laptop? (But, read all the way to the end about why I personally use Lenovo laptops. Trust me: This makes sense if you read all the way to the end.)&lt;/p&gt;

&lt;p&gt;Simple. Dell&#039;s warranty is easy for my pea-brain to understand.&lt;/p&gt;

&lt;p&gt;Here’s how it works:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The default warranty is 1 year if something “dies.” Examples are: Power supply, screen goes blank, USB port dies, whatever. You call up. They try to fix it over the phone.&lt;/li&gt;
	&lt;li&gt;If it needs a part you can replace (ie: battery, mouse, removable DVD drive) they ship it to you; you replace it yourself. You put the broken part in a pre-paid box back to them, and drop it in the mail. You are done.&lt;/li&gt;
	&lt;li&gt;If it needs a part you can’t replace (laptop screen, motherboard) the part is shipped “overnight” to a “regional center.” Then when the part arrives, the center calls you and you schedule a time to get your machine fixed.&lt;/li&gt;
	&lt;li&gt;For a little extra money when you buy your laptop, you can get 3 years on-site (ie: they come to you) coverage.&lt;/li&gt;
	&lt;li&gt;For a little “extra extra”, you can get “I spilled coffee directly in it”, “I dropped it hard on a marble floor” or “I dropped it in a lake” insurance, which will cover things like that. Really. At least that’s what they say.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now.. with that said: I, with my pea-brain, can understand this warranty structure, and can embrace what it means.&lt;/p&gt;

&lt;p&gt;To be clear: This warranty structure doesn’t mean “my problem will be fixed in 24 hours.” (Especially on a Thursday or Friday.)&lt;/p&gt;

&lt;p&gt;It means: “We (Dell) spring to action right away… If you called us with your problem after 2.00 PM or so, then we’re going to miss Mr. DHL delivery dude for today. So, we’ll have to ship it tomorrow then it will (usually) get to the local repair depot the next business (shipping) day. And when it arrives, then you’ll get a call. Only after the part arrives at the local depot center, will we call you and schedule an appointment for up to 24 hours after that.”&lt;/p&gt;

&lt;p&gt;That’s the deal.&lt;/p&gt;

&lt;p&gt;So don’t expect your warranty coverage to mean “your problem will be fixed within 24 hours.” Expect them to get started on your problem right away and have it fixed 24 hours AFTER the part is in the hands of the depot.&lt;/p&gt;

&lt;p&gt;So, because I ‘get’ the deal, I usually recommend Dell. It’s the “warranty-devil” I know, and I’m totally cool with that deal.&lt;/p&gt;

&lt;p&gt;That said, I always recommend Dells to Joes and Janes when they ask me what laptop to get because:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;99% of the any laptop you get is exactly the same and&lt;/li&gt;
	&lt;li&gt;I can EXPLAIN the warranty to them and ..&lt;/li&gt;
	&lt;li&gt;They can decide if that’s what they want.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I cannot OVER-EMPHASIZE how important &lt;strong&gt;UNDERSTANDING&lt;/strong&gt; your laptop’s warranty and restrictions are. This is &lt;strong&gt;literally&lt;/strong&gt;, &lt;em&gt;&lt;strong&gt;the #1 factor you should choose in buying a laptop.&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Again: I’ve described Dell’s warranty service above. If you want to check out &lt;strong&gt;other&lt;/strong&gt; manufacturer’s warranties, great. I’m just giving you my personal experience with Dell and warranties.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Part V: “How much laptop do I, a regular person, need?”&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;If you’re planning on: Surfing, Facebook, using Microsoft Office, Google Docs, Gmail, Hotmail, Office 365, NetFlix, Skype and other usual stuff you’ve got what I call “modest needs.”&lt;/p&gt;

&lt;p&gt;If you’re running some high powered stuff like Quark, World Of Warcraft (or other high end games), Final Cut, Movie Maker, VMware Workstation, HyperV, Autocad, Camtasia Studio or Mathemetica, you might need more than what I’ve listed here.&lt;/p&gt;

&lt;p&gt;Now, before we get into this, there’s a handful of.. holycow.. NEW $200 full Windows laptops out there. (&lt;a href=&quot;http://www.wsj.com/articles/hp-stream-11-review-a-200-windows-laptop-thats-worth-the-price-1417546863&quot;&gt;Here’s an older Wall Street Journal Entry on them.&lt;/a&gt; And here’s a &lt;a href=&quot;https://www.laptopmag.com/articles/best-cheap-laptop&quot;&gt;LaptopMag.com article from 2017 on sub-$200 laptops&lt;/a&gt;) And here&#039;s an article for 2018 from &lt;a href=&quot;https://bestlaptopsworld.com/best-laptops-under-200/&quot;&gt;Best Laptops World&lt;/a&gt; for computers under $200. But … they FAIL the “sniff test.” Read the article, then also read my discussion on Chip Type.. right here.&lt;/p&gt;

&lt;p&gt;So, here’s my answer for your “modest needs” person.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;&lt;em&gt;CPU Chip type and speed:&lt;/em&gt;&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Here’s the dirty little secret the laptop manufactures don’t want you to know: This almost doesnt matter. Or said another way, you almost cannot go wrong. Here are my suggestions:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Regular Intel Chips: i3 / i5 / i7&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Intel’s chip lines are the Intel Core i3, i5 and i7s. The i3 is usually the best bang for the buck but I wouldn’t turn down the higher model i5s or i7s. Again, i3 (any speed) will be perfectly fine for almost anyone. Get the i5s if you can afford it. The i7s are almost certainly overkill for almost everyone.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Intel Celerons (Avoid at all costs)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Avoid “Intel Celerons” at all costs. &lt;strong&gt;None are acceptable. Ever. This is why you don’t want to buy the $200 HP Stream 11 laptop .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;See the above line: NEVER EVER buy a laptop with an Intel Celeron. &lt;strong&gt;EVER.  &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ATOM Processor&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I would also avoid anything with Intel &lt;strong&gt;ATOM. &lt;/strong&gt;They’ll run all Windows apps. But slower. The PLUS side is that battery life is greater on these, but definitely slower than the Intel “i” series I mentioned above.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Snapdragon Laptops (new for 2018-2019)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;New for 2018-2019, there&#039;s a new choice on the block ... in a chip called &lt;strong&gt;Snapdragon&lt;/strong&gt;. If this word maybe sounds familiar to you, it&#039;s because many phones utilize Snapdragon processors. They are very low power, which means you get pretty insane battery life. Snapdragon laptops are closer to ATOM processors than they are to Intel i3/i5/i7s. This is because all the software you&#039;re running has to convert everything from &quot;Intel speak to Snapdragon speak.&quot;&lt;/p&gt;

&lt;p&gt;They are considered &quot;Always on, always connected.&quot; So even if you close the lid, they don&#039;t really go to sleep... they jusst &quot;sip&quot; power and will just be ready to rock when you re-open the lid. (Like an iPad works.)&lt;/p&gt;

&lt;p&gt;The good news is that, by all accounts, Snapdragon PCs are pretty nifty and if you use your PC like I use my iPad... for checking web stuff, surfing, skyping, etc etc. If you use a PC like this, then a Snapdragon PC is a pretty good choice. There is a tradeoff: you have to sacrifice a speed drop, but you get a really big advantage of outrageous near all-day battery life. Well, that&#039;s the idea anyway. This &lt;a href=&quot;https://www.zdnet.com/article/review-hp-envy-x2-running-windows-10-on-arm/&quot;&gt;fair review of a Snapdragon PC&lt;/a&gt; is not too, too glowing. These &lt;a href=&quot;https://www.zdnet.com/article/qualcomm-launches-snapdragon-850-platform-boosts-always-connected-windows-10-pcs/&quot;&gt;Snapdragon PCs are getting faster&lt;/a&gt;... but I&#039;m not sure I would want it to be my daily driver. So... I&#039;m not recommending it for students, and &quot;worker bees&quot; or people who create content and work for a living... yet. Maybe 2019 - 2020 or 2021 will be the year.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Gamer Laptops&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Avoid all “gamer” laptops. Avoid due to the high price tag and low battery life and large power supply to lug around. And I&#039;ve used some of these gamer laptops, and they don&#039;t really feel faster than what I&#039;m using now for work-like stuff. I&#039;m sure they do awesome on games. But I don&#039;t play games.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;RAM:&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;The new modern standard is 8GB. You could get away with 4GB likely just fine. But if if you had an extra $40, get 8GB over 4GB.&lt;/p&gt;

&lt;p&gt;Note that I am NOT recommending you get &lt;strong&gt;more&lt;/strong&gt; than 8GB for most modest-needs users. If you happen to get MORE than 8GB of RAM, bully for you, but you likely will never really need or use it.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Hard drive:&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;There are fivekinds of hard drives now:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Spinning disks (the kind we’ve had for years)&lt;/li&gt;
	&lt;li&gt;SSD disks which have no moving parts at all and&lt;/li&gt;
	&lt;li&gt;eMMC drives (also have no moving parts at all)&lt;/li&gt;
	&lt;li&gt;Hybrids which are spinning disks with some extra SSD stuff slapped on.&lt;/li&gt;
	&lt;li&gt;M.2 disks which are like SSD disks, &lt;a href=&quot;https://searchstorage.techtarget.com/definition/M2-SSD&quot;&gt;and look like little sticks of Wrigley&#039;s gum&lt;/a&gt;. These are generally faster than SSD disks, aren&#039;t needed for most mere mortals. Standard SSD disks are just fine.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Note that the older spinning disks are still found in 50% of all laptops. These are typically labeled SATA, but that&#039;s kind of a misnomer. SATA is the interface... so a SATA interface might connect wither a traditional spinning disk -or- an SSD disk. So, read the fine print and verify what you&#039;re getting when you see &quot;SATA&quot;: are you getting a spinning disk (connected via SATA)? or are you getting an SSD disk (connected via SATA)?&lt;/p&gt;

&lt;p&gt;I would avoid spinning disks in total now, and opt only for the SSD  or M.2s (which has no moving parts.) The catch however is that SSD and M.2 disks are more expensive than older spinning disks (for the same amount of space.) Manufacturers used to only have small SSDs for some reason; now they’re finally getting their acts together and you can go pretty big. Avoid eMMC drives, which are found in PCs as well; these kinds of drives are made for phones&#039; storage, but sometimes PC makers will put them in PCs. Don&#039;t use eMMC drives if possible.&lt;/p&gt;

&lt;p&gt;In short getting an SSD (or M.2)  vs. spinning disks is going to be the greatest &lt;strong&gt;one thing&lt;/strong&gt; you can do to make your laptop (even your old, crappy 3 year old laptop) feel insanely fast. More on SSD disks a little later.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Video card / chip:&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Unless you’re playing games, it doesn’t matter.&lt;/p&gt;

&lt;p&gt;Really.&lt;/p&gt;

&lt;p&gt;Even if you’re planning on watching NetFlix or Hulu, or playing Mindcraft, those kinds of apps really don’t care about your video chip / card much.&lt;/p&gt;

&lt;p&gt;Even on my super old crappy 8 year old Netbook, I am able to see full screen videos (wirelessly!) without any issue with a good network connection.&lt;/p&gt;

&lt;p&gt;Avoid laptops which tout “multiple” or “two” video chips. These give you extra headaches for almost NO VALUE to the mere mortal.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Screen Size / Resolution &amp; Touch:&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Look for something with WXGA or WXGA+ resolution. This can mean 1280×720 and up, which is decent on a laptop. &lt;/p&gt;

&lt;p&gt;In a total surprise, I find Microsoft Surface laptops to have &quot;too much&quot; resolution and too insane on my eyes. I&#039;m over 40, and.. well, that means my eyes are just so-so. I would test-drive any laptop and make sure the resolution works for you. Of course this is adjustable in software / Windows.. but sometimes Windows looks lousy when not at the uppermost maximum resolution.&lt;/p&gt;

&lt;p&gt;Some laptops don’t have touch screens. You might as well get a touch-enabled laptop, since things do appear to be getting “touch-ier.” That being said, as I write this year’s revised article, the two laptops I own; neither has a touch screen.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Wireless Network Card:&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;All laptops have built-in Wireless cards. You don’t have to get all worried if you don’t have the fastest wireless card.&lt;/p&gt;

&lt;p&gt;Ideally, look for one that has “n” in the spec, like 802.11n to get the fastest. Note that 802.11n isn’t actually the fastest thing out there. It’s actually 802.11AC but I think only a handful of laptop manufacturers put 802.11AC chips built into their notebooks (Asus being one of them).&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Part VI: Picking the OS. Windows 10, Windows 10 S and Windows 7 &lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;So, let me start out by saying it’s really, really hard to get a new laptop WITHOUT Windows 10 on it.&lt;/p&gt;

&lt;p&gt;There really isn’t any compelling reason to get Windows 7 anymore anyway. Windows 10 is the “last” version of Windows, but it will constantly upgraded and updated with new features every few months.&lt;/p&gt;

&lt;p&gt;In short, you pretty much have to get it.. so just get it… UNLESS your business or school or something requires you to have Windows 7 and NOT Windows 10. Besides, Windows 7 support ends January of 2020.. so I would avoid Windows 7. It&#039;s hard to find now on new machines anyway, so, just go Windows 10 and be done with it. &lt;/p&gt;

&lt;p&gt;My advice for “normal people” would be to spring for a machine with Windows 10 Pro.&lt;/p&gt;

&lt;p&gt;Why not “Windows 10 Home?” It’s Cheaper right?&lt;/p&gt;

&lt;p&gt;Right. But it’s missing ONE KEY feature I think everyone should be using, which is BITLOCKER Full Disk Encryption. And that is not within Windows 10 Home, so, for me.. it’s a non-starter.&lt;/p&gt;

&lt;p&gt;Note: My geeky friends will notice Windows 10 Enterprise isn’t on this list, because they are NOT sold with NEW machines are only available to IT departments.&lt;/p&gt;

&lt;p&gt;This chart is excellent to see what you get in which edition (left most columns): &lt;a href=&quot;https://en.wikipedia.org/wiki/Windows_10_editions&quot;&gt;https://en.wikipedia.org/wiki/Windows_10_editions &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note also that some new laptops might come with Windows 7 or Windows 8 or 8.1 pre-loaded. It depends on the manufacturer if you get “Windows 10 Ugprade rights.” I would just skip all of this and get Windows 10 Pro.&lt;/p&gt;

&lt;p&gt;Now: There’s another new kid on the block with Windows. Windows 10S. Windows 10S comes pre-loaded on some laptops and here’s the deal:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You can only install stuff from the Windows 10 Store.&lt;/li&gt;
	&lt;li&gt;You can only use Microsoft Edge as your browser&lt;/li&gt;
	&lt;li&gt;You cannot “download any application from the Internet” (like .MSI or EXE apps) and expect it to run. It won’t.&lt;/li&gt;
	&lt;li&gt;You can UPGRADE from Windows10S one time to Windows 10Pro if you purchase a upgrade license.&lt;/li&gt;
	&lt;li&gt;You CANNOT DOWNGRADE from Windows 10Pro backward to Windows 10S.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, why does Windows 10S exist? Because in the same way there is goodness and utility when an iPad is “locked” to using the Apple apps store, and an Android Tablet has goodness and utility when “locked” to the Android Store… Windows 10S also has goodness and utility when “locked” to the Windows 10 Store.&lt;/p&gt;

&lt;p&gt;So these Windows 10S machines are like “Windows’ versions of Chromebooks, but you can download apps.. lots of them from the Windows Store and do a lot of useful stuff.” But you can’t get yourself into too much trouble with viruses, malware, and evil stuff because.. these Windows 10S computers simply cannot run that stuff.&lt;/p&gt;

&lt;p&gt;So Windows 10S might be a pretty good option.. for SOME PEOPLE, SOME TIMES. Microsoft is touting Windows 10S as an excellent choice for Schools and “Front Line Workers” like hotel clerks, storefronts, and so on.. because they don’t need to do too, too much and don’t want to get into too much trouble. If this sounds good to you, check it out and see if a Windows 10S machine might be right for you. If it stinks, just return it. Or... you can do a one-time upgrade of Windows 10S to Windows 10 Pro. &lt;a href=&quot;https://www.theverge.com/2017/7/13/15959602/how-to-windows-10-s-store-microsoft-apps-best-survive&quot;&gt;Here’s a good article about using a Windows 10S as a daily driver.&lt;/a&gt; I recommend the read.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Part VII: 32 bit vs 64 bit.&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Most new machines you will get are 64-bit capable. 64-bit capable means you get two major benefits.&lt;/p&gt;

&lt;p&gt;Since most machines (laptops, not netbooks) you will buy nowadays are 64-bit capable, if you had an extra minute before clicking “buy now” I would check to ensure your new machine it’s 64-bit compatible and Windows 10 64-bit is pre-loaded.&lt;/p&gt;

&lt;p&gt;Okay  — why would you care?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Benefit #1: With 64-bit you can tap into all 4GB+ of memory you purchase. If you were to use the older 32-bit OS you will only see 3.2GB of your 4GB purchase. Weird, but that’s how it works.&lt;/li&gt;
	&lt;li&gt;Benefit #2: By and large, the computer will be “faster” than the exact same machine running a 32-bit operating system. Even though we’re talking about identical systems, the 64-bit is faster all around because it processes (many / most) things in 64-bit “chunks” as opposed to 32-bit “chunks.” So it’s overall, faster.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, in short, if you CAN get a 64-bit Windows 10 edition pre-loaded on your machine, I say “do it.”&lt;/p&gt;

&lt;p&gt;In the old days, there were driver problems with 64-bit editions.&lt;/p&gt;

&lt;p&gt;No more.&lt;/p&gt;

&lt;p&gt;If the machine comes pre-loaded with Windows 10 and has 64-bit support, you’re likely quite golden with regards to drivers. You could, maybe possibly have some problems with some of the stuff ATTACHED to your machine, like Printers and Scanners. But Windows 7 and 8′s drivers support is excellent and those drivers should work in Windows 10. It’s a rare (mostly modern) device that won’t work with Windows 64-bit. Note: some won’t, and that’s a possible 64-bit risk.&lt;/p&gt;

&lt;p&gt;For more information on 32 vs 64 bit support from Microsoft’s perspective, &lt;a href=&quot;http://windows.microsoft.com/en-us/windows/32-bit-and-64-bit-windows#1TC=windows-7&quot;&gt;read this&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;In short, for regular people, my advice is simple: Get Windows 10 Pro 64-bit edition pre-loaded on your laptop if you want guaranteed success.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Where do I go next:&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Again, your best bet for Price / Performance is the Dell Factory Outlet: &lt;a href=&quot;http://www.dell.com/outlet/&quot;&gt;http://www.dell.com/Outlet/&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;I found many, many, many under $600. Here’s an example available now as I write this:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Processor: Intel Core 7th Generation i5 Processor&lt;/li&gt;
	&lt;li&gt;Windows 10 Pro 64-bit&lt;/li&gt;
	&lt;li&gt;256 GB Solid State Drive&lt;/li&gt;
	&lt;li&gt;8GB DDR4 RAM &lt;/li&gt;
	&lt;li&gt;14 Inch HD (1366×768) LED-backlit Non-Touch Display&lt;/li&gt;
	&lt;li&gt;Intel HD Graphics&lt;/li&gt;
	&lt;li&gt;Dell Outlet Latitude 5480 Laptop&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Total price: $587 (as of Nov 29, 2018)&lt;/p&gt;

&lt;p&gt;Are these the best, lightest, fastest, crispest, nicest laptops you’re going to find? &lt;strong&gt;DEFINITELY NO&lt;/strong&gt;. But for MOST PEOPLE these laptops (and the warranty I explained earlier) are PERFECT for mere mortals.&lt;/p&gt;

&lt;p&gt;So, after this: everything else.. everything else.. is just bells and whistles when it comes to laptops.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You could argue that touch is becoming more and more important. So, if you wanted touch, then… get one with touch.  :-) Again: I have two &quot;daily driver&quot; Windows PC laptops, neither has touch, and I don&#039;t miss it, not even a litle bit.&lt;/p&gt;

&lt;p&gt;If you do want to go there, my only other big alternative might be a Microsoft Surface device. These are tablets that convert into laptops with snap-on keyboards (extra cost.) But the devices are amazingly built and very slick. You can go thru the myriad of options (again, this will be more expensive than other laptops, but you will almost certainly be happy with the experience.) &lt;a href=&quot;http://www.microsoftstore.com/store/msusa/en_US/cat/All-Surface/categoryID.69403400?icid=en_US_Store_UH_devices_Surface&quot;&gt;Anyway, check them out here&lt;/a&gt;.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Part VII: Wait.. you said Solid-State (SSD) disks were the best, why don’t I see those (sometimes) when I try to buy a new laptop?&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Here’s a fact: Your computer is ONLY as fast as its SLOWEST part.&lt;/p&gt;

&lt;p&gt;Want to know what the slowest part is? The “spinning disk” hard drive. (Or “Hybrid” which is a spinning disk with SOME non-spinning stuff slapped on.)&lt;/p&gt;

&lt;p&gt;Remember: Most computer manufacturers are cheap. They want to make something cheap and sell you something that works. When you get it they want you to be REASONABLY happy enough NOT to send it back. Its also in their best interest to say “500GB hard drive” or “750GB Hard drive”. Sounds HUUUUGE. So, ”spinning disks” do the job. They’re cheap and plentiful.&lt;/p&gt;

&lt;p&gt;But, your spinning disk is holding you back.&lt;/p&gt;

&lt;p&gt;SSD and M.2 disks are where the action is. Sometimes you cannot buy SSD disks with new systems (or if you do, you can only get the smaller ones.)&lt;/p&gt;

&lt;p&gt;Why? See point #1 above: Spinning disks are &lt;strong&gt;good enough&lt;/strong&gt;. So that’s what manufacturers sell. It won’t be like this forever. I suspect in the next year this will tip the other way to SSDs being normally available in bigger sizes.&lt;/p&gt;

&lt;p&gt;So, here’s the (counter-intuitive) recommendation if you want to maximize your new laptop and make it feel AWESOME / ZIPPY for the next several years. Note: There is a litttttttle risk and costs involved here. But I think its worth it. Here goes:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Buy your machine with the SMALLEST spinning disk hard drive you can. Usually the smallest is 320GB for laptops made.&lt;/li&gt;
	&lt;li&gt;Buy your own SSD. Buy the biggest you can afford. I have tested several brands, and can only hands-down recommend ONE manufacturer: Samsung.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Samsung has three “flavors” of SSD disks. But, for YOU the mere mortal, there’s only one: The Samsung EVO.  &lt;a href=&quot;https://www.amazon.com/Samsung-850-EVO-2-5-Inch-MZ-75E120B/dp/B00OAJ5N6I/ref=sr_1_1?s=electronics&amp;ie=UTF8&amp;qid=1511379491&amp;sr=1-1&amp;keywords=samsung+evo+120GB&quot;&gt;Here on Amazon&lt;/a&gt; it’s $158.00 for the 120GB version.  A little more for 256 and so on, and you can select up to 1TB if you wanted (obviously for more money.)&lt;/p&gt;

&lt;p&gt;In MOST cases (not all!) these drives come with a cable and software to MIGRATE the hard drive you HAVE onto the new platform. Always remember that in most cases, you need to be USING less space than you’re GOING to. (Be sure to read the details of your purchase CAREFULLY to ensure that your drive comes with a transfer cable if you want to do this yourself.)&lt;/p&gt;

&lt;p&gt;Anyway.. here’s an example:&lt;/p&gt;

&lt;p&gt;– Your new laptop comes with a 500GB spinning disk hard drive.&lt;/p&gt;

&lt;p&gt;– Its using 20GB of space of that 500GB.&lt;/p&gt;

&lt;p&gt;You can then upgrade to the 120GB SSD because you’re only using 20GB of that space.&lt;/p&gt;

&lt;p&gt;Here’s another example:&lt;/p&gt;

&lt;p&gt;-Your laptop comes with 500GB hard drive.&lt;/p&gt;

&lt;p&gt;-You’re using 300GB of that space.&lt;/p&gt;

&lt;p&gt;You cannot shove 300GB of stuff into that 120GB SSD disk.&lt;/p&gt;

&lt;p&gt;Its usually pretty easy to then take out the OLD drive and throw in the NEW drive. If you’re UNCOMFORTABLE with all of this, you can pay someone at Best Buy or your local computer store to do all of this for you. Don’t pay more than $100 for the LABOR involved here.&lt;/p&gt;

&lt;p&gt;What do you do with the original drive you took out? &lt;a href=&quot;http://www.amazon.com/Inateck-External-Enclosure-Tool-free-FE2001/dp/B00DW374W4/ref=sr_1_1?s=electronics&amp;ie=UTF8&amp;qid=1448996692&amp;sr=1-1&amp;keywords=usb+3.0+external+hard+drive+case&quot;&gt;For $10 whole dollars on Amazon&lt;/a&gt;, you can put your ORIGINAL drive in a USB 3.0 case and reclaim that space as “spare” .. for pictures, videos, docs, whatever.&lt;/p&gt;

&lt;h1&gt;&lt;strong&gt;Part IX: What kind of laptop do you own, Jeremy?&lt;/strong&gt; &lt;strong&gt;(Here comes a little geekier stuff.)&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Some of you may wonder what kind of laptop I am running?&lt;/p&gt;

&lt;p&gt;I finally in 2017, retired my laptop that I used since 2011 !! Up until this year, I used a Lenovo W520 with a four-core i7 processor and 1.5TB of SSD hard drive space (two SSD disks) and 32GB of RAM. It’s big and heavy and the power supply is .. just.. huge.&lt;/p&gt;

&lt;p&gt;Now, for a little over a year, I have used a Lenovo T470P (P= Performance in case you care) with an i7-7820HQ 4-Core 2.9Ghz processor, 32GB RAM, and 2TB M.2 SSD space (which cost me as much as the laptop ITSELF!)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BUT REMEMBER: BUT I AM NOT A REGULAR PERSON.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I do live demonstrations in front of thousands of people and my laptop has to FLY.&lt;/p&gt;

&lt;p&gt;I have another machine which is a Lenovo X260 running Windows 10 64-bit with 16GB of RAM and 512GB SSD disk, and its totally fantastic to represent my “mere mortal machine”. This is the machine I carry around the house, or on a one or two day trip somewhere, where I am not presenting demos (but maybe demoing PowerPoints only). It has &quot;near all day&quot; battery life, but is pretty fast, and I can do 98% of what I would need to on my super fast &quot;big boy&quot; laptop.&lt;/p&gt;

&lt;p&gt;I can hear you now: “But what about Dell? You reference Dell like 80 times in this article. Didn’t you basically tell me to buy a Dell?”&lt;/p&gt;

&lt;p&gt;Yes, I did.&lt;/p&gt;

&lt;p&gt;I recommend Dell for &lt;strong&gt;most &lt;/strong&gt;people. But I personally like Lenovo’s “build quality” a lot better, and .. with my multiple Lenovo laptops I’ve owned over the years, I have literally NEVER needed the warranty. I’ve never had a pixel go bad, never had a USB port fry out, or a keyboard die. Not one. Not ever.&lt;/p&gt;

&lt;p&gt;Remember: I’m an IT guy who does hard core demonstrations, so my needs are greater than some others. I need 32GB of RAM in my laptop, seriously fast hard drive and a lot lot more.&lt;/p&gt;

&lt;p&gt;Again: my set up is NOT RECOMMENDED for regular people.&lt;/p&gt;

&lt;p&gt;Let me be frank: the Lenovo buying experience is not great. The laptops take forever to get to me and the last time, my assistant called every day for 90 days to get confirmation of the activation of the warranty.&lt;/p&gt;

&lt;p&gt;I wouldn’t want to put Jon and Jane Buyer thru either of those experiences. And I’m bordering on afraid to use the warranty service. Haven’t used it yet, I’ll cross my fingers. Heck, I don’t even know where to call if I had a problem. And that’s a problem.&lt;/p&gt;

&lt;p&gt;For some of the people in my business, I have purcahsed them Lenovo T430s machines which I got as a refurbished deal on Woot.com. These are &quot;off lease&quot; / refubished machines. &quot;Why would I do this to myself?&quot; flying in the face of my own advice. Again: I&#039;m not a regular person. I know what I&#039;m doing. If one of these laptop dies, I&#039;m confident I can rip the hard drive out and stick it another PC and be working the same day. And, I&#039;ve had one of these machines fail.. the same day I got it. And then never again. So, again: Lenovo&#039;s appear to work like tanks, and I&#039;m happy with my skillset to deal with &quot;no warranty&quot; or &quot;sub-par&quot; warranty on these systems to save some dollars, because I can recover if one of these T430s machines should die around the office.&lt;/p&gt;

&lt;h1&gt;Final Thoughts (and if you read nothing else…)&lt;/h1&gt;

&lt;p&gt;So, for regular people, I still recommended the Dell Outlet to get cheap, reliable, new computers and the Dell warranty for reliable, easy to understand warranty service.&lt;/p&gt;

&lt;p&gt;Hope this guide helps you and your friends out.&lt;/p&gt;

&lt;p&gt;– Signed, your friendly neighborhood Jeremy Moskowitz, Enterprise Mobility MVP&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Windows 1809 ADMX Files, Spreadsheet, and Security Baselines ... Out the door and final. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/windows-1809-admx-files-spreadsheet-and-security-baselines--out-the-door-and-final</link>
        <pubDate>2018-11-27T13:10:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you&amp;#39;re using Windows 1809, the final 1809 ADMX, 1809 ADMX Spreadsheet and 1809 security baselines are out the door.

1809 ADMX:&amp;nbsp;https://www.microsoft.com/en-us/download/details.aspx?id=57576

1809 Spreadsheet:&amp;nbsp;https://www.microsoft.com/en-us/download/details.aspx?id=57464

1809 Baselines:&amp;nbsp;https://blogs.technet.microsoft.com/secguide/2018/11/20/security-baseline-final-for-windows-10-v1809-and-windows-server-2019/&amp;nbsp;&amp;nbsp;

As a reminder, here&amp;#39;s my best practic ]]>
        </description>
        <content:encoded>
            &lt;p&gt;If you&#039;re using Windows 1809, the final 1809 ADMX, 1809 ADMX Spreadsheet and 1809 security baselines are out the door.&lt;/p&gt;

&lt;p&gt;1809 ADMX: &lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=57576&quot;&gt;https://www.microsoft.com/en-us/download/details.aspx?id=57576&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1809 Spreadsheet: &lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=57464&quot;&gt;https://www.microsoft.com/en-us/download/details.aspx?id=57464&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1809 Baselines: &lt;a href=&quot;https://blogs.technet.microsoft.com/secguide/2018/11/20/security-baseline-final-for-windows-10-v1809-and-windows-server-2019/  &quot;&gt;https://blogs.technet.microsoft.com/secguide/2018/11/20/security-baseline-final-for-windows-10-v1809-and-windows-server-2019/  &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As a reminder, here&#039;s my best practice video for ADMXs and how to update the central store: &lt;a href=&quot;https://www.youtube.com/watch?v=Op7hAvc5a0M&quot;&gt;https://www.youtube.com/watch?v=Op7hAvc5a0M&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That&#039;s it. ! Hope it helps you out!&lt;/p&gt;

&lt;p&gt;Thanks to my friend Jeremy F for the reminder to send this to the gang... !&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is the Policy CSP and why is it special to Intune? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-the-policy-csp-and-why-is-it-special-to-intune</link>
        <pubDate>2018-11-27T11:33:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So we said that CSPs are embedded interfaces in the Windows 10 OS that give MDMs the ability to read, set, modify and delete configuration settings.&amp;nbsp; This gives administrators the ability to command and deliver settings for enterprise devices.

There are many CSPs, but there is one particular one that is special.&amp;nbsp; That one is the Policy CSP.&amp;nbsp;

Like all CSPs, the MDM engine takes directives from it.&amp;nbsp; What makes it prominent is that it contains so many of the common items t ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So we said that CSPs are embedded interfaces in the Windows 10 OS that give MDMs the ability to read, set, modify and delete configuration settings.  This gives administrators the ability to command and deliver settings for enterprise devices.&lt;/p&gt;

&lt;p&gt;There are many CSPs, but there is one particular one that is special.  That one is the Policy CSP. &lt;/p&gt;

&lt;p&gt;Like all CSPs, the MDM engine takes directives from it.  What makes it prominent is that it contains so many of the common items that admins are used to managing in Group Policy.  For instance, the Policy CSP contains settings for common components such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Browser&lt;/li&gt;
	&lt;li&gt;Defender&lt;/li&gt;
	&lt;li&gt;Device Guard&lt;/li&gt;
	&lt;li&gt;Power&lt;/li&gt;
	&lt;li&gt;Remote Desktop Services&lt;/li&gt;
	&lt;li&gt;Update&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For instance, may you want to prevent users from terminating a task in the Task Manager.  Well, the Policy CSP contains a TaskManager Policy and the name of the settings is &lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;TaskManager/AllowEndTask.  The data type for this setting is integer and the supported values are as follows:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;0 - Disabled. EndTask functionality is blocked in TaskManager.&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;1 - Enabled (default). Users can perform EndTask in TaskManager.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;The TaskManager Policy is supported in the following Windows 10 Editions.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Policy_CSP_2.png&quot; style=&quot;height:148px; width:500px&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;Chart taken from &lt;a href=&quot;https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-taskmanager&quot;&gt;https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-taskmanager&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;The Policy configuration service provider contains sub-categories.&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;Policy/Config/&lt;em&gt;AreaName&lt;/em&gt; – Handles the policy configuration request from the server.&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;Policy/Result/&lt;em&gt;AreaName&lt;/em&gt; – Provides a read-only path to policies enforced on the device.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;The Policy CSP have a scope to which its settings can be configured.  Some policies have settings that only apply to the device itself regardless of who is logged on to it.  Others apply to the user which means that settings can vary depending on which user logs on.  Each policy includes a path that defines its scope.  The possible scope paths are as follows:&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;User scope:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;./User/Vendor/MSFT/Policy/Config/&lt;em&gt;AreaName/PolicyName&lt;/em&gt;&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt; to configure the policy.&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;./User/Vendor/MSFT/Policy/Result/&lt;em&gt;AreaName/PolicyName&lt;/em&gt;&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt; to get the result.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;Device scope:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;./Device/Vendor/MSFT/Policy/Config/&lt;em&gt;AreaName/PolicyName&lt;/em&gt;&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt; to configure the policy.&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;./Device/Vendor/MSFT/Policy/Result/&lt;em&gt;AreaName/PolicyName&lt;/em&gt;&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt; to get the result.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is a quick introduction to the PolicyCSP. In other blog articles we&#039;ll examine more how to take advantage of it.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is a CSP and what is a Custom OMA-URI? (and how do I deploy one in Intune)? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-a-csp-and-what-is-a-custom-omauri-and-how-do-i-deploy-one-in-intune</link>
        <pubDate>2018-11-20T17:33:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ CSP stands for Configuration Service Provider.&amp;nbsp; You might think Intune i somehow a CSP but that would be incorrect.&amp;nbsp;

Intune is an MDM service.&amp;nbsp;

A CSP is a component of the Windows 10 operating system; kind of like a Client Side Extension (CSE) is to Group Policy.

The CSP is what gives IT personnel the ability to apply device-specific settings to Windows devices.&amp;nbsp; In our case, that means using Intune to do it.&amp;nbsp; In doing so, IT can be assured that all company devi ]]>
        </description>
        <content:encoded>
            &lt;p&gt;CSP stands for Configuration Service Provider.  You might think Intune i somehow a CSP but that would be incorrect. &lt;/p&gt;

&lt;p&gt;Intune is an MDM service. &lt;/p&gt;

&lt;p&gt;A CSP is a component of the Windows 10 operating system; kind of like a Client Side Extension (CSE) is to Group Policy.&lt;/p&gt;

&lt;p&gt;The CSP is what gives IT personnel the ability to apply device-specific settings to Windows devices.  In our case, that means using Intune to do it.  In doing so, IT can be assured that all company devices are compliant with the standards and policies set forth by the organization.  Keep in mind that you can deliver setting configurations to CSPs through other means than an MDM such as Windows Configuration Designer, which is used to create provisioning packages.  &lt;/p&gt;

&lt;p&gt;So what are these CSP’s?  Well, you can go to Microsoft’s website and look them up at &lt;a href=&quot;https://docs.microsoft.com/en-us/windows/client-management/mdm/configuration-service-provider-reference&quot;&gt;https://docs.microsoft.com/en-us/windows/client-management/mdm/configuration-service-provider-reference&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Notice that not all operating system editions support each CSP because some settings are unique to select OS versions.  In addition, many CSP’s contain settings introduced in designated Windows versions.  This means that the settings are not supported in versions prior to that release.  &lt;/p&gt;

&lt;p&gt;So let’s look at the inner workings of a CSP.  Let’s say you want to enable BitLocker for all the mobile devices used by your HR and Finance personnel.  Well, there is a CSP for that called BitLocker CSP.  If we look at the available settings for that CSP, they look like this:&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/CSP_4.png&quot; style=&quot;height:317px; width:500px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Chart came from &lt;a href=&quot;https://docs.microsoft.com/en-us/windows/client-management/mdm/bitlocker-csp&quot;&gt;https://docs.microsoft.com/en-us/windows/client-management/mdm/bitlocker-csp&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;CSP settings accept some sort of data type value to enable or disable the setting.  In this case, the data types are integers, either a 0 or a 1.  A value of 0 disables the settings while a value of 1 enables it.  The setting RequireDeviceEncryption for instance allows an administrator to require the use of BitLocker encryption on designated devices.&lt;/p&gt;

&lt;p&gt;So let’s say our security minded administrator wants to deliver an integer data value of “1” to the BitLocker CSP contained within the HR and Finance devices.  That administrator just needs an interface to configure, assign and deliver them, and that is where Intune comes in.  Below, a Profile was created called “BitLocker Settings”  that now delivers the selected Windows Encryption settings.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/CSP_3_001.png&quot; style=&quot;height:342px; width:700px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;How easy was that?  Ridiculously simple indeed.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;Keep in mind that not all CSP settings are &quot;surfaced&quot; as settings within Intune.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;So what happens when we want to configure settings on a CSP that doesn’t appear in Intune?  Well, there are two options.  The first would be to sit and wait around with our fingers crossed and hope that Microsoft Intune developers will add our desired settings soon.  The other way is to take matters into our own hands and make a Custom OMA-URL.  So how do we do this?&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;A key (and useful) example is how to make MDM vs. GP more deterministic.  &lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;Starting with 1803 however, a policy called “ControlPolicyConflict/MDMWinsOverGP&lt;/span&gt;&lt;strong&gt;&lt;span style=&quot;color:black&quot;&gt;”&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;was created to give you control over which one won.  So while the policy setting doesn’t appear by default, we can create a customized URI for it that will enforce the outcome we want. &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;Intune provides an interface to create Custom OMA-URI policies within a profile.  We just have to provide some information which is outlined below.  &lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;Name&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;Description &lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;OMA-URI&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;Data Type&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;Value&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;In the case of this CSP, the possible values are &lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;0 (default)&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;1 - The MDM policy is used and the GP policy is blocked&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In the case the creation process will look like this:&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Custom_CSP.png&quot; style=&quot;height:138px; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;For more information concerning this particular CSP:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-controlpolicyconflict#controlpolicyconflict-mdmwinsovergp&quot;&gt;https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-controlpolicyconflict#controlpolicyconflict-mdmwinsovergp&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But the point is: Don&#039;t have a &quot;knob&quot; for the setting? Make a custom OMA-URA and you&#039;re off to the races.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is Azure AD connect, and how is it related to Intune? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-azure-ad-connect-and-how-is-it-related-to-intune</link>
        <pubDate>2018-11-19T13:17:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you are familiar with the concept of Windows Server Active Directory, then you already have a good idea of what Azure AD is.&amp;nbsp; It essentially is a cloud version of Active Directory which was introduced in Server 2000, which seems like forever ago.&amp;nbsp; In technical terms, it is Microsoft&amp;rsquo;s cloud-based identity and access management service.&amp;nbsp; The basic concept of the two AD&amp;rsquo;s is the same; users logon and authenticated to AD and then access resources.

So why the need fo ]]>
        </description>
        <content:encoded>
            &lt;p&gt;If you are familiar with the concept of Windows Server Active Directory, then you already have a good idea of what Azure AD is.  It essentially is a cloud version of Active Directory which was introduced in Server 2000, which seems like forever ago.  In technical terms, it is Microsoft’s cloud-based identity and access management service.  The basic concept of the two AD’s is the same; users logon and authenticated to AD and then access resources.&lt;/p&gt;

&lt;p&gt;So why the need for Azure AD?  Well, we live in a different world today than we did when Server 2000 was unveiled.  We live in a mobile age that is dominated by the Internet and traditional AD wasn’t designed for a world like that.  Azure AD on the other hand is designed to support web-based services that use Representational State Transfer API interfaces.  In simple terms, it was created for cloud based applications such as Office 365, Salesforce.com, etc.  To do that, it had to be based on completely different protocols, specifically SAML and OAuth 2.0. &lt;/p&gt;

&lt;p&gt;There are a number of versions of Azure AD:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Azure Active Directory Free&lt;/li&gt;
	&lt;li&gt;Azure Active Directory Basic&lt;/li&gt;
	&lt;li&gt;Azure Active Directory Premium P1&lt;/li&gt;
	&lt;li&gt;Azure Active Directory Premium P2&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The differences between these different versions is two fold.  As you move up from the free version, you get more features, which of course, you guessed it, costs more money.  Except for Azure Active Directory Free, which is complimentary if you have a paid subscription to Office 365, Microsoft Dynamics CRM Online, Enterprise Mobility Suite, or other Microsoft services, the other versions require some sort of subscription free that goes up along with the number of feature packages.&lt;/p&gt;

&lt;p&gt;There are several integral components of Azure AD.  They are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Azure AD Directory – the equivalent to the domain of Windows Server AD, it is what contains the tenant’s users, groups, apps, devices, etc.&lt;/li&gt;
	&lt;li&gt;Azure AD Account – an identity created through Azure AD or another Microsoft cloud service such as Office 365.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The Azure AD account gives users access to their organization’s cloud service subscriptions.  On a Windows 10 device, it is referred to as a Work or School Account.  The screenshot below illustrates how one would manually join a Windows 10 device to Azure AD.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Azure_AD_2.png&quot; style=&quot;height:540px; width:700px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;A&lt;/span&gt;&lt;span style=&quot;color:black&quot;&gt;zure AD is highly scalable.  Even the free version can contain 500,000 objects.  With so many users, accounts and applications, an organization undoubtedly needs one or more administrators to manage everything.  Below is the management screen of Azure AD.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/azure_ad_1a.png&quot; style=&quot;height:798px; width:1324px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;So how does Azure AD relate to Intune?  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;Well, the two work hand-in-hand.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;In practivcal terms, you really cannot have Intune with Azure AD.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;In the same way that Windows Group Policy helped deliver and manage settings for Windows domain join machines, Intune is the mobile device management tool that integrates with Azure AD in order to manage settings as well.  It also protects your organization’s resources by controlling how users can access and share it and can lock down devices that may have been stolen or compromised.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Is Group Policy Slowing Me Down </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/is-group-policy-slowing-me-down</link>
        <pubDate>2018-11-15T13:20:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Another article.. Not mine.. from Microsoft. Good one.

https://blogs.technet.microsoft.com/askpfeplat/2018/09/03/is-group-policy-slowing-me-down/

I do talk about this in super detail in my GPbook.. in the Troubleshooting chapter with more details; but this is an excellent first start.

I also talk about this topic in my talk from TechEd here:

https://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/WIN-B328

And give you some tips and tricks for analyzing the data and making conclu ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Another article.. Not mine.. from Microsoft. Good one.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/askpfeplat/2018/09/03/is-group-policy-slowing-me-down/&quot;&gt;https://blogs.technet.microsoft.com/askpfeplat/2018/09/03/is-group-policy-slowing-me-down/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I do talk about this in super detail in my GPbook.. in the Troubleshooting chapter with more details; but this is an excellent first start.&lt;/p&gt;

&lt;p&gt;I also talk about this topic in my talk from TechEd here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/WIN-B328&quot;&gt;https://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/WIN-B328&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And give you some tips and tricks for analyzing the data and making conclusions.&lt;/p&gt;

&lt;p&gt;Hope this helps you out !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is Enterprise Mobility + Security E3 vs E5? (and which should you pick for Intune?) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-enterprise-mobility--security-e3-vs-e5-and-which-should-you-pick-for-intune</link>
        <pubDate>2018-11-14T23:03:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ There are a number of things that are complicated and hard to comprehend at first.&amp;nbsp; College algebra, quantum physics and Microsoft pricing when it comes to their cloud services.&amp;nbsp; For instance, here is a screenshot of just some of the available licensing for a school system that currently utilizes Microsoft cloud services.



At first glance, trying to wrap your head around all of the available licensing options can be as exhaustive as contemplating the size of the universe.&amp;nbsp; T ]]>
        </description>
        <content:encoded>
            &lt;p&gt;There are a number of things that are complicated and hard to comprehend at first.  College algebra, quantum physics and Microsoft pricing when it comes to their cloud services.  For instance, here is a screenshot of just some of the available licensing for a school system that currently utilizes Microsoft cloud services.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Mobility_E3_1.png&quot; style=&quot;height:542px; width:400px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;At first glance, trying to wrap your head around all of the available licensing options can be as exhaustive as contemplating the size of the universe.  There are so many ways to slice and dice subscription licensing when it comes to Office 365, Intune, Azure, etc.  For the sake of this blog series, we are going to make it simple. &lt;/p&gt;

&lt;p&gt;You want the ability to do mobile device management, which means Intune.  You also want Azure AD.  That combination pairs your options down to one of two Enterprise Mobility Suite packages (EMS).  Before EMS, Microsoft only offered their products separately such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Azure Active Directory Premium&lt;/li&gt;
	&lt;li&gt;Microsoft Intune&lt;/li&gt;
	&lt;li&gt;Azure Information Protection&lt;/li&gt;
	&lt;li&gt;Microsoft Advanced Threat Analytics&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Microsoft then offered EMS combos that bundled features together in a single option for simplicity’s sake.  As of today, there are two EMS bundle offerings which are outlined below:&lt;/p&gt;

&lt;table border=&quot;1&quot; cellspacing=&quot;0&quot; style=&quot;width:476.75pt&quot;&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td style=&quot;vertical-align:top; width:148.25pt&quot;&gt;
			&lt;p&gt;&lt;strong&gt;Feature&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:163.4pt&quot;&gt;
			&lt;p&gt;&lt;strong&gt;Enterprise Mobility + Security E3&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:165.1pt&quot;&gt;
			&lt;p&gt;&lt;strong&gt;Enterprise Mobility + Security E5&lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;vertical-align:top; width:148.25pt&quot;&gt;
			&lt;p&gt;Azure Active Directory&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:163.4pt&quot;&gt;
			&lt;p&gt;P1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:165.1pt&quot;&gt;
			&lt;p&gt;P2&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;vertical-align:top; width:148.25pt&quot;&gt;
			&lt;p&gt;Intune&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:163.4pt&quot;&gt;
			&lt;p&gt;Included&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:165.1pt&quot;&gt;
			&lt;p&gt;Included&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;vertical-align:top; width:148.25pt&quot;&gt;
			&lt;p&gt;Azure Information Protection&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:163.4pt&quot;&gt;
			&lt;p&gt;P1&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:165.1pt&quot;&gt;
			&lt;p&gt;P2&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;vertical-align:top; width:148.25pt&quot;&gt;
			&lt;p&gt;Advanced Threat Analytics&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:163.4pt&quot;&gt;
			&lt;p&gt;Included&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:165.1pt&quot;&gt;
			&lt;p&gt;Included&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td style=&quot;vertical-align:top; width:148.25pt&quot;&gt;
			&lt;p&gt;Cloud App Security&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:163.4pt&quot;&gt;
			&lt;p&gt;N/A&lt;/p&gt;
			&lt;/td&gt;
			&lt;td style=&quot;vertical-align:top; width:165.1pt&quot;&gt;
			&lt;p&gt;Included&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;So what is P1 and P2?  Well P2 includes more advanced features and capabilities.  For instance, the P1 bundle for Azure Active Directory gives you the ability to secure single sign-on to cloud and on premise apps.  It also offers multifactor authentication (MFA) conditional access and advanced security reporting.  P2 includes all of that plus offers &lt;span style=&quot;color:#0d0d0d&quot;&gt;Identity Protection and Privileged Identity Management (PIM)&lt;/span&gt; and advanced capability concerning identity protection.&lt;/p&gt;

&lt;p&gt;E5 of course is more expensive.  So should you get E3 or E5?  Well, just like buying a car, this isn’t a decision that a business should make without a little time and consideration concerning what the needs of the organization actually are, as well as their budget.  Your decision also depends on what other Microsoft cloud services you subscribe to as well such as Office 365.  I told you it was complicated.  If you want to test drive all of the features that E5 has to offer, the good news is that you can sign up for an E5 trial.  That part I can truly say, is easy.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/mobility_e3_3b.png&quot; style=&quot;height:523px; width:800px&quot; /&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is Intune MDM Enrollment vs. Azure Workplace Join? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-intune-mdm-enrollment-vs-azure-workplace-join</link>
        <pubDate>2018-11-12T15:11:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ When you join a Windows machine in the traditional way to a network, you have the choice of joining a workgroup or a domain.&amp;nbsp; A workgroup has limited features.&amp;nbsp; It really just gives just each device the ability to share files with one another and that is about it.&amp;nbsp; A domain was a far better choice in most instances because it offers all of the management and security abilities you need in an enterprise.

I use that analogy to describe the difference between MDM Enrollment and Az ]]>
        </description>
        <content:encoded>
            &lt;p&gt;When you join a Windows machine in the traditional way to a network, you have the choice of joining a workgroup or a domain.  A workgroup has limited features.  It really just gives just each device the ability to share files with one another and that is about it.  A domain was a far better choice in most instances because it offers all of the management and security abilities you need in an enterprise.&lt;/p&gt;

&lt;p&gt;I use that analogy to describe the difference between MDM Enrollment and Azure Workplace.   Azure Workplace join &lt;strong&gt;is not the same as &lt;/strong&gt;Intune MDM. &lt;/p&gt;

&lt;p&gt;It is however a first step to enrolling in MDM because a device has to joined to Azure AD before it can be enrolled in Intune.  With Azure Workplace, you’re really just “half way there” (as the man to Bon Jovi would say, well, sing really.),&lt;/p&gt;

&lt;p&gt;And there is really minimal of advantages to just being &quot;half way&quot; there. &lt;/p&gt;

&lt;p&gt;Azure Workplace is really just about allowing other people to bring their own devices (BYOD) to join your Azure AD and enjoy a few benefits such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;single-sign-on (SSO) functionality to cloud services&lt;/li&gt;
	&lt;li&gt;access to the Windows store&lt;/li&gt;
	&lt;li&gt;ability to logon a device using an organizational work or school account&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;What you &lt;strong&gt;can’t do&lt;/strong&gt; with Azure Workplace is:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Deploy applications or&lt;/li&gt;
	&lt;li&gt;Manage settings or&lt;/li&gt;
	&lt;li&gt;Lockdown a machine&lt;/li&gt;
	&lt;li&gt;Wipe it&lt;/li&gt;
	&lt;li&gt;Control it. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All of that takes full MDM enrollment.  But if you are looking for a quick way for a dozen temp workers or contractors to join your Azure AD, it is ample to get the job done.&lt;/p&gt;

&lt;p&gt;You can tell if your device is only Azure Workplace joined.  If you click “Manage your account on your Windows Profile page, the page will open in a web browser.  In the screenshot below, you can see where the computer is only “Workplace joined” and not MDM enrolled.&lt;/p&gt;

&lt;p&gt;But you can see for yourself if you click on the flag, click Manage your account, and open the page in a Browser, like Edge. You’ll see in Figure 2.23 where the computer is merely “Workplace joined” and not MDM enrolled. &lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Azure_Workplace_1.png&quot; style=&quot;height:436px; width:800px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Note the Windows flag like icon which is also an indicator of Workplace joined status.  If the machine were MDM enrolled, it would be replaced by a briefcase.  In the end, if you want the full Monty, you need to complete the two-part process and become MDM enrolled on top of merely registering with Azure.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> New poll shows... Group Policy use Expanding in 2019 / 2019 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/new-poll-shows-group-policy-use-expanding-in-2019--2019</link>
        <pubDate>2018-11-12T12:19:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I posted this on PolicyPak.. my other blog, but you should check it out anyway. :-)

If you want to know how you stack up against the rest of the world.. here&amp;#39;s the blog entry.

Enjoy!

https://www.policypak.com/blog/entry/recent-poll-expansive-use-group-policy.html

&amp;nbsp; ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I posted this on PolicyPak.. my other blog, but you should check it out anyway. :-)&lt;/p&gt;

&lt;p&gt;If you want to know how you stack up against the rest of the world.. here&#039;s the blog entry.&lt;/p&gt;

&lt;p&gt;Enjoy!&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.policypak.com/blog/entry/recent-poll-expansive-use-group-policy.html&quot;&gt;https://www.policypak.com/blog/entry/recent-poll-expansive-use-group-policy.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> (Jeremy&#039;s been right for years)... Don&#039;t bother disabling unused GP &quot;half&quot;. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/jeremys-been-right-for-years-dont-bother-disabling-unused-gp-half</link>
        <pubDate>2018-11-12T09:15:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I&amp;#39;ve never met this author, but I like the author&amp;#39;s breakdown of the problem.

In summary... I get this question all the time.. &amp;quot;Jeremy... If I disable the UN-used half of the GPO, will it speed up GP processing?&amp;quot;

For 800 years, I&amp;#39;ve said &amp;quot;Don&amp;#39;t bother.&amp;quot; You only GAIN headaches because now the other half of the GPO might not process if you end up using it.

Now, a great article with excellent workmanship to prove the point: Don&amp;#39;t bother.

https:// ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I&#039;ve never met this author, but I like the author&#039;s breakdown of the problem.&lt;/p&gt;

&lt;p&gt;In summary... I get this question all the time.. &quot;Jeremy... If I disable the UN-used half of the GPO, will it speed up GP processing?&quot;&lt;/p&gt;

&lt;p&gt;For 800 years, I&#039;ve said &quot;Don&#039;t bother.&quot; You only GAIN headaches because now the other half of the GPO might not process if you end up using it.&lt;/p&gt;

&lt;p&gt;Now, a great article with excellent workmanship to prove the point: Don&#039;t bother.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/askpfeplat/2018/10/22/does-disabling-user-computer-gpo-settings-make-processing-quicker/&quot; target=&quot;_blank&quot;&gt;https://blogs.technet.microsoft.com/askpfeplat/2018/10/22/does-disabling-user-computer-gpo-settings-make-processing-quicker/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Enjoy the read.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is an MDM deep link (and how can I use it to enroll computers into Intune?) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-an-mdm-deep-link-and-how-can-i-use-it-to-enroll-computers-into-intune</link>
        <pubDate>2018-11-08T09:56:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The goal of IT today is to make IT processes as automated as possible so that your IT professionals that are being paid the big bucks don&amp;rsquo;t have to spend all of their time on trivial tasks such as MDM enrolling devices.&amp;nbsp; You also don&amp;rsquo;t want them answering help desk calls all day from users who are confused how to follow the steps on their own that you sent them.&amp;nbsp;

Well, as you might expect, there is another way.&amp;nbsp; You can use deep links.&amp;nbsp; Let&amp;rsquo;s say you have ]]>
        </description>
        <content:encoded>
            &lt;p&gt;The goal of IT today is to make IT processes as automated as possible so that your IT professionals that are being paid the big bucks don’t have to spend all of their time on trivial tasks such as MDM enrolling devices.  You also don’t want them answering help desk calls all day from users who are confused how to follow the steps on their own that you sent them. &lt;/p&gt;

&lt;p&gt;Well, as you might expect, there is another way.  You can use deep links.  Let’s say you have a new employee with his own BYOD system, and you need their new device to be MDM enrolled.  You send them a nice friendly email that say something like:&lt;/p&gt;

&lt;p&gt;Welcome aboard.  We need you to enroll your new Windows 10 laptop.  Please &lt;a href=&quot;ms-device-enrollment:?mode=mdm&quot;&gt;click here&lt;/a&gt; to do so.&lt;/p&gt;

&lt;p&gt;(Don&#039;t worry, that link won&#039;t send you to siberia or anything.)&lt;/p&gt;

&lt;p&gt;You can check it.. that embedded hyperlink actually points to:&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:black&quot;&gt;ms-device-enrollment:?mode=mdm&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;You could also put a link on your company’s portal page and inform users to click the link to enroll a new device.  Clicking this link will launch the flow equivalent to the Enroll into device management option in Windows 10, except it will do the kickoff via the browser.  Note that only Edge and Internet Explorer appear supported however for deep links during my testing. &lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/MDM_Deep_Link_1.png&quot; style=&quot;height:387px; width:700px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Your users still have to input some information. &lt;/p&gt;

&lt;p&gt;Buuuut... If you want to make it even easier for them, you could append their username as a parameter in the link so that it would already be filled in the Email address box.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://ms-device-enrollment:?mode=mdm&amp;username=tdurden@fabrikam1000.onmicrosoft.com&quot;&gt;ms-device-enrollment:?mode=mdm&amp;username=tdurden@fabrikam1000.onmicrosoft.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note that this option parameter and others are only available in Windows 10, version 1703 or later.&lt;/p&gt;

&lt;p&gt;Of course there are more MDM solutions than just Intune.  If you are using Workspace One as your MDM, you may be required to enter a specific server name.  Once again, you can bypass the process of having your users input these specifics in manually by adding the server name parameter.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://ms-devicenrollment:?mode=mdm&amp;username=mdmuser1@fabrikam1000.com&amp;servername=https://techp-ds.awmdm.com&quot;&gt;ms-devicenrollment:?mode=mdm&amp;username=mdmuser1@fabrikam1000.com&amp;servername=https://techp-ds.awmdm.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The result would look like this:&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/MDM_Deep_Link_2.png&quot; style=&quot;height:267px; width:700px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Note that there are other optional parameters such as &lt;em&gt;ownership&lt;/em&gt; which denotes wheter the device is BYOD or owned by the business enterprise.  Another one is &lt;em&gt;deviceidentifier &lt;/em&gt;which passes a unique identifier onto the device.&lt;/p&gt;

&lt;p&gt;The point is that Deep Links is made to make it easy and comfortable for users to self enroll themselves.  Self deployment is one of the goals of cloud computing. &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is an MDM authority (and how do I set it up in Intune?) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-an-mdm-authority-and-how-do-i-set-it-up-in-intune</link>
        <pubDate>2018-11-07T14:10:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Before you go about adding your first device to Intune, you have to choose your MDM authority for your tenant.&amp;nbsp; The mobile device management authority determines where you will perform mobile device management tasks.&amp;nbsp; In a domain joined network, the authority would be either Group Policy or SCCM for instance.&amp;nbsp; There are three options to configure the&amp;nbsp;tenant-level MDM authority.


	Intune MDM Authority
	Configuration Manager MDM Authority
	None


Intune MDM Authority u ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Before you go about adding your first device to Intune, you have to choose your MDM authority for your tenant.  The mobile device management authority determines where you will perform mobile device management tasks.  In a domain joined network, the authority would be either Group Policy or SCCM for instance.  There are three options to configure the tenant-level MDM authority.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Intune MDM Authority&lt;/li&gt;
	&lt;li&gt;Configuration Manager MDM Authority&lt;/li&gt;
	&lt;li&gt;None&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Intune MDM Authority used to be known as Intune Standalone.  This is a better name descriptor in that using this option, all mobile device management tasks will take place within Intune exclusively.  The second option, Configuration Manager MDM Authority was once known as Hybrid MDM.  Using this option means that devices are managed through a combination of Intune and SCCM Configuration Manager.  You should know that this hybrid ability will be depreciated as of &lt;span style=&quot;color:#231f20&quot;&gt;Sept. 1, 2019.  On that date, Microsoft will stop delivering &quot;policy, apps or security updates&quot; to hybrid MDM users.  You can interpret this as strong encouragement by Microsoft to transition to Intune on Azure.  Really, Hybrid Intune was only meant to be a transition state for companies to begin their migrations to the cloud.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#231f20&quot;&gt;Configuring the MDM Authority for your tenant couldn’t be easier.  If you are configuring your MDM Authority for the first time, you can simply logon to the Intune administrator console.  If you are currently running in Hybrid MDM or Configuration Manager MDM Authority, you can either access the Intune administrator console or the Configuration Manager console of your SCCM server to initiate the process.  In this case, I will use the example of assigning the MDM Authority for the very first time.  Once you are logged on, simply go to Device enrollment.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/MDM_Authority_1.png&quot; style=&quot;height:626px; width:500px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#231f20&quot;&gt;Then you will see the option “Choose MDM Authority.”  Note that if you have assigned your MDM Authority already, this option will not be visible.  &lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/MDM_Authority_2.png&quot; style=&quot;height:678px; width:350px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#231f20&quot;&gt;Note that you can only transition from &lt;/span&gt;Configuration Manager MDM Authority to Intune MDM Authority and not vise versa.  Also know that while it was true at one time that you had to contact Microsoft support to change from hybrid to stand alone, that requirement is now null and void.  The entire MDM Authority selection process is self serve and simple.  Keep in mind that there may be a transition time involved when changing between the two types of authority modes.  Once the MDM Authority assignment process is complete, you can begin the process of enrolling devices.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What can I get from Office 365’s MDM versus Intune? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-can-i-get-from-office-365s-mdm-versus-intune</link>
        <pubDate>2018-11-05T09:01:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ When it comes to Mobile Device Management, it can be a little confusing keeping all the various MDM offerings straight.&amp;nbsp; For many organizations that utilize Office 365 for their email and/or other office suite applications, O365 MDM may be quite appealing due to one captivating detail&amp;hellip;its free!&amp;nbsp; Yes, MDM for O365 is included with many Office 365 commercial subscriptions.&amp;nbsp; Free is indeed a good thing.

Free of course usually denotes some limitations and shortcomings.&amp;nbsp; ]]>
        </description>
        <content:encoded>
            &lt;p&gt;When it comes to Mobile Device Management, it can be a little confusing keeping all the various MDM offerings straight.  For many organizations that utilize Office 365 for their email and/or other office suite applications, O365 MDM may be quite appealing due to one captivating detail…its free!  Yes, MDM for O365 &lt;span style=&quot;color:#2f2f2f&quot;&gt;is included with many Office 365 commercial subscriptions.  Free is indeed a good thing.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Free of course usually denotes some limitations and shortcomings.  This is the case with O365 MDM as it does not have near the feature rich options nor device coverability of Intune.  Intune either requires a paid subscription or can be purchased with Enterprise Mobility Suite.  Cost is one of the main differences between the two.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Mobile Device Management for Office 365 is designed for securing and managing mobile devices.  This includes such things as iPhones, iPads, Android devices, Windows Phones and tablets that are connected to Exchange Online.  You can create MDM policies to secure these devices by remotely wiping them or removing sensitive information.  This is one of the most important security management features for corporate mobile devices.  Other functions of O365 MDM include:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Remotely wipe emails from any device&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#383838&quot;&gt;Set up device policies like password requirements and security settings&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Ensure email and documents can only be accessed by company managed mobile devices&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Access reports and alerts concerning the jailbreaking of devices&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Review reports concerning which devices are not compliant&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;O365 MDM is a good fit for a company that fully utilizes domain joined &lt;/span&gt;&lt;span style=&quot;color:#0d0d0d&quot;&gt;services to manage their traditional workstations and laptops and need to manage and secure mobile devices as well.  For those organizations that want to go all in and manage all of their Windows 10 computer devices (including traditional PCs) using an MDM solution, Intune is the only choice between the two.  With Intune, it is possible to manage your devices without any on premise infrastructure as long as they are all Azure joined.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Another key difference is how you access each of the CSP interfaces.  O365 MDM is accessed using the Security and Compliance Center as is shown below.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/O365_MDM_1.png&quot; style=&quot;height:313px; width:800px&quot; /&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Intune on the other hand is accessed through the Azure portal.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Offce_365_MDM_3.png&quot; style=&quot;height:567px; width:800px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Intune has a lot more functionality than O365 MDM such as the following:&lt;/span&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;You can integrate Intune with System Center Configuration Manager to coincidingly manage both on and off prem devices&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Supports &lt;/span&gt;&lt;span style=&quot;color:#383838&quot;&gt;Mac OS X as well as &lt;/span&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Linux and Unix servers&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:black&quot;&gt;Deploy your internal line-of-business apps and apps in stores to users&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#0a0a0a&quot;&gt;Provide additional security for web browsing&lt;/span&gt;&lt;/li&gt;
	&lt;li&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Implement Mobile Application Management policies for all your users&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;span style=&quot;color:#2f2f2f&quot;&gt;Which one is best depends on the needs of your organization.  &lt;/span&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is Intune for Education? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-intune-for-education</link>
        <pubDate>2018-11-01T11:58:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft puts a lot of emphasis on the education market.&amp;nbsp; In an effort to cater to the K12 educational organizations, Microsoft offers a separate product called Intune for Education.&amp;nbsp; While large metro school districts that have students numbering in the tens of thousands or more will most likely opt for the full Intune Console, Intune for Education is a very attractive alternative for private schools and public schools with a student body of less than 10,000 students.&amp;nbsp;

First  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Microsoft puts a lot of emphasis on the education market.  In an effort to cater to the K12 educational organizations, Microsoft offers a separate product called Intune for Education.  While large metro school districts that have students numbering in the tens of thousands or more will most likely opt for the full Intune Console, Intune for Education is a very attractive alternative for private schools and public schools with a student body of less than 10,000 students. &lt;/p&gt;

&lt;p&gt;First off, Intune for Education is simpler.  Smaller school systems often lack high level fulltime inhouse IT staff with the knowledge base to granularly administer advanced settings for their enterprise.  Often a single staff member is assigned the duty of supporting everything.  In some cases, schools may rely on teachers themselves to manage their classroom students and devices.  This is where Intune for Education comes in.  It has a simplified management interface that is inviting and extremely user.  Task creation is wizard driven so that the user is guided through the setup process.  The interface makes use of graphical icons that make it less intimidating for teachers and non-technical staff.  Below is an example of the Express Configuration area that is designed to quickly achieve a desired task.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Intune_Educate_3.png&quot; style=&quot;height:376px; width:800px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Simplicity does come at a cost.  Intune for Education lacks the advanced configuration functionality that the full console version boasts.  It does do a great job of the essentials however such as the basic management of users and devices (both Windows 10 and iOS), deploying mobile apps and ensuring basic security compliance.  It is a simplified Windows 10 experience, but for many schools, that is all that is needed.&lt;/p&gt;

&lt;p&gt;Intune for Education is designed for the modern day educational organizations.  For instance, teachers can create “Take a Test” profiles.  These test profiles secure the browser during an online testing experience.  These secure testing profiles prevent students from using other computer or internet resources during a test.  Intune for Education also integrates with other Microsoft products such as School Data Sync and Minecraft Education Edition.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.mdmandgpanswers.com/uploads/Intune_Education_2.png&quot; style=&quot;height:421px; width:600px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Screenshot originally from: &lt;a href=&quot;https://docs.microsoft.com/en-us/education/windows/take-tests-in-windows-10&quot;&gt;https://docs.microsoft.com/en-us/education/windows/take-tests-in-windows-10&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And then of course, there is cost.  Intune for Education is affordable for smaller school systems that face challenging budgets.  Currently, educational customers have two options.  The first is a “one and done” per device fee at the time of the device’s enrollment.  This license is good for the life cycle of the product.  The other option is to license it per user on an annual basis.  The good news here is that student account are free.  School administrators will have to run the numbers to decide which option is best for them.&lt;/p&gt;

&lt;p&gt;Keep in mind that Intune for Education is for “schools” only and Microsoft does verify this.  While Intune for Education isn’t for everyone in education, it certainly makes sense for some.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Windows 1809 Group Policy Blue Screen After Upgrading (that you don&#039;t have to panic about) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/windows-1809-group-policy-blue-screen-after-upgrading-that-you-dont-have-to-panic-about</link>
        <pubDate>2018-10-09T12:39:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Hi Team..!

As some of you know, Windows 1809 rollout was paused for upgrade problem (https://support.microsoft.com/en-us/help/4464619/windows-10-update-history).

But I got a copy before it got yanked. When I did some tests..&amp;nbsp;in upgrading from Windows 1803 to 1809 on&amp;nbsp; some machines ,

I found this interesting &amp;quot;Blue Screen&amp;quot; which.. you should NOT FREAK OUT ABOUT.



The good news is that this only occurs ONE time per machine, on the first attempted login. Then.. nev ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Hi Team..!&lt;/p&gt;

&lt;p&gt;As some of you know, Windows 1809 rollout was paused for upgrade problem (&lt;a href=&quot;https://support.microsoft.com/en-us/help/4464619/windows-10-update-history&quot;&gt;https://support.microsoft.com/en-us/help/4464619/windows-10-update-history&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;But I got a copy before it got yanked. When I did some tests.. in upgrading from Windows 1803 to 1809 on  some machines ,&lt;/p&gt;

&lt;p&gt;I found this interesting &quot;Blue Screen&quot; which.. you should NOT FREAK OUT ABOUT.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;GPSVC service failed UUID Blue Screen&quot; src=&quot;https://www.policypak.com/wp-content/uploads/2017/12/sdgdfhfgnfjfghjfghjfghjfghj.png&quot; style=&quot;height:362px; width:574px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The good news is that this only occurs ONE time per machine, on the first attempted login. Then.. never again.&lt;/p&gt;

&lt;p&gt;Maybe again the next time Windows is upgraded... maybe maybe you&#039;ll see it again.. but ... maybe not.&lt;/p&gt;

&lt;p&gt; Anyway: If you get people reporting this.. you can cheerfully just say &quot;Got it&quot; and then.. don&#039;t worry about it.&lt;/p&gt;

&lt;p&gt;It&#039;s the one blue screen.. NOT to freak out about.&lt;/p&gt;

&lt;p&gt;My friend Thorbjorn Sjovold from SpecopSoftware explains also how this can occur:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://specopssoft.com/blog/things-work-group-policy-processing/ &quot;&gt;https://specopssoft.com/blog/things-work-group-policy-processing/ &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Another great read !&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Also, and totally unrelated.. I&#039;m doing a live webinar with my friends at NetWrix.. &lt;/p&gt;

&lt;p&gt;What: Group Policy Changes - What You Don’t Know Can Hurt You&quot;&lt;br /&gt;
When: October 25 at 1.00 PM EST.&lt;br /&gt;
Who: You. Me. Them.&lt;br /&gt;
Where: &lt;span style=&quot;color:#1f497d&quot;&gt;&lt;a href=&quot;https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.netwrix.com%2Fwebinars.html%3Fwebinar_id%3D516%26utm_source%3Dwebinars%26utm_medium%3Djeremy-moskowitz%26utm_campaign%3Dgpanswers-link-upcoming-group-policy-changes&amp;data=02%7C01%7Cjeremym%40policypak.com%7Cc0a7aa0ebef74153d84f08d62dff8f4b%7C6d43b23f316e4187b59e846c83476c9e%7C1%7C0%7C636746973093470425&amp;sdata=4cDZT4InBIbKXzE7ITKzKqChO4QDmJfWH%2BFUDosUaEI%3D&amp;reserved=0&quot;&gt;https://www.netwrix.com/webinars.html?webinar_id=516&amp;utm_source=webinars&amp;utm_medium=jeremy-moskowitz&amp;utm_campaign=gpanswers-link-upcoming-group-policy-changes&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
Anything else? : Not that I can think of.&lt;/p&gt;

&lt;p&gt;Great? So what are you waiting for? Sign up and see you there.&lt;/p&gt;

&lt;p&gt;See ya soon.&lt;/p&gt;

&lt;p&gt;-Jeremy Moskowitz&lt;br /&gt;
 &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Edge in Windows 17718 just got more policies and new ADMX templates just shipped. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/edge-in-windows-17718-just-got-more-policies-and-new-admx-templates-just-shipped</link>
        <pubDate>2018-07-19T13:57:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

Microsoft just pre-announced a bunch of interesting new policies for a future version of Windows.&amp;nbsp;

https://docs.microsoft.com/en-us/microsoft-edge/deploy/new-policies&amp;nbsp;

And, the latest ADMX items, which fix a small problem I mentioned several weeks back... is now available:

https://www.microsoft.com/en-us/download/details.aspx?id=56880

Go forth and go policy my friends !

&amp;nbsp; ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;Microsoft just pre-announced a bunch of interesting new policies for a future version of Windows. &lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/microsoft-edge/deploy/new-policies&quot;&gt;https://docs.microsoft.com/en-us/microsoft-edge/deploy/new-policies &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And, the latest ADMX items, which fix a small problem &lt;a href=&quot;https://www.gpanswers.com/blogs/view-blog/1803-admx-files-errors-that-come-with-a-byte&quot;&gt;I mentioned several weeks back&lt;/a&gt;... is now available:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=56880&quot;&gt;https://www.microsoft.com/en-us/download/details.aspx?id=56880&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Go forth and go policy my friends !&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The case of the insane flickering of GPupdate! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-case-of-the-insane-flickering-of-gpupdate</link>
        <pubDate>2018-06-11T16:25:11+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ &amp;nbsp;

This isn&amp;rsquo;t my story: This is me sharing THEIR story. In this story, I (Jeremy) am only the narrator. ?

While at a conference, I met two new friends (who already knew one of my friends). A bunch of awesome Danish gents who said to me.. &amp;ldquo;Hey Mr. Group Policy Guru.. maybe you know&amp;hellip; we have a problem when Group Policy updates, some of our applications flicker! And our users are going crazy !&amp;rdquo;

The guys were: Roland J&amp;oslash;rgensen (twitter: @mindlessdk) and J ]]>
        </description>
        <content:encoded>
            &lt;p&gt; &lt;/p&gt;

&lt;p&gt;This isn’t my story: This is me sharing THEIR story. In this story, I (Jeremy) am only the narrator. ?&lt;/p&gt;

&lt;p&gt;While at a conference, I met two new friends (who already knew one of my friends). A bunch of awesome Danish gents who said to me.. “Hey Mr. Group Policy Guru.. maybe you know… we have a problem when Group Policy updates, some of our applications flicker! And our users are going crazy !”&lt;/p&gt;

&lt;p&gt;The guys were: Roland Jørgensen (twitter: @mindlessdk) and Jonas Weinreich (twitter: @weinedk) (both at the conference), and Claus Wordenskjold (twitter: @CWordenskjold) (my original friend, who was NOT at the conference.)&lt;/p&gt;

&lt;p&gt;Now I had heard of this issue from time to time. But to set the stage, in fact, a little flicker during foreground and GPudpate is perfectly normal.&lt;/p&gt;

&lt;p&gt;In fact, there’s an older web article: &lt;a href=&quot;https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fms812018.aspx&amp;data=02%7C01%7Cjeremym%40policypak.com%7Caf4435c9e29947a6141308d5c56158ef%7C6d43b23f316e4187b59e846c83476c9e%7C1%7C0%7C636631944274139213&amp;sdata=6Z9nerqrHXn%2BtivyF2XG3hV8nUnL9Zi%2FIFxH5FcbiZI%3D&amp;reserved=0&quot; target=&quot;_blank&quot;&gt;https://msdn.microsoft.com/en-us/library/ms812018.aspx&lt;/a&gt; which tells the tale..&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Consider notifying users that their policy is updated periodically so that they recognize the signs of a policy update. When Group Policy is updated, the Windows desktop is refreshed; it flickers briefly and closes open menus. Also, restrictions imposed by Group Policies, such as those that limit the programs a user can run, might interfere with tasks in progress.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;So, if this is expected behavior, why are my Danish pals seeing a more “profound” flicker.. enough to make users call the help desk and start to get pretty annoyed?&lt;/p&gt;

&lt;p&gt;You can find others’ with flicker issues if you Goog, I mean.. Bing for it.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;For instance, here’s a resolution with GPupdate flicker + Cortana: &lt;a href=&quot;https://answers.microsoft.com/en-us/msoffice/forum/msoffice_outlook-mso_win10/the-calendar-in-outlook-2016-is-blinkingflickering/07c3ca0f-4b38-4ad9-857e-f7d486d6e9b1&quot;&gt;https://answers.microsoft.com/en-us/msoffice/forum/msoffice_outlook-mso_win10/the-calendar-in-outlook-2016-is-blinkingflickering/07c3ca0f-4b38-4ad9-857e-f7d486d6e9b1&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Here’s a chat about Group Policy updates making Dynamics flicker: &lt;a href=&quot;https://community.spiceworks.com/topic/1539867-group-policy-refresh-causing-dynamics-gp-forms-to-flicker-on-windows-10&quot;&gt;https://community.spiceworks.com/topic/1539867-group-policy-refresh-causing-dynamics-gp-forms-to-flicker-on-windows-10&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Here’s a patch which fixed Outlook To-Do bar flashing with GPupdate: &lt;a href=&quot;https://www.policypak.com/knowledge-base/general-on-prem-troubleshooting/how-can-i-fix-outlook-to-do-bar-flashing-when-gp-or-policypak-does-a-background-refresh.html&quot;&gt;https://www.policypak.com/knowledge-base/general-on-prem-troubleshooting/how-can-i-fix-outlook-to-do-bar-flashing-when-gp-or-policypak-does-a-background-refresh.html&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;So, yes, I (Jeremy) had heard of it.&lt;/p&gt;

&lt;p&gt;I told them I would poke around, and they would too, and we’d meet up. But they found an answer.. and that’s this story.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Problem Statement&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So after a little investigation, the team made a problem statement:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;When the computer ran a gpupdate, some applications would flicker.
	&lt;ul&gt;
		&lt;li&gt; Outlook 2016 started flickering, and switching back and forth, going to not responding and blank pages and return to normal.&lt;/li&gt;
		&lt;li&gt;Navision 2009 R2 client flickered and the formular which the user was working in would be reset.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;We experienced the issue on both virtual and physical computers, and in a variety of different OS from Windows 8.1 to Windows 10 1607, 1703 and 1709.&lt;/li&gt;
	&lt;li&gt;The issue occurs every time a new setting is set a GPO. Thereby it happened every time a policy with a Group Policy Preferences item was run. All of our drive and printer mapping is set in GPO.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;To get started to pare it down, they did what I always recommend…&lt;/p&gt;

&lt;p&gt;GO NAKED.&lt;/p&gt;

&lt;p&gt;By which I mean.. have a computer that is “born fresh”, has all the latest patches, and few applications as possible… JUST FOR TESTING.&lt;/p&gt;

&lt;p&gt;This aspect is critical, because you can eliminate SO MUCH from your testing by paring it down and stripping the computer / OS to as basic as you can get.&lt;/p&gt;

&lt;p&gt;Then.. BUILD UP you machine.. and find WHEN the problem STARTS.&lt;/p&gt;

&lt;p&gt;And.. with this technique, they were able to start with a “pretty naked” machine, as soon as Group Policy applied, and Group Policy Preferences were re-applying, the “mega flicker” issue occurred.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next step: Event Logs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;My Danish friends got different reports and different applications flickering. But for them, it was Outlook that was driving them crazy, and flickering all the time.&lt;/p&gt;

&lt;p&gt;So… with Group Policy, the best place to START troubleshooting would be.. the event log ! On the first computer they checked, they saw GPOs being refreshed &lt;strong&gt;every minute&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Then, some time later, it started to refresh every 5 seconds!&lt;/p&gt;

&lt;p&gt;Crazy!&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;The case of the insane flickering of GPupdate 01&quot; src=&quot;https://www.gpanswers.com/images/posts/gpa_tips/two-off-the-beaten-path-but-free-utilities-from-microsoft.jpg&quot; style=&quot;height:204px; width:673px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Log Name:       System&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Source:         Microsoft-Windows-GroupPolicy&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Date:          16-05-2018 16:25:39&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Event ID:      1502&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Task Category: None&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Level:         Information&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Keywords:      &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;User:          SYSTEM&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Computer:      L-TEST-T480S.internal.org&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Description:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The Group Policy settings for the computer were processed successfully. New settings from 8 Group Policy objects were detected and applied.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Event Xml:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;Event xmlns=&quot;&lt;/em&gt;&lt;a href=&quot;https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fschemas.microsoft.com%2Fwin%2F2004%2F08%2Fevents%2Fevent&amp;data=02%7C01%7Cjeremym%40policypak.com%7Caf4435c9e29947a6141308d5c56158ef%7C6d43b23f316e4187b59e846c83476c9e%7C1%7C0%7C636631944274139213&amp;sdata=vBdmBk%2FmqqE1LRrkiE0kWz5oIT3sLUohYm6ImTRgaQ0%3D&amp;reserved=0&quot;&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/a&gt;&lt;em&gt;&quot;&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;  &lt;System&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Provider Name=&quot;Microsoft-Windows-GroupPolicy&quot; Guid=&quot;{AEA1B4FA-97D1-45F2-A64C-4D69FFFD92C9}&quot; /&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;EventID&gt;1502&lt;/EventID&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Version&gt;0&lt;/Version&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Level&gt;4&lt;/Level&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Task&gt;0&lt;/Task&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Opcode&gt;1&lt;/Opcode&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Keywords&gt;0x8000000000000000&lt;/Keywords&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;TimeCreated SystemTime=&quot;2018-05-21T01:17:12.416286700Z&quot; /&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;EventRecordID&gt;14030&lt;/EventRecordID&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Correlation ActivityID=&quot;{14E5F0E1-F113-47CD-B4F2-D7A2A362F1F4}&quot; /&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Execution ProcessID=&quot;6120&quot; ThreadID=&quot;12080&quot; /&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Channel&gt;System&lt;/Channel&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Computer&gt;L-TEST-T480S.internal.org&lt;/Computer&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Security UserID=&quot;S-1-5-18&quot; /&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;  &lt;/System&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;  &lt;EventData&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Data Name=&quot;SupportInfo1&quot;&gt;1&lt;/Data&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Data Name=&quot;SupportInfo2&quot;&gt;4201&lt;/Data&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Data Name=&quot;ProcessingMode&quot;&gt;0&lt;/Data&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Data Name=&quot;ProcessingTimeInMilliseconds&quot;&gt;9953&lt;/Data&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Data Name=&quot;DCName&quot;&gt;&lt;/em&gt;\\ADSERVER.internal.org&lt;/Data&lt;em&gt;&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;    &lt;Data Name=&quot;NumberOfGroupPolicyObjects&quot;&gt;15&lt;/Data&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;  &lt;/EventData&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;/Event&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Discovery… It wasn’t Group Policy at all.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So the team started to kill process after process looking for a solution.&lt;/p&gt;

&lt;p&gt;And this is where Claus Wordenskjold found the process that made the problem stop.&lt;/p&gt;

&lt;p&gt;When killing ccmexec (SCCM) process, the issue stopped.&lt;/p&gt;

&lt;p&gt;The team proved that it was ccmexec causing the issue, which can be seen in the picture below. You should see four parts.. numbered 1 -4 with four little stories:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;SCCM runs without GPO&#039;s applied
	&lt;ul style=&quot;list-style-type:circle&quot;&gt;
		&lt;li&gt;Gpupdate runs every 10th second&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;SCCM service is disabled and no GPO’s are applied
	&lt;ul style=&quot;list-style-type:circle&quot;&gt;
		&lt;li&gt;Gpupdate runs as per standard configuration&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;SCCM service is disabled and all GPO’s are applied
	&lt;ul style=&quot;list-style-type:circle&quot;&gt;
		&lt;li&gt;Gpupdate runs as per standard configuration&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;SCCM service is enabled and all GPO’s are applied
	&lt;ul style=&quot;list-style-type:circle&quot;&gt;
		&lt;li&gt;Gpupdate runs every 10th second&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;The key thing to look for in each of these stories is the number of 1502 events which expresses the attempt to perform computer-side Group Policy updates.  When SCCM was disabled, the 1502 events were normal and not “out of control.”&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;The case of the insane flickering of GPupdate 02&quot; src=&quot;https://www.gpanswers.com/images/posts/gpa_tips/two-off-the-beaten-path-but-free-utilities-from-microsoft.png&quot; style=&quot;height:497px; width:688px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Event log KEY:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Event 1500: The Group Policy settings for the computer were processed successfully. There were no changes detected since the last successful processing of Group Policy.&lt;/li&gt;
	&lt;li&gt;Event 1501: The Group Policy settings for the user were processed successfully. There were no changes detected since the last successful processing of Group Policy.&lt;/li&gt;
	&lt;li&gt;Event 1502: The Group Policy settings for the computer were processed successfully. New settings from X Group Policy objects were detected and applied.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, in summary: the real issue was not gpupdate or the Group Policy engine. Gpupdate is working exactly as expected.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Solution&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So, if killing SCCM processes made Group Policy “happier”, the Danish team needed to dig deeper.&lt;/p&gt;

&lt;p&gt;Now, SCCM has a massive amount of logs, so this took a while.&lt;/p&gt;

&lt;p&gt;After searching and searching, they discovered a lot of activity in &lt;strong&gt;wuahandler.log&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The errors discovered were identical as what is described here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Feskonr.com%2F2014%2F02%2Fconfigmgr-onsearchcomplete-failed-to-end-search-job-error-0x80244022-wuahandler-log%2F&amp;data=02%7C01%7Cjeremym%40policypak.com%7Caf4435c9e29947a6141308d5c56158ef%7C6d43b23f316e4187b59e846c83476c9e%7C1%7C0%7C636631944274139213&amp;sdata=MUkmkqmUaf0iTlfIQRai%2FiX0SOMVWORHWk18kLiapOE%3D&amp;reserved=0&quot; target=&quot;_blank&quot;&gt;http://eskonr.com/2014/02/configmgr-onsearchcomplete-failed-to-end-search-job-error-0x80244022-wuahandler-log/&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;And….&lt;/p&gt;

&lt;p&gt;As described in the article, the application pool &quot;WsusPool&quot; in the IIS server on our SCCM distribution point (DP) was stopped. Once it was started it, all of the computers did not refresh every 10th second anymore.&lt;/p&gt;

&lt;p&gt;All refreshes returned to normal GPO update behavior.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;The programs are still flickering when GPO’s are refreshed, but this is expected and has has always happened.&lt;/p&gt;

&lt;p&gt;The problem became obvious and noticeable to end users because GPO refresh happened every 10th second.&lt;/p&gt;

&lt;p&gt;People started to notice.&lt;/p&gt;

&lt;p&gt;It got weird.&lt;/p&gt;

&lt;p&gt;So, why does the failure of an SCCM service make Group Policy “flip out?”&lt;/p&gt;

&lt;p&gt;We’re not sure why.&lt;/p&gt;

&lt;p&gt;The theory is that the when the SCCM agent cannot see its DP it will try to find a new one. For instance, if a computer moves from one branch office to another, then it might not be able to reach its former DP.&lt;/p&gt;

&lt;p&gt;And, the information on where to find the DP is supplied in a GPO targeted the computer.&lt;/p&gt;

&lt;p&gt;Thus we think the SCCM agent will trigger it’s own GPupdate, attempting to update only the computer policy. However, we do not have prove of that theory. But that’s what we think is going on.&lt;/p&gt;

&lt;p&gt;If you have anything to share, on this interesting case, then just email me (Jeremy) and I’ll compile the best responses and tack them onto the end of the article.&lt;/p&gt;

&lt;p&gt;Hope this helps you out.. and happy Group Policy + SCCM co-existence. ?&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Two &quot;Off the beaten path&quot;, but FREE utilities from Microsoft </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/two-off-the-beaten-path-but-free-utilities-from-microsoft</link>
        <pubDate>2018-06-08T16:00:43+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In my GP training classes, I go into DEEP DIVE DETAILS on how to set up and manage LAPS.. which is a local admin password rotation system. If you&amp;#39;ve taken the class, here&amp;#39;s a great ADD-ON to tell you about overall LAPS health. Nice !

https://blogs.technet.microsoft.com/askpfeplat/2018/06/04/how-healthy-is-your-laps-environment/&amp;nbsp;

And, unrelated, I also found this little nugget.. a more bad-a$$ password filter for Active Directory.&amp;nbsp;

And now.. the plugs. :)
Come to my ne ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In my GP training classes, I go into DEEP DIVE DETAILS on how to set up and manage LAPS.. which is a local admin password rotation system. If you&#039;ve taken the class, here&#039;s a great ADD-ON to tell you about overall LAPS health. Nice !&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/askpfeplat/2018/06/04/how-healthy-is-your-laps-environment/&quot;&gt;https://blogs.technet.microsoft.com/askpfeplat/2018/06/04/how-healthy-is-your-laps-environment/&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;And, unrelated, I also found this little nugget.. &lt;a href=&quot;https://github.com/ryanries/PassFiltEx&quot;&gt;a more bad-a$$ password filter for Active Directory&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;And now.. the plugs. :)&lt;br /&gt;
Come to my next &lt;a href=&quot;https://www.gpanswers.com/live-class&quot;&gt;GP &amp; MDM training class&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Seattle (Tacoma) .. Aug 7 ,8 and 9 (three days).. &lt;br /&gt;
$2250.. includes Awesomesauce.&lt;br /&gt;
&lt;a href=&quot;https://www.gpanswers.com/live-class&quot;&gt;www.gpanswers.com/live-class&lt;/a&gt; &lt;br /&gt;
See you there, mates.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> 1803 ADMX files .. Errors that come with a Byte? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/1803-admx-files-errors-that-come-with-a-byte</link>
        <pubDate>2018-05-09T14:24:01+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Some people, like my friend Brian I. (that&amp;rsquo;s &amp;ldquo;Brian I.&amp;rdquo;, not &amp;ldquo;Brian and I&amp;rdquo;)&amp;hellip; discovered that upon UPDATING you existing Central Store with latest 1803 ADMX/ ADMLs.. You could get bitten.

The problem appears that the (current 1803) ADMX files are missing .. well.. and ADMX. That is, for every ADMX there should be a corresponding ADML file for each language.

And one ADMX file.. didn&amp;rsquo;t make it into the 1803 ADMX download: SearchOCR.admx.

So what&amp;r ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Some people, like my friend Brian I. (that’s “Brian I.”, not “Brian and I”)… discovered that upon UPDATING you existing Central Store with latest 1803 ADMX/ ADMLs.. You could get bitten.&lt;/p&gt;

&lt;p&gt;The problem appears that the (current 1803) ADMX files are missing .. well.. and ADMX. That is, for every ADMX there should be a corresponding ADML file for each language.&lt;/p&gt;

&lt;p&gt;And one ADMX file.. didn’t make it into the 1803 ADMX download: SearchOCR.admx.&lt;/p&gt;

&lt;p&gt;So what’s happening is, that:&lt;/p&gt;

&lt;p&gt;1. Some old (totally fine) ADMX version is there in your central store.&lt;br /&gt;
2. You leave that in place; and update/ overwrite the SearchOCR.ADML.&lt;br /&gt;
3. Now.. the OLD SearchOCR.ADML kind of “loses its mind” because he’s paired up with (essentially) the wrong SearchOCR.ADMX.&lt;/p&gt;

&lt;p&gt;And.. Bingo. You’ve got an error message every time you open the GP editor.&lt;/p&gt;

&lt;p&gt;Screenshot: &lt;a href=&quot;https://i.imgur.com/EksFBMH.png&quot;&gt;https://i.imgur.com/EksFBMH.png&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There are a few ways to solve this.. (now, note I could not reproduce the problem, but I think I’ve got a strong handle on what would solve it.)&lt;/p&gt;

&lt;p&gt;1. JUST WAIT. I dont know DIRECTLY.. but I bet this gets fixed in some minor Admx update from Microsoft.&lt;/p&gt;

&lt;p&gt;2. Delete the SearchOCR.ADMX and SearchOCR.ADML in the central store (for now.). This is a little tricky because you cannot know if you’re using these policies or not. But even if you *ARE*, the data in any GPOs which use(d) this ADMX are still valid. Just the definitions are now “gone” if you try this. Then when Microsoft repairs this problem, you can put these files (just these) back in.&lt;/p&gt;

&lt;p&gt;3. Hand-edit the SearchOCR.ADMX file you *HAVE* to make SearchOCR.ADMX **NOT** lose its mind and properly marry up withthe SearchOCR.ADML.&lt;/p&gt;

&lt;p&gt;Nice step by step details are found here… (so I dont need to go over it.)&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://social.technet.microsoft.com/Forums/windowsserver/en-US/cb97affb-9724-457b-a113-32cbd3d53331/searchocradmx-error-after-installing-win101803-admx-templates?forum=winserverGP&quot;&gt;https://social.technet.microsoft.com/Forums/windowsserver/en-US/cb97affb-9724-457b-a113-32cbd3d53331/searchocradmx-error-after-installing-win101803-admx-templates?forum=winserverGP&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That’s it. Hope this gets you BACK on the road if you’re bitten by the 1803ADMX item.&lt;/p&gt;

&lt;p&gt;Quick update, my friend Alan Burchill from GroupPolicy.Biz has this nice breakdown of the problem too. &lt;a href=&quot;https://www.grouppolicy.biz/2018/05/how-to-fix-searchocs-admx-error-after-upgrade-to-windows-1803-admx-files/&quot;&gt;Click here for more&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;(Another update): Official MS article about this published: &lt;a href=&quot;https://support.microsoft.com/en-us/help/4292332/error-when-you-open-gpedit-msc-in-windows&quot;&gt;https://support.microsoft.com/en-us/help/4292332/error-when-you-open-gpedit-msc-in-windows&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Three GP News items: hresult-0x80071128 fix, 2016 Baselines, and Windows 10 extends support </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/three-gp-news-items-hresult-0x80071128-fix-2016-baselines-and-windows-10-extends-support</link>
        <pubDate>2018-02-15T16:36:13+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ What is it: (Updated and Fixed: The Group Policy cannot be written bug.)
Time to re-read: 180 seconds.
www.gpanswers.com/blogs/view-blog/hresult-0x80071128-on-server-2012r2-dcs-when-editing-gpos/
&amp;nbsp;
What is it: Security Baseline for Office 2016 &amp;amp; Office 365 Proplus
Time to read: 200 seconds
https://blogs.technet.microsoft.com/secguide/2018/01/29/security-baseline-for-office-2016-and-office-365-proplus-apps-draft/
&amp;nbsp;
Windows as a Service Changes .. AGAIN.
Insanely fast summar ]]>
        </description>
        <content:encoded>
            &lt;div class=&quot;posttext&quot;&gt;&lt;p&gt;What is it: (Updated and Fixed: The Group Policy cannot be written bug.)&lt;br&gt;
Time to re-read: 180 seconds.&lt;br&gt;
&lt;a href=&quot;https://www.gpanswers.com/blogs/view-blog/hresult-0x80071128-on-server-2012r2-dcs-when-editing-gpos/&quot;&gt;www.gpanswers.com/blogs/view-blog/hresult-0x80071128-on-server-2012r2-dcs-when-editing-gpos/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;What is it: Security Baseline for Office 2016 &amp; Office 365 Proplus&lt;br&gt;
Time to read: 200 seconds&lt;br&gt;
&lt;a href=&quot;https://blogs.technet.microsoft.com/secguide/2018/01/29/security-baseline-for-office-2016-and-office-365-proplus-apps-draft/&quot;&gt;https://blogs.technet.microsoft.com/secguide/2018/01/29/security-baseline-for-office-2016-and-office-365-proplus-apps-draft/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;Windows as a Service Changes .. AGAIN.&lt;br&gt;
Insanely fast summary: Got one of the four ORIGINAL Windows 10 editions? Windows 1511, 1607, 1703, and 1709), an extra six months of support is being added. Future builds.. will only get the 18 months as previously stated. From Microsoft:&lt;br&gt;
&lt;a href=&quot;https://blogs.technet.microsoft.com/windowsitpro/2018/02/01/changes-to-office-and-windows-servicing-and-support/&quot;&gt;https://blogs.technet.microsoft.com/windowsitpro/2018/02/01/changes-to-office-and-windows-servicing-and-support/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
        </content:encoded>
    </item>
        <item>
        <title> HRESULT: 0x80071128 on Server 2012R2 and 2016 DCs when editing GPOs </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/hresult-0x80071128-on-server-2012r2-dcs-when-editing-gpos</link>
        <pubDate>2018-01-26T21:09:44+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

Wanted to alert you to a known issue with the January patches.

This is MY INTERPRETATION of the problem and advice, and is coming from ME and NOT from Microsoft.
And, I have not PERSONALLY seen this problem, but wanted to get it to you quickly.

Please use your own brain when reading the rest of this email and don&amp;rsquo;t knee jerk and do anything that would get you in the doghouse.

When the JAN patch is on your Server 2012 R2 servers there are reports of editing some GPOs usin ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;Wanted to alert you to a known issue with the January patches.&lt;/p&gt;

&lt;p&gt;This is MY INTERPRETATION of the problem and advice, and is coming from ME and NOT from Microsoft.&lt;br /&gt;
And, I have not PERSONALLY seen this problem, but wanted to get it to you quickly.&lt;/p&gt;

&lt;p&gt;Please use your own brain when reading the rest of this email and don’t knee jerk and do anything that would get you in the doghouse.&lt;/p&gt;

&lt;p&gt;When the JAN patch is on your Server 2012 R2 servers there are reports of editing some GPOs using GPMC or AGPM 4.0 may fail with error “The data present in the reparse point buffer is invalid. (Exception from HRESULT: 0x80071128)” after installing this update on a domain controller.&lt;/p&gt;

&lt;p&gt;This is now a known issue at…&lt;br /&gt;
&lt;a href=&quot;https://support.microsoft.com/en-us/help/4056898/windows-81-update-kb4056898&quot;&gt;https://support.microsoft.com/en-us/help/4056898/windows-81-update-kb4056898&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Update: Feb 14, 2018… And the current resolution is… The FEB 2018 patch !&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4074594&amp;data=02%7C01%7C%7C09703f935b9c43151f6608d5734ad83e%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636541687644588697&amp;sdata=FpkFvcGsagHBnnpVl1LEfYHwGmXs%2FHBWGibkqBGScy0%3D&amp;reserved=0&quot;&gt;https://support.microsoft.com/en-us/help/4074594&lt;/a&gt;  (2008R2)&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4074590&amp;data=02%7C01%7C%7C09703f935b9c43151f6608d5734ad83e%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636541687644588697&amp;sdata=QH%2BzgMBhhLUDYMMyZ6vajjeqC80B2YhNRrhQffeqItg%3D&amp;reserved=0&quot;&gt;https://support.microsoft.com/en-us/help/4074590&lt;/a&gt;  (2016)&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;-or.. OLD ADVICE… not needed now that there is the FEB patch…-&lt;br /&gt;
Remove the JAN patch from your Server 2012 R2 and Server 2016 DCs. The one that should be removed is&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;The problem has been identified. Should only affect &lt;strong&gt;Windows Server 2012 R2&lt;/strong&gt; and &lt;strong&gt;Windows Server 2016&lt;/strong&gt;.&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;The KBs affected are: &lt;/em&gt;
	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;&lt;em&gt;WS2012R2&lt;/em&gt;&lt;/strong&gt;&lt;em&gt;: &lt;/em&gt;&lt;a href=&quot;https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4056895%2Fwindows-81-update-kb4056895&amp;data=02%7C01%7Cjeremym%40policypak.com%7Cebf04f537cac46a8c92a08d56503ec2a%7C6d43b23f316e4187b59e846c83476c9e%7C1%7C0%7C636525989879402437&amp;sdata=66mAE8OuoBXkxM4PGyHTRQ1NuWrFbfWfvbnHiKmRSGQ%3D&amp;reserved=0&quot;&gt;&lt;em&gt;KB4056895&lt;/em&gt;&lt;/a&gt;&lt;em&gt; (1B – January 8th monthly rollup) and &lt;/em&gt;&lt;a href=&quot;https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4056898%2Fwindows-81-update-kb4056898&amp;data=02%7C01%7Cjeremym%40policypak.com%7Cebf04f537cac46a8c92a08d56503ec2a%7C6d43b23f316e4187b59e846c83476c9e%7C1%7C0%7C636525989879402437&amp;sdata=8qMQPdktxxv0d6Xh739jGALrtOoMDH7pNIPIx4iybdU%3D&amp;reserved=0&quot;&gt;&lt;em&gt;KB4056898&lt;/em&gt;&lt;/a&gt;&lt;em&gt;  (1B – January 3rd security-only monthly rollup) and Server 2016 &lt;a href=&quot;https://support.microsoft.com/en-au/help/4057142/windows-10-update-kb4057142&quot;&gt;KB4057142&lt;/a&gt;.&lt;/em&gt;&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I hope this helps you out.&lt;/p&gt;

&lt;p&gt;UPDATE: Jan 29th.. I have a theorized and UNTESTED workaround for this problem I bet if you use the GPMC and point to a Server 2008 R2 DC, and make your changes THERE, then NATURALLY wait for replication to occur… I bet you’ll work around this problem. Just a hunch. ?&lt;/p&gt;

&lt;p&gt;And… Since you likely got to the end of this.. Now’s a good time for you to PENCIL IN my next Group Policy TRAINING CLASS.&lt;/p&gt;

&lt;p&gt;April 16, 17 and 18… in Northern VA / DC Area. You CANNOT sign up for this class yet.&lt;br /&gt;
I will announce OPEN dates on Monday I think.&lt;/p&gt;

&lt;p&gt;Thanks team.. and .. Always use your brain !! ?&lt;/p&gt;

&lt;p&gt;PS: Thanks to &lt;a href=&quot;https://blogs.msmvps.com/bradley/&quot;&gt;Susan Bradley MVP&lt;/a&gt;  and “PolicyPak Customer Ted A.” with the Assist on this one !&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How do you become an MVP? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-do-you-become-an-mvp</link>
        <pubDate>2017-12-18T11:24:33+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I get this question like 3 - 10 times per year. This is a great answer to that question.. here&amp;#39;s the link from a fellow MVP. Enjoy.  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I get this question like 3 - 10 times per year. This is a great answer to that question.. here&#039;s the link from a fellow MVP. Enjoy. &lt;a href=&quot;https://blogs.sentryone.com/kevinkline/how-can-i-become-a-microsoft-mvp/&quot;&gt;&lt;img alt=&quot;How Can I Become A Microsoft MVP?&quot; src=&quot;https://www.gpanswers.com/images/posts/gp_tools/MVP_Logo_Horizontal_Secondary_Blue286_RGB_300ppi-472x266.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> It&#039;s NOT a Group Policy Bug... !! &lt;Grumble&gt; </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/its-not-a-group-policy-bug</link>
        <pubDate>2017-12-13T15:33:46+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ &amp;lt;Rant mode on&amp;gt;

So I go a little BSC (That&amp;rsquo;s Bat-Spit Crazy) when I read
&amp;ldquo;Group Policy Bug takes over the earth&amp;rdquo;.

As you might expect, my hackles go up&amp;hellip;
(And, if you&amp;rsquo;re not a dog, where, exactly **ARE** your hackles? Just sayin&amp;rsquo;)

Anyway.. This latest up-hackles occurred when I read
the beginning of, and now the end of items like this.

(These are all reporting the same thing, and basically the same way..)

winaero.com/blog/bug-group-polic ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;Rant mode on&gt;&lt;/p&gt;

&lt;p&gt;So I go a little BSC (That’s Bat-Spit Crazy) when I read&lt;br /&gt;
“Group Policy Bug takes over the earth”.&lt;/p&gt;

&lt;p&gt;As you might expect, my hackles go up…&lt;br /&gt;
(And, if you’re not a dog, where, exactly **ARE** your hackles? Just sayin’)&lt;/p&gt;

&lt;p&gt;Anyway.. This latest up-hackles occurred when I read&lt;br /&gt;
the beginning of, and now the end of items like this.&lt;/p&gt;

&lt;p&gt;(These are all reporting the same thing, and basically the same way..)&lt;/p&gt;

&lt;p&gt;winaero.com/blog/bug-group-policy-updates-windows-10/&lt;br /&gt;
windowsreport.com/group-policy-bug-windows-10-fix/&lt;br /&gt;
mspoweruser.com/group-policy-bug-blocks-windows-update-user-delays-installation-updates/&lt;/p&gt;

&lt;p&gt;(Note: The HTTP and HTTPs are removed so there are no links.. on purpose.)&lt;/p&gt;

&lt;p&gt;They’re all saying that this is a “Group Policy Bug.”&lt;br /&gt;
(which is now fixed by the way… see below)&lt;/p&gt;

&lt;p&gt;Annnnd.. No it’s not a Group Policy bug. It just isn’t.&lt;/p&gt;

&lt;p&gt;A Group Policy bug would be something like:&lt;/p&gt;

&lt;p&gt;1. You run GPupdate and it explodes. (This doesn’t happen.).&lt;br /&gt;
2. You have conflicting values and the final value is not present (This doesn’t happen.).&lt;br /&gt;
3. You click in the GP / MMC editor and it explodes (This can happen due to some underlying MMC code, etc.)&lt;br /&gt;
4. Data saved in the MMC and written to SYSVOL doesn’t make it there in one piece. (This is super insanely rare, but can happen when YOUR GPMC/management machine is over a slow link to a DC.)&lt;br /&gt;
5. You get data to the endpoint, but the CSE (internal to Microsoft or 3rd part CSE) does the “wrong thing” (this can happen from time to time.)&lt;/p&gt;

&lt;p&gt;But NONE of that type of thing happened here.&lt;/p&gt;

&lt;p&gt;So.. What occurred in this latest “Not really a Group Policy” bug ?&lt;/p&gt;

&lt;p&gt;Nothing. Nothing at all that has to do with Group Policy anyway.&lt;/p&gt;

&lt;p&gt;What DID happen is that:&lt;/p&gt;

&lt;p&gt;1. Admins used the GP MMC editor to make a value change. The MMC worked as expected.&lt;br /&gt;
2. Data was saved in SYSVOL perfectly.&lt;br /&gt;
3. The Admin Templates CSE / REG.POL CSE performed perflecty and delivered the value as expected.&lt;br /&gt;
***THE END** … in terms of Group Policy doing its job.&lt;/p&gt;

&lt;p&gt;What happened next?&lt;/p&gt;

&lt;p&gt;The Windows Update engine on Windows 10 had a bug in it which read the value.. (anything except zero).. as “Never update ever again, like ever, please.”&lt;/p&gt;

&lt;p&gt;Then Microsoft made a patch to fix the Windows Update engine to honor the zero and make it work as expected which is “Update when I tell you, as per the setting in policy.”&lt;/p&gt;

&lt;p&gt;So *WHY* is this maligned and deemed as a Group Policy bug?&lt;/p&gt;

&lt;p&gt;It’s not. It simply isn’t a GP bug.&lt;/p&gt;

&lt;p&gt;Here’s what this would look like if this wasn’t Group Policy:&lt;/p&gt;

&lt;p&gt;You: I’m going to use FedEx to deliver a nice sweater to my friend Steve directly from Amazon.&lt;br /&gt;
Steve: I got the sweater from FedEx. And I took it out of the box, but it doesn’t fit *AND* is in shreds, actually.&lt;br /&gt;
You: That’s crazy.. I’m really sorry to hear it.&lt;br /&gt;
Steve: DAMN YOU, FEDEX for delivering the sweater!! And screw you Amazon for putting it in a box!&lt;br /&gt;
You: Wait.. isn’t it the maker of the sweater you should be mad at?&lt;br /&gt;
Steve: That makes no sense ! I want to be mad at FedEx and Amazon !!!&lt;/p&gt;

&lt;p&gt;This kind of maligning to GP is is what gives Group Policy a BAD NAME, and something I’m (clearly) passionate about eradicating.&lt;/p&gt;

&lt;p&gt;So, go ahead.. find these bloggers and people in the press and tell them straight.&lt;/p&gt;

&lt;p&gt;GP worked perfectly… The “Package” from Amazon was put in the box correctly. FedEx delivered the box. But when it got there, the sweater was in tatters.&lt;/p&gt;

&lt;p&gt;NOT GROUP POLICY’S FAULT.&lt;/p&gt;

&lt;p&gt;The bug was in the Windows update engine. And (if I have my story right,&lt;br /&gt;
fixed with KB4051963 and should be in the December 2017 Windows 10 update.)&lt;/p&gt;

&lt;p&gt;Sooooo… to recap:&lt;/p&gt;

&lt;p&gt;– This wasn’t a Group Policy bug.&lt;br /&gt;
– It was a Windows Update engine bug. And that’s what was fixed.&lt;/p&gt;

&lt;p&gt;The end.&lt;/p&gt;

&lt;p&gt;&lt;/Rant mode off&gt;&lt;/p&gt;

&lt;p&gt;And, back to friendly happy Jeremy land.&lt;/p&gt;

&lt;p&gt;If you made it this far… BIG announcement coming on Friday.&lt;/p&gt;

&lt;p&gt;See you then !&lt;/p&gt;

&lt;p&gt;-JM&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Buy a Laptop for the Normal Person in 2017-2018 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-buy-a-laptop-for-the-normal-person-in-2017-2018</link>
        <pubDate>2017-11-22T19:03:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This is a yearly re-post / re-edit. It started in 2009 and has been updated yearly. This started out as a post to just my closest friends but has become one of my popular blog entries of all time. Here&amp;rsquo;s my fully updated guide to end-of-year 2016 into 2017.

Quick updates for 2017-2018:


	Chromebooks + Downloadable Android apps
	About Windows 10S.
	Why Windows 10 Home doesn&amp;rsquo;t cut it for me anymore.
	Jeremy got a new laptop in 2018 after 7 years with his old one.


&amp;mdash; ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;em&gt;This is a yearly re-post / re-edit. It started in 2009 and has been updated yearly. This started out as a post to just my closest friends but has become one of my popular blog entries of all time. Here’s my fully updated guide to end-of-year 2016 into 2017.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Quick updates for 2017-2018:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Chromebooks + Downloadable Android apps&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;About Windows 10S.&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Why Windows 10 Home doesn’t cut it for me anymore.&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Jeremy got a new laptop in 2018 after 7 years with his old one.&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;—&lt;/p&gt;

&lt;p&gt;If you’re an IT geek like me, you’re often asked “What kind of laptop should I buy?”&lt;/p&gt;

&lt;p&gt;If you’re NOT an IT geek, you’re likely asking an IT geek friend “What kind of laptop should I buy?”&lt;/p&gt;

&lt;p&gt;This is a guide for both of you.&lt;/p&gt;

&lt;p&gt;If you’re in IT, this question might not directly affect you, since many IT organizations dole out laptops to the whole staff, including you. However, since you’re seen walking around with a laptop, or have that geeky-vibe about you, I’m guessing you’ve been asked more than once “What kind of laptop should I buy?”&lt;/p&gt;

&lt;p&gt;You might be tempted to say “Buy a Macbook” – if only for the reason that you DON’T have a Macbook, and therefore would be unable to help the person in the future. (See this for the example of the problem: &lt;a href=&quot;http://theoatmeal.com/comics/computers&quot;&gt;http://theoatmeal.com/comics/computers&lt;/a&gt;) That being said, Macbooks are pretty awesome, and if you want to real work on a Macbook, you can do that. That’s just not the point of this article. This is about how to buy a Windows PC laptop. Macs are great, if you want to go there.&lt;/p&gt;

&lt;p&gt;If you’re NOT in IT, your problems are substantial too. If you ask three geeks, you might get THREE answers.&lt;/p&gt;

&lt;p&gt;With that in mind, here’s “Jeremy’s Guide to Buying a new PC-based Laptop in 2017-2018.” Again, there are a LOT of ways someone COULD do this task. This is what I send to people in my inner circle (friends, family, etc.) when I get the question.&lt;/p&gt;

&lt;p&gt;Seriously. I just email them a link to this blog entry, and .. I’m done.&lt;/p&gt;

&lt;p&gt;These suggestions should be “good enough” for the common man / woman / student for the foreseeable near term future. Any one person’s particular needs may vary, but you, the IT Pro, should be able to “print out and hand over” these suggestions and have them work for about 90+% of the people you come in contact with.&lt;/p&gt;

&lt;p&gt;If you’re NOT an IT geek, you’re looking at the Internet and catalogs and think that desktop and laptops could be “infinitely configured.”&lt;/p&gt;

&lt;p&gt;And you don’t have time for that. You want to get back to real work. So, here is a document you can send to anyone who has ever asked that question with some “straight dope answers.”&lt;/p&gt;

&lt;p&gt;Yes: This document is long. But, you want to make a GOOD decision which will last you the next 2-4 years, right? So, just read it. Really READ it. Then go shopping.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Jeremy’s Guide to Buying a new PC-based Laptop in 2017 – 2018&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;We’re going to answer some questions here like:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Laptop or Ultrabook ?&lt;/li&gt;
	&lt;li&gt;Laptop or iPad or Surface (Windows Tablet)?&lt;/li&gt;
	&lt;li&gt;Should I get a $200 Windows laptop?&lt;/li&gt;
	&lt;li&gt;What is / should I get a Microsoft Surface?&lt;/li&gt;
	&lt;li&gt;What’s the deal with Android Tablets and Google Chromebook Laptops?&lt;/li&gt;
	&lt;li&gt;iPad Pro? Will that work for me?&lt;/li&gt;
	&lt;li&gt;Where can I get good deals?&lt;/li&gt;
	&lt;li&gt;What kind of hardware (and warranty) should I get?&lt;/li&gt;
	&lt;li&gt;Should I get Windows 10 or hunt down a laptop with Windows 7?&lt;/li&gt;
	&lt;li&gt;Should I get 32-bit or 64-bit?&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;Part I: Laptop, Ultrabook or Netbook ?&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;To make sure we all understand the marketing vocabulary you’re likely to encounter as you go to buy a machine:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Laptops: You know what a laptop is.&lt;/li&gt;
	&lt;li&gt;Ultrabook: Just like a laptop, but thinner and lighter.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For most people, they want Laptops. They’re mid priced, mid weight and have a full sized keyboard.&lt;/p&gt;

&lt;p&gt;If you pay a little more, you can get an Ultrabook, which is just like a laptop — except lighter.&lt;/p&gt;

&lt;p&gt;I think there are a ton of great options out there where you don’t have buy a HEAVY laptop, or buy an EXPENSIVE Ultrabook.&lt;/p&gt;

&lt;p&gt;Said another way, you can get a great laptop, which approaches the weight of an Ultrabook, at a “Laptop cost.”&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Part II:  Non-Windows tablets (iPad, Android, Chromebooks)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before we talk about ACTUAL laptops, let’s take a quick turn and chat about your “second” device.&lt;/p&gt;

&lt;p&gt;In fact, you might be thinking “Maybe I don’t need a laptop at all, and instead, I’ll just get an iPad, iPad Pro, or Chromebook.” And, what’s the deal with “Microsoft Surface?”&lt;/p&gt;

&lt;p&gt;In short, nothing beats a laptop for ACTUAL WORK.&lt;/p&gt;

&lt;p&gt;The iPad can be FORCED into a device that can help kinda-sorta help you do better at making ACTUAL WORK.&lt;/p&gt;

&lt;p&gt;There’s the iPad, iPad Mini and now the “jumbo” iPad Pro which.. is just a REALLY BIG iPad and pen with some specialty apps to help you try to do ACTUAL WORK.&lt;/p&gt;

&lt;p&gt;But honestly, I’ve tried a lot of stuff, and NOTHING BEATS A LAPTOP for ACTUAL WORK.&lt;/p&gt;

&lt;p&gt;For me, I tend to use my iPad Mini when on the airplane and on the road, watching movies and quick dash emails.&lt;/p&gt;

&lt;p&gt;The bonus of a laptop over an iPad is… its just better at creating and editing documents. Yes, you CAN create documents, deliver slideshows, or make a spreadsheet on an iPad. For me, when it comes to creating content, even simple emails… I need a keyboard. Yes, yes, you can get Bluetooth keyboards that sync with the iPad (and I have one), but still the content creation software and experience isn’t the same as a Netbook, laptop or desktop.&lt;/p&gt;

&lt;p&gt;So, here’s my verdict if you want a “Not Full Windows Machine”:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If I had “real work” to do, and had to only pick one travel machine for the next 5 years, then, sorry iPad, I’d have to go laptop.&lt;/li&gt;
	&lt;li&gt;If I’m sitting on a beach and want to read, game, surf or NetFlix.. I use my iPad.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;How about Android Tablets? Are those good choices?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Possibly. So, I’m (personally) not a huge fan of the current Android world. But I actually believe it’s a very personal choice / taste.&lt;/p&gt;

&lt;p&gt;But, I actually recognize I’m in the minority.&lt;/p&gt;

&lt;p&gt;That is, apparently more portable devices run Android than anything else out there. But I don’t own one, so I can’t personally recommend it.&lt;/p&gt;

&lt;p&gt;I will say that Android devices (Phones and tablets) seem to get a lot of viruses and crap that iPads simply do not. For that reason alone, I wouldn’t recommend them to most people.&lt;/p&gt;

&lt;p&gt;If you’ve got a friend with one, ask to play around on it. But even if I loved it, I’m not sure I’d want it as my only content-creation machine.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;What’s the deal with the “Google Chromebook Laptop”?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;So this section is updated for 2017-2018.&lt;/p&gt;

&lt;p&gt;Whew. This is a tough one. So, non-IT folks… stick with me here.&lt;/p&gt;

&lt;p&gt;Every year I get a lot of comments telling me that I don’t give Google Chromebooks enough “discussion.”&lt;/p&gt;

&lt;p&gt;Fine. Okay.. Here’s the Wall Street Journal article entitled “&lt;a href=&quot;http://www.wsj.com/articles/you-can-ditch-your-pc-now-1415570187&quot;&gt;You can ditch your PC now&lt;/a&gt;” which demonstrates for some people its possible to use a Chromebook for many (most) tasks.&lt;/p&gt;

&lt;p&gt;Google has a “full size laptop thing” running an OS called the Chrome OS.&lt;/p&gt;

&lt;p&gt;Here’s the deal: It has no hard drive, and ALMOST everything you do is in the cloud. Meaning, really, that when you save stuff you’re saving to a website which stores your stuff for later access.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Does it run Windows applications? No.&lt;/li&gt;
	&lt;li&gt;Does it run Mac applications? No.&lt;/li&gt;
	&lt;li&gt;Does it run iPad apps? No.&lt;/li&gt;
	&lt;li&gt;Does it run Android apps?  See below.&lt;/li&gt;
	&lt;li&gt;Might you want one anyway? Possibly.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A recent addition to the Android arsenal is the new idea where SOME Chromebooks can run Android apps. &lt;a href=&quot;https://www.androidcentral.com/these-are-chromebooks-can-run-android-apps&quot;&gt;Here’s a list of currently supported devices&lt;/a&gt;. Of course I don’t maintain that list and who knows when it gets updated.&lt;/p&gt;

&lt;p&gt;But that’s kind-of-sort of interesting for me, if there was some key application I wanted to use while in my submarine or the WiFi goes down.&lt;/p&gt;

&lt;p&gt;Back to their core usage: Where are these Chromebook devices GREAT? In school (K-12) environments. They run Google apps and all the Google-y stuff you already use.&lt;/p&gt;

&lt;p&gt;So teachers just give ‘em to students and if they break? O well. There’s nothing stored on them anyway. Since the Internet is always on (usually) in the school, it makes a lot of sense there.&lt;/p&gt;

&lt;p&gt;For me, though, it’s not how I want to work. But some people can and do use a Google Chromebook is their “daily driver” for all things. And with the addition of Android apps you can take on-the-go with you, it’s a serious iPad contender and possible laptop replacement for some.&lt;/p&gt;

&lt;p&gt;But not me personally. I have several friends who love them and give them to their parents as their “daily driver” for all things.&lt;/p&gt;

&lt;p&gt;Okay: Back to laptops and Netbooks.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Part III: Which laptop brand should I get?&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Read this part first, before we get to the “Should I try really hard to get Windows 7 on my laptop” section. We’ll answer that in a minute.&lt;/p&gt;

&lt;p&gt;Okay: Here’s the thing about all laptops. All of them: basically, they’re all the same.&lt;/p&gt;

&lt;p&gt;Shocker, I know. But so are cars. They are all basically, almost exactly, 99% the same. Some of the “differences” might be:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Extra ports or USB 3.0 vs. USB 2.0.&lt;/li&gt;
	&lt;li&gt;USB “C” port(s). (None of my laptops have this, and I do just fine, thank you very much.)&lt;/li&gt;
	&lt;li&gt;One or two “video chips” (don’t get me started).&lt;/li&gt;
	&lt;li&gt;Keyboard twists / converts to make it a tablet.&lt;/li&gt;
	&lt;li&gt;Keyboard snaps off to make it a tablet.&lt;/li&gt;
	&lt;li&gt;Keyboard doesn’t exist at all (so it *IS* a tablet) and you ADD a keyboard.&lt;/li&gt;
	&lt;li&gt;Some are a little faster or a little slower.&lt;/li&gt;
	&lt;li&gt;Some are heavier. Others are lighter.&lt;/li&gt;
	&lt;li&gt;Some have 10-key keypads build in and some do not.&lt;/li&gt;
	&lt;li&gt;Some have BIG power supplies (which add to the overall weight of travel). Others have small wee ones.&lt;/li&gt;
	&lt;li&gt;Some are “bigger” and have a full sized keyboard. Others are smaller (Netbooks.)&lt;/li&gt;
	&lt;li&gt;Some laptops have touch screens, some do not.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But… again 99% of all laptops running Windows are EXACTLY the same “guts” and what they’re capable of.&lt;/p&gt;

&lt;p&gt;Since they all do the same basic thing, for the MAJORITY of “Joe and Jane users” you almost &lt;strong&gt;CANNOT GO WRONG&lt;/strong&gt; in buying a new laptop nowadays.&lt;/p&gt;

&lt;p&gt;This is going to sound totally weird, but my primary suggestion to prospective buyers of laptops and desktops is: &lt;strong&gt;UNDERSTAND THE WARRANTY&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;We’ll cover this in the next part of this talk.&lt;/p&gt;

&lt;p&gt;Of course, you’re also looking for a good deal. So, here are my top five &lt;strong&gt;deals&lt;/strong&gt; for anyone looking for a computer:&lt;/p&gt;

&lt;p&gt;1. &lt;strong&gt;New Dell Inspiron laptops.&lt;/strong&gt; They’re cheap, decent, fast, and have Dell’s warranty (again, more on this in a second.) &lt;a href=&quot;http://www.dell.com/p/inspiron-laptops-netbooks.aspx?c=us&amp;cs=04&amp;l=en&amp;s=bsd&amp;~ck=mn&quot;&gt;Click here to see them.&lt;/a&gt; I wouldn’t recommend _all_ of them. Some of them have the “wrong” processor type. (again, more on this in a second.) And this year, I’m recommending ONLY disks without moving parts (SSD) .. again, more on this in a bit.&lt;/p&gt;

&lt;p&gt;2. &lt;a href=&quot;http://www.dell.com/us/dfh/p/?cs=22&amp;c=us&amp;l=en&amp;s=dfh&amp;redirect=1&amp;dgc=IR&amp;cid=259637&amp;lid=4662700&quot;&gt;&lt;strong&gt;Dell Factory Outlet &lt;/strong&gt;&lt;/a&gt; This is Dell’s “island of lost toys.” This usually mans “Jane Doe couldn’t afford her new laptop for her son Johnny Doe after all, so she sent it back after 9 days of light use.” It doesn’t really mean “It was dropped, so it’s now crap.”  Even if it did, Dell still puts an original warranty on everything they sell there, which is the most important part of owning a laptop. I’ve literally bought 4 Dell laptops using the Outlet store.&lt;/p&gt;

&lt;p&gt;3. &lt;strong&gt;Tigerdirect.com and NewEgg.&lt;/strong&gt; They do sell new computers, but also “fell off the truck, if ya know what I mean”, off-lease (meaning, used) or are market closeouts in some way. But, holymoly.. lots and lots of awesome deals here. I promise you won’t find better deals than Tigerdirect. You will get the MOST bang for your buck, especially if you’re looking for something “higher end” at “lower cost.” But here’s the trick: Tigerdirect doesn’t warranty these. They’re always “factory direct warranties” whatever that means. And since they sell all brands, I don’t know what to tell you – even if you find a great deal. You’ll have to manually inspect the warranty yourself, call the company and see what their story is. Don’t expect Tigerdirect to help you when you have a problem. They sell it to you. They mail it to you. That’s the extent of your relationship.&lt;/p&gt;

&lt;p&gt;4. &lt;strong&gt;Retail:&lt;/strong&gt; Best Buy, hhGregg, Office Max, Office Depot, Staples: Even if they swore “up and down” that they had the most amazing warranty of all time, PLUS a killer deal  I still wouldn’t buy the computer and warranty from any of them. Plain and simple: There are KIDS working in these stores, and this is YOUR business / personal laptop. Sorry, but I can’t trust any of these outfits with my most precious business instrument. Not to mention that these kinds of stores turn over equipment types and makes and models so, so quickly. Will the kid behind the desk know what to do when you bring yours in from 1.5 years ago?&lt;/p&gt;

&lt;p&gt;5. &lt;strong&gt;Other Internet sites&lt;/strong&gt;: NewEgg.com, Buy.Com, Woot.com and others. Again almost always ONLY manufacturer’s warranty or some kind of 30-90 day only warranty. Again, not my cup of tea.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Part IV: Understanding the warranty (the most important part of your laptop.)&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Let’s talk about Dell, specifically, for a second though. Why have I, historically, always owned a Dell laptop? (But, read all the way to the end about why I personally use Lenovo laptops. Trust me: This makes sense if you read all the way to the end.)&lt;/p&gt;

&lt;p&gt;Simple. Their warranty is easy for my pea-brain to understand.&lt;/p&gt;

&lt;p&gt;Here’s how it works:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The default warranty is 1 year if something “dies.” Examples are: Power supply, screen goes blank, USB port dies, whatever. You call up. They try to fix it over the phone.&lt;/li&gt;
	&lt;li&gt;If it needs a part you can replace (ie: battery, mouse, removable DVD drive) they ship it to you; you replace it yourself. You put the broken part in a pre-paid box back to them, and drop it in the mail. You are done.&lt;/li&gt;
	&lt;li&gt;If it needs a part you can’t replace (laptop screen, motherboard) the part is shipped “overnight” to a “regional center.” Then when the part arrives, the center calls you and you schedule a time to get your machine fixed.&lt;/li&gt;
	&lt;li&gt;For a little extra money when you buy your laptop, you can get 3 years on-site (ie: they come to you) coverage.&lt;/li&gt;
	&lt;li&gt;For a little “extra extra”, you can get “I spilled coffee directly in it”, “I dropped it hard on a marble floor” or “I dropped it in a lake” insurance, which will cover things like that. Really. At least that’s what they say.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now.. with that said: I, with my pea-brain, can understand this warranty structure, and can embrace what it means.&lt;/p&gt;

&lt;p&gt;To be clear: This warranty structure doesn’t mean “my problem will be fixed in 24 hours.” (Especially on a Thursday or Friday.)&lt;/p&gt;

&lt;p&gt;It means: “We (Dell) spring to action right away… If you called us with your problem after 2.00 PM or so, then we’re going to miss Mr. DHL delivery dude for today. So, we’ll have to ship it tomorrow then it will (usually) get to the local repair depot the next business (shipping) day. And when it arrives, then you’ll get a call. Only after the part arrives at the local depot center, will we call you and schedule an appointment for up to 24 hours after that.”&lt;/p&gt;

&lt;p&gt;That’s the deal.&lt;/p&gt;

&lt;p&gt;So don’t expect your warranty coverage to mean “your problem will be fixed within 24 hours.” Expect them to get started on your problem right away and have it fixed 24 hours AFTER the part is in the hands of the depot.&lt;/p&gt;

&lt;p&gt;So, because I ‘get’ the deal, I usually recommend Dell. It’s the “warranty-devil” I know, and I’m totally cool with that deal.&lt;/p&gt;

&lt;p&gt;That said, I always recommend Dells to Joes and Janes when they ask me what laptop to get because:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;99% of the any laptop you get is exactly the same and&lt;/li&gt;
	&lt;li&gt;I can EXPLAIN the warranty to them and ..&lt;/li&gt;
	&lt;li&gt;They can decide if that’s what they want.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I cannot OVER-EMPHASIZE how important &lt;strong&gt;UNDERSTANDING&lt;/strong&gt; your laptop’s warranty and restrictions are. This is &lt;strong&gt;literally&lt;/strong&gt;, the #1 factor you should choose in buying a laptop.&lt;/p&gt;

&lt;p&gt;Again: I’ve described Dell’s warranty service above. If you want to check out &lt;strong&gt;other&lt;/strong&gt; manufacturer’s warranties, great. I’m just giving you my personal experience with Dell and warranties.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Part V: “How much laptop do I, a regular person, need?”&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;If you’re planning on: Surfing, Facebook, using Microsoft Office, Google Docs, Gmail, Hotmail, Office 365, NetFlix, Skype and other usual stuff you’ve got what I call “modest needs.”&lt;/p&gt;

&lt;p&gt;If you’re running some high powered stuff like Quark, World Of Warcraft (or other high end games), Final Cut, Movie Maker, VMware Workstation, HyperV, Autocad, Camtasia Studio or Mathemetica, you might need more than what I’ve listed here.&lt;/p&gt;

&lt;p&gt;Now, before we get into this, there’s a handful of.. holycow.. NEW $200 full Windows laptops out there. (&lt;a href=&quot;http://www.wsj.com/articles/hp-stream-11-review-a-200-windows-laptop-thats-worth-the-price-1417546863&quot;&gt;Here’s an older Wall Street Journal Entry on them.&lt;/a&gt; And here’s a &lt;a href=&quot;https://www.laptopmag.com/articles/best-cheap-laptop&quot;&gt;LaptopMag.com article from 2017 on sub-$200 laptops&lt;/a&gt;) But … they FAIL the “sniff test.” Read the article, then also read my discussion on Chip Type.. right here.&lt;/p&gt;

&lt;p&gt;So, here’s my answer for your “modest needs” person.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;CPU Chip type and speed:&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here’s the dirty little secret the laptop manufactures don’t want you to know: This almost doesnt matter. Or said another way, you almost cannot go wrong. Here are my suggestions:&lt;/p&gt;

&lt;p&gt;Intel’s chip lines are the Intel Core i3, i5 and i7s. The i3 is usually the best bang for the buck but I wouldn’t turn down the higher model i5s or i7s. Again, i3 (any speed) will be perfectly fine for almost anyone. Get the i5s if you can afford it. The i7s are almost certainly overkill for almost everyone.&lt;/p&gt;

&lt;p&gt;Avoid “Intel Celerons” at all costs. &lt;strong&gt;None are acceptable. Ever. This is why you don’t want to buy the $200 HP Stream 11 laptop .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;See the above line: NEVER EVER buy a laptop with an Intel Celeron. &lt;strong&gt;EVER.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I would also avoid anything with Intel &lt;strong&gt;ATOM. &lt;/strong&gt;They’ll run all Windows apps. But slower. The PLUS side is that battery life is greater on these, but definitely slower than the Intel “i” series I mentioned above.&lt;/p&gt;

&lt;p&gt;Also:  Avoid all “gamer” laptops. Avoid due to the high price tag and low battery life and large power supply to lug around.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;RAM:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The new modern standard is 8GB. You could get away with 4GB likely just fine. But if if you had an extra $40, get 8GB over 4GB.&lt;/p&gt;

&lt;p&gt;Note that I am NOT recommending you get &lt;strong&gt;more&lt;/strong&gt; than 8GB for most modest-needs users. If you happen to get MORE than 8GB of RAM, bully for you, but you likely will never really need or use it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hard drive:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are three kinds of hard drives now: spinning disks (the kind we’ve had for years) and SSD disks which have no moving parts at all and hybrids which are spinning disks with some extra SSD stuff slapped on.&lt;/p&gt;

&lt;p&gt;The older spinning disks are still found in 50% of all laptops.&lt;/p&gt;

&lt;p&gt;I would avoid spinning disks at all costs now, and opt only for the SSD (which has no moving parts.) The catch however is that SSD disks are more expensive than older spinning disks (for the same amount of space.)&lt;/p&gt;

&lt;p&gt;Manufacturers used to only have small SSDs for some reason; now they’re finally getting their acts together and you can go pretty big.&lt;/p&gt;

&lt;p&gt;In short getting an SSD vs. spinning disks is going to be the greatest &lt;strong&gt;one thing&lt;/strong&gt; you can do to make your laptop (even your old, crappy 3 year old laptop) feel insanely fast. More on SSD disks a little later.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Video card / chip:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Unless you’re playing games, it doesn’t matter.&lt;/p&gt;

&lt;p&gt;Really.&lt;/p&gt;

&lt;p&gt;Even if you’re planning on watching NetFlix or Hulu, or playing Mindcraft, those kinds of apps really don’t care about your video card much.&lt;/p&gt;

&lt;p&gt;Even on my super old crappy 6 year old Netbook, I am able to see full screen videos (wirelessly!) without any issue with a good network connection.&lt;/p&gt;

&lt;p&gt;Avoid laptops which tout “multiple” or “two” video chips. These give you extra headaches for almost NO VALUE to the mere mortal.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Screen Size / Resolution &amp; Touch:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Look for something with WXGA or WXGA+ resolution. This can mean 1280×720 and up, which is decent on a laptop.&lt;/p&gt;

&lt;p&gt;Some laptops don’t have touch screens. You might as well get a touch-enabled laptop, since things do appear to be getting “touch-ier.” That being said, as I write this year’s revised article, the two laptops I own; neither has a touch screen.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wireless Network Card:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most laptops now have built-in Wireless cards.&lt;/p&gt;

&lt;p&gt;You don’t have to get all worried if you don’t have the fastest wireless card.&lt;/p&gt;

&lt;p&gt;Ideally, look for one that has “n” in the spec, like 802.11n to get the fastest. Note that 802.11n isn’t actually the fastest thing out there. It’s actually 802.11AC but I think only a handful of laptop manufacturers put 802.11AC chips built into their notebooks (Asus being one of them).&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Part VI: Picking the OS. Windows 10, Windows 10 S and Windows 7 &lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;So, let me start out by saying it’s really, really hard to get a new laptop WITHOUT Windows 10 on it.&lt;/p&gt;

&lt;p&gt;There really isn’t any compelling reason to get Windows 7 anymore anyway. Windows 10 is the “last” version of Windows, but it will constantly upgraded and updated with new features every few months.&lt;/p&gt;

&lt;p&gt;In short, you pretty much have to get it.. so just get it… UNLESS your business or school or something requires you to have Windows 7 and NOT Windows 10.&lt;/p&gt;

&lt;p&gt;But that being said, you will find at least Dell and some other manufacturers still putting Windows 7 onto new machines as an option (&lt;a href=&quot;http://www.dell.com/us/business/p/laptops#!facets=80770~0~16063830&amp;p=1&quot;&gt;click here&lt;/a&gt; for a list of SOME Dell machines with Windows 7 as an option.)&lt;/p&gt;

&lt;p&gt;So, you CAN get Windows 7 in lieu of Windows 10 if you wanted, but I wouldn’t.&lt;/p&gt;

&lt;p&gt;My advice for “normal people” would be to spring for a machine with Windows 10 Pro.&lt;/p&gt;

&lt;p&gt;Why not “Windows 10 Home?” It’s Cheaper right?&lt;/p&gt;

&lt;p&gt;Right. But it’s missing ONE KEY feature I think everyone should be using, which is BITLOCKER Full Disk Encryption. And that is not within Windows 10 Home, so, for me.. it’s a non-starter.&lt;/p&gt;

&lt;p&gt;Note: My geeky friends will notice Windows 10 Enterprise isn’t on this list, because they are NOT sold with NEW machines are only available to IT departments.&lt;/p&gt;

&lt;p&gt;This chart is excellent to see what you get in which edition (left most columns): &lt;a href=&quot;https://en.wikipedia.org/wiki/Windows_10_editions&quot;&gt;https://en.wikipedia.org/wiki/Windows_10_editions &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note also that some new laptops might come with Windows 7 or Windows 8 or 8.1 pre-loaded. It depends on the manufacturer if you get “Windows 10 Ugprade rights.” I would just skip all of this and get Windows 10 Pro.&lt;/p&gt;

&lt;p&gt;Now: There’s another new kid on the block with Windows. Windows 10S. Windows 10S comes pre-loaded on some laptops and here’s the deal:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You can only install stuff from the Windows 10 Store.&lt;/li&gt;
	&lt;li&gt;You can only use Microsoft Edge as your browser&lt;/li&gt;
	&lt;li&gt;You cannot “download any application from the Internet” (like .MSI or EXE apps) and expect it to run. It won’t.&lt;/li&gt;
	&lt;li&gt;You can UPGRADE from Windows10S one time to Windows 10Pro if you purchase a upgrade license.&lt;/li&gt;
	&lt;li&gt;You CANNOT DOWNGRADE from Windows 10Pro backward to Windows 10S.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, why does Windows 10S exist? Because in the same way there is goodness and utility when an iPad is “locked” to using the Apple apps store, and an Android Tablet has goodness and utility when “locked” to the Android Store… Windows 10S also has goodness and utility when “locked” to the Windows 10 Store.&lt;/p&gt;

&lt;p&gt;So these Windows10S machines are like “Windows’ versions of Chromebooks, but you can download apps.. lots of them from the Windows Store and do a lot of useful stuff.” But you can’t get yourself into too much trouble with viruses, malware, and evil stuff because.. these Windows 10S computers simply cannot run that stuff.&lt;/p&gt;

&lt;p&gt;So Windows 10S might be a pretty good option.. for SOME PEOPLE, SOME TIMES. Microsoft is touting Windows 10S as an excellent choice for Schools and “Front Line Workers” like hotel clerks, storefronts, and so on.. because they don’t need to do too, too much and don’t want to get into too much trouble. If this sounds good to you, check it out and see if a Windows 10S machine might be right for you. If it stinks, just return it. &lt;a href=&quot;https://www.theverge.com/2017/7/13/15959602/how-to-windows-10-s-store-microsoft-apps-best-survive&quot;&gt;Here’s a good article about using a Windows 10S as a daily driver.&lt;/a&gt; I recommend the read.&lt;/p&gt;

&lt;h3&gt;Part VII: &lt;strong&gt;32 bit vs 64 bit.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Most new machines you will get are 64-bit capable. 64-bit capable means you get two major benefits.&lt;/p&gt;

&lt;p&gt;Since most machines (laptops, not netbooks) you will buy nowadays are 64-bit capable, if you had an extra minute before clicking “buy now” I would check to ensure your new machine it’s 64-bit compatible and Windows 10 64-bit is pre-loaded.&lt;/p&gt;

&lt;p&gt;Okay  — why would you care?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Benefit #1: With 64-bit you can tap into all 4GB+ of memory you purchase. If you were to use the older 32-bit OS you will only see 3.2GB of your 4GB purchase. Weird, but that’s how it works.&lt;/li&gt;
	&lt;li&gt;Benefit #2: By and large, the computer will be “faster” than the exact same machine running a 32-bit operating system. Even though we’re talking about identical systems, the 64-bit is faster all around because it processes (many / most) things in 64-bit “chunks” as opposed to 32-bit “chunks.” So it’s overall, faster.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, in short, if you CAN get a 64-bit Windows 10 edition pre-loaded on your machine, I say “do it.”&lt;/p&gt;

&lt;p&gt;In the old days, there were driver problems with 64-bit editions.&lt;/p&gt;

&lt;p&gt;No more.&lt;/p&gt;

&lt;p&gt;If the machine comes pre-loaded with Windows 10 and has 64-bit support, you’re likely quite golden with regards to drivers. You could, maybe possibly have some problems with some of the stuff ATTACHED to your machine, like Printers and Scanners. But Windows 7 and 8′s drivers support is excellent and those drivers should work in Windows 10. It’s a rare (mostly modern) device that won’t work with Windows 64-bit. Note: some won’t, and that’s a possible 64-bit risk.&lt;/p&gt;

&lt;p&gt;For more information on 32 vs 64 bit support from Microsoft’s perspective, &lt;a href=&quot;http://windows.microsoft.com/en-us/windows/32-bit-and-64-bit-windows#1TC=windows-7&quot;&gt;read this&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;In short, for regular people, my advice is simple: Get Windows 10 Pro 64-bit edition pre-loaded on your laptop if you want guaranteed success.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Where do I go next:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Again, your best bet for Price / Performance is the Dell Factory Outlet: &lt;a href=&quot;http://www.dell.com/outlet/&quot;&gt;http://www.dell.com/Outlet/&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;I found many, many, many under $600. Here’s an example available now as I write this:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Processor: Intel Core 7th Generation i5 Processor&lt;/li&gt;
	&lt;li&gt;Windows 10 Pro 64-bit&lt;/li&gt;
	&lt;li&gt;256 GB Solid State Drive&lt;/li&gt;
	&lt;li&gt;8GB DDR3L at 1600MHz&lt;/li&gt;
	&lt;li&gt;15 Inch HD (1366×768) LED-backlit Non-Touch Display&lt;/li&gt;
	&lt;li&gt;Intel HD Graphics&lt;/li&gt;
	&lt;li&gt;Dell Outlet Latitude Laptop&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Total price: $592&lt;/p&gt;

&lt;p&gt;Are these the best, lightest, fastest, crispest, nicest laptops you’re going to find? &lt;strong&gt;DEFINITELY NO&lt;/strong&gt;. But for MOST PEOPLE these laptops (and the warranty I explained earlier) are PERFECT for mere mortals.&lt;/p&gt;

&lt;p&gt;So, after this: everything else.. everything else.. is just bells and whistles when it comes to laptops.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You could argue that touch is becoming more and more important. But on a real LAPTOP, I don’t see it yet and I personally don’t use it yet. But if you really wanted touch, then… get one with touch.  :-)&lt;/p&gt;

&lt;p&gt;If you do want to go there, my only other big alternative might be a Microsoft Surface device. These are tablets that convert into laptops with snap-on keyboards (extra cost.) But the devices are amazingly built and very slick. You can go thru the myriad of options (again, this will be more expensive than other laptops, but you will almost certainly be happy with the experience.) &lt;a href=&quot;http://www.microsoftstore.com/store/msusa/en_US/cat/All-Surface/categoryID.69403400?icid=en_US_Store_UH_devices_Surface&quot;&gt;Anyway, check them out here&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Part VII: Wait.. you said Solid-State (SSD) disks were the best, why don’t I see those (sometimes) when I try to buy a new laptop?&lt;/h3&gt;

&lt;p&gt;Here’s a fact: Your computer is ONLY as fast as its SLOWEST part.&lt;/p&gt;

&lt;p&gt;Want to know what the slowest part is? The “spinning disk” hard drive. (Or “Hybrid” which is a spinning disk with SOME non-spinning stuff slapped on.)&lt;/p&gt;

&lt;p&gt;Remember: Most computer manufacturers are cheap. They want to make something cheap and sell you something that works. When you get it they want you to be REASONABLY happy enough NOT to send it back. Its also in their best interest to say “500GB hard drive” or “750GB Hard drive”. Sounds HUUUUGE. So, ”spinning disks” do the job. They’re cheap and plentiful.&lt;/p&gt;

&lt;p&gt;But, your spinning disk is holding you back.&lt;/p&gt;

&lt;p&gt;SSD disks are where the action is. Sometimes you cannot buy SSD disks with new systems (or if you do, you can only get the smaller ones.)&lt;/p&gt;

&lt;p&gt;Why? See point #1 above: Spinning disks are &lt;strong&gt;good enough&lt;/strong&gt;. So that’s what manufacturers sell. It won’t be like this forever. I suspect in the next year this will tip the other way to SSDs being normally available in bigger sizes.&lt;/p&gt;

&lt;p&gt;So, here’s the (counter-intuitive) recommendation if you want to maximize your new laptop and make it feel AWESOME / ZIPPY for the next several years. Note: There is a litttttttle risk and costs involved here. But I think its worth it. Here goes:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Buy your machine with the SMALLEST spinning disk hard drive you can. Usually the smallest is 320GB for laptops made.&lt;/li&gt;
	&lt;li&gt;Buy your own SSD. Buy the biggest you can afford. I have tested several brands, and can only hands-down recommend ONE manufacturer: Samsung.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Samsung has three “flavors” of SSD disks. But, for YOU the mere mortal, there’s only one: The Samsung EVO.  &lt;a href=&quot;https://www.amazon.com/Samsung-850-EVO-2-5-Inch-MZ-75E120B/dp/B00OAJ5N6I/ref=sr_1_1?s=electronics&amp;ie=UTF8&amp;qid=1511379491&amp;sr=1-1&amp;keywords=samsung+evo+120GB&quot;&gt;Here on Amazon&lt;/a&gt; it’s $80.99 for the 120GB version.  A little more for 256 and so on, and you can select up to 1TB if you wanted for obviously more money.&lt;/p&gt;

&lt;p&gt;In MOST cases (not all!) these drives come with a cable and software to MIGRATE the hard drive you HAVE onto the new platform. Always remember that in most cases, you need to be USING less space than you’re GOING to. (Be sure to read the details of your purchase CAREFULLY to ensure that your drive comes with a transfer cable if you want to do this yourself.)&lt;/p&gt;

&lt;p&gt;Anyway.. here’s an example:&lt;/p&gt;

&lt;p&gt;– Your new laptop comes with a 500GB hard drive.&lt;/p&gt;

&lt;p&gt;– Its using 20GB of space of that 500GB.&lt;/p&gt;

&lt;p&gt;You can then upgrade to the 120GB SSD because you’re only using 20GB of that space.&lt;/p&gt;

&lt;p&gt;Here’s another example:&lt;/p&gt;

&lt;p&gt;-Your laptop comes with 500GB hard drive.&lt;/p&gt;

&lt;p&gt;-You’re using 300GB of that space.&lt;/p&gt;

&lt;p&gt;You cannot shove 300GB of stuff into that 120GB SSD disk.&lt;/p&gt;

&lt;p&gt;Its usually pretty easy to then take out the OLD drive and throw in the NEW drive. If you’re UNCOMFORTABLE with all of this, you can pay someone at Best Buy or your local computer store to do all of this for you. Don’t pay more than $100 for the LABOR involved here.&lt;/p&gt;

&lt;p&gt;What do you do with the original drive you took out? &lt;a href=&quot;http://www.amazon.com/Inateck-External-Enclosure-Tool-free-FE2001/dp/B00DW374W4/ref=sr_1_1?s=electronics&amp;ie=UTF8&amp;qid=1448996692&amp;sr=1-1&amp;keywords=usb+3.0+external+hard+drive+case&quot;&gt;For $12 whole dollars on Amazon&lt;/a&gt;, you can put your ORIGINAL drive in a USB 3.0 case and reclaim that space as “spare” .. for pictures, videos, docs, whatever.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Part IX: What kind of laptop do you own, Jeremy?&lt;/strong&gt; &lt;strong&gt;(Here comes a little geekier stuff.)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Some of you may wonder what kind of laptop I am running?&lt;/p&gt;

&lt;p&gt;I finally in 2017, retired my laptop that I used since 2011 !! Up until this year, I used a Lenovo W520 with a four-core i7 processor and 1.5TB of SSD hard drive space (two SSD disks) and 32GB of RAM. It’s big and heavy and the power supply is .. just.. huge.&lt;/p&gt;

&lt;p&gt;Now, I have a Lenovo T470P (P= Performance in case you care) with an i7-7820HQ 4-Core 2.9Ghz processor, 32GB RAM, and 2TB M.2 SSD space (which cost me as much as the laptop ITSELF!)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BUT REMEMBER: BUT I AM NOT A REGULAR PERSON.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I do live demonstrations in front of thousands of people and my laptop has to FLY.&lt;/p&gt;

&lt;p&gt;I have another machine which is a Lenovo X260 running Windows 10 64-bit with 16GB of RAM and 512GB SSD disk, and its totally fantastic to represent my “mere mortal machine”. This is the machine I carry around the house, or on a day trip somewhere, where I am not presenting.&lt;/p&gt;

&lt;p&gt;I can hear you now: “But what about Dell? You reference Dell like 80 times in this article. Didn’t you basically tell me to buy a Dell?”&lt;/p&gt;

&lt;p&gt;Yes, I did.&lt;/p&gt;

&lt;p&gt;I recommend Dell for &lt;strong&gt;most &lt;/strong&gt;people. But I personally like Lenovo’s “build quality” a lot better, and .. with my multiple Lenovo laptops I’ve owned over the years, I have literally NEVER needed the warranty. I’ve never had a pixel go bad, a USB port fry out, or a keyboard die. Not one. Not ever.&lt;/p&gt;

&lt;p&gt;Remember: I’m an IT guy who does hard core demonstrations, so my needs are greater than some others. I need 32GB of RAM in my laptop, seriously fast hard drive and a lot lot more.&lt;/p&gt;

&lt;p&gt;Again: my set up is NOT RECOMMENDED for regular people.&lt;/p&gt;

&lt;p&gt;Let me be frank: the Lenovo buying experience is not great. The laptops take forever to get to me and the last time, my assistant called every day for 90 days to get confirmation of the activation of the warranty.&lt;/p&gt;

&lt;p&gt;I wouldn’t want to put Jon and Jane Buyer thru either of those experiences. And I’m bordering on afraid to use the warranty service. Haven’t used it yet, I’ll cross my fingers. Heck, I don’t even know where to call if I had a problem. And that’s a problem.&lt;/p&gt;

&lt;h3&gt;Final Thoughts (and if you read nothing else…)&lt;/h3&gt;

&lt;p&gt;So, for regular people, I still recommended the Dell Outlet to get cheap, reliable, new computers and the Dell warranty for reliable, easy to understand warranty service.&lt;/p&gt;

&lt;p&gt;Hope this guide helps you and your friends out.&lt;/p&gt;

&lt;p&gt;– Signed, your friendly neighborhood Jeremy Moskowitz, Enterprise Mobility MVP&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Everything you need to know about Windows 10 1709 Group Policy Updates </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/everything-you-need-to-know-about-windows-10-1709-group-policy-updates</link>
        <pubDate>2017-10-19T13:45:58+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Windows 1709 &amp;ldquo;Dropped.&amp;rdquo; As in.. Dropped the Mic AWESOME !

Here&amp;rsquo;s your homework:

1. Start out by downloading the 1709 ADMX templates.
https://www.microsoft.com/en-gb/download/details.aspx?id=56121

1b. Optional, recommended: Immediately put them in the Central Store.
I get this question a lot, but for me, there&amp;rsquo;s no DOWNSIDE to using these
NOW, even if you have ZERO Windows 10 1709 machines &amp;ldquo;out there.&amp;rdquo;
At least you can see &amp;ldquo;all that&amp;rsquo;s p ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Windows 1709 “Dropped.” As in.. Dropped the Mic AWESOME !&lt;/p&gt;

&lt;p&gt;Here’s your homework:&lt;/p&gt;

&lt;p&gt;1. Start out by downloading the 1709 ADMX templates.&lt;br /&gt;
&lt;a href=&quot;https://www.microsoft.com/en-gb/download/details.aspx?id=56121&quot;&gt;https://www.microsoft.com/en-gb/download/details.aspx?id=56121&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1b. Optional, recommended: Immediately put them in the Central Store.&lt;br /&gt;
I get this question a lot, but for me, there’s no DOWNSIDE to using these&lt;br /&gt;
NOW, even if you have ZERO Windows 10 1709 machines “out there.”&lt;br /&gt;
At least you can see “all that’s possible” in GP-land once you do this.&lt;br /&gt;
Old video, still works as expected: &lt;a href=&quot;https://www.youtube.com/watch?v=acYb2wQeL94&quot;&gt;https://www.youtube.com/watch?v=acYb2wQeL94&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;1b. REPLACE old ADMX files and KEEP any “overage.” Here is an answer to a FAQ: &lt;a href=&quot;https://www.youtube.com/watch?v=Op7hAvc5a0M&quot;&gt;https://www.youtube.com/watch?v=Op7hAvc5a0M&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2. Check out the 1709 ADMX settings reference:&lt;br /&gt;
&lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=25250&quot;&gt;https://www.microsoft.com/en-us/download/details.aspx?id=25250&lt;/a&gt;&lt;br /&gt;
TIP: Column A.. filter by 1709, and bingo.. New stuff to check out !&lt;/p&gt;

&lt;p&gt;3. Check out the 1709 Security Baselines.&lt;br /&gt;
&lt;a href=&quot;https://blogs.technet.microsoft.com/secguide/2017/10/18/security-baseline-for-windows-10-fall-creators-update-v1709-final/&quot;&gt;https://blogs.technet.microsoft.com/secguide/2017/10/18/security-baseline-for-windows-10-fall-creators-update-v1709-final/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There’s just a metric new ton of GP settings for the various security features.&lt;/p&gt;

&lt;p&gt;Which .. ya know.. I will go over in excrutating detail in my upcoming Group Policy&lt;br /&gt;
training class in LAX (Dec 3 – 5.)&lt;/p&gt;

&lt;p&gt;Because: Yes, you totally want to be caught off guard by updates, new stuff in the box,&lt;br /&gt;
things you could have secured but didn’t, and all that stuff.&lt;/p&gt;

&lt;p&gt;What? You DONT want to be caught off guard? If **ONLY** there was a training class you could take for that.. Then.. man, that would be AWESOME.&lt;/p&gt;

&lt;p&gt;Wait: There is! In Los Angeles.. Dec 4 – 6.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.GPanswers.com/training&quot;&gt;http://www.GPanswers.com/training&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Get that seat, or be LEFT OUT !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Updated Group Policy Is Not Dead Manifesto - July 2017 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/updated-group-policy-is-not-dead-manifesto-july-2017</link>
        <pubDate>2017-07-18T17:54:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

I keep getting asked &amp;ldquo;What do I think of DSC vs. Group Policy&amp;rdquo; a lot.

So I decided to work closely with Jeffrey Snover, father of Powershell and DSC to come up with some clarifying points.

As such, I have embedded them into my &amp;ldquo;Why Group Policy Is Not Dead Manifesto&amp;rdquo;.

If you don&amp;rsquo;t want to re-read the whole thing , here are the updates for July 2017:


	Worked with Jeffrey Snover to provide DSC + Windows Client &amp;ldquo;Truths &amp;amp; Tenets&amp;rdquo;.  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;I keep getting asked “What do I think of DSC vs. Group Policy” a lot.&lt;/p&gt;

&lt;p&gt;So I decided to work closely with Jeffrey Snover, father of Powershell and DSC to come up with some clarifying points.&lt;/p&gt;

&lt;p&gt;As such, I have embedded them into my “&lt;a href=&quot;https://www.gpanswers.com/blogs/view-blog/the-why-group-policy-is-not-dead-manifesto&quot;&gt;Why Group Policy Is Not Dead Manifesto”&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;If you don’t want to re-read the whole thing , here are the updates for July 2017:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Worked with Jeffrey Snover to provide DSC + Windows Client “Truths &amp; Tenets”. (PLEASE use them in Powerpoints, etc. They are blessed as gospel.)&lt;/li&gt;
	&lt;li&gt;Updated Nano server since the infrastructure pieces are now GONE in Nano.&lt;/li&gt;
	&lt;li&gt;Defined “Two Racoons in bag” as “Competing Controllers”&lt;/li&gt;
	&lt;li&gt;Added a link to Security Compliance Toolkit&lt;/li&gt;
	&lt;li&gt;Demonstrated that Security Compliance Manager 4.0 is now dead.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Here’s the link to share with the world:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/blogs/view-blog/the-why-group-policy-is-not-dead-manifesto&quot;&gt;www.gpanswers.com/the-why-group-policy-is-not-dead-manifesto/&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The Untold tale of Mark Minasi and Jeremy Moskowitz: A personal tale of me and my mentor (who is now retiring.) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-untold-tale-of-mark-minasi-and-jeremy-moskowitz-a-personal-tale-of-me-and-my-mentor-who-is-now-retiring</link>
        <pubDate>2017-06-22T00:35:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you don’t know who Mark Minasi is, then you don’t know Windows.
Before I knew Mark personally, I would regularly encounter his books when I went from business to business during my old NT 3.5, 4.0 then Active Directory Consulting days.
Then I read his articles in Windows NT magazine, which later had different names, and transformed into Windows IT Pro. Most memorable was “This Old Resource Kit”, which was often in the back of the magazine, and the article I always flipped to first. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;If you don’t know who Mark Minasi is, then you don’t know Windows.&lt;/p&gt;
&lt;p&gt;Before I knew Mark personally, I would regularly encounter his books when I went from business to business during my old NT 3.5, 4.0 then Active Directory Consulting days.&lt;/p&gt;
&lt;p&gt;Then I read his articles in Windows NT magazine, which later had different names, and transformed into Windows IT Pro. Most memorable was “This Old Resource Kit”, which was often in the back of the magazine, and the article I always flipped to &lt;i&gt;first&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;I first met Mark when I was doing some occasional writing for Windows NT Magazine and got my first “professional shot” to speak at a big time IT Pro conference. Mark and I were scheduled to speak back-to-back; Mark first, me second. Nothing to worry about there !&lt;/p&gt;
&lt;p&gt;But there was a problem ! Not only was I going on directly after the best selling author and world class speaker Mark Minasi… but more importantly, our material overlapped a little bit. I wanted to coordinate material so the audience wouldn’t throw things at me.&lt;/p&gt;
&lt;p&gt;So without knowing him really, at all, I found his business phone number, talked with his assistant, and she said Mark would call me back later that day.&lt;/p&gt;
&lt;p&gt;And he did !&lt;/p&gt;
&lt;p&gt;I think my brain froze up during that phone call. Here was this bestselling author talking to this totally unknown “Kid” (which by the way he would later call me “Kid” for YEARS.. really, literally, years.) From what I remember, we talked about our material decided some overlap was totally a-ok, and that was that. I can’t remember if the call was 15 minutes long or 2 hours long but I know he took the time he needed with me.&lt;/p&gt;
&lt;p&gt;Months later at the big IT Conference, where I was scheduled to speak for my very first time… there he was. On stage. In. Front. Of. All. Those. People.&lt;/p&gt;
&lt;p&gt;And I was next.&lt;/p&gt;
&lt;p&gt;And if you don’t know Mark, his delivery is amazing, flawless, personal, engaging, technical, and relevant.&lt;/p&gt;
&lt;p&gt;He was everything I wanted to grow up to be.&lt;/p&gt;
&lt;p&gt;I was completely floored.&lt;/p&gt;
&lt;p&gt;And then.. when his talk was over. It was my turn. On stage. In. Front. Of. All. Those. People.&lt;/p&gt;
&lt;p&gt;And Mark. In the front row.&lt;/p&gt;
&lt;p&gt;With. All. Those. People.&lt;/p&gt;
&lt;p&gt;And I did.. fine. Not “Mark quality awesome.” But.. perfectly fine. In fact, for my first time out in the big leagues, pretty well.&lt;/p&gt;
&lt;p&gt;After the talk, Mark took me aside and we had a little chat. He gave me a few tips, notes and pointers which was amazing to get from the Master.&lt;/p&gt;
&lt;p&gt;He knew about my couple of articles in Windows NT Magazine and asked if I wanted to write a book in his new “series” of “Mark Minasi Presents” books. And after we talked for a little bit, we landed on the right topic: Group Policy, Profiles and IntelliMirror.&lt;/p&gt;
&lt;p&gt;The three things I knew best. (Tip, if you want to see the original cover, check out this link on Amazon: &lt;a href=&quot;https://www.amazon.com/Profiles-IntelliMirror-Windows-Administrator-Library/dp/0782144470&quot;&gt;https://www.amazon.com/Profiles-IntelliMirror-Windows-Administrator-Library/dp/0782144470&lt;/a&gt; )&lt;/p&gt;
&lt;p&gt;I wrote the book, it became a bestseller, and it launched me into GPanswers.com, my training classes, then later to found PolicyPak Software.&lt;/p&gt;
&lt;p&gt;In other words, because Mark believed in me, he helped me become the person I wanted to become and get to help thousands and thousands of administrators just like you.&lt;/p&gt;
&lt;p&gt;Mark would go on to become a very close personal friend, offering guidance from business to personal matters, and has been a terrific sounding board, and was I honored to have Mark at my wedding.&lt;/p&gt;
&lt;p&gt;In short: Mark was my personal mentor, and I couldn’t have been “Jeremy” without Mark helping me along the way.&lt;/p&gt;
&lt;p&gt;I’ve seen Mark speak now, live, more than I can remember. I can remember attending his multi-day seminars at least three times, maybe it was four. And then seeing him speak at little, medium, and big events: Mark is a professional machine at speaking, entertaining and making sure the material sticks.&lt;/p&gt;
&lt;p&gt;I will continue to be talking at events, small, medium and large, and hope to take a piece of Mark with me on stage whenever I do.&lt;/p&gt;
&lt;p&gt;Thank you Mark for helping thousands of IT admins be just plain better at their jobs. No one will ever be a better “explainer” than you. You’re the highest standard I know.&lt;/p&gt;
&lt;p&gt;And thanks for taking a personal touch with me and help transform me from Kid to, well, whatever I am now. J&lt;/p&gt;
&lt;p&gt;PS: That all being said, if you KNOW Mark really well, and want to go in the wayback machine to a time even before I knew him, check out these crazy videos:&lt;/p&gt;
&lt;p&gt;–   &lt;a href=&quot;https://www.youtube.com/watch?v=wq-OPbKSvGg&quot;&gt;https://www.youtube.com/watch?v=wq-OPbKSvGg&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;–   &lt;a href=&quot;https://www.youtube.com/watch?v=UhM2amh5vI0&quot;&gt;https://www.youtube.com/watch?v=UhM2amh5vI0&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;–   &lt;a href=&quot;https://www.youtube.com/watch?v=ZsWM7ebIqag&quot;&gt;https://www.youtube.com/watch?v=ZsWM7ebIqag&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;PPS: Mark is still tweeting at @mminasi so, do be sure to follow him !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Goodbye Security Compliance Manager, Hello Security Compliance Toolkit </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/goodbye-security-compliance-manager-hello-security-compliance-toolkit</link>
        <pubDate>2017-06-20T20:39:21+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Just in time for my next GP class, Microsoft announced the end of road for the &amp;ldquo;Security Compliance Manager.&amp;rdquo;

But they also say Hello to the Security Compliance Toolkit. Here&amp;rsquo;s the quick blog entry from my Microsoft pal Aaron Margosis:

https://blogs.technet.microsoft.com/secguide/2017/06/15/security-compliance-manager-scm-retired-new-tools-and-procedures/

So.. OK Got it. And I&amp;rsquo;m feverishly updating my GP Master Class to bring this new toolkit to you.

What&amp;rsqu ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Just in time for my next GP class, Microsoft announced the end of road for the “Security Compliance Manager.”&lt;/p&gt;

&lt;p&gt;But they also say Hello to the Security Compliance Toolkit. Here’s the quick blog entry from my Microsoft pal Aaron Margosis:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/secguide/2017/06/15/security-compliance-manager-scm-retired-new-tools-and-procedures/&quot;&gt;https://blogs.technet.microsoft.com/secguide/2017/06/15/security-compliance-manager-scm-retired-new-tools-and-procedures/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So.. OK Got it. And I’m feverishly updating my GP Master Class to bring this new toolkit to you.&lt;/p&gt;

&lt;p&gt;What’s that? Don’t know what the Security Compliance Manager DID .. or how to make the MOST of the Security Compliance Toolkit for Group Policy?&lt;/p&gt;

&lt;p&gt;Well, NO PROBLEM .. Just COME to my Group Policy Master Class.. !! July 24-26 (Three days) and get a brainfull in North Carolina with other super-duper Admin smarty pants’s (pantses?)&lt;/p&gt;

&lt;p&gt;We still have “front row” seats available.. (I dont really care where you sit in the class.. just SHOW UP!)&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/training/sign-up-now-live/&quot;&gt;Sign up now (Live Training)&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Don’t get snaked out of getting your seat.&lt;/p&gt;

&lt;p&gt;Sharpen your saw.. and be more EFFECTIVE at running your company’s world.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/training/sign-up-now-live/&quot;&gt;Sign up now (Live Training)&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;See you in class. !!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Kill more SMB using Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/kill-more-smb-using-group-policy</link>
        <pubDate>2017-06-18T19:31:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Item 1 (in case yo missed it.):
Which wacky NAS and SAN and whatever.. items STILL use SMB1 and.. well.. oh well.. sorry. ?
At least there’s this nice list!
https://blogs.technet.microsoft.com/filecab/2017/06/01/smb1-product-clearinghouse/
Item 2:
Annnnd.. another awesome article on how to use Group Policy to SMB1.. by my pal and Microsoft employee and security expert.. Aaron Margosis !
https://blogs.technet.microsoft.com/secguide/2017/06/15/disabling-smbv1-through-group-policy/ ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Item 1 (in case yo missed it.):&lt;/p&gt;
&lt;p&gt;Which wacky NAS and SAN and whatever.. items STILL use SMB1 and.. well.. oh well.. sorry. ?&lt;br&gt;
At least there’s this nice list!&lt;br&gt;
&lt;a href=&quot;https://blogs.technet.microsoft.com/filecab/2017/06/01/smb1-product-clearinghouse/&quot;&gt;https://blogs.technet.microsoft.com/filecab/2017/06/01/smb1-product-clearinghouse/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Item 2:&lt;br&gt;
Annnnd.. another awesome article on how to use Group Policy to SMB1.. by my pal and Microsoft employee and security expert.. Aaron Margosis !&lt;br&gt;
&lt;a href=&quot;https://blogs.technet.microsoft.com/filecab/2017/06/01/smb1-product-clearinghouse/&quot;&gt;https://blogs.technet.microsoft.com/secguide/2017/06/15/disabling-smbv1-through-group-policy/&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> XenServer, vCenter and vSphere all require SMB V1... so, I WannaCry. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/xenserver-vcenter-and-vsphere-all-require-smb-v1-so-i-wannacry</link>
        <pubDate>2017-06-06T18:55:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft Posted a HUGE list of products which still have SMB1. Here’s the MEGA LIST.
Then I also just got this email from my pal Webster who runs the famous Citrix-focused blog “The Accidental Citrix Admin” blog over at&amp;nbsp;http://carlwebster.com/
If &amp;nbsp;Webster got zapped, you might get zapped too. Here’s the note:
”
I disabled SMB V1 on both of my Synology NAS units.
I run both vSphere 6.5 and XenServer 7.1 in my lab.
Everything was fine since all the hosts already had conn ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Microsoft Posted a HUGE list of products which still have SMB1. &lt;a href=&quot;https://blogs.technet.microsoft.com/filecab/2017/06/01/smb1-product-clearinghouse&quot;&gt;Here’s the MEGA LIST.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Then I also just got this email from my pal Webster who runs the famous Citrix-focused blog “The Accidental Citrix Admin” blog over at &lt;a href=&quot;http://carlwebster.com/&quot;&gt;http://carlwebster.com/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If  Webster got zapped, you might get zapped too. Here’s the note:&lt;/p&gt;
&lt;p&gt;”&lt;/p&gt;
&lt;p&gt;I disabled SMB V1 on both of my Synology NAS units.&lt;/p&gt;
&lt;p&gt;I run both vSphere 6.5 and XenServer 7.1 in my lab.&lt;/p&gt;
&lt;p&gt;Everything was fine since all the hosts already had connected to all their storage.&lt;/p&gt;
&lt;p&gt;Before I left for three back-to-back conferences, I shutdown EVERYTHING in my lab.&lt;/p&gt;
&lt;p&gt;All nine servers, both Synology NAS units, my laptops, tablets, and switch.&lt;/p&gt;
&lt;p&gt;Ten days later, I come home and power everything back on. Guess what? None of the hosts would work.&lt;/p&gt;
&lt;p&gt;Guess who REQUIRES SMB V1 to work? Both Citrix XenServer and VMware vCenter and vSphere.&lt;/p&gt;
&lt;p&gt;After re-enabling SMB V1 on both NAS units, I had to destroy all storage connections and re-create them to get them to reattach. Six wasted hours. A simple Google search BEFORE disabling SMB V1 on my storage devices would have revealed numerous articles stating that XenServer, vCenter and vSphere all require SMB V1.&lt;/p&gt;
&lt;p&gt;SHEESH !!&lt;/p&gt;
&lt;p&gt;”&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> When using GP to disable SMB, it&#039;s BOWSER, not BROWSER </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/when-using-gp-to-disable-smb-its-bowser-not-browser</link>
        <pubDate>2017-06-05T02:11:14+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I got this letter in the ol&amp;rsquo; inbox. &amp;nbsp;I got explicit permission to share it with you from it&amp;rsquo;s author, with name included. A true warrior is one who makes mistakes, takes ownership of those mistakes, and then shares those mistakes with the world to make it a better place.

Steven Stein, my hat is off to you. Here&amp;rsquo;s Steve&amp;rsquo;s letter to me, which I hope helps you out if you plan to kill SMB using GP using my previous post&amp;rsquo;s links.

-email below-

To my fave GP ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I got this letter in the ol’ inbox.  I got explicit permission to share it with you from it’s author, with name included. A true warrior is one who makes mistakes, takes ownership of those mistakes, and then shares those mistakes with the world to make it a better place.&lt;/p&gt;

&lt;p&gt;Steven Stein, my hat is off to you. Here’s Steve’s letter to me, which I hope helps you out if you plan to kill SMB using GP using my previous post’s links.&lt;/p&gt;

&lt;p&gt;-email below-&lt;/p&gt;

&lt;p&gt;To my fave GP guy who I try to avoid bothering with useless trivia:   Here is &lt;strong&gt;major&lt;/strong&gt; “How could I be so stupid” accident waiting to happen, and I made it happen re disabling SMB1 using GP.  To myself.  At a client.  Sheesh.&lt;/p&gt;

&lt;p&gt;In the instructions, it states to  enter the following Value Data into the “DependendOnService” key – part of disabling (actually NOT enabling) SMB10:  &lt;strong&gt;“Bowser”&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I knew this was to “enable the &lt;strong&gt;B&lt;/strong&gt;&lt;strong&gt;r&lt;/strong&gt;&lt;strong&gt;owser&lt;/strong&gt;” service and though my eyes saw “Bowser” at least a dozen time, my brain read “B&lt;strong&gt;r&lt;/strong&gt;owser” a dozen times and my fingers rolled off “Browser” …  all 12 times.  That mental typo rolled out to a test group of four machines.  And, all SMB was disabled on each target.  No browser service, no contacting Sysvol, no mapped drives, no group policy to fix the mental typo.  Not wonderful.&lt;/p&gt;

&lt;p&gt;Knowing it would fail, I fixed the GPO and tried to run it.  Anyway.      . . . . Since sysvol was unreachable, the repaired GPO couldn’t be reached.  So, had to manually edit the typo in each registry.  Fortunately, there were only four.&lt;/p&gt;

&lt;p&gt;You may want to perform your usual saintly magic and keep a few other folks from getting themselves into a real pickle – like manually editing 10,000 registry entries????&lt;/p&gt;

&lt;p&gt;Regards – and keep up the good work.&lt;/p&gt;

&lt;p&gt;Steven R. Stein – CCNA, MCSE, VCP&lt;/p&gt;

&lt;p&gt;Sr. Systems Engineer&lt;/p&gt;

&lt;p&gt;”&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Prevent Wannacry using Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/prevent-wannacry-using-group-policy</link>
        <pubDate>2017-05-30T14:50:52+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In the effort of &amp;ldquo;not repeating excellent work of others&amp;rdquo; &amp;hellip; here are two articles to help you turn off SMB 1 via Group Policy:


	https://blogs.technet.microsoft.com/staysafe/2017/05/17/disable-smb-v1-in-managed-environments-with-ad-group-policy/&amp;nbsp;
	http://www.grouppolicy.biz/2017/03/how-to-disable-smb-1-on-windows-7-via-group-policy/&amp;nbsp;


It doesn&amp;rsquo;t take much, and you should do it.. yesterday.

You should also start thinking about how to block attacks th ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In the effort of “not repeating excellent work of others” … here are two articles to help you turn off SMB 1 via Group Policy:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/staysafe/2017/05/17/disable-smb-v1-in-managed-environments-with-ad-group-policy/ &quot; target=&quot;_blank&quot;&gt;https://blogs.technet.microsoft.com/staysafe/2017/05/17/disable-smb-v1-in-managed-environments-with-ad-group-policy/ &lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/staysafe/2017/05/17/disable-smb-v1-in-managed-environments-with-ad-group-policy/ &quot; target=&quot;_blank&quot;&gt;http://www.grouppolicy.biz/2017/03/how-to-disable-smb-1-on-windows-7-via-group-policy/ &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It doesn’t take much, and you should do it.. yesterday.&lt;/p&gt;

&lt;p&gt;You should also start thinking about how to block attacks that users themselves (or even slightly tired IT people) can click upon and wreck their networks.&lt;/p&gt;

&lt;p&gt;I humbly suggest you check out PolicyPak Least Privilege Manager and our SecureRun feature. Here are two videos showing you you could have prevented the attack in the firstplace:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href=&quot;https://www.policypak.com/video/stop-cryptolocker-and-other-unknown-zero-day-attacks-with-policypak-secureruntm.html&quot; target=&quot;_blank&quot;&gt;https://www.policypak.com/video/stop-cryptolocker-and-other-unknown-zero-day-attacks-with-policypak-secureruntm.html &lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;https://www.policypak.com/video/policypak-elevate-scripts-and-java-jar-files.html &quot; target=&quot;_blank&quot;&gt;https://www.policypak.com/video/policypak-elevate-scripts-and-java-jar-files.html &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        </content:encoded>
    </item>
        <item>
        <title> EMET is gone for Windows 10. Here&#039;s what to do next. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/emet-is-gone-for-windows-10-heres-what-to-do-next</link>
        <pubDate>2017-04-25T15:02:02+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Very interesting and geeky article about how to use Group Policy in Windows 10 to prevent memory attacks. The kind that EMET on Windows 7 provided, but is not available anymore for Windows 10.

Here&amp;rsquo;s the article at Microsoft. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Very interesting and geeky article about how to use Group Policy in Windows 10 to prevent memory attacks. The kind that EMET on Windows 7 provided, but is not available anymore for Windows 10.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/askpfeplat/2017/04/24/windows-10-memory-protection-features/&quot; target=&quot;_blank&quot;&gt;Here’s the article at Microsoft&lt;/a&gt;.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What&#039;s new in ADMX and Group Policy for Windows 1703 Creators Edition </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/whats-new-in-admx-and-group-policy-for-windows-1703-creators-edition</link>
        <pubDate>2017-04-18T14:06:15+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The new ADMX files are ready for download. You can get them here from Microsoft:&amp;nbsp;https://www.microsoft.com/en-us/download/details.aspx?id=55080

Here&amp;rsquo;s my (usual) advice:

1. If you don&amp;rsquo;t have a central store, please first watch this video I made on it.

2. If you already have a central store, leave what&amp;rsquo;s already there, and then overwrite anything NEW from the download on top of what you ALREADY have.

3. Install these ADMX files&amp;hellip; even if you have no Window ]]>
        </description>
        <content:encoded>
            &lt;p&gt;The new ADMX files are ready for download. You can get them here from Microsoft: &lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=55080&quot; target=&quot;_blank&quot;&gt;https://www.microsoft.com/en-us/download/details.aspx?id=55080&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here’s my (usual) advice:&lt;/p&gt;

&lt;p&gt;1. If you don’t have a central store, &lt;a href=&quot;https://www.youtube.com/watch?v=Q4DBdQo4XZs&quot; target=&quot;_blank&quot;&gt;please first watch this video I made&lt;/a&gt; on it.&lt;/p&gt;

&lt;p&gt;2. If you already have a central store, leave what’s already there, and then overwrite anything NEW from the download on top of what you ALREADY have.&lt;/p&gt;

&lt;p&gt;3. Install these ADMX files… even if you have no Windows 10 at all, and/or even if you have no Windows 10 1703. Just.. use them.&lt;/p&gt;

&lt;p&gt;4. Is this advice perfect for everyone? No; but for 99.98% of people, it’s the right thing. To see more on this idea, see this great blog entry from Kai O. from Microsoft:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/grouppolicy/2016/10/12/admx-version-history/&quot;&gt;https://blogs.technet.microsoft.com/grouppolicy/2016/10/12/admx-version-history/&lt;/a&gt;  . Note: This isn’t updated yet for 1703, but hopefully soon.&lt;/p&gt;

&lt;p&gt;&lt;Note: For more on this, I cover it in un-believable detail in my live training class: &lt;a href=&quot;https://www.gpanswers.com/training&quot; target=&quot;_blank&quot;&gt;www.GPanswers.com/training&lt;/a&gt;.)&lt;/p&gt;

&lt;p&gt;If you want to know WHAT IS NEW in Group Policy for Windows 1703 Creator’s Edition, I have a list of those here.&lt;/p&gt;

&lt;p&gt;There are 107 new policy settings.&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;Scope&lt;/td&gt;
			&lt;td&gt;Policy Path&lt;/td&gt;
			&lt;td&gt;Policy Setting&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Control Panel&lt;/td&gt;
			&lt;td&gt;Settings Page Visibility&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Network\Network Isolation&lt;/td&gt;
			&lt;td&gt;Domains categorized as both work and personal&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Network\Network Isolation&lt;/td&gt;
			&lt;td&gt;Enterprise resource domains hosted in the cloud&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;System\App-V\PackageManagement&lt;/td&gt;
			&lt;td&gt;Enable automatic cleanup of unused appv packages&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;System\App-V\PowerManagement&lt;/td&gt;
			&lt;td&gt;Enable background sync to server when on battery power&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;System\Credentials Delegation&lt;/td&gt;
			&lt;td&gt;Remote host allows delegation of non-exportable credentials&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;System\Display&lt;/td&gt;
			&lt;td&gt;Turn off GdiDPIScaling for applications&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;System\Display&lt;/td&gt;
			&lt;td&gt;Turn on GdiDPIScaling for applications&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;System\Group Policy&lt;/td&gt;
			&lt;td&gt;Configure web-to-app linking with app URI handlers&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;System\Logon&lt;/td&gt;
			&lt;td&gt;Configure Dynamic Lock&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;System\Trusted Platform Module Services&lt;/td&gt;
			&lt;td&gt;Configure the system to use legacy Dictionary Attack Prevention Parameters setting for TPM 2.0.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\App Privacy&lt;/td&gt;
			&lt;td&gt;Let Windows apps access diagnostic information about other apps&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\App Privacy&lt;/td&gt;
			&lt;td&gt;Let Windows apps access Tasks&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\App Privacy&lt;/td&gt;
			&lt;td&gt;Let Windows apps run in the background&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\BitLocker Drive Encryption&lt;/td&gt;
			&lt;td&gt;Disable new DMA devices when this computer is locked&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\BitLocker Drive Encryption\Operating System Drives&lt;/td&gt;
			&lt;td&gt;Allow devices compliant with InstantGo or HSTI to opt out of pre-boot PIN.&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Data Collection and Preview Builds&lt;/td&gt;
			&lt;td&gt;Configure Authenticated Proxy usage for the Connected User Experience and Telemetry service&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Delivery Optimization&lt;/td&gt;
			&lt;td&gt;Allow uploads while the device is on battery while under set Battery level (percentage)&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Delivery Optimization&lt;/td&gt;
			&lt;td&gt;Enable Peer Caching while the device connects via VPN&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Delivery Optimization&lt;/td&gt;
			&lt;td&gt;Minimum disk size allowed to use Peer Caching (in GB)&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Delivery Optimization&lt;/td&gt;
			&lt;td&gt;Minimum Peer Caching Content File Size (in MB)&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Delivery Optimization&lt;/td&gt;
			&lt;td&gt;Minimum RAM capacity (inclusive) required to enable use of Peer Caching (in GB)&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Find My Device&lt;/td&gt;
			&lt;td&gt;Turn On/Off Find My Device&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Content Page&lt;/td&gt;
			&lt;td&gt;Show Content Advisor on Internet Options&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Internet Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Restricted Sites Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Restricted Site Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft account&lt;/td&gt;
			&lt;td&gt;Block all consumer Microsoft account user authentication&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Allow Address bar drop-down list suggestions&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Allow Adobe Flash&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Allow clearing browsing data on exit&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Allow Microsoft Compatibility List&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Allow search engine customization&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Configure additional search engines&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Configure the Adobe Flash Click-to-Run setting&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Disable lockdown of Start pages&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Keep favorites in sync between Internet Explorer and Microsoft Edge&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Prevent the First Run webpage from opening on Microsoft Edge&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Set default search engine&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Speech&lt;/td&gt;
			&lt;td&gt;Allow Automatic Update of Speech Data&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender Antivirus\MpEngine&lt;/td&gt;
			&lt;td&gt;Configure extended cloud check&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender Antivirus\MpEngine&lt;/td&gt;
			&lt;td&gt;Select cloud protection level&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender Antivirus\Reporting&lt;/td&gt;
			&lt;td&gt;Turn off enhanced notifications&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender Application Guard&lt;/td&gt;
			&lt;td&gt;Block Entperise websites to load non-Enterprise content in IE and Edge&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender Application Guard&lt;/td&gt;
			&lt;td&gt;Configure Windows Defender Application Guard clipboard settings&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender Application Guard&lt;/td&gt;
			&lt;td&gt;Configure Windows Defender Application Guard Print Settings&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender Application Guard&lt;/td&gt;
			&lt;td&gt;Turn On/Off Windows Defender Application Guard (WDAG)&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender SmartScreen\Explorer&lt;/td&gt;
			&lt;td&gt;Configure App Install Control&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender SmartScreen\Explorer&lt;/td&gt;
			&lt;td&gt;Configure Windows Defender SmartScreen&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender SmartScreen\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Configure Windows Defender SmartScreen&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender SmartScreen\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Prevent bypassing Windows Defender SmartScreen prompts for files&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender SmartScreen\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Prevent bypassing Windows Defender SmartScreen prompts for sites&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Game Recording and Broadcasting&lt;/td&gt;
			&lt;td&gt;Enables or disables Windows Game Recording and Broadcasting&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Hello for Business&lt;/td&gt;
			&lt;td&gt;Use certificate for on-premises authentication&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Update&lt;/td&gt;
			&lt;td&gt;Configure auto-restart reminder notifications for updates&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Update&lt;/td&gt;
			&lt;td&gt;Configure auto-restart required notification for updates&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Update&lt;/td&gt;
			&lt;td&gt;Configure auto-restart warning notifications schedule for updates&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Update&lt;/td&gt;
			&lt;td&gt;Remove access to use all Windows Update features&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Update&lt;/td&gt;
			&lt;td&gt;Specify active hours range for auto-restarts&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Update&lt;/td&gt;
			&lt;td&gt;Specify deadline before auto-restart for update installation&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Update&lt;/td&gt;
			&lt;td&gt;Specify Engaged restart transition and notification schedule for updates&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Update&lt;/td&gt;
			&lt;td&gt;Turn off auto-restart notifications for update installations&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;Machine&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Update&lt;/td&gt;
			&lt;td&gt;Update Power Policy for Cart Restarts&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Start Menu and Taskbar&lt;/td&gt;
			&lt;td&gt;Show additional calendar&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Cloud Content&lt;/td&gt;
			&lt;td&gt;Do not use diagnostic data for tailored experiences&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Cloud Content&lt;/td&gt;
			&lt;td&gt;Turn off the Windows Spotlight on Action Center&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Cloud Content&lt;/td&gt;
			&lt;td&gt;Turn off the Windows Welcome Experience&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\IME&lt;/td&gt;
			&lt;td&gt;Turn on lexicon update&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Content Page&lt;/td&gt;
			&lt;td&gt;Show Content Advisor on Internet Options&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Intranet Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Local Machine Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Internet Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Intranet Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Local Machine Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Restricted Sites Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Locked-Down Trusted Sites Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Restricted Site Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Control Panel\Security Page\Trusted Sites Zone&lt;/td&gt;
			&lt;td&gt;Allow VBScript to run in Internet Explorer&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Internet Explorer\Internet Settings\Advanced settings\Browsing&lt;/td&gt;
			&lt;td&gt;Hide the button (next to the New Tab button) that opens Microsoft Edge&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Allow Address bar drop-down list suggestions&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Allow Adobe Flash&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Allow clearing browsing data on exit&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Allow Microsoft Compatibility List&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Allow search engine customization&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Configure additional search engines&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Configure the Adobe Flash Click-to-Run setting&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Disable lockdown of Start pages&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Keep favorites in sync between Internet Explorer and Microsoft Edge&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Prevent the First Run webpage from opening on Microsoft Edge&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Set default search engine&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender SmartScreen\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Configure Windows Defender SmartScreen&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender SmartScreen\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Prevent bypassing Windows Defender SmartScreen prompts for files&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Defender SmartScreen\Microsoft Edge&lt;/td&gt;
			&lt;td&gt;Prevent bypassing Windows Defender SmartScreen prompts for sites&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Hello for Business&lt;/td&gt;
			&lt;td&gt;Use certificate for on-premises authentication&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Windows Hello for Business&lt;/td&gt;
			&lt;td&gt;Use Windows Hello for Business&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;User&lt;/td&gt;
			&lt;td&gt;Windows Components\Work Folders&lt;/td&gt;
			&lt;td&gt;Enables the use of Token Broker for AD FS authentication&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Buy a laptop as a Regular Person (2016-2017 edition) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-buy-a-laptop-as-a-regular-person-2016-2017-edition</link>
        <pubDate>2016-11-25T20:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This is a yearly re-post / re-edit. It started in 2009 and has been updated yearly. This started out as a post to just my closest friends but has become one of my popular blog entries of all time. Heres my fully updated guide to end-of-year 2016 into 2017.

If you&amp;rsquo;re an IT geek like me, you&amp;rsquo;re often asked &amp;ldquo;What kind of laptop should I buy?&amp;rdquo;

If you&amp;rsquo;re NOT an IT geek, you&amp;rsquo;re likely asking an IT geek friend What kind of laptop should I buy?

 ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;em&gt;This is a yearly re-post / re-edit. It started in 2009 and has been updated yearly. This started out as a post to just my closest friends but has become one of my popular blog entries of all time. Heres my fully updated guide to end-of-year 2016 into 2017.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;If you’re an IT geek like me, you’re often asked “What kind of laptop should I buy?”&lt;/p&gt;

&lt;p&gt;If you’re NOT an IT geek, you’re likely asking an IT geek friend What kind of laptop should I buy?&lt;/p&gt;

&lt;p&gt;This is a guide for both of you.&lt;/p&gt;

&lt;p&gt;If you’re in IT, this question might not directly affect you, since many IT organizations dole out laptops to the whole staff, including you. However, since you’re seen walking around with a laptop, or have that geeky-vibe about you, I’m guessing you’ve been asked more than once “What kind of laptop should I buy?”&lt;/p&gt;

&lt;p&gt;You might be tempted to say “Buy a Macbook” – if only for the reason that you DON’T have a Macbook, and therefore would be unable to help the person in the future. (See this for the example of the problem: &lt;a href=&quot;http://theoatmeal.com/comics/computers&quot;&gt;http://theoatmeal.com/comics/computers&lt;/a&gt;) That being said, Macbooks are pretty awesome, and if you want to real work on a Macbook, you can do that. That’s just not the point of this article. This is about how to buy a Windows PC laptop. Macs are great, if you want to go there.&lt;/p&gt;

&lt;p&gt;If you’re NOT in IT, your problems are substantial too. If you ask three geeks, you might get THREE answers.&lt;/p&gt;

&lt;p&gt;With that in mind, here’s “Jeremy’s Guide to Buying a new PC-based Laptop in 2016-2017.” Again, there are a LOT of ways someone COULD do this task. This is what I send to people in my inner circle (friends, family, etc.) when I get the question.&lt;/p&gt;

&lt;p&gt;Seriously. I just email them a link to this blog entry, and .. I’m done.&lt;/p&gt;

&lt;p&gt;These suggestions should be “good enough” for the common man / woman / student for the foreseeable near term future. Any one person’s particular needs may vary, but you, the IT Pro, should be able to “print out and hand over” these suggestions and have them work for about 90+% of the people you come in contact with.&lt;/p&gt;

&lt;p&gt;If you’re NOT an IT geek, you’re looking at the Internet and catalogs and think that desktop and laptops could be “infinitely configured.”&lt;/p&gt;

&lt;p&gt;And you don’t have time for that. You want to get back to real work. So, here is a document you can send to anyone who has ever asked that question with some “straight dope answers.”&lt;/p&gt;

&lt;p&gt;Yes: This document is long. But, you want to make a GOOD decision which will last you the next 2-4 years, right? So, just read it. Really READ it. Then go shopping.&lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Jeremy’s Guide to Buying a new PC-based Laptop in 2016&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;We’re going to answer some questions here like:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Laptop or Ultrabook ?&lt;/li&gt;
	&lt;li&gt;Laptop or iPad or Surface (Windows Tablet)?&lt;/li&gt;
	&lt;li&gt;Should I get a $200 Windows laptop?&lt;/li&gt;
	&lt;li&gt;What is / should I get a Microsoft Surface?&lt;/li&gt;
	&lt;li&gt;What’s the deal with Android Tablets and Google Chromebook Laptops?&lt;/li&gt;
	&lt;li&gt;iPad Pro? Will that work for me?&lt;/li&gt;
	&lt;li&gt;Where can I get good deals?&lt;/li&gt;
	&lt;li&gt;What kind of hardware (and warranty) should I get?&lt;/li&gt;
	&lt;li&gt;Should I get Windows 10 or get Windows 7?&lt;/li&gt;
	&lt;li&gt;Should I get 32-bit or 64-bit?&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;Part I: Laptop, Ultrabook or Netbook ?&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;To make sure we all understand the marketing vocabulary you’re likely to encounter as you go to buy a machine:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Laptops: You know what a laptop is.&lt;/li&gt;
	&lt;li&gt;Ultrabook: Just like a laptop, but thinner and lighter.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For most people, they want Laptops. They’re mid priced, mid weight and have a full sized keyboard.&lt;/p&gt;

&lt;p&gt;If you pay a little more, you can get an Ultrabook, which is just like a laptop — except lighter.&lt;/p&gt;

&lt;p&gt;I think there are a ton of great options out there where you don’t have buy a HEAVY laptop, or buy an EXPENSIVE Ultrabook.&lt;/p&gt;

&lt;p&gt;Said another way, you can get a great laptop, which approaches the weight of an Ultrabook, at a “Laptop cost.”&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Part II:  Non-Windows tablets (iPad, Android, Chromebooks)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before we talk about ACTUAL laptops, let’s take a quick turn and chat about your “second” device.&lt;/p&gt;

&lt;p&gt;In fact, you might be thinking “Maybe I don’t need a laptop at all, and instead, I’ll just get an iPad, iPad Pro, or Chromebook.” And, what’s the deal with “Microsoft Surface?”&lt;/p&gt;

&lt;p&gt;In short, nothing beats a laptop for ACTUAL WORK.&lt;/p&gt;

&lt;p&gt;The iPad can be FORCED into a device that can help kinda-sorta help you do better at making ACTUAL WORK.&lt;/p&gt;

&lt;p&gt;There’s the iPad, iPad Mini and now the “jumbo” iPad Pro which.. is just a REALLY BIG iPad and pen with some specialty apps to help you try to do ACTUAL WORK.&lt;/p&gt;

&lt;p&gt;But honestly, I’ve tried a lot of stuff, and NOTHING BEATS A LAPTOP for ACTUAL WORK.&lt;/p&gt;

&lt;p&gt;For me, I tend to use my iPad Mini when on the airplane and on the road, watching movies and quick dash emails.&lt;/p&gt;

&lt;p&gt;The bonus of a laptop over an iPad is… its just better at creating and editing documents. Yes, you CAN create documents, deliver slideshows, or make a spreadsheet on an iPad. For me, when it comes to creating content, even simple emails… I need a keyboard. Yes, yes, you can get Bluetooth keyboards that sync with the iPad (and I have one), but still  the content creation software and experience isn’t the same as a Netbook, laptop or desktop.&lt;/p&gt;

&lt;p&gt;So, heres the verdict if you want a “Not Full Windows Machine”:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If I had real work to do, and had to only pick one travel machine for the next 5 years  sorry iPad, I’d have to go laptop.&lt;/li&gt;
	&lt;li&gt;If I’m sitting on a beach and want to read, game, surf or NetFlix.. I use my iPad.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;How about Android Tablets? Are those good choices?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Possibly. So, I’m (personally) not a huge fan of the current Android world. But I actually believe it’s a very personal choice / taste.&lt;/p&gt;

&lt;p&gt;But, I actually recognize I’m in the minority.&lt;/p&gt;

&lt;p&gt;That is, apparently more portable devices run Android than anything else out there. But I don’t own one, so I can’t personally recommend it.&lt;/p&gt;

&lt;p&gt;If you’ve got a friend with one, ask to play around on it. But even if I loved it, I’m not sure I’d want it as my only content-creation machine.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Whats the deal with the Google Chromebook Laptop?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Whew. This is a tough one. So, non-IT folks… stick with me here.&lt;/p&gt;

&lt;p&gt;Every year I get a lot of comments telling me that I don’t give Google Chromebooks enough “discussion.”&lt;/p&gt;

&lt;p&gt;Fine. Okay.. Here’s the Wall Street Journal article entitled “&lt;a href=&quot;http://www.wsj.com/articles/you-can-ditch-your-pc-now-1415570187&quot;&gt;You can ditch your PC now&lt;/a&gt;” which demonstrates for some people its possible to use a Chromebook for many (most) tasks.&lt;/p&gt;

&lt;p&gt;Google has a full size laptop running a thing called the Chrome OS.&lt;/p&gt;

&lt;p&gt;Heres the deal: It has no hard drive, and ALMOST everything you do is in the cloud. Meaning, really, that when you save stuff you’re saving to a website which stores your stuff for later access.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Does it run Windows applications? No.&lt;/li&gt;
	&lt;li&gt;Does it run Mac applications? No.&lt;/li&gt;
	&lt;li&gt;Does it run iPad apps? No.&lt;/li&gt;
	&lt;li&gt;Does it run Android apps? No.&lt;/li&gt;
	&lt;li&gt;Might you want one anyway? Possibly.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There are SOME things that can be downloaded then used offline without Internet access, but not too much.&lt;/p&gt;

&lt;p&gt;Where are these devices GREAT? In school (K-12) environments. They run Google apps and all the Google-y stuff you already use.&lt;/p&gt;

&lt;p&gt;So teachers just give ‘em to students and if they break? O well. There’s nothing stored on them anyway. Since the Internet is always on (usually) in the school, it makes a lot of sense there.&lt;/p&gt;

&lt;p&gt;For me, though, it’s not how I want to work. But some people can and do use a Google Chromebook is their “daily driver” for all things. But not me personally. I have several friends who love them and give them to their parents as their “daily driver” for all things.&lt;/p&gt;

&lt;p&gt;Okay: Back to laptops and Netbooks.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Part III: Which laptop brand should I get?&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Read this part first, before we get to the “Should I try really hard to get Windows 7 on my laptop” section. We’ll answer that in a minute.&lt;/p&gt;

&lt;p&gt;Okay: Here’s the thing about all laptops. All of them: basically, they’re all the same.&lt;/p&gt;

&lt;p&gt;Shocker, I know. But so are cars. They are all basically, almost exactly, 99% the same. Some of the “differences” might be:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Extra ports or USB 3.0 vs. USB 2.0.&lt;/li&gt;
	&lt;li&gt;One or two “video chips” (don’t get me started).&lt;/li&gt;
	&lt;li&gt;Keyboard twists / converts to make it a tablet.&lt;/li&gt;
	&lt;li&gt;Keyboard snaps off to make it a tablet.&lt;/li&gt;
	&lt;li&gt;Keyboard doesn’t exist at all (so it *IS* a tablet) and you ADD a keyboard.&lt;/li&gt;
	&lt;li&gt;Some are a little faster or a little slower.&lt;/li&gt;
	&lt;li&gt;Some are heavier. Others are lighter.&lt;/li&gt;
	&lt;li&gt;Some have BIG power supplies (which add to the overall weight of travel). Others have small wee ones.&lt;/li&gt;
	&lt;li&gt;Some are “bigger” and have a full sized keyboard. Others are smaller (Netbooks.)&lt;/li&gt;
	&lt;li&gt;Some laptops have touch screens, some do not.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But… again 99% of all laptops running Windows are EXACTLY the same guts and what they’re capable of.&lt;/p&gt;

&lt;p&gt;Since they all do the same basic thing, for the MAJORITY of “Joe and Jane users” you almost &lt;strong&gt;CANNOT GO WRONG&lt;/strong&gt; in buying a new laptop nowadays.&lt;/p&gt;

&lt;p&gt;This is going to sound totally weird, but my primary suggestion to prospective buyers of laptops and desktops is: &lt;strong&gt;UNDERSTAND THE WARRANTY&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;We’ll cover this in the next part of this talk.&lt;/p&gt;

&lt;p&gt;Of course, you’re also looking for a good deal. So, here are my top five &lt;strong&gt;deals&lt;/strong&gt; for anyone looking for a computer:&lt;/p&gt;

&lt;p&gt;1. &lt;strong&gt;New Dell Inspiron laptops.&lt;/strong&gt; They’re cheap, decent, fast, and have Dell’s warranty (again, more on this in a second.) &lt;a href=&quot;http://www.dell.com/p/inspiron-laptops-netbooks.aspx?c=us&amp;cs=04&amp;l=en&amp;s=bsd&amp;~ck=mn&quot;&gt;Click here to see them.&lt;/a&gt; I wouldn’t recommend _all_ of them. Some of them have the “wrong” processor type. (again, more on this in a second.) And this year, I’m recommending ONLY disks without moving parts (SSD) .. again, more on this in a bit.&lt;/p&gt;

&lt;p&gt;2. &lt;a href=&quot;http://www.dell.com/us/dfh/p/?cs=22&amp;c=us&amp;l=en&amp;s=dfh&amp;redirect=1&amp;dgc=IR&amp;cid=259637&amp;lid=4662700&quot;&gt;&lt;strong&gt;Dell Factory Outlet &lt;/strong&gt;&lt;/a&gt; This is Dell’s “island of lost toys.” This usually mans “Jane Doe couldn’t afford her new laptop for her son Johnny Doe after all, so she sent it back after 9 days of light use.” It doesn’t really mean “It was dropped, so it’s now crap.”  Even if it did, Dell still puts an original warranty on everything they sell there, which is the most important part of owning a laptop. I’ve literally bought 4 Dell laptops using the Outlet store.&lt;/p&gt;

&lt;p&gt;3. &lt;strong&gt;Tigerdirect.com and NewEgg.&lt;/strong&gt; They do sell new computers, but also “fell off the truck, if ya know what I mean”, off-lease (meaning, used) or are market closeouts in some way. But, holymoly.. lots and lots of awesome deals here. I promise you won’t find better deals than Tigerdirect. You will get the MOST bang for your buck, especially if you’re looking for something “higher end” at “lower cost.” But here’s the trick: Tigerdirect doesn’t warranty these. They’re always factory direct warranties whatever that means. And since they sell all brands, I don’t know what to tell you – even if you find a great deal. You’ll have to manually inspect the warranty yourself, call the company and see what their story is. Don’t expect Tigerdirect to help you when you have a problem. They sell it to you. They mail it to you. That’s the extent of your relationship.&lt;/p&gt;

&lt;p&gt;4. &lt;strong&gt;Retail:&lt;/strong&gt; Best Buy, hhGregg, Office Max, Office Depot, Staples: Even if they swore up and down that they had the most amazing warranty of all time, PLUS a killer deal  I still wouldn’t buy the computer and warranty from any of them. Plain and simple: There are KIDS working in these stores, and this is YOUR business / personal laptop. Sorry, but I can’t trust any of these outfits with my most precious business instrument. Not to mention that these kinds of stores turn over equipment types and makes and models so, so quickly. Will the kid behind the desk know what to do when you bring yours in from 1.5 years ago?&lt;/p&gt;

&lt;p&gt;5. &lt;strong&gt;Other Internet sites&lt;/strong&gt;: NewEgg.com, Buy.Com, Woot.com and others. Again almost always ONLY manufacturers warranty or some kind of 30-90 day only warranty. Again, not my cup of tea.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Part IV: Understanding the warranty (the most important part of your laptop.)&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Let’s talk about Dell, specifically, for a second though. Why have I, historically, always owned a Dell laptop?&lt;/p&gt;

&lt;p&gt;Simple. Their warranty is easy for my pea-brain to understand.&lt;/p&gt;

&lt;p&gt;Here’s how it works:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The default warranty is 1 year if something “dies.” Examples are: Power supply, screen goes blank, USB port dies, whatever. You call up. They try to fix it over the phone.&lt;/li&gt;
	&lt;li&gt;If it needs a part you can replace (ie: battery, mouse, removable DVD drive) they ship it to you; you replace it yourself. You put the broken part in a pre-paid box back to them, and drop it in the mail. You are done.&lt;/li&gt;
	&lt;li&gt;If it needs a part you can’t replace (laptop screen, motherboard) the part is shipped “overnight” to a “regional center.” Then when the part arrives, the center calls you and you schedule a time to get your machine fixed.&lt;/li&gt;
	&lt;li&gt;For a little extra money when you buy your laptop, you can get 3 years on-site (ie: they come to you) coverage.&lt;/li&gt;
	&lt;li&gt;For a little “extra extra”, you can get “I spilled coffee directly in it”, “I dropped it hard on a marble floor” or “I dropped it in a lake” insurance, which will cover things like that. Really. At least that’s what they say.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now.. with that said: I, with my pea-brain, can understand this warranty structure, and can embrace what it means.&lt;/p&gt;

&lt;p&gt;To be clear: This warranty structure doesn’t mean “my problem will be fixed in 24 hours.” (Especially on a Thursday or Friday.)&lt;/p&gt;

&lt;p&gt;It means: “We (Dell) spring to action right away… If you called us with your problem after 2.00 PM or so, then we’re going to miss Mr. DHL delivery dude for today. So, we’ll have to ship it tomorrow then it will (usually) get to the local repair depot the next business (shipping) day. And when it arrives, then you’ll get a call. Only after the part arrives at the local depot center, will we call you and schedule an appointment for up to 24 hours after that.”&lt;/p&gt;

&lt;p&gt;That’s the deal.&lt;/p&gt;

&lt;p&gt;So don’t expect your warranty coverage to mean “your problem will be fixed within 24 hours.” Expect them to get started on your problem right away and have it fixed 24 hours AFTER the part is in the hands of the depot.&lt;/p&gt;

&lt;p&gt;So, because I ‘get’ the deal, I usually recommend Dell. It’s the warranty-devil I know, and I’m totally cool with that deal.&lt;/p&gt;

&lt;p&gt;That said, I always recommend Dells to Joes and Janes when they ask me what laptop to get because:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;99% of the any laptop you get is exactly the same and&lt;/li&gt;
	&lt;li&gt;I can EXPLAIN the warranty to them and ..&lt;/li&gt;
	&lt;li&gt;They can decide if that’s what they want.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I cannot OVER-EMPHASIZE how important &lt;strong&gt;UNDERSTANDING&lt;/strong&gt; your laptop’s warranty and restrictions are. This is &lt;strong&gt;literally&lt;/strong&gt;, the #1 factor you should choose in buying a laptop.&lt;/p&gt;

&lt;p&gt;Again: I’ve described Dell’s warranty service above. If you want to check out &lt;strong&gt;other&lt;/strong&gt; manufacturer’s warranties, great. I’m just giving you my personal experience with Dell and warranties.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Part V: “How much laptop do I, a regular person, need?”&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;If you’re planning on: Surfing, Facebook, using Microsoft Office, Google Docs, Gmail, Hotmail, Office 365, NetFlix, Skype and other usual stuff you’ve got what I call “modest needs.”&lt;/p&gt;

&lt;p&gt;If you’re running some high powered stuff  like Quark, World Of Warcraft (or other high end games), Final Cut, Movie Maker, VMware Workstation, HyperV, Autocad, Camtasia Studio or Mathemetica, you might need more than what I’ve listed here.&lt;/p&gt;

&lt;p&gt;Now, before we get into this, there’s a handful of.. holycow.. NEW $200 full Windows laptops out there. (&lt;a href=&quot;http://www.wsj.com/articles/hp-stream-11-review-a-200-windows-laptop-thats-worth-the-price-1417546863&quot;&gt;Here’s a Wall Street Journal Entry on them.&lt;/a&gt;) But … they FAIL the “sniff test.” Read the article, then also read my discussion on Chip Type.. right here.&lt;/p&gt;

&lt;p&gt;So, here’s my answer for your “modest needs” person.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Chip type and speed:&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Heres the dirty little secret the laptop manufactures don’t want you to know: This almost doesnt matter. Or said another way, you almost cannot go wrong. Here are my suggestions:&lt;/p&gt;

&lt;p&gt;Intels chip lines are the Intel Core i3, i5 and i7s. The i3 is usually the best bang for the buck but I wouldn’t turn down the higher model i5s or i7s. Again, i3 (any speed) will be perfectly fine for almost anyone. Get the i5s if you can afford it. The i7s are almost certainly overkill for almost everyone.&lt;/p&gt;

&lt;p&gt;Avoid “Intel Celerons” at all costs. &lt;strong&gt;None are acceptable. Ever. This is why you don’t want to buy the $200 HP Stream 11 laptop .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt; See the above line: NEVER EVER buy a laptop with an Intel Celeron. &lt;strong&gt;EVER.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I would also avoid anything with Intel &lt;strong&gt;ATOM. &lt;/strong&gt;They’ll run all Windows apps. But slower. The PLUS side is that battery life is greater on these, but definitely slower than the Intel “i” series I mentioned above.&lt;/p&gt;

&lt;p&gt;Also:  Avoid all “gamer” laptops. Avoid due to the high price tag and low battery life and large power supply to lug around.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;RAM:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The new modern standard is 8GB. You could get away with 4GB likely just fine. But if if you had an extra $40, get 8GB over 4GB.&lt;/p&gt;

&lt;p&gt;Note that I am NOT recommending you get &lt;strong&gt;more&lt;/strong&gt; than 8GB for most modest-needs users. If you happen to get MORE than 8GB of RAM, bully for you, but you likely will never really need or use it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hard drive:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are three kinds of hard drives now: spinning disks (the kind we’ve had for years) and SSD disks which have no moving parts at all and hybrids which are spinning disks with some extra SSD stuff slapped on.&lt;/p&gt;

&lt;p&gt;The older spinning disks are still found in 50% of all laptops.&lt;/p&gt;

&lt;p&gt;I would avoid spinning disks at all costs now, and opt only for the SSD (which has no moving parts.) The catch however is that SSD disks are more expensive than older spinning disks (for the same amount of space.)&lt;/p&gt;

&lt;p&gt;Manufacturers used to only have small SSDs for some reason; now they’re finally getting their acts together and you can go pretty big.&lt;/p&gt;

&lt;p&gt;In short getting an SSD vs. spinning disks is going to be the greatest one thing you can do to make your laptop (even your old, crappy 3 year old laptop) feel insanely fast. More on SSD disks a little later.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Video card / chip:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Unless you’re playing games, it doesn’t matter.&lt;/p&gt;

&lt;p&gt;Really.&lt;/p&gt;

&lt;p&gt;Even if you’re planning on watching NetFlix or Hulu, those kinds of apps really don’t care about your video card much.&lt;/p&gt;

&lt;p&gt;Even on my super old crappy 6 year old Netbook, I am able to see full screen videos (wirelessly!) without any issue with a good network connection.&lt;/p&gt;

&lt;p&gt;Avoid laptops which tout “multiple” or “two” video chips. These give you extra headaches for almost NO VALUE to the mere mortal.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Screen Size / Resolution &amp; Touch:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Look for something with WXGA or WXGA+ resolution. This can mean 1280×720 and up, which is decent on a laptop.&lt;/p&gt;

&lt;p&gt;Some laptops don’t have touch screens. You might as well get a touch-enabled laptop, since things do appear to be getting “touch-ier.” That being said, as I write this year’s revised article, the two laptops I own; neither has a touch screen.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wireless Network Card:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most laptops now have built-in Wireless cards.&lt;/p&gt;

&lt;p&gt;You don’t have to get all worried if you don’t have the fastest wireless card.&lt;/p&gt;

&lt;p&gt;Ideally, look for one that has “n” in the spec, like 802.11n to get the fastest. Note that 802.11n isn’t actually the fastest thing out there. It’s actually 802.11AC but I think only a handful of laptop manufacturers put 802.11AC chips built into their notebooks (Asus being one of them).&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Part VI: Windows 7 vs. 10 &lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;So, let me start out by saying it’s really, really hard to get a new laptop WITHOUT Windows 10 on it.&lt;/p&gt;

&lt;p&gt;There really isn’t any compelling reason to get Windows 7 anymore anyway. Windows 10 is the “last” version of Windows, but it will constantly upgraded and updated with new features every few months.&lt;/p&gt;

&lt;p&gt;In short, you pretty much have to get it.. so just get it… UNLESS your business or school or something requires you to have Windows 7 and NOT Windows 10.&lt;/p&gt;

&lt;p&gt;But that being said, you will find at least Dell and some other manufacturers still putting Windows 7 onto new machines as an option (&lt;a href=&quot;http://www.dell.com/us/business/p/laptops#!facets=80770~0~16063830&amp;p=1&quot;&gt;click here&lt;/a&gt; for a list of SOME Dell machines with Windows 7 as an option.)&lt;/p&gt;

&lt;p&gt;So, you CAN get Windows 7 in lieu of Windows 10 if you wanted, but I wouldn’t.&lt;/p&gt;

&lt;p&gt;My advice for “normal people” would be to spring for a machine with one of the following operating systems:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Windows 10 Home Premium: If you’re never going to join an IT department’s domain.&lt;/li&gt;
	&lt;li&gt;Windows 10 Pro: If you’re possibly going to join an IT department’s domain.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Note: My geeky friends will notice neither Windows 10 Enterprise doesn’t appear on this list, because they are NOT sold with NEW machines are only available to IT departments.&lt;/p&gt;

&lt;p&gt;This chart is excellent to see what you get in which edition (left most columns): &lt;a href=&quot;https://en.wikipedia.org/wiki/Windows_10_editions&quot;&gt;https://en.wikipedia.org/wiki/Windows_10_editions &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note also that some new laptops might come with Windows 7 or Windows 8 or 8.1 pre-loaded. It depends on the manufacturer if you get “Windows 10 Ugprade rights.”&lt;/p&gt;

&lt;h3&gt;Part VII: &lt;strong&gt;32 bit vs 64 bit.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Most new machines you will get are 64-bit capable. 64-bit capable means you get two major benefits.&lt;/p&gt;

&lt;p&gt;Since most machines (laptops, not netbooks) you will buy nowadays are 64-bit capable, if you had an extra minute before clicking “buy now” I would check to ensure your new machine it’s 64-bit compatible and Windows 10 64-bit is pre-loaded.&lt;/p&gt;

&lt;p&gt;Okay  — why would you care?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Benefit #1: With 64-bit you can tap into all 4GB+ of memory you purchase. If you were to use the older 32-bit OS you will only see 3.2GB of your 4GB purchase. Weird, but that’s how it works.&lt;/li&gt;
	&lt;li&gt;Benefit #2: By and large, the computer will be “faster” than the exact same machine running a 32-bit operating system. Even though were talking about identical systems, the 64-bit is faster all around because it processes (many / most) things in 64-bit “chunks” as opposed to 32-bit “chunks.” So its overall, faster.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, in short, if you CAN get a 64-bit Windows 10 edition pre-loaded on your machine, I say “do it.”&lt;/p&gt;

&lt;p&gt;In the old days, there were driver problems with 64-bit editions.&lt;/p&gt;

&lt;p&gt;No more.&lt;/p&gt;

&lt;p&gt;If the machine comes pre-loaded with Windows 10 and has 64-bit support, you’re likely quite golden with regards to drivers. You could, maybe possibly have some problems with some of the stuff ATTACHED to your machine, like Printers and Scanners. But Windows 7 and 8′s drivers support is excellent and those drivers should work in Windows 10. It’s a rare (mostly modern) device that won’t work with Windows 64-bit. Note: some won’t, and that’s a possible 64-bit risk.&lt;/p&gt;

&lt;p&gt;For more information on 32 vs 64 bit support from Microsoft’s perspective, &lt;a href=&quot;http://windows.microsoft.com/en-us/windows/32-bit-and-64-bit-windows#1TC=windows-7&quot;&gt;read this&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;In short, for regular people, my advice is simple: Get Windows 10 (Home or Pro) 64-bit edition pre-loaded on your laptop if you want guaranteed success.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Where do I go next:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Again, your best bet for Price / Performance is the Dell Factory Outlet: &lt;a href=&quot;http://www.dell.com/outlet/&quot;&gt;http://www.dell.com/Outlet/&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;I found many, many, many under $600. Here’s an example available now as I write this:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Processor: Intel Core 5th Generation i3 Processor&lt;/li&gt;
	&lt;li&gt;Windows 10 (Home or Pro)&lt;/li&gt;
	&lt;li&gt;128 GB Solid State Drive&lt;/li&gt;
	&lt;li&gt;4GB DDR3L at 1600MHz&lt;/li&gt;
	&lt;li&gt;13.3 Inch HD (1366×768) LED-backlit Non-Touch Display&lt;/li&gt;
	&lt;li&gt;Intel HD Graphics&lt;/li&gt;
	&lt;li&gt;Dell Outlet Latitude Laptop&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Total price: $550&lt;/p&gt;

&lt;p&gt;Are these the best, lightest, fastest, crispest, nicest laptops you’re going to find? &lt;strong&gt;DEFINITELY NO&lt;/strong&gt;. But for MOST PEOPLE these laptops (and the warranty I explained earlier) are PERFECT for mere mortals.&lt;/p&gt;

&lt;p&gt;So, after this: everything else.. everything else.. is just bells and whistles when it comes to laptops.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You could argue that touch is becoming more and more important. But on a real LAPTOP, I don’t see it yet and I personally don’t use it yet. But if you really wanted touch, then… get one with touch. &lt;/p&gt;

&lt;p&gt;If you do want to go there, my only other big alternative might be a Microsoft Surface device. These are tablets that convert into laptops with snap-on keyboards (extra cost.) But the devices are amazingly built and very slick. You can go thru the myriad of options (again, this will be more expensive than other laptops, but you will almost certainly be happy with the experience.) &lt;a href=&quot;http://www.microsoftstore.com/store/msusa/en_US/cat/All-Surface/categoryID.69403400?icid=en_US_Store_UH_devices_Surface&quot;&gt;Anyway, check them out here&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Part VII: Wait.. you said Solid-State (SSD) disks were the best, why don’t I see those (sometimes) when I try to buy a new laptop?&lt;/h3&gt;

&lt;p&gt;Here’s a fact: Your computer is ONLY as fast as its SLOWEST part.&lt;/p&gt;

&lt;p&gt;Want to know what the slowest part is? The “spinning disk” hard drive. (Or “Hybrid” which is a spinning disk with SOME non-spinning stuff slapped on.)&lt;/p&gt;

&lt;p&gt;Remember: Most computer manufacturers are cheap. They want to make something cheap and sell you something that works. When you get it they want you to be REASONABLY happy enough NOT to send it back. Its also in their best interest to say “500GB hard drive” or “750GB Hard drive”. Sounds HUUUUGE. So, ”spinning disks” do the job. They’re cheap and plentiful.&lt;/p&gt;

&lt;p&gt;But, your spinning disk is holding you back.&lt;/p&gt;

&lt;p&gt;SSD disks are where the action is. Sometimes you cannot buy SSD disks with new systems (or if you do, you can only get the smaller ones.)&lt;/p&gt;

&lt;p&gt;Why? See point #1 above: Spinning disks are &lt;strong&gt;good enough&lt;/strong&gt;. So that’s what manufacturers sell. It won’t be like this forever. I suspect in the next year this will tip the other way to SSDs being normally available in bigger sizes.&lt;/p&gt;

&lt;p&gt;So, here’s the (counter-intuitive) recommendation if you want to maximize your new laptop and make it feel AWESOME / ZIPPY for the next several years. Note: There is a litttttttle risk and costs involved here. But I think its worth it. Here goes:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Buy your machine with the SMALLEST spinning disk hard drive you can. Usually the smallest is 320GB for laptops made.&lt;/li&gt;
	&lt;li&gt;Buy your own SSD. Buy the biggest you can afford. I have tested several brands, and can only hands-down recommend ONE manufacturer: Samsung.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Samsung has three “flavors” of SSD disks. But, for YOU the mere mortal, there’s only one: The Samsung EVO.  &lt;a href=&quot;http://www.amazon.com/Samsung-Electronics-EVO-Series-2-5-Inch-MZ-7TE120BW/dp/B00E3W15P0&quot;&gt;Here on Amazon&lt;/a&gt; it’s $80.99 for the 120GB version. (And you can select up to 1TB if you wanted for obviously more money.)&lt;/p&gt;

&lt;p&gt;In MOST cases (not all!) these drives come with a cable and software to MIGRATE the hard drive you HAVE onto the new platform. Always remember that in most cases, you need to be USING less space than you’re GOING to. (Be sure to read the details of your purchase CAREFULLY to ensure that your drive comes with a transfer cable if you want to do this yourself.)&lt;/p&gt;

&lt;p&gt;Anyway.. here’s an example:&lt;/p&gt;

&lt;p&gt;– Your new laptop comes with a 500GB hard drive.&lt;/p&gt;

&lt;p&gt;– Its using 20GB of space of that 500GB.&lt;/p&gt;

&lt;p&gt;You can then upgrade to the 120GB SSD because you’re only using 20GB of that space.&lt;/p&gt;

&lt;p&gt;Here’s another example:&lt;/p&gt;

&lt;p&gt;-Your laptop comes with 500GB hard drive.&lt;/p&gt;

&lt;p&gt;-You’re using 300GB of that space.&lt;/p&gt;

&lt;p&gt;You cannot shove 300GB of stuff into that 120GB SSD disk.&lt;/p&gt;

&lt;p&gt;Its usually pretty easy to then take out the OLD drive and throw in the NEW drive. If you’re UNCOMFORTABLE with all of this, you can pay someone at Best Buy or your local computer store to do all of this for you. Don’t pay more than $100 for the LABOR involved here.&lt;/p&gt;

&lt;p&gt;What do you do with the original drive you took out? &lt;a href=&quot;http://www.amazon.com/Inateck-External-Enclosure-Tool-free-FE2001/dp/B00DW374W4/ref=sr_1_1?s=electronics&amp;ie=UTF8&amp;qid=1448996692&amp;sr=1-1&amp;keywords=usb+3.0+external+hard+drive+case&quot;&gt;For $12 whole dollars on Amazon&lt;/a&gt;, you can put your ORIGINAL drive in a USB 3.0 case and reclaim that space as “spare” .. for pictures, videos, docs, whatever.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Part IX: What kind of laptop do you own, Jeremy?&lt;/strong&gt; &lt;strong&gt;(Here comes a little geekier stuff.)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Some of you may wonder what kind of laptop I am running?&lt;/p&gt;

&lt;p&gt;I use a laptop released in 2011 !! A Lenovo W520 with a four-core i7 processor and 1.5TB of SSD hard drive space (two SSD disks) and 32GB of RAM. It’s big and heavy and the power supply is .. just.. huge.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BUT REMEMBER: BUT I AM NOT A REGULAR PERSON.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I do live demonstrations in front of thousands of people and my laptop has to FLY.&lt;/p&gt;

&lt;p&gt;I have another machine which is a Lenovo X260 running Windows 10 64-bit with 16GB of RAM and 512GB SSD disk, and its totally fantastic to represent my “mere mortal machine”.&lt;/p&gt;

&lt;p&gt;I can hear you now: “But what about Dell? You reference Dell like 80 times in this article. Didn’t you basically tell me to buy a Dell?”&lt;/p&gt;

&lt;p&gt;Yes, I did.&lt;/p&gt;

&lt;p&gt;I recommend Dell for &lt;strong&gt;most &lt;/strong&gt;people. I needed some special stuff that I could only get with a Lenovo.&lt;/p&gt;

&lt;p&gt;Remember: I’m an IT guy who does hard core demonstrations, so my needs are greater than some others. I need 32GB of RAM in my laptop, and SATA III and a lot lot more. Why the W520, specifically, and not another Lenovo (or Dell for that matter.)&lt;/p&gt;

&lt;p&gt;So, Lenovo (and a handful of others) are using new faster guts called Sandy Bridge which is the stuff between the Intel chips and the hard drives. Its the stuff that moves data between the main processor and, well, everything else. And Sandy Bridge laptops are super slick and fast  provided you jam in a super fast hard drive. For the geeks out there, Sandy Bridge laptops can take SATA III disks which are stupid-fast. So, Ive decided for my W520 with an Core i7 and also decided to splurge and get (crazy, I know) a 1TB SSD SATA III disk. (Note: Geeky people will also know that something NEWER than Sandy Bridge is out called Haswell. Except it’s not all that much faster as evidenced &lt;a href=&quot;http://www.itworld.com/hardware/365695/sandy-bridge-haswell-upgrade-wont-blow-your-hair-back&quot;&gt;in this article&lt;/a&gt;.)&lt;/p&gt;

&lt;p&gt;Anyway.. no kidding: the SSD drive I purchased &lt;strong&gt;literally&lt;/strong&gt; cost as much as the laptop itself (at the time).&lt;/p&gt;

&lt;p&gt;Again: my set up is NOT RECOMMENDED for regular people.&lt;/p&gt;

&lt;p&gt;Let me be frank: the Lenovo buying experience is not great. The laptops take forever to get to me and the last time, my assistant called every day for 90 days to get confirmation of the activation of the warranty.&lt;/p&gt;

&lt;p&gt;I wouldn’t want to put Jon and Jane Buyer thru either of those experiences. And I’m bordering on afraid to use the warranty service. Haven’t used it yet, I’ll cross my fingers. Heck, I don’t even know where to call if I had a problem. And that’s a problem.&lt;/p&gt;

&lt;h3&gt;Final Thoughts (and if you read nothing else…)&lt;/h3&gt;

&lt;p&gt;So, for regular people, I still recommended the Dell Outlet to get cheap, reliable, new computers and the Dell warranty for reliable, easy to understand warranty service.&lt;/p&gt;

&lt;p&gt;Hope this guide helps you and your friends out.&lt;/p&gt;

&lt;p&gt;– Signed, your friendly neighborhood Jeremy Moskowitz, Enterprise Mobility MVP&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> ADMX Changes thru the years </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/admx-changes-thru-the-years</link>
        <pubDate>2016-11-14T19:28:16+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I love it when I learn new stuff about Group Policy; or when someone shows me stuff I did know in a unique way. This is one of those.

Microsoft has a great blog entry and corresponding spreadsheet to demonstrate &amp;ldquo;What settings were added or subtracted in ADMX thru the years&amp;rdquo;?

Absolutely fascinating:

https://blogs.technet.microsoft.com/grouppolicy/2016/10/12/admx-version-history/

The only time to really &amp;ldquo;worry&amp;rdquo; is when Group Policy ADMX settings are DELETED by  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I love it when I learn new stuff about Group Policy; or when someone shows me stuff I did know in a unique way. This is one of those.&lt;/p&gt;

&lt;p&gt;Microsoft has a great blog entry and corresponding spreadsheet to demonstrate “What settings were added or subtracted in ADMX thru the years”?&lt;/p&gt;

&lt;p&gt;Absolutely fascinating:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/grouppolicy/2016/10/12/admx-version-history/&quot;&gt;https://blogs.technet.microsoft.com/grouppolicy/2016/10/12/admx-version-history/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The only time to really “worry” is when Group Policy ADMX settings are DELETED by the product team. Typically: This isn’t done.&lt;/p&gt;

&lt;p&gt;But it CAN happen; and if it does, you can &lt;a href=&quot;https://technet.microsoft.com/en-us/library/ee461034.aspx&quot;&gt;set-GPregistryvalue&lt;/a&gt; Powershell item to help negotiate those rare cases.&lt;/p&gt;

&lt;p&gt;(I go over this in supreme detail in my &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;LIVE training class&lt;/a&gt;… hint, hint.)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Next Group Policy Training: Atlanta. (And some security stuff that scared my pants off !) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/next-group-policy-training-atlanta-and-some-security-stuff-that-scared-my-pants-off</link>
        <pubDate>2016-10-04T14:55:48+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Next GP Class Stop: Atlanta. (And some security stuff that scared my pants off !)

Hey Team.. ! Just got back from Atlanta&amp;hellip; where last week I was at Ignite.

Quick Ignite report: Nothing blew my face off, but it was nice to physically be back in touch with friends, customers and students.
The human connection CANNOT be underrated !

Check this picture out of a dinner on Wednesday night. Can you name all the people in this photo: http://screencast.com/t/daL5kTOFfU ?

And, guess wh ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Next GP Class Stop: Atlanta. (And some security stuff that scared my pants off !)&lt;/p&gt;

&lt;p&gt;Hey Team.. ! Just got back from Atlanta… where last week I was at Ignite.&lt;/p&gt;

&lt;p&gt;Quick Ignite report: Nothing blew my face off, but it was nice to physically be back in touch with friends, customers and students.&lt;br /&gt;
The human connection CANNOT be underrated !&lt;/p&gt;

&lt;p&gt;Check this picture out of a dinner on Wednesday night. Can you name all the people in this photo: &lt;a href=&quot;http://screencast.com/t/daL5kTOFfU&quot;&gt;http://screencast.com/t/daL5kTOFfU&lt;/a&gt; ?&lt;/p&gt;

&lt;p&gt;And, guess what? I’m coming back to Atlanta… TWICE MORE this year.&lt;br /&gt;
First: Techstravaganza 2016 Nov 18th !&lt;br /&gt;
—&lt;br /&gt;
What is it? This is the annual Atlanta IT Pro user group meetup, and it’s awesome. And I’m giving two speeches and one is the keynote ! Come hear me speak about:&lt;br /&gt;
– “Top Windows Server 2016 and Windows 10 Gotchas”&lt;br /&gt;
– “Why Group Policy isn’t dead, still matters, and what’s new in Group Policy for Windows 10”&lt;/p&gt;

&lt;p&gt;When is it? Nov 18th, 2016.. One Day only !&lt;/p&gt;

&lt;p&gt;How do you sign up? Sign up and get tickets here: https://www.eventbrite.com/e/atlanta-techstravaganza-2016-tickets-27792984565&lt;br /&gt;
Second: My next Group Policy Class : Dec 12 – 15 (Four Days)&lt;br /&gt;
—&lt;br /&gt;
We have two seats remaining my class next week in Chicago.. and see you all who are coming NEXT MONDAY!!&lt;br /&gt;
And it’s really been like forever since I’ve had GP class in Atlanta.&lt;br /&gt;
So.. Guess where I’m going next!? Atlanta ! Dec 12 -15.&lt;br /&gt;
We’ve got a great location, great room rate, it’s just going to be a super awesome amazeballs class.. I know it.&lt;br /&gt;
And you can join aboard… How do you do that I hear you cry? http://dev.gpanswers.com/training&lt;br /&gt;
Price: $2500 for the four days.&lt;br /&gt;
Results?: Priceless.&lt;br /&gt;
So what scared the heck out of me? Well, check this out.. There’s a video you have to see. It will freak you out.. !&lt;br /&gt;
Stealing login credentials from a locked PC or Mac just got easier&lt;br /&gt;
http://arstechnica.com/security/2016/09/stealing-login-credentials-from-a-locked-pc-or-mac-just-got-easier/&lt;/p&gt;

&lt;p&gt;Some possible remediations could be:&lt;br /&gt;
– Block the USB\Class_02 device using a Device Installation restrictions GPO as a countermeasure based on the following info:&lt;br /&gt;
https://isc.sans.edu/diary/Collecting%2BUsers%2BCredentials%2Bfrom%2BLocked%2BDevices/21461&lt;/p&gt;

&lt;p&gt;Another proposed protection was:&lt;br /&gt;
https://www.sternsecurity.com/blog/local-network-attacks-llmnr-and-nbt-ns-poisoning&lt;/p&gt;

&lt;p&gt;These are both UN-tested, and were suggested by a two fellow MVPs (not me.)&lt;/p&gt;

&lt;p&gt;You’ll learn about Device Installation Restrictions in my Group Policy class. And a billion other security tips and tricks.&lt;/p&gt;

&lt;p&gt;So.. what are you waiting for?&lt;br /&gt;
Dec 12 – 15 in Atlanta… !&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/training/get-training/&quot;&gt;Get Training &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;See you there !!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Use Non-Microsoft DNS with Active Directory </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/use-non-microsoft-dns-with-active-directory</link>
        <pubDate>2016-08-30T21:59:55+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Here&amp;rsquo;s an interesting article.

Mostly because I wrote it, and also.. it is interesting. ?

It answers the question of &amp;ldquo;Can I use non-Microsoft DNS with my Active Directory (and why you might want to.)&amp;rdquo;

Check it out.

http://www.esecurityplanet.com/network-security/must-you-use-microsofts-in-box-dns.html ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Here’s an interesting article.&lt;/p&gt;

&lt;p&gt;Mostly because I wrote it, and also.. it is interesting. ?&lt;/p&gt;

&lt;p&gt;It answers the question of “Can I use non-Microsoft DNS with my Active Directory (and why you might want to.)”&lt;/p&gt;

&lt;p&gt;Check it out.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.esecurityplanet.com/network-security/must-you-use-microsofts-in-box-dns.html&quot; target=&quot;_blank&quot;&gt;http://www.esecurityplanet.com/network-security/must-you-use-microsofts-in-box-dns.html&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Windows 10 Build 1607 (Anniversary Edition) - Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/windows-10-build-1607-anniversary-edition-group-policy</link>
        <pubDate>2016-08-05T20:42:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So.. &amp;ldquo;Windows 13&amp;rdquo; is out.. I mean&amp;hellip; &amp;ldquo;Windows 10, Build 1607 Anniversary Edition&amp;rdquo; of course. And, it&amp;rsquo;s a pretty big update. To make your life easier I rounded up all the news about Group Policy and this build into one place. THIS PLACE.

Here we go !

Item #1: Get the latest ADMX download

https://www.microsoft.com/en-us/download/details.aspx?id=53430

Item #2: What to do with this ADMX download (video I made back in the day)

https://www.youtube.com/ ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So.. “Windows 13” is out.. I mean… “Windows 10, Build 1607 Anniversary Edition” of course. And, it’s a pretty big update. To make your life easier I rounded up all the news about Group Policy and this build into one place. THIS PLACE.&lt;/p&gt;

&lt;p&gt;Here we go !&lt;/p&gt;

&lt;h3&gt;Item #1: Get the latest ADMX download&lt;/h3&gt;

&lt;p&gt;&lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=53430&quot;&gt;https://www.microsoft.com/en-us/download/details.aspx?id=53430&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Item #2: What to do with this ADMX download (video I made back in the day)&lt;/h3&gt;

&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=Q4DBdQo4XZs&quot;&gt;https://www.youtube.com/watch?v=Q4DBdQo4XZs&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Item #3: Some Policy Setting items are ONLY in the Enterprise/Edu editions and NOT in Pro.&lt;/h3&gt;

&lt;p&gt;Here’s that list so you don’t punch a wall, wondering why a setting isn’t working as expected on your Pro machines.&lt;br /&gt;
&lt;a href=&quot;https://technet.microsoft.com/en-us/itpro/windows/manage/group-policies-for-enterprise-and-education-editions&quot;&gt;https://technet.microsoft.com/en-us/itpro/windows/manage/group-policies-for-enterprise-and-education-editions&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Item #4: Latest ADMX Spreadsheet&lt;/h3&gt;

&lt;p&gt;First: The latest Group Policy Spreadsheet is found at:&lt;br /&gt;
&lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=25250&quot;&gt;https://www.microsoft.com/en-us/download/details.aspx?id=25250&lt;/a&gt;&lt;br /&gt;
But there are some old ones too. The right one to get is:&lt;br /&gt;
Windows10AndWindowsServer2016PolicySettings.xslx&lt;br /&gt;
Here’s a picture so you don’t mess it up (like I did):&lt;br /&gt;
&lt;a href=&quot;http://screencast.com/t/TvfGkHBIPFgs&quot;&gt;http://screencast.com/t/TvfGkHBIPFgs&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Item #5: How do you find ONLY new policies for Win 10 Build 1607?&lt;/h3&gt;

&lt;p&gt;When you open the spreadsheet it, look at COL H which says “New for”…&lt;br /&gt;
Here’s a picture:&lt;br /&gt;
&lt;a href=&quot;http://screencast.com/t/oAUHpfv5p13&quot;&gt;http://screencast.com/t/oAUHpfv5p13&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Item #6: Microsoft Edge got some new policies&lt;/h3&gt;

&lt;p&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/itpro/microsoft-edge/available-policies?f=255&amp;MSPPError=-2147217396&quot;&gt;https://technet.microsoft.com/en-us/itpro/microsoft-edge/available-policies?f=255&amp;MSPPError=-2147217396&lt;/a&gt;&lt;br /&gt;
And .. at least one only works when the machines are DOMAIN JOINED ONLY (so Local Policy won’t work too if the machine is not domain joined.)&lt;/p&gt;

&lt;h3&gt;Item #7: How to delay the Anniversary Update.&lt;/h3&gt;

&lt;p&gt;&lt;a href=&quot;http://www.zdnet.com/article/windows-10-tip-temporarily-delay-the-anniversary-update/&quot;&gt;http://www.zdnet.com/article/windows-10-tip-temporarily-delay-the-anniversary-update/&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Item #8: A bunch of stuff has changed around Windows Update.&lt;/h3&gt;

&lt;p&gt;I’m working on chewing thru this; and promise to have it sorted out by the time the Chicago class happens.&lt;br /&gt;
Soooooo… COME to the Chicago class, will ya!?&lt;/p&gt;

&lt;p&gt;With over half the seats sold, don’t be “that guy” who missed the boat. Remember: Windows 10 is now already up to “Windows 12” or “Windows 13” depending on how you count the updates. If you don’t keep up with what’s new, you’re gonna fall so far behind you might as well throw out everything and go back to abacii (abacuses?). Whatever, you get the idea. Details:&lt;/p&gt;

&lt;p&gt;Where: Chicago (Addison)&lt;br /&gt;
When: Oct 10-13. (Four Days)&lt;br /&gt;
Cost: $2400.&lt;br /&gt;
Guarantee: 100% guaranteed to be awesome or your money back. Really and truely.&lt;br /&gt;
How to sign up (up to 3 people): &lt;a href=&quot;https://www.gpanswers.com/training/get-training/&quot;&gt;https://www.gpanswers.com/training/get-training/&lt;/a&gt;&lt;br /&gt;
Got 4 or more people? Gotta call us for mega discount: 215-391-0096.&lt;/p&gt;

&lt;p&gt;Thousands of admins have taken (and RE-TAKEN) my killer Group Policy Class.&lt;/p&gt;

&lt;p&gt;Get up to speed (or get up to speed AGAIN if you need to).&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Never a dull moment with Group Policy (or what to do about MS16-072) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/never-a-dull-moment-with-group-policy-or-what-to-do-about-ms16-072</link>
        <pubDate>2016-06-16T15:27:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So on Patch Tuesday, Microsoft released a patch to prevent a theoretical &amp;ldquo;man in the middle attack&amp;rdquo; when &amp;nbsp;GPOs are downloaded from your servers to your endpoints.

Okay.. Fine. Sounds good. In fact, here&amp;rsquo;s the tech note on the problem.&amp;nbsp;Fix for GP elevation https://technet.microsoft.com/library/security/ms16-072

But when that patch is applied, there is a &amp;ldquo;double increase&amp;rdquo; in security, one with an unintended consequence.

That consequence is that SOME ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So on Patch Tuesday, Microsoft released a patch to prevent a theoretical “man in the middle attack” when  GPOs are downloaded from your servers to your endpoints.&lt;/p&gt;

&lt;p&gt;Okay.. Fine. Sounds good. In fact, here’s the tech note on the problem. Fix for GP elevation &lt;a href=&quot;https://technet.microsoft.com/library/security/ms16-072&quot;&gt;https://technet.microsoft.com/library/security/ms16-072&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But when that patch is applied, there is a “double increase” in security, one with an unintended consequence.&lt;/p&gt;

&lt;p&gt;That consequence is that SOME GPOs will no longer apply when you expected them to. You could call this a “breaking change”, but.. stick with me, I think Microsoft wanted this behavior updated. And it’s not TERRIBLE; it’s simply somewhat inconvenient to fix and make right again.&lt;/p&gt;

&lt;h2&gt;How to expose the new behavior&lt;/h2&gt;

&lt;p&gt;Warning: I have not done the full end to end testing on this. This is simply my understanding of the issue and what’s going on here. With that disclaimer, the problem will occur for you when:&lt;/p&gt;

&lt;p&gt;1. The patch MS16-072 is applied to your endpoint computers (the ones which PROCESSS GPOs).&lt;/p&gt;

&lt;p&gt;2. Admin has REMOVED Authenticated Users in Security Filter.&lt;/p&gt;

&lt;p&gt;Here’s a GPO in “normal” state: &lt;a href=&quot;http://screencast.com/t/svZODLEpR&quot;&gt;http://screencast.com/t/svZODLEpR&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;3. Admin has specified specific USERS (directly or via Group membership) in Security filter.&lt;/p&gt;

&lt;p&gt;Here’s the same GPO in “revised” state, specifying a security group which contains only users: &lt;a href=&quot;http://screencast.com/t/NyBdnAYZR&quot;&gt;http://screencast.com/t/NyBdnAYZR&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; Ergo: The COMPUTER ACCOUNT itself has no READ access to the GPO (nor should it need it.)&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The ORIGINAL behavior is:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;ALL user-side GPOs should be processed when a USER has READ/AGP rights, even if the computer itself has no read / AGP rights access to a particular GPO.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The UPDATED (unexpected) result is:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;User-side GPOs are not processed (if the computer cannot perform the READ operation.)&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;And why is this occurring? Well, here’s the answer from the KB: “Before MS16-072 is installed, user group policies were retrieved by using the user’s security context. After MS16-072 is installed, user group policies are retrieved by using the machines security context ”&lt;/p&gt;

&lt;p&gt;So the big change is that in order to process USER side GPOs, the COMPUTER needs READ access. And when you remove AUTHENTICATED USERS from the GPO, the COMPUTER cannot perform the READ it needs.. and hence, user-side GPOs are not processed as expected.&lt;/p&gt;

&lt;h2&gt;What to do next: &lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;If you wanted to MANUALLY update any existing GPO to then recover from this breaking change, there are two possible manual ways:
	&lt;ul&gt;
		&lt;li&gt;Manual way #1: Simply add Domain Computers to the Security Filter as seen here: &lt;a href=&quot;http://screencast.com/t/ziB193hs&quot;&gt;http://screencast.com/t/ziB193hs&lt;/a&gt;&lt;/li&gt;
		&lt;li&gt;Manual way #2: Add Domain Computers “indirectly”, by using the Delegation | Advanced and specifying READ but NOT “Apply Group Policy” as seen here &lt;a href=&quot;http://screencast.com/t/xfbmuCy0i&quot;&gt;http://screencast.com/t/xfbmuCy0i&lt;/a&gt;&lt;/li&gt;
		&lt;li&gt;TIP: READ THIS BLOG ENTRY ALL THE WAY THRU TO DECIDE WHICH IS BEST FOR YOU.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;If you wanted to AUTOMATICALLY buzz thru ALL your GPOs and find the ones with problems. Here’s a quick powershell script:  &lt;a href=&quot;https://blogs.technet.microsoft.com/poshchap/2016/06/16/ms16-072-known-issue-use-powershell-to-check-gpos/&quot;&gt;https://blogs.technet.microsoft.com/poshchap/2016/06/16/ms16-072-known-issue-use-powershell-to-check-gpos/&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt; If you wanted to AUTOMATICALLY fix all your GPOs, there are two ways to do it:
	&lt;ul&gt;
		&lt;li&gt;One-liner Powershell script as follows (thanks to  Rudi Vanden Dries in the comments of this blog for the tip):
		&lt;pre&gt;
Get-GPO -All | Set-GPPermissions -TargetType Group -TargetName &quot;Domain computers&quot; -PermissionLevel GpoRead&lt;/pre&gt;
		&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;
	&lt;ul&gt;
		&lt;li&gt;Fellow Enterprise Mobility MVP Darren Mar-Elia has a somewhat more sophisticated script which will pre-verify you NEED to change before making it. You can find that blog entry here (Thanks Darren!): &lt;a href=&quot;https://sdmsoftware.com/group-policy-blog/bugs/new-group-policy-patch-ms16-072-breaks-gp-processing-behavior/&quot;&gt;https://sdmsoftware.com/group-policy-blog/bugs/new-group-policy-patch-ms16-072-breaks-gp-processing-behavior/&lt;/a&gt;&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Why ?&lt;/h2&gt;

&lt;p&gt;You might be asking WHY Microsoft made the change.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Update 6-22-16:&lt;/strong&gt; Well, the Official Microsoft Response to the patch is here: &lt;a href=&quot;https://blogs.technet.microsoft.com/askds/2016/06/22/deploying-group-policy-security-update-ms16-072-kb3163622/&quot;&gt;https://blogs.technet.microsoft.com/askds/2016/06/22/deploying-group-policy-security-update-ms16-072-kb3163622/ &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Short story: It’s a prevent of a theoretical attack, and ensures that the computer does all the work with Kerberos.&lt;/p&gt;

&lt;h3&gt;Update 6-17-16 to the question “Is it better to just add ‘Read Rights’ to Domain Computers directly to the delegation tab?”&lt;/h3&gt;

&lt;p&gt;So after this post went live, I got the question (in several ways) which boiled down to&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Jeremy, should I add DOMAIN COMPUTERS to the SECURITY FILTERING section? Or should I just add DOMAIN COMPUTERS to the DELEGATION TAB?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;So there are advantages and disadvantages to each approach.&lt;/p&gt;

&lt;p&gt;Method 1: Adding DOMAIN COMPUTERS to Security Filtering section advantage and disadvantage&lt;/p&gt;

&lt;p&gt;When you add Domain Computers directly to the Security Filtering tab, you can actually *SEE* that you did that. Again, here’s the screenshot from earlier if you take my advice: &lt;a href=&quot;http://screencast.com/t/ziB193hs&quot;&gt;http://screencast.com/t/ziB193hs&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In a PERFECT world, if you followed best practices by NOT mixing USER and COMPUTER side stuff, there would be no particular consequence for adding DOMAIN COMPUTERS to the Security Filtering tab. Said another way, if NO GPOs had COMPUTER side stuff, then the computer would have nothing in particular to apply when you made this change.&lt;/p&gt;

&lt;p&gt;Method 2: Adding Domain Computers “indirectly”, by using the Delegation tab advantage and disadvantage&lt;/p&gt;

&lt;p&gt;Method two is that you use the Delegation tab and specify READ but NOT “Apply Group Policy” as seen here &lt;a href=&quot;http://screencast.com/t/xfbmuCy0i&quot;&gt;http://screencast.com/t/xfbmuCy0i&lt;/a&gt; the end result in the security filtering tab is this (when you press OK) is simply this: &lt;a href=&quot;http://screencast.com/t/svZODLEpR&quot;&gt;http://screencast.com/t/svZODLEpR&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When you do this, you don’t get CLARITY that the rights are correct. You have no idea that the Group Policy will actually process.. unless you peek (again) at the Delegation tab.&lt;/p&gt;

&lt;p&gt;But the upside here is that if you have “mixed GPOs” with COMPUTER side stuff into the same GPO, you won’t start to process “dormant items” that didn’t apply yesterday and will (uh-oh) magically apply today.&lt;/p&gt;

&lt;p&gt;So I guess, ultimately, this is my vote.. the indirect way… with the downside that I have to verify the GPO is “ready to rock” by clicking the Delegation tab and verifying that Domain Computers is in there. (boo.)&lt;/p&gt;

&lt;p&gt;Note also that Method 2 should be used for those still on SBS 2008 or SBS 2011; as SBS has a special process which cleans out some GPOs back to their original baseline (if you do Method 1.)&lt;/p&gt;

&lt;h3&gt;Update 6-22-16 to the question: “Should I add Authenticated Users or Domain Computers” when I choose a method?&lt;/h3&gt;

&lt;p&gt;So I got this question a lot, and here’s my vote: Use Domain Computers and not Authenticated Users. Yes, either will work, but I think Domain Computers is slightly better to add.&lt;/p&gt;

&lt;p&gt;Authenticated Users is simply more rights than necessary. (But just a little bit.)&lt;/p&gt;

&lt;p&gt;Domain Computers are.. well, domain computers. And Authenticated Users are… well, Authenticated Users *AND* Domain Computers.&lt;br /&gt;
(As I like to say… “Computers are People Too”).&lt;/p&gt;

&lt;p&gt;So, it’s the minimum rights required are Domain Computers.. because THEY (the computers) are now in charge of the whole “Lookup and download” operation, Where before.. it was a two-part affair.&lt;/p&gt;

&lt;h2&gt;Making the change permanent in Active Directory for future / newly born GPOs&lt;/h2&gt;

&lt;p&gt;So, okay. If we’re going to go with “Method 2” .. maybe you want to make this change permanent for all future / newly born GPOs. Which, I think is a good idea. Here are the exact step-by-steps you need to do this. (Tip: If you don’t trust my advice, pre-check this out: &lt;a href=&quot;https://support.microsoft.com/en-us/kb/321476&quot;&gt;https://support.microsoft.com/en-us/kb/321476&lt;/a&gt;). The steps which I verified:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Open ADSI Edit&lt;/li&gt;
	&lt;li&gt;Connect to the schema &lt;a href=&quot;http://screencast.com/t/PnQ5if2pVpLO&quot;&gt;http://screencast.com/t/PnQ5if2pVpLO&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Find the the object “CN = Group-Policy-Container” &lt;a href=&quot;http://screencast.com/t/BdaJJ3Oimyx&quot;&gt;http://screencast.com/t/BdaJJ3Oimyx &lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Find defaultSecurityDescriptor and add this at the end:  &lt;strong&gt;(A;CI;LCRPLORC;;;DC)&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;TIP: The “DC” in the string is “Domain Computers” not the “Domain Controllers”.  In case you care, Domain Controllers “short name” is “ED” which means “Enterprise Domain Controllers”.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;BEFORE screenshot: &lt;a href=&quot;http://screencast.com/t/AZ4NU0oGKO8&quot;&gt;http://screencast.com/t/AZ4NU0oGKO8&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;AFTER screenshot: &lt;a href=&quot;http://screencast.com/t/6XMYzBtc3qBX&quot;&gt;http://screencast.com/t/6XMYzBtc3qBX&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;5. Close ADSI edit. Then also close the GPMC (if opened.) And re-open the GPMC.&lt;/p&gt;

&lt;p&gt;Check to see if it worked. If it did, all new GPOs you create will have the following stamp on them: &lt;a href=&quot;http://screencast.com/t/YUJ0k9Fw4q&quot;&gt;http://screencast.com/t/YUJ0k9Fw4q&lt;/a&gt;   &lt;/p&gt;

&lt;p&gt;6. If it did not work, then, ensure that all DCs get the update (aka synchronize all DCS) then … reboot all your DCs. You can reboot them one by one. -or- Another option is to update the Schema Cache:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Article 1: &lt;a href=&quot;https://technet.microsoft.com/en-us/library/cc961572.aspx&quot;&gt;https://technet.microsoft.com/en-us/library/cc961572.aspx&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Article 2 with Step by Steps: &lt;a href=&quot;https://www.safaribooksonline.com/library/view/active-directory-cookbook/0596004648/ch10s23.html&quot;&gt;https://www.safaribooksonline.com/library/view/active-directory-cookbook/0596004648/ch10s23.html &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Again: when this is over, all new GPOs you create will have the following stamp on them: &lt;a href=&quot;http://screencast.com/t/YUJ0k9Fw4q&quot;&gt;http://screencast.com/t/YUJ0k9Fw4q&lt;/a&gt;  .&lt;/p&gt;

&lt;h2&gt;What about Microsoft AGPM (and tools like it, like NetIQ GPA , etc.? )&lt;/h2&gt;

&lt;p&gt;So another Microsoft article, posted from a Microsoft PFE is found here: &lt;a href=&quot;https://blogs.technet.microsoft.com/askpfeplat/2016/07/05/who-broke-my-user-gpos/&quot;&gt;https://blogs.technet.microsoft.com/askpfeplat/2016/07/05/who-broke-my-user-gpos/&lt;/a&gt; which re-iterates some of my points and step-by-steps. That being said, I didn’t talk about AGPM here, and he does a pretty good job explaining what to do in AGPM land. In short, the steps are:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Do all the steps to the LIVE GPOs like we already talked about.&lt;/li&gt;
	&lt;li&gt;Mass Import from Production AFTER that.. or else AGPM doesn’t know you did anything in the real world.&lt;/li&gt;
	&lt;li&gt;Set AGPM’s permissions such that when a GPO is DEPLOYED it has the right stamp.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Again, the blog entry does a reasonable job of explaining that, so I’m not going to re-do the step-by-steps here.&lt;/p&gt;

&lt;p&gt;Brief commercial message:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Hope this information helps you out, and you’ll consider getting serious GP training from me at &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training&lt;/a&gt; … Live and Online training !&lt;/li&gt;
	&lt;li&gt;And consider &lt;a href=&quot;https://www.policypak.com&quot;&gt;PolicyPak&lt;/a&gt; to manage the heck out of all browsers and apps: IE, Firefox, Chrome.. plus Java, Flash, and hundreds more. Thru Group Policy, SCCM or thru the cloud.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Your pal, Jeremy Moskowitz, Enterprise Mobility MVP.&lt;/p&gt;

&lt;p&gt;Thanks to my Fellow Enterprise Mobility MVPs for technical review of this article.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> AMA replay now live, and Group Policy Not Dead Manifesto .. Updated ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/ama-replay-now-live-and-group-policy-not-dead-manifesto-updated</link>
        <pubDate>2016-05-17T16:40:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Actually, this has three things:

1. AMA session replay.

I did a super fantastic ASK ME ANYTHING (AMA) session with my hosts at AdminArsenal. It was super fun. The replay is here:

https://www.youtube.com/watch?v=BibYm8KrgR4&amp;nbsp;

2. Group Policy not in Nano Server (Not News to me), but I updated the Why GP is Not Dead Manifesto.

Also, I already knew this, but apparently it was NOT known by some that Windows&amp;rsquo; new Nano server has no Group Policy support.

You&amp;rsquo;d think I&amp; ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Actually, this has three things:&lt;/p&gt;

&lt;p&gt;1. AMA session replay.&lt;/p&gt;

&lt;p&gt;I did a super fantastic ASK ME ANYTHING (AMA) session with my hosts at AdminArsenal. It was super fun. The replay is here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=BibYm8KrgR4&quot;&gt;https://www.youtube.com/watch?v=BibYm8KrgR4&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;2. Group Policy not in Nano Server (Not News to me), but I updated the Why GP is Not Dead Manifesto.&lt;/p&gt;

&lt;p&gt;Also, I already knew this, but apparently it was NOT known by some that Windows’ new Nano server has no Group Policy support.&lt;/p&gt;

&lt;p&gt;You’d think I’d be upset about this, but I’m not. Not even a little bit. As such, I’ve updated my “Why GP Is not Dead” manifesto.&lt;/p&gt;

&lt;p&gt;It’s another GPanswers.com Blog entry, and that link is here. &lt;a href=&quot;https://www.gpanswers.com/the-why-group-policy-is-not-dead-manifesto/&quot;&gt;You can find that important reading here.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Search for the phrase: &lt;em&gt;May 10th, 2016 update&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;3.  Microsoft also figured out that it’s too insane to bring up a new Windows 7 machine nowadays with 897 patches. So they they have a “rollup” of all the important fixes since Windows 7 SP1. Excellent. This is awesome.&lt;/p&gt;

&lt;p&gt;Download it here to add to your (new) Windows 7 + SP1 build images.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/windowsitpro/2016/05/17/simplifying-updates-for-windows-7-and-8-1/&quot;&gt;Here’s the link.&lt;/a&gt; and&lt;/p&gt;

&lt;p&gt;Be sure to check out the associated KB article, &lt;a href=&quot;https://support.microsoft.com/en-us/kb/3125574&quot;&gt;https://support.microsoft.com/en-us/kb/3125574&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Thanks and talk soon !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Block Windows Store in Windows 10 Pro with Group Policy (even though the GP setting </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-block-windows-store-in-windows-10-pro-with-group-policy-even-though-the-gp-setting</link>
        <pubDate>2016-05-10T11:06:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ You might have read the news that it&amp;rsquo;s no longer possible to use the built-in Group Policy SETTING to prevent access to the Windows Store starting in Windows 10 / 1511 with some updates. I don&amp;rsquo;t make the news, I just report it.

The official article at Microsoft is&amp;nbsp;&amp;ldquo;Can&amp;rsquo;t disable Windows Store in Windows 10 Pro through Group Policy:&amp;nbsp;https://support.microsoft.com/en-us/kb/3135657&amp;ldquo;. Except, good news.. turns out there IS a way to prevent Windows Store from ]]>
        </description>
        <content:encoded>
            &lt;p&gt;You might have read the news that it’s no longer possible to use the built-in Group Policy SETTING to prevent access to the Windows Store starting in Windows 10 / 1511 with some updates. I don’t make the news, I just report it.&lt;/p&gt;

&lt;p&gt;The official article at Microsoft is “Can’t disable Windows Store in Windows 10 Pro through Group Policy: &lt;a href=&quot;https://support.microsoft.com/en-us/kb/3135657&quot;&gt;https://support.microsoft.com/en-us/kb/3135657&lt;/a&gt;“. Except, good news.. turns out there IS a way to prevent Windows Store from running with Windows 10 Pro Video.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://youtu.be/W3KJCIzhQ3U?width=1200&amp;height=600&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;how-to-block-windows-store-in-windows-10-pro-with-group-policy-even-though-the-gp-setting&quot; src=&quot;https://www.gpanswers.com/images/posts/gpa_tips/how-to-block-windows-store-in-windows-10-pro-with-group-policy-even-though-the-gp-setting-1024x512.jpg&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For more killer tips, be sure to sign up at &lt;a href=&quot;https://www.gpanswers.com/register/&quot;&gt;https://www.gpanswers.com/register/&lt;/a&gt; for the  newsletter list to stay informed.&lt;/p&gt;

&lt;p&gt;For Group Policy training, (live and online) sign up at &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;https://www.gpanswers.com/training&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;And to extend Group Policy to manage applications and browsers, check out &lt;a href=&quot;http://www.PolicyPak.com&quot;&gt;www.PolicyPak.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;UPDATE: Found another technique which works with “Software Restriction Policies”, which is a little less intense than using, say, AppLocker to do it. Personally, I prefer the method in MY video, but this alternate method using SRP should work a-ok for most people as well. &lt;a href=&quot;http://www.urtech.ca/2016/05/solved-video-how-to-disable-the-store-in-windows-10-pro-using-group-policy-gpo/&quot;&gt;Link to another blog / video&lt;/a&gt;.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Windows 7 and slow Windows updates </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/windows-7-and-slow-windows-updates</link>
        <pubDate>2016-04-21T14:44:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ NO GP CONTENT.. ?

This one has been annoying me for a while; so I found two resources which explain how to stop Windows 7 from taking (literally) forever, or at least hours to update.

Resource 1 at Infoworld.

Resource 2 at Stack Exchange.&amp;nbsp;Look for the words &amp;ldquo;This issue has come and gone over the years with different fixes along the way&amp;hellip;&amp;rdquo; and follow his instructions. Worked perfectly for me. Requires downloading two patches, then going offline, installing them, th ]]>
        </description>
        <content:encoded>
            &lt;p&gt;NO GP CONTENT.. ?&lt;/p&gt;

&lt;p&gt;This one has been annoying me for a while; so I found two resources which explain how to stop Windows 7 from taking (literally) forever, or at least hours to update.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.infoworld.com/article/3058260/microsoft-windows/heres-how-to-significantly-speed-up-windows-7-scans-for-updates.html?token=%23tk.IFWNLE_nlt_infoworld_sec_rpt_2016-04-21&amp;idg_eid=1640a0a38d3b4b638fd2beadfc5e9dc7&amp;utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=InfoWorld%20Security%20Report%202016-04-21&amp;utm_term=infoworld_sec_rpt#tk.IFW_nlt_infoworld_sec_rpt_2016-04-21&quot;&gt;Resource 1 at Infoworld&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://superuser.com/questions/951960/windows-7-sp1-windows-update-stuck-checking-for-updates&quot;&gt;Resource 2 at Stack Exchange.&lt;/a&gt; Look for the words “This issue has come and gone over the years with different fixes along the way…” and follow his instructions. Worked perfectly for me. Requires downloading two patches, then going offline, installing them, then going back online to complete. Again: Personally worked for me and I can vouch this worked as expected (in my cases anyway.)&lt;/p&gt;

&lt;p&gt;Hope this helps you !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Fix GPPrefs Scheduled Tasks and also Updating AD </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/fix-gpprefs-scheduled-tasks-and-also-updating-ad</link>
        <pubDate>2016-04-18T19:41:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ A student in a recent class showed me this article, which demonstrates how to make Scheduled Tasks (correctly) run as SYSTEM. I didn&amp;rsquo;t know this was a bug, but I&amp;rsquo;m glad I know there&amp;rsquo;s a fix !

https://maddog2050.wordpress.com/2014/09/11/gpo-issue-deploying-a-scheduled-task-running-as-system/

The same guy also has a nifty script to perform a full replication of all DCs in the domain. Handy if you&amp;rsquo;re getting inconsistent results with GP. Here&amp;rsquo;s a pointer to that  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;A student in a recent class showed me this article, which demonstrates how to make Scheduled Tasks (correctly) run as SYSTEM. I didn’t know this was a bug, but I’m glad I know there’s a fix !&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://maddog2050.wordpress.com/2014/09/11/gpo-issue-deploying-a-scheduled-task-running-as-system/&quot;&gt;https://maddog2050.wordpress.com/2014/09/11/gpo-issue-deploying-a-scheduled-task-running-as-system/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The same guy also has a nifty script to perform a full replication of all DCs in the domain. Handy if you’re getting inconsistent results with GP. Here’s a pointer to that nice script:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://maddog2050.wordpress.com/2014/09/15/ad-force-sysvol-and-ad-replication/&quot;&gt;https://maddog2050.wordpress.com/2014/09/15/ad-force-sysvol-and-ad-replication/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Good job, MadDog 2050.. whomever you are !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The “Why Group Policy is Not Dead” Manifesto </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-why-group-policy-is-not-dead-manifesto</link>
        <pubDate>2016-03-24T19:24:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Updated July 2017.

If you thought only crazy people wrote Manifestos, then call me crazy.

Yes, I&amp;rsquo;m crazy for Group Policy, and I also get a little crazy about Group Policy&amp;rsquo;s misunderstandings and misunderstood place in the modern &amp;ldquo;mobile first, cloud first&amp;rdquo; world Microsoft has in mind and where might all go someday.

In this manifesto I get to talk about something that&amp;rsquo;s really, really, really been bothering me (and hence, making me crazy enough to write a m ]]>
        </description>
        <content:encoded>
            &lt;h2&gt;&lt;em&gt;Updated July 2017.&lt;/em&gt;&lt;/h2&gt;

&lt;p&gt;If you thought only crazy people wrote Manifestos, then call me crazy.&lt;/p&gt;

&lt;p&gt;Yes, I’m crazy for Group Policy, and I also get a little crazy about Group Policy’s misunderstandings and misunderstood place in the modern “mobile first, cloud first” world Microsoft has in mind and where might all go someday.&lt;/p&gt;

&lt;p&gt;In this manifesto I get to talk about something that’s really, really, really been bothering me (and hence, making me crazy enough to write a manifesto.)&lt;/p&gt;

&lt;p&gt;That is, I cannot tell you how many times IT Admins like you have walked up to me, and with great concern on your face asked me something like:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;“A Microsoft rep told me that Group Policy is dead. What should I tell my boss, and what should I do now?”&lt;/li&gt;
	&lt;li&gt;“Is Intune/ MDM trying to replace Group Policy?”&lt;/li&gt;
	&lt;li&gt;“Why do I need Group Policy if I’ve also got SCCM?”&lt;/li&gt;
	&lt;li&gt;“Do you think Powershell and/or DSC (Desired State Configuration) is replacing Group Policy?”&lt;/li&gt;
	&lt;li&gt;“Will Azure Active Directory be the death of Group Policy?”&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Finally, from the topmost ranks of Microsoft, they have officially come out and expressed something I’ve been saying forever:&lt;/p&gt;

&lt;h3&gt;                                          Group Policy is NOT dead.&lt;/h3&gt;

&lt;p&gt;And, more importantly, it’s MORE IMPORTANT than ever when it comes to Windows 10.&lt;/p&gt;

&lt;p&gt;Here are the blog entries from the top ranks at Microsoft, and then immediately following is my analysis and guidance for you, my fellow IT admins:&lt;/p&gt;

&lt;p&gt;&lt;cite&gt;&lt;big&gt;From Brad Anderson, Corporate Vice President, Enterprise and Client Mobility:&lt;/big&gt;&lt;/cite&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/in_the_cloud/2016/03/23/clear-simple-guidance-when-configmgr-and-intune-should-be-used-with-windows-10/&quot; target=&quot;_blank&quot;&gt;https://blogs.technet.microsoft.com/in_the_cloud/2016/03/23/clear-simple-guidance-when-configmgr-and-intune-should-be-used-with-windows-10/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The actual blog post which is housed on the Windows Intune blog:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/microsoftintune/2016/03/23/the-path-to-modernizing-windows-management/&quot;&gt;https://blogs.technet.microsoft.com/microsoftintune/2016/03/23/the-path-to-modernizing-windows-management/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Updated for April 2017, now also housed on the Modern Management blog:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/windows/client-management/manage-windows-10-in-your-organization-modern-management&quot;&gt;https://docs.microsoft.com/en-us/windows/client-management/manage-windows-10-in-your-organization-modern-management&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here’s the main quote from the Microsoft-written blogs.. all saying the same thing… which you can take to the bank:&lt;/p&gt;

&lt;blockquote&gt;
&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt;&lt;em&gt;&lt;strong&gt;Group Policy is the best way to granularly configure domain joined Windows PCs and tablets connected to the corporate network using Windows-based tools. Microsoft continues to add Group Policy settings with each new version of Windows.&lt;/strong&gt;&lt;/em&gt;&lt;/div&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;br /&gt;
And, if we look at the flowchart Microsoft provides, it’s clear as day.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/assets/images/win10mgmt3.png&quot;&gt;&lt;img alt=&quot;win10mgmt3&quot; src=&quot;https://www.gpanswers.com/assets/images/win10mgmt3.png&quot; style=&quot;height:625px; width:672px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let me use my red marker, and highlight the most common scenario for Windows PCs on the planet today and the foreseeable mid-term future:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/assets/images/domain-joined-GP1.jpg&quot;&gt;&lt;img alt=&quot;domain-joined-GP&quot; src=&quot;https://www.gpanswers.com/assets/images/domain-joined-GP1.jpg&quot; style=&quot;height:437px; width:470px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This becomes a very, very simple “If domain joined, then use Group Policy” decision tree. And that represents about 98% of the Windows PC systems in the world today. Maybe 99%.&lt;/p&gt;

&lt;p&gt;To continue, let’s break this down, step by step, and use the following questions to help others decide if Group Policy is dead or not:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Do you have domain joined Windows PCs and tablets? You do? Then you should use Group Policy, which is the best way to manage them.&lt;/li&gt;
	&lt;li&gt;Do you need to granularly configure settings? You do? Then Group Policy is the best way to do that.&lt;/li&gt;
	&lt;li&gt;Are you considering (or already moving to Windows 10?) You are? Then Group Policy is there to help you manage these new settings which are only available in Windows 10.&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Look, I get it. It’s a confusing “landscape” of tools out there from Microsoft now to manage Windows machines.&lt;/p&gt;

&lt;p&gt;To be clear: It’s not that I have love for old and aversion for new. For me, it really is “the right tool for the right job”. If, that “right job” is to manage and configure domain joined Windows PCs, then the “right tool” is Group Policy. And remember, it’s not me saying this, it’s Microsoft:&lt;/p&gt;

&lt;blockquote&gt;
&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt;&lt;em&gt;&lt;strong&gt;Group Policy is the best way to granularly configure domain joined Windows PCs and tablets&lt;/strong&gt;&lt;/em&gt;&lt;/div&gt;
&lt;/blockquote&gt;

&lt;p&gt;Group Policy has the most settings, the most ability, most flexibility and granularity, comes in the box, works when you log on and/or reboot, has reporting, tooling, guidance, third-party extensibility and it usually JUST WORKS as expected – across millions of PCs, millions of times and countless changes and updates a day.&lt;/p&gt;

&lt;p&gt;This is why Group Policy is the BEST WAY for domain joined Windows PCs.&lt;/p&gt;

&lt;p&gt;Okay then: So what are the other management tools that Microsoft has, and what are they “best at”? Microsoft has a huge variety of ways to manage Windows devices. In fact, so many, that I must deliberately omit some in this analysis for fear you will fall asleep and not make it to the end.&lt;/p&gt;

&lt;p&gt;So, here is a brief overview of the most popular Microsoft-provided Windows management tools and what they are BEST at. I’ll cover SCCM, Intune, PowerShell &amp; DSC and Azure Active Directory.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;SCCM at its best&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;SCCM is best at:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Deploying the OS&lt;/li&gt;
	&lt;li&gt;Deploying other software to the PC&lt;/li&gt;
	&lt;li&gt;Performing inventory&lt;/li&gt;
	&lt;li&gt;Patching and Windows updates for the OS&lt;/li&gt;
	&lt;li&gt;Reporting&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Yes, yes, I know: SCCM has lots of OTHER features too, but this is where SCCM is BEST.&lt;/p&gt;

&lt;p&gt;Can SCCM deliver a registry setting which would be similar to a Group Policy setting? Can it copy a file down to the desktop, similar in function to a Group Policy Preferences setting? Yes, SCCM CAN do these things. But is it the BEST tool for doing these things? I would argue no; it is not the BEST tool to do granular policy-based management.&lt;/p&gt;

&lt;p&gt;SCCM is awesome at what it does, but it’s not trying to overtake Group Policy.&lt;/p&gt;

&lt;p&gt;Side note though: Just to muddy the waters a little bit with SCCM, there are some pre-baked functions which specifically overlap with existing Group Policy settings. The ones that come to mind are Power Management settings and Folder Redirection settings. In my opinion for these settings, pick one strategy: Group Policy or SCCM, because it becomes hard, almost impossible if you’re using multiple management technologies to manage the same settings. I’ll talk a little more about this “management overlap” problem toward the end of this manifesto.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Microsoft Intune at its best&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Microsoft Intune is best at:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Managing phones (iOS, Android, Windows Phones)&lt;/li&gt;
	&lt;li&gt;Managing some aspects of Windows PCs&lt;/li&gt;
	&lt;li&gt;Getting you some ability to manage Non-Domain joined machines&lt;/li&gt;
	&lt;li&gt;Letting people use their own devices to access corporate data&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To be clear, Intune has two ways it can manage devices. One way is called the Intune client. And like SCCM it has to be installed on the endpoint to pick up directives. As you might imagine the Intune client (like the SCCM client) can only be installed on real Windows PCs and not, say phones.&lt;/p&gt;

&lt;p&gt;But what if you don’t want to install anything at all on your endpoint (or in the case of iOS, Android, or Windows Phones? Well, you don’t need too, and for that, you get some, but not all benefits.&lt;/p&gt;

&lt;p&gt;Intune (or similar 3rd party tools like Airwatch or MobileIron) can all use the same “receiver” to perform their newest directives. That receiver is called MDM: Mobile Device Management client.&lt;/p&gt;

&lt;p&gt;The MDM client (also known as the MDM platform) is a “cousin” and is similar to Group Policy; because like Group Policy, the MDM client is in the box (for Windows 10) and can receive directives, kind of like Group Policy does.&lt;/p&gt;

&lt;p&gt;Okay then, what makes MDM different than Group Policy? Let’s go back to the Microsoft-written blog entry for the quote:&lt;/p&gt;

&lt;blockquote&gt;
&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt;&lt;em&gt;&lt;strong&gt;The MDM approach calls for settings that achieve the admin’s intent without exposing every possible setting. In contrast, Group Policy exposes fine-grained settings the admin controls individually. &lt;/strong&gt;&lt;/em&gt;&lt;/div&gt;
&lt;/blockquote&gt;

&lt;p&gt;There you have it.&lt;/p&gt;

&lt;p&gt;MDM is good for sweeping ideas (also known as Intent), but not stellar at fine-grained settings management.&lt;/p&gt;

&lt;p&gt;So, what is “Intent” (MDM) versus “Fine-grained settings”(Group Policy) mean?&lt;/p&gt;

&lt;p&gt;Intent means that you might want something to be generally secure (aka VPN settings, Mail settings, Password length), but you really don’t care (or perhaps even get a chance to KNOW) what is happening under the hood. So when you want it done, across multiple operating systems, and don’t care HOW it’s done, then MDM works fine. It’s setting the settings (one, two or a zillion) but you don’t have to particularly know what.&lt;/p&gt;

&lt;p&gt;I can see where that’s good for some administrators, but totally frightening to others.&lt;/p&gt;

&lt;p&gt;So what is MDM BEST at then? Well MDM is all XML based, which means its directives are very lightweight and can be sent and received over low bandwidth conditions like cellular networks. So as the blog entry says:&lt;/p&gt;

&lt;blockquote&gt;
&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt;&lt;em&gt;&lt;strong&gt;This makes MDM the best choice for devices that are constantly on the go.&lt;/strong&gt;&lt;/em&gt;&lt;/div&gt;
&lt;/blockquote&gt;

&lt;p&gt;Like a phone.&lt;/p&gt;

&lt;p&gt;But for a full Windows PC, if you want more granular management: MDM isn’t the best, Group Policy is. Here are some for-instances:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You cannot drop a shortcut on a Windows 10 desktop using MDM. You can using Group Policy.&lt;/li&gt;
	&lt;li&gt;You cannot rename the local Administrator on a Windows 10 desktop using MDM. You can using Group Policy.&lt;/li&gt;
	&lt;li&gt;You cannot map a printer on a Windows 10 desktop using MDM. You can using Group Policy.&lt;/li&gt;
	&lt;li&gt;You cannot prevent access to specific control panel applets on a Windows 10 desktop using MDM. You can using Group Policy.&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Okay. This gets really confusing really fast, so try to stick with me. Because Intune can use the Intune client OR the MDM client you actually get a different set of functions and possibilities depending on which client you use.&lt;/p&gt;

&lt;p&gt;In some cases, using the Intune client, Intune is trying to manipulate the exact same settings that would also take effect using Group Policy. The ones that come to mind are Firewall settings settings.&lt;/p&gt;

&lt;p&gt;But Intune’s future is to be reliant upon the in-box MDM client and not the installable Intune client. And, since MDM isn’t trying to overtake Group Policy’s granular functions that means, by definition, that means Intune isn’t trying to overtake Group Policy.&lt;/p&gt;

&lt;p&gt;Therefore, as a side note, since Intune (and tools like it) aren’t trying to do Group Policy, I often get the question of “How can I deliver real Group Policy settings to my ‘&lt;strong&gt;constantly on the go&lt;/strong&gt;’ Windows PCs”. As such, there are four viable options:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Option 1: Ensure your people in the field use a VPN and connect consistently. Group Policy works perfectly thru VPN and will deliver on-prem Active Directory GPOs to your “constantly on the go” Windows PCs. Of course, this means that users need to initiate that VPN connection; and that could be problematic.&lt;br /&gt;
	 &lt;/li&gt;
	&lt;li&gt;Option 2: Extend your corporate network to the Internet using Microsoft DirectAccess. DirectAccess extends your intranet OUT to the Internet (but in a secure way.) DirectAccess is only available for Windows Enterprise edition, and can be a bear to set up. People I’ve talked with who have DirectAccess set up and working really love it. But they won’t talk with you about their deployment experience until AFTER you’ve got two beers in them.&lt;br /&gt;
	 &lt;/li&gt;
	&lt;li&gt;Option 3: PolicyPak Cloud (from my company PolicyPak Software) will take any Group Policy setting, let you EXPORT it, then upload it to our PolicyPak Cloud service. Then client computers automatically download and perform your directives. Not to brag, but “It Just Works.” And it works also for non-Domain Joined and Domain Joined machines. More information, demonstration videos and a free trial, &lt;a href=&quot;https://www.policypak.com/products/policypak-suite-cloud-edition.html&quot; target=&quot;_blank&quot;&gt;check it out here.&lt;/a&gt;&lt;br /&gt;
	 &lt;/li&gt;
	&lt;li&gt;Option 4: PolicyPak On-Prem with an MDM Service. As of June 2017, we can take any Group Policy setting, let you EXPORT it, and use your own MDM service (like Intune, Airwatch, or MobileIron) and deploy 100% real Group Policy Settings using your EXISTING MDM service. Again, this “Just Works”.  More information, demonstration videos and a free trial, &lt;a href=&quot;https://www.policypak.com/integration/policypak-and-mdm-utilities.html&quot; target=&quot;_blank&quot;&gt;check it out here&lt;/a&gt; and some FAQs PolicyPak On-Prem and your MDM service “better together” &lt;a href=&quot;https://www.policypak.com/support-sharing/policypak-and-mdm-faq.html&quot;&gt;more about this here&lt;/a&gt;.&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Please don’t think I’m not “Pro Intune”. I am Pro Intune, for what Intune does best. It has an excellent Company Portal ability which enables self-install of applications to Phones and PCs, auto-enrollment of Phones, protects access to resources like Exchange mail and other corporate data.&lt;/p&gt;

&lt;p&gt;But granular management of domain-joined Windows PCs? It’s simply not the MDM-platform (and by extension, Microsoft Intune’s) best strength. What is interesting though, is that the very logical thinking behind MDM settings will increase Group Policy’s own set. In other words, when a team inside Microsoft wants to MDM-enable a setting, the goal is to do their best and also Group Policy-enable that same setting in Windows 10. So, thanks MDM team for rising the tide to lift all boats. That being said, there is no goal to back-port 5,000+ Group Policy settings to MDM but increase reach as needed.&lt;/p&gt;

&lt;p&gt;Side note: You can marry on-prem SCCM to a Windows Intune subscription, which gives you the ability from your on-prem SCCM to deliver MDM settings to your MDM-enrolled devices. That’s nice if, say, you have 10,000 on-prem PCs you want to patch using SCCM and want to use the same console to deliver an MDM setting like “Use Strong Password on my Phones.”&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Powershell &amp; DSC at its best&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Powershell is best at:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Complex functions which require logic and error handling.&lt;/li&gt;
	&lt;li&gt;Configuring items which require a “method” (WMI, COM, API).&lt;/li&gt;
	&lt;li&gt;Reading one value and then consequently writing another value.&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;DSC (Desired State Configuration), a function of PowerShell is best at:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Bringing up a zillion similar servers, to a set of specific specifications.&lt;/li&gt;
	&lt;li&gt;Datacenter and Cloud scenarios&lt;/li&gt;
	&lt;li&gt;But not specifically CLIENT scenarios.&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Powershell and DSC are ludicrously powerful. But PowerShell is not meant to make ongoing configuration changes on your endpoints. And DSC is &lt;em&gt;not meant&lt;/em&gt; to declare state for Windows endpoints aka Windows 7, 8.1 and 10. DSC is for SERVERS; and doesn’t have the ability to target computers in the same way that Group Policy does nor does it have the same function set, nor is it TRYING to be a GP replacement.&lt;/p&gt;

&lt;p&gt;So on &lt;em&gt;May 10th, 2016 ..&lt;/em&gt; There was a little bit of a stir on Twitter when Jeffrey Snover, Technical Fellow at Microsoft (and father of Powershell and DSC) said the following… “&lt;strong&gt;Desired State Configuration (DSC) is the replacement for GP – it provides better semantics for server scenarios.&lt;/strong&gt;“&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/assets/images/jsnover1a.jpg&quot;&gt;&lt;img alt=&quot;jsnover1a&quot; src=&quot;https://www.gpanswers.com/assets/images/jsnover1a.jpg&quot; style=&quot;height:67px; width:300px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But he quickly clarified and honed his statement.. 20 minutes later… which makes total sense… “&lt;strong&gt;Group Policy is very well suited to client scenarios which is why you saw a big set of new GPs for Win10″&lt;/strong&gt;&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/assets/images/jsnover2.jpg&quot;&gt;&lt;img alt=&quot;jsnover2&quot; src=&quot;https://www.gpanswers.com/assets/images/jsnover2.jpg&quot; style=&quot;height:64px; width:300px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At the time, I needed to interpret / explain Jeffrey a little here. What he was saying was that there are some tools which could be used with Group Policy to configure servers today.. and they stink.. and I agree. Those two tools would be:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/magazine/2007.04.securitywatch.aspx&quot;&gt;Windows Security Configuration Wizard&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;https://technet.microsoft.com/en-us/solutionaccelerators/cc835245.aspx&quot;&gt;Windows Security Compliance Manager&lt;/a&gt; (now dead, as of July 2017.)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;br /&gt;
Those tools try to tell servers how to be more secure and they use GP as the transport to get those directives embraced. But they stink. And DSC is a better choice for telling servers how to get stood up and be secure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;July 17, 2017 update&lt;/em&gt;&lt;/strong&gt;.. Even with this blog entry, I keep getting asked the same question: “What’s the deal with DSC on ENDPOINTS?” So I took some quality time, and worked with Jeffrey Snover — &lt;strong&gt;PERSONALLY&lt;/strong&gt;, on this, and together, we co-wrote some “tenets” around DSC working with clients / endpoints. Here is what Jeffrey and I landed on together. And this is the official gospel coming from the mountain:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;
	&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt;DSC’s design goals &amp; best use cases are for Datacenter &amp; Cloud scenarios (such as “Bringing up 400 servers in a controlled sequence.”)&lt;/div&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt;DSC with Windows clients will work: since it’s part of the Windows management platform. But it is not DSC’s design center, and the client management teams are not driving DSC requirements.&lt;/div&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt;DSC alongside other management mechanisms (like Group Policy, or SCCM, etc..) would be considered “competing controllers”. Never a good idea with ANY two controllers managing the same resources (aka: target value) for writing.&lt;/div&gt;
	&lt;/li&gt;
	&lt;li&gt;
	&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt;DSC for use as a reporting mechanism about configuration state (as a read-only) mechanism on Servers or Clients could be an interesting idea&lt;/div&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt; – &lt;strong&gt;Jeffrey Snover co-written with Jeremy Moskowitz&lt;/strong&gt;, with Microsoft’s Aaron Margosis and Zach Alexander with the assist.&lt;/div&gt;

&lt;p&gt;&lt;br /&gt;
Again: This is me *WITH* Jeffrey Snover, agreeing to these words. Thanks to Jeffrey and my other Microsoft pals for for helping contribute to this segment.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Nano Server: What’s the deal with that? (Updated, July 2017).&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Continuing onward: Let’s talk about Nano server, why you should and/or shouldn’t care, and how Group Policy and/or DSC relates to Nano server.&lt;/p&gt;

&lt;p&gt;First: When Nano server was released it did TWO things. Some “Infrastructure” things, like become a DHCP server or DNS server, and also had the ability to host containers for apps (web apps and the like.)&lt;/p&gt;

&lt;p&gt;Now: (July 2017), everything changed with regards to Nano. They have DITCHED the ability to do “infrastructure things.” Don’t believe me? Here’s the blog entry:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.msdn.microsoft.com/canberrapfe/2017/07/18/windows-server-2016-nano-server-and-how-it-has-changed-already/&quot;&gt;https://blogs.msdn.microsoft.com/canberrapfe/2017/07/18/windows-server-2016-nano-server-and-how-it-has-changed-already/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;and here’s the quote to take to the bank…&lt;/p&gt;

&lt;blockquote&gt;
&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt;&lt;em&gt;&lt;strong&gt;“The changes mean that Nano Server, from the most recent update, will no longer be able to implement Server infrastructure roles. It can no longer, for example, run IIS or DNS in your environments like it could at from the earliest Technical Previews right up until the RTM version.”&lt;/strong&gt;&lt;/em&gt;&lt;/div&gt;
&lt;/blockquote&gt;

&lt;p&gt;So: How what does this mean for Nano and GP support?&lt;/p&gt;

&lt;p&gt;If you’re looking at Nano server, there is &lt;strong&gt;no GP client (receiver) in Nano server&lt;/strong&gt;. Which for me, is totally fine. Because, again, DSC is better for Servers and not clients. For more information on this, &lt;a href=&quot;https://blogs.technet.microsoft.com/grouppolicy/2016/05/09/configuration-management-on-servers/&quot;&gt;see this article from Zach A. from the GP team&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Note: So that’s it for Nano. No GP support; DSC only, and .. that’s AWESOME NEWS for everyone.  Since DSC’s design goals &amp; best use cases are for Datacenter &amp; Cloud scenarios (such as “Bringing up 400 servers in a controlled sequence.”) AND since Nano is now devoid of any infrastructure role, there is no tear to be shed that Nano has NO Group Policy support.&lt;/p&gt;

&lt;p&gt;So, let’s recap:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;PowerShell is the right job sometimes on clients.&lt;/li&gt;
	&lt;li&gt;And DSC is the right job sometimes on SERVERS.&lt;/li&gt;
	&lt;li&gt;But DSC is never right for endpoints (clients).&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Again: technically, you could apply DSC to endpoints and perform at least some of what Group Policy does, and expect it to work.. because DSC is built into the Windows platform.&lt;/p&gt;

&lt;p&gt;And you could go bananas and build your own DSC resources to do similar work that Group Policy already does. But there is absolutely zero guidance or suggestion from Microsoft that you do this. (Again: See Snover’s twitter comment above: “&lt;strong&gt;Group Policy is very well suited to client scenarios which is why you saw a big set of new GPs for Win10&lt;/strong&gt;.” and the DSC “Tenets” above “&lt;strong&gt;The client is not DSC’s design center, and the client management teams are not driving DSC requirements&lt;/strong&gt;.”&lt;/p&gt;

&lt;p&gt;Therefore, as it sits today, neither PowerShell nor DSC is a sanctioned replacement for Group Policy on the client… ever.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;When Two Management Systems Work (or Don’t Work) Together  aka “The Competing Controllers” problem (updated July 2017)&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Oh, and if you’re considering using Group Policy and DSC, you need to know the (now sort-of famous) quote (also) from Jeffrey Snover when asked:&lt;/p&gt;

&lt;p&gt;Q: Will DSC and Group Policy work together?&lt;br /&gt;
A: No. They will fight like two raccoons in a bag.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.systemcentercentral.com/day-50-comparing-contrasting-powershell-dsc-versus-group-policy/&quot; target=&quot;_blank&quot;&gt;http://www.systemcentercentral.com/day-50-comparing-contrasting-powershell-dsc-versus-group-policy/ &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And honestly, this is true about any two management systems. Seriously. Let’s replace “Will DSC and Group Policy work together?” with:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;“Will Group Policy and Intune/MDM work together?”&lt;/li&gt;
	&lt;li&gt;“Will Group Policy and SCCM work together?”&lt;/li&gt;
	&lt;li&gt;“Will PowerShell and Intune/MDM work together?”&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In pretty much all cases..  if you’re trying to set the exact same settings on the endpoint… the only answer would be:&lt;/p&gt;

&lt;p&gt;A: No. They will fight like two raccoons in a bag… [again: if you’re trying to use two systems to manage the same exact same settings.]&lt;/p&gt;

&lt;p&gt;This is called the Competing Controllers problem, and is “Tenet #3” of DSC + Clients as seen earlier (which was updated in July 2017.)&lt;/p&gt;

&lt;p&gt;Anytime you’re trying to poke the same value with two management systems with different approaches, you are asking for trouble. So even if you don’t choose Group Policy (which, again, Microsoft is saying is “&lt;strong&gt;the best way to granularly configure domain joined Windows PCs and tablets connected to the corporate network&lt;/strong&gt;” ) … okay. Fine. Whatever you use, use it consistently. For instance, Microsoft Intune has some guidance about using Microsoft Intune and Group Policy &lt;a href=&quot;https://technet.microsoft.com/en-us/library/dn646986.aspx&quot; target=&quot;_blank&quot;&gt; together here&lt;/a&gt; specifically detail how this situation is handled and provide some guidance to avoid problems like this.&lt;/p&gt;

&lt;p&gt;Also: I would say that SCCM and Intune also don’t fight like two raccoons in a bag, if only because they are built from the same team and have a well thought out hybrid model .. when you USE that hybrid model as designed. But you could go bananas and poke the same value with SCCM and Intune, in the WRONG way.&lt;/p&gt;

&lt;p&gt;Said yet another way, I’m not suggesting you use say, Group Policy exclusively or SCCM exclusively. I am saying you can use multiple management systems for different parts of the world. For instance, Group Policy CAN deploy software to your domain-joined systems, but I don’t recommend it. I recommend SCCM or purpose-built 3rd party tools, which are way, way better than what Group Policy can do with regards to Software Deployment.&lt;/p&gt;

&lt;p&gt;You can use SCCM to deploy desktops and use DSC to bring up servers.&lt;/p&gt;

&lt;p&gt;So for complete clarity: Group Policy, and say, SCCM can and often do work hand in hand. What I’m saying (again clarifying for emphasis) would be: Don’t use two management tools to poke at the SAME THING with TWO systems. That’s “Competing Controllers”. That is just asking for trouble. Use the right tool for the right job.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;What about Azure Active Directory ?&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Azure Active Directory is NOT “On-Prem Active Directory in the cloud.”&lt;/p&gt;

&lt;p&gt;It just isn’t. It has two main jobs, and here they are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Creating identity&lt;/li&gt;
	&lt;li&gt;Auto-workplace / MDM joining machines to an MDM service of your choice (Intune, Airwatch, etc.)&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So okay. If you have 10,000 iPhones, Android, Windows Phones and some Windows 10 PCs you don’t want to domain join, then I see some real value here.&lt;/p&gt;

&lt;p&gt;I can see this as something awesome in a university environment when you tell students: “Buy whatever you want and here are some credentials. And when you ‘join us’, we’re going to lightly manage your machines so you can be partially, but not mega-naughty, on our network.”&lt;/p&gt;

&lt;p&gt;That scenario: I totally get with Azure Active Directory and auto-enrolled MDM.&lt;/p&gt;

&lt;p&gt;The other nice thing about Azure Active Directory is called out in the blog post:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure AD Join is also a great solution for temporary staff, partners, or other part-time employees. These accounts can be kept separate from the on-premises AD domain but still access needed corporate resources.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;But, see the earlier talk about what MDM settings can do versus Group Policy settings.&lt;/p&gt;

&lt;p&gt;Said another way, and I want to be as perfectly clear as I can here:&lt;/p&gt;

&lt;p&gt;&lt;ins&gt;Microsoft has no cloud-based way to deliver real Group Policy settings thru Azure Active Directory: it is NOT a current design goal of Azure Active Directory, nor do I ever expect it to be.&lt;/ins&gt;&lt;/p&gt;

&lt;p&gt;If you want real Group Policy thru the Internet, see the four solutions I suggested earlier: VPN or DirectAccess (for domain joined machines) or &lt;a href=&quot;https://www.policypak.com/products/policypak-suite-cloud-edition.html&quot;&gt;PolicyPak Cloud&lt;/a&gt; (for domain joined or non-domain joined machines), or PolicyPak On-Prem with your existing MDM service.&lt;/p&gt;

&lt;p&gt;This latest one is new as of June 2017. We announced at PolicyPak we also have &lt;a href=&quot;https://www.policypak.com/integration/policypak-and-mdm-utilities.html&quot;&gt;TRUE Group Policy support along side any existing MDM service&lt;/a&gt;. So if you have Intune, Airwatch or Mobileiron, and want to EXPORT real Group Policy for use with your MDM service, &lt;a href=&quot;https://www.policypak.com/integration/policypak-and-mdm-utilities.html&quot;&gt;then check out these videos&lt;/a&gt;. We built this solution for customers who are just being told “You MUST use MDM and you need a way to get your existing GPOs handled via MDM.” Okay, if you want to do that, we provide the only true viable option for that.&lt;/p&gt;

&lt;p&gt;That about wraps up my “Why Group Policy is Not Dead” manifesto. I’m appreciative that Microsoft took the time and care to explain to all their customers (and also by extension, their field representatives) about how Group Policy isn’t dead and still very relevant in the Windows 10 era.&lt;/p&gt;

&lt;p&gt;Thanks to Jeffrey Snover, Zach Alexander and Aaron Margosis for contributing to this blog entry to help set the record straight.&lt;/p&gt;

&lt;p&gt;For me, this blog was a labor of love. I wanted to take the time to write this to underscore those sentiments and explain how I see Microsoft’s current array of utilities working at their best. As a final thought, again, from the Microsoft blog entry, this says it all:&lt;/p&gt;

&lt;blockquote&gt;
&lt;div style=&quot;background:#eeeeee; border:1px solid #cccccc; padding:5px 10px&quot;&gt;&lt;em&gt;&lt;strong&gt;Group Policy is the best way to granularly configure domain joined Windows PCs and tablets connected to the corporate network using Windows-based tools. Microsoft continues to add Group Policy settings with each new version of Windows.&lt;/strong&gt;&lt;/em&gt;&lt;/div&gt;
&lt;/blockquote&gt;

&lt;p&gt;But that being said, if anyone ever tries to convince you that Microsoft has eschewed Group Policy for something else, here is even more evidence of Group Policy not being dead… Very recent new tools, functions, guidance, and advice from Microsoft which use Group Policy:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/mmpc/2016/03/22/new-feature-in-office-2016-can-block-macros-and-help-prevent-infection/&quot; target=&quot;_blank&quot;&gt;Tooling and guidance to stop Macro-based attacks.&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;http://blogs.technet.com/b/secguide/archive/2016/01/22/new-tool-policy-analyzer.aspx&quot; target=&quot;_blank&quot;&gt;Group Policy Analyzer.&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;http://blogs.technet.com/b/secguide/archive/2016/01/21/lgpo-exe-local-group-policy-object-utility-v1-0.aspx&quot; target=&quot;_blank&quot;&gt;LGPO tool.&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=46899&quot;&gt;Local Admin Password Solution (LAPS)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;http://blogs.technet.com/b/secguide/&quot; target=&quot;_blank&quot;&gt;SecGuides for Group Policy-based security deployment. &lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=25250&quot; target=&quot;_blank&quot;&gt;Group Policy Settings Spreadsheet which contains all settings including those for Windows 10&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/secguide/2016/07/28/security-compliance-manager-4-0-now-available-for-download/&quot;&gt;Security Compliance Manager 4.0&lt;/a&gt; (July 2016 !).. (now Dead, yay.. good riddance !!)&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;https://www.microsoft.com/en-us/download/details.aspx?id=55319&quot;&gt;Security Compliance Toolkit 1.0&lt;/a&gt; (July 2017!)&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;PS: If you’d like a “second opinion”, please see my Pal Stephen’s blog at FoxDeploy. He does a great job contrasting GP, SCCM and DSC. &lt;a href=&quot;https://foxdeploy.com/2016/02/25/dsc-vs-gpo-vs-sccm-the-case-for-each/&quot;&gt;Here’s the link&lt;/a&gt; for that second opinion.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Hide your name and email in Windows 10 Lock Screen </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/hide-your-name-and-email-in-windows-10-lock-screen</link>
        <pubDate>2016-03-15T21:12:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Found this great little article:

http://www.groovypost.com/howto/hide-username-email-photo-windows-10-logon-screen/

It&amp;rsquo;s very well written. Nice job. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Found this great little article:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.groovypost.com/howto/hide-username-email-photo-windows-10-logon-screen/&quot;&gt;http://www.groovypost.com/howto/hide-username-email-photo-windows-10-logon-screen/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It’s very well written. Nice job.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Interview with Aaron Margosis.. Part 3 of 3: Microsoft Scams, Whitelisting, and Futures ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/interview-with-aaron-margosis-part-3-of-3-microsoft-scams-whitelisting-and-futures</link>
        <pubDate>2016-03-14T18:48:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Part 3: What happens when someone from “Not Microsoft” calls Aaron
Notes from Part 3 (the final part of the Interview… here !)
Download the audio MP3:&amp;nbsp;https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part3.mp3
Download the ZIP:&amp;nbsp;https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part3.zip
Aarons tips to making people more secure.
Applocker and DeviceGuard Training:
https://www.gpanswers.com/training
NSA Application Whitelisting using Microsoft Applocker:
http ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Part 3: What happens when someone from “Not Microsoft” calls Aaron&lt;/p&gt;
&lt;p&gt;Notes from Part 3 (the final part of the Interview… here !)&lt;/p&gt;
&lt;p&gt;Download the audio MP3: &lt;a href=&quot;https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part3.mp3&quot;&gt;https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part3.mp3&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Download the ZIP: &lt;a href=&quot;https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part3.zip&quot;&gt;https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part3.zip&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Aarons tips to making people more secure.&lt;/p&gt;
&lt;p&gt;Applocker and DeviceGuard Training:&lt;br&gt;
&lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;https://www.gpanswers.com/training&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;NSA Application Whitelisting using Microsoft Applocker:&lt;br&gt;
&lt;a href=&quot;https://www.nsa.gov/ia/_files/app/Application_Whitelisting_Using_Microsoft_AppLocker_FINAL.pdf&quot;&gt;https://www.nsa.gov/ia/_files/app/Application_Whitelisting_Using_Microsoft_AppLocker_FINAL.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Applocker talk from Jeremy Moskowitz at TechEd 2010:&lt;br&gt;
&lt;a href=&quot;https://channel9.msdn.com/Events/TechEd/NorthAmerica/2010/WCL303&quot;&gt;https://channel9.msdn.com/Events/TechEd/NorthAmerica/2010/WCL303&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Project Centenial:&lt;br&gt;
&lt;a href=&quot;https://channel9.msdn.com/Events/Build/2015/2-692&quot;&gt;https://channel9.msdn.com/Events/Build/2015/2-692&lt;/a&gt;&lt;br&gt;
&lt;a href=&quot;https://devpreviewsignup.windows.com/&quot;&gt;https://devpreviewsignup.windows.com/&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Interview with Aaron Margosis: Part 2 of 3 .. Local GPO, SecGuides, what-to-use-for-what-scenario coaching </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/interview-with-aaron-margosis-part-2-of-3-local-gpo-secguides-what-to-use-for-what-scenario-coaching</link>
        <pubDate>2016-03-08T15:27:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ My interview with Aaron Margosis.. Part 2 !

Learn about LocalGPOs, Security Guides, why Group Policy is still THE BEST WAY to manage domain joined PCs.

Option 1 (play directly in the browser):

https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part2.mp3

Option 2 (zipped):

https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part2.zip

Part 2:

SCM:
https://technet.microsoft.com/en-us/solutionaccelerators/cc835245.aspx

LGPO
http://blogs.technet.com/b/secguide/arc ]]>
        </description>
        <content:encoded>
            &lt;p&gt;My interview with Aaron Margosis.. Part 2 !&lt;/p&gt;

&lt;p&gt;Learn about LocalGPOs, Security Guides, why Group Policy is still THE BEST WAY to manage domain joined PCs.&lt;/p&gt;

&lt;p&gt;Option 1 (play directly in the browser):&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part2.mp3&quot;&gt;https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part2.mp3&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Option 2 (zipped):&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part2.zip&quot;&gt;https://www.gpanswers.com/media/Aaron-Margosis-Interview-Part2.zip&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Part 2:&lt;/p&gt;

&lt;p&gt;SCM:&lt;br /&gt;
&lt;a href=&quot;https://technet.microsoft.com/en-us/solutionaccelerators/cc835245.aspx&quot;&gt;https://technet.microsoft.com/en-us/solutionaccelerators/cc835245.aspx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;LGPO&lt;br /&gt;
&lt;a href=&quot;http://blogs.technet.com/b/secguide/archive/2016/01/21/lgpo-exe-local-group-policy-object-utility-v1-0.aspx&quot;&gt;http://blogs.technet.com/b/secguide/archive/2016/01/21/lgpo-exe-local-group-policy-object-utility-v1-0.aspx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;SecGuides:&lt;br /&gt;
&lt;a href=&quot;http://blogs.technet.com/b/secguide/&quot;&gt;http://blogs.technet.com/b/secguide/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Favorite quote from this part of the interview:&lt;/p&gt;

&lt;p&gt;“Group policy; it’s been around the longest and is THE BEST WAY to manage domain joined machines” –Aaron Margosis&lt;/p&gt;

&lt;p&gt;PolicyPak Cloud Service: Extend real GPOs thru the Internet to domain joined and non-domain joined machines&lt;br /&gt;
&lt;a href=&quot;https://www.policypak.com/products/policypak-suite-cloud-edition.html&quot;&gt;https://www.policypak.com/products/policypak-suite-cloud-edition.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;PolicyPak MDM Settings Manager:&lt;br /&gt;
&lt;a href=&quot;https://www.policypak.com/products/policypak-mdm-settings-manager.html&quot;&gt;https://www.policypak.com/products/policypak-mdm-settings-manager.html&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Interview with Aaron Margosis Part 1 of 3:  Get to know Group Policy Analyzer </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/interview-with-aaron-margosis-part-1-of-3-get-to-know-group-policy-analyzer</link>
        <pubDate>2016-03-04T18:23:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Hi.. ! I got a chance to sit down with an interview Aaron Margosis from Microsoft in a 3-part Interview !
Learn about Aaron’s upcoming new Sysinternals book, and his new GP Analyzer tool.
Part 2 and 3 coming soon… !
NOTE:&amp;nbsp;I wanted to get this out the door as fast as possible, so it’s not yet uploaded to GPanswers.com; and instead is here in Dropbox and also Amazon S3.
–
Option 1 (play directly in the browser):
https://www.gpanswers.com/media/Aaron-Margosis-and-Jeremy-Moskowitz ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Hi.. ! I got a chance to sit down with an interview Aaron Margosis from Microsoft in a 3-part Interview !&lt;/p&gt;
&lt;p&gt;Learn about Aaron’s upcoming new Sysinternals book, and his new GP Analyzer tool.&lt;/p&gt;
&lt;p&gt;Part 2 and 3 coming soon… !&lt;/p&gt;
&lt;p&gt;NOTE: I wanted to get this out the door as fast as possible, so it’s not yet uploaded to GPanswers.com; and instead is here in Dropbox and also Amazon S3.&lt;/p&gt;
&lt;p&gt;–&lt;/p&gt;
&lt;p&gt;Option 1 (play directly in the browser):&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Aaron-Margosis-and-Jeremy-Moskowitz Interview-Part-1.mp3&quot;&gt;https://www.gpanswers.com/media/Aaron-Margosis-and-Jeremy-Moskowitz Interview-Part-1.mp3&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Option 2 (zipped):&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Aaron-Margosis-and-Jeremy-Moskowitz-Interview-Part-1.zip&quot;&gt;https://www.gpanswers.com/media/Aaron-Margosis-and-Jeremy-Moskowitz-Interview-Part-1.zip&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Notes from Part 1 of the Interview:&lt;/p&gt;
&lt;p&gt;Sami Laiho Sysinternals 20th Birthday conference:&lt;br&gt;
http://win-fu.com/sysinternals20&lt;/p&gt;
&lt;p&gt;Group Policy Analyzer:&lt;br&gt;
http://blogs.technet.com/b/secguide/archive/2016/01/22/new-tool-policy-analyzer.aspx&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Two new Group Policy tools from Microsoft </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/two-new-group-policy-tools-from-microsoft</link>
        <pubDate>2016-02-16T20:25:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft recently released a nice little freebie which lets you compare “sets” of GPOs to help you determine GPO settings overlap.
Check it out.
Link: http://blogs.technet.com/b/secguide/archive/2016/01/22/new-tool-policy-analyzer.aspx
the second tool is the spiritual successor to LocalGPO, and is called LGPO. This helps you take many settings and deliver them to Local GPOs instead of via AD-based GPOs.
Check it out.
Link:&amp;nbsp;http://blogs.technet.com/b/secguide/archive/2016/01/21/lgp ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Microsoft recently released a nice little freebie which lets you compare “sets” of GPOs to help you determine GPO settings overlap.&lt;/p&gt;
&lt;p&gt;Check it out.&lt;/p&gt;
&lt;p&gt;Link: &lt;a href=&quot;http://blogs.technet.com/b/secguide/archive/2016/01/22/new-tool-policy-analyzer.aspx&quot;&gt;http://blogs.technet.com/b/secguide/archive/2016/01/22/new-tool-policy-analyzer.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;the second tool is the spiritual successor to LocalGPO, and is called LGPO. This helps you take many settings and deliver them to Local GPOs instead of via AD-based GPOs.&lt;/p&gt;
&lt;p&gt;Check it out.&lt;/p&gt;
&lt;p&gt;Link: &lt;a href=&quot;http://blogs.technet.com/b/secguide/archive/2016/01/21/lgpo-exe-local-group-policy-object-utility-v1-0.aspx&quot;&gt;http://blogs.technet.com/b/secguide/archive/2016/01/21/lgpo-exe-local-group-policy-object-utility-v1-0.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;And enjoy !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Wubba heck is WUB (Windows Update for Business) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/wubba-heck-is-wub-windows-update-for-business</link>
        <pubDate>2015-11-24T15:24:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In the spirit of NOT repeating everything word for word that people have already laid down, I can point you to some very well written articles explaining the basics of Windows Update for Business.
That being said, before you dive in, here’s my pre-2 cents / summary of Windows Update for Business (WUB):

Windows Update for Business is not (yet another) cloud service.
Windows Update for Business is not WSUS in the cloud. (See first bullet point.)
Windows Update for Business is a mere SINGLE ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In the spirit of NOT repeating everything word for word that people have already laid down, I can point you to some very well written articles explaining the basics of Windows Update for Business.&lt;/p&gt;
&lt;p&gt;That being said, before you dive in, here’s my pre-2 cents / summary of Windows Update for Business (WUB):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows Update for Business is not (yet another) cloud service.&lt;/li&gt;
&lt;li&gt;Windows Update for Business is not WSUS in the cloud. (See first bullet point.)&lt;/li&gt;
&lt;li&gt;Windows Update for Business is a mere SINGLE Group Policy Setting.&lt;/li&gt;
&lt;li&gt;The point of WUB is to use the GP skills you already have to create “collections” (my word) or “rings” (Microsoft’s word) dictating when some machines will accept updates and others will not. (What? No / need GP skills? &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.gpanswers.com/training&lt;/a&gt; )&lt;/li&gt;
&lt;li&gt;You can still use WSUS if you want to; but the point is that Microsoft is basically saying “trust us with the update blocks.” Here’s the difference between WSUS and WUB:
&lt;ul&gt;
&lt;li&gt;WSUS enables you to get really granular. But that’s more work because you need to (theoretically) test then approve each update.&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;line-height: 1.5em&quot;&gt;WUB enables you to get LESS granular about your choices, but instead trust that Microsoft has pre-vetted the patches by the time those patches make it to you.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;You still need to use WSUS until your whole universe is Windows 10; then you can (theoretically) abandon WSUS and use only WUB.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;So, here are the good articles I’ve seen explaining WUB.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.computerworld.com/article/3005688/microsoft-windows/microsoft-debuts-controls-that-postpone-windows-10-feature-upgrades-up-to-a-year.html&quot;&gt;http://www.computerworld.com/article/3005688/microsoft-windows/microsoft-debuts-controls-that-postpone-windows-10-feature-upgrades-up-to-a-year.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.zdnet.com/article/how-to-take-control-of-windows-10-updates-and-upgrades-even-if-you-dont-own-a-business/&quot;&gt;http://www.zdnet.com/article/how-to-take-control-of-windows-10-updates-and-upgrades-even-if-you-dont-own-a-business/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Of course, if you need kick-butt GP skills.. take my Group Policy training ! &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training &lt;/a&gt;!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> RSAT for Windows 10 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/rsat-for-windows-10</link>
        <pubDate>2015-08-21T15:28:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ RSAT is the “Remote Server Admin Tools.”
It’s like the old “Adminpak.MSI”.. but.. it’s got a new name.
And its out for Windows 10 now. Here’s the link !
http://www.microsoft.com/en-us/download/details.aspx?id=45520
Enjoy ! ]]>
        </description>
        <content:encoded>
            &lt;p&gt;RSAT is the “Remote Server Admin Tools.”&lt;/p&gt;
&lt;p&gt;It’s like the old “Adminpak.MSI”.. but.. it’s got a new name.&lt;/p&gt;
&lt;p&gt;And its out for Windows 10 now. Here’s the link !&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.microsoft.com/en-us/download/details.aspx?id=45520&quot;&gt;http://www.microsoft.com/en-us/download/details.aspx?id=45520&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Enjoy !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Group Policy ADMX Files and Group Policy ADMX Spreadsheet for Windows 10 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/group-policy-admx-files-and-group-policy-admx-spreadsheet-for-windows-10</link>
        <pubDate>2015-08-07T14:06:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:
It’s TIME! Windows 10 is out out out.. and with that, so is the latest Group Policy settings ADMX files and corresponding Excel Settings reference.
Here is a link to those two resources *AND* a link to my (older but totally still works!) video on WHAT TO DO WITH THE ADMX file DOWNLOAD.
So, here are…
The ADMX files themselves:
http://www.microsoft.com/en-us/download/details.aspx?id=48257
The ADMX settings spreadsheet reference:
http://www.microsoft.com/en-us/download/details.aspx ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;
&lt;p&gt;It’s TIME! Windows 10 is out out out.. and with that, so is the latest Group Policy settings ADMX files and corresponding Excel Settings reference.&lt;/p&gt;
&lt;p&gt;Here is a link to those two resources *AND* a link to my (older but totally still works!) video on WHAT TO DO WITH THE ADMX file DOWNLOAD.&lt;/p&gt;
&lt;p&gt;So, here are…&lt;/p&gt;
&lt;p&gt;The ADMX files themselves:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.microsoft.com/en-us/download/details.aspx?id=48257&quot;&gt;http://www.microsoft.com/en-us/download/details.aspx?id=48257&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The ADMX settings spreadsheet reference:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.microsoft.com/en-us/download/details.aspx?id=25250&quot;&gt;http://www.microsoft.com/en-us/download/details.aspx?id=25250&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Also, please &lt;a href=&quot;https://www.youtube.com/watch?v=acYb2wQeL94&quot;&gt;see MY VIDEO&lt;/a&gt; on what to do when you download the latest ADMX files.&lt;/p&gt;
&lt;p&gt;PS:&lt;/p&gt;
&lt;p&gt;In case anyone ran into the error below after they copied over the new files.&lt;/p&gt;
&lt;p&gt;“Microsoft.Policies.Sensors.WindowsLocationProvider’ is already defined” error when you edit a policy in Windows “&lt;/p&gt;
&lt;p&gt;This link and solution fixed it rather easily.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://support.microsoft.com/en-us/kb/3077013&quot; target=&quot;_blank&quot; rel=&quot;nofollow&quot;&gt;https://support.microsoft.com/en-us/kb/3077013&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Thanks to my friend Chuck for the “PS”. ?&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to block a Windows 10 update using Group Policy and the Cloud (For Windows 7 and Windows 8.1) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-block-a-windows-10-update-using-group-policy-for-windows-7-and-windows-8-1</link>
        <pubDate>2015-07-28T20:40:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I’ve been asked if there’s a Group Policy based way to squelch the messages to “Reserve your copy of Windows 10” from normal users.
The answer is YES, but it’s only REQUIRED for NON-DOMAIN JOINED MACHINES.
This is the one-stop-shop for everything from Microsoft:&amp;nbsp;https://support.microsoft.com/en-us/kb/3080351
There is another article from Microsoft which explains why Windows PRO machines might still get the pop-up, even if they ARE domain-joined and how to stop those machines fr ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I’ve been asked if there’s a Group Policy based way to squelch the messages to “Reserve your copy of Windows 10” from normal users.&lt;/p&gt;
&lt;p&gt;The answer is YES, but it’s only REQUIRED for NON-DOMAIN JOINED MACHINES.&lt;/p&gt;
&lt;p&gt;This is the one-stop-shop for everything from Microsoft: &lt;a href=&quot;https://support.microsoft.com/en-us/kb/3080351&quot;&gt;https://support.microsoft.com/en-us/kb/3080351&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://blogs.technet.com/b/charlesa_us/archive/2015/06/25/how-to-remove-block-and-prevent-quot-get-windows-10-quot-application-for-corporate-environments.aspx&quot;&gt;There is another article from Microsoft &lt;/a&gt;which explains why Windows PRO machines might still get the pop-up, even if they ARE domain-joined and how to stop those machines from getting the upgrade.&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;line-height: 1.5em&quot;&gt;Okay. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;line-height: 1.5em&quot;&gt;The final question though is: how do you get registry items over to your NON-DOMAIN JOINED machines if you don’t want to run around to them one by one?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Answer / VIDEO: &lt;a href=&quot;https://www.policypak.com/video/policypak-cloud-deploy-group-policy-admin-template-settings-over-the-internet.html&quot;&gt;PolicyPak Cloud deploys any Admin Template setting you need over the Internet!&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How To Enable UNC Hardened Access to Prevent JASBUG (MS15-011/KB3000483 &amp; MS15-014/KB3004361) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-enable-unc-hardened-access-to-prevent-jasbug-ms15-011kb3000483-ms15-014kb3004361</link>
        <pubDate>2015-02-25T23:01:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I didn’t write this. But fellow GPanswers.com Team Member Charles Palmer did !
But, I did have the LEAD GUY at Microsoft (name withheld) check out this post and give it a once-over for accuracy. Got the THUMBS UP, so here’s the how-to.
Thanks Charles and also Microsoft.
—
Microsoft released these two updates in Feb 2015. You can read more about them here:
http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx
with an additional FAQ here:
 ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I didn’t write this. But fellow GPanswers.com Team Member Charles Palmer did !&lt;/p&gt;
&lt;p&gt;But, I did have the LEAD GUY at Microsoft (name withheld) check out this post and give it a once-over for accuracy. Got the THUMBS UP, so here’s the how-to.&lt;/p&gt;
&lt;p&gt;Thanks Charles and also Microsoft.&lt;/p&gt;
&lt;p&gt;—&lt;/p&gt;
&lt;p&gt;Microsoft released these two updates in Feb 2015. You can read more about them here:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx&quot;&gt;http://blogs.technet.com/b/srd/archive/2015/02/10/ms15-011-amp-ms15-014-hardening-group-policy.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;with an additional FAQ here:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://blogs.technet.com/b/askpfeplat/archive/2015/02/23/guidance-on-deployment-of-ms15-011-and-ms15-014.aspx&quot;&gt;http://blogs.technet.com/b/askpfeplat/archive/2015/02/23/guidance-on-deployment-of-ms15-011-and-ms15-014.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In addition to the two KB’s above, KB3004375 is installed at the same time as KB3000483 as they work together.&lt;/p&gt;
&lt;p&gt;KB3000483 also requires additional configuration in Group Policy. The details of those steps can be found here:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://support.microsoft.com/kb/3000483&quot;&gt;http://support.microsoft.com/kb/3000483&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;There is an oversight in the above article in that it doesn’t take into account a central store for your Policy definitions.&lt;/p&gt;
&lt;p&gt;Using the information in that article, the following are the default steps:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Open Group Policy Management Console.&lt;/li&gt;
&lt;li&gt;In the console tree, in the forest and domain that contain the Group Policy object (GPO) that you want to create or edit, double-click Group Policy Objects.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Forest name/Domains/&lt;Domain name&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;(Optional) Right-click Group Policy Objects, and then click New.&lt;/li&gt;
&lt;li&gt;Type the desired name for the new GPO.&lt;/li&gt;
&lt;li&gt;Right-click the desired GPO, and then click Edit.&lt;/li&gt;
&lt;li&gt;In the Group Policy Object Editor console, browse to the following policy path:&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Computer Configuration/Administrative Templates/Network/Network Provider&lt;/p&gt;
&lt;p&gt;NOTE: Until you update your central policy store, you will not see the above Network Provider key&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Right-click the Hardened UNC Paths setting, and then click Edit.&lt;/li&gt;
&lt;li&gt;Select the Enabled option button.&lt;/li&gt;
&lt;li&gt;In the Options pane, scroll down, and then click Show.&lt;/li&gt;
&lt;li&gt;Add one or more configuration entries. To do this, follow these steps:&lt;/li&gt;
&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;In the Value Name column, type the UNC path that you want to configure. The UNC path may be specified in one of the following forms: &lt;a href=&quot;///\\%3cServer%3e\%3cShare&quot;&gt;\\&lt;Server&gt;\&lt;Share&lt;/a&gt;&gt; – The configuration entry applies to the share that has the specified name on the specified server.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&quot;///\\*\%3cShare&quot;&gt;\\*\&lt;Share&lt;/a&gt;&gt; – The configuration entry applies to the share that has the specified name on any server.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;///\\%3cServer%3e\*&quot;&gt;\\&lt;Server&gt;\*&lt;/a&gt; – The configuration entry applies to any share on the specified server.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;///\\%3cServer&quot;&gt;\\&lt;Server&lt;/a&gt;&gt; – The same as &lt;a href=&quot;///\\%3cServer%3e\*&quot;&gt;\\&lt;Server&gt;\*&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;NOTE: A specific server or share name must be specified. All-wildcard paths such as \\* and \\*\* are not supported.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In the Value column, type the name of the security property to configure (for example, type RequireMutualAuthentication, RequireIntegrity, or RequirePrivacy) followed by an equal sign (=) and the number 0 or 1.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;NOTE: Multiple properties may be assigned for a single UNC path by separating each “&lt;Property&gt; = &lt;Value&gt;” pair by using a comma (,).&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;11. Click OK two times, and then close the GPO editor.&lt;/p&gt;
&lt;p&gt;12. If you created a new GPO earlier, link the GPO to one or more domains. To do this, right-click the desired domain, click Link an Existing GPO, select the newly added GPO, and then click OK&lt;/p&gt;
&lt;p&gt;13. To test the new or updated GPO, log on to a computer to which the GPO applies, and then run the following command:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;               gpupdate /force&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style=&quot;text-decoration: underline&quot;&gt;Additional Steps:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;To make it work, you will need to complete the following steps:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;On a Windows 8.1 or Server 2012R2 computer that has the update installed, browse to C:\Windows\PolicyDefinitions (hereafter &lt;i&gt;Source&lt;/i&gt;)&lt;/li&gt;
&lt;li&gt;Find NetworkProvider.admx and copy it&lt;/li&gt;
&lt;li&gt;Open your central PolicyDefinitions folder: &lt;a href=&quot;///\\%3cDomain%3e\SYSVOL\%3cDomain%3e\Policies\PolicyDefinitions&quot;&gt;\\&lt;Domain&gt;\SYSVOL\&lt;Domain&gt;\Policies\PolicyDefinitions&lt;/a&gt; (hereafter &lt;i&gt;Destination&lt;/i&gt;)&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;4. Paste NetworkProvider.admx into the &lt;i&gt;Destination&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;5. In your &lt;i&gt;Source&lt;/i&gt; folder, open the en-US folder&lt;/p&gt;
&lt;p&gt;6. Find NetworkProvider.adml and copy it&lt;/p&gt;
&lt;p&gt;7. Paste NetworkProvider.adml into the &lt;i&gt;Destination&lt;/i&gt;\en-US folder&lt;/p&gt;
&lt;p&gt;8. Repeat for any additional language files you may desire&lt;/p&gt;
&lt;p&gt;9. Allow PolicyDefinitions to replicate around to the other domain controllers&lt;/p&gt;
&lt;p&gt;10. You may now create your desired policy as the Network Provider key will be available&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> JESBUG GP Vulnerability -- Advice </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/jesbug-gp-vulnerability-advice</link>
        <pubDate>2015-02-25T17:53:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft put the petal to the metal and put together a great Q&amp;amp;A about the &amp;ldquo;JESBUG&amp;rdquo; GP Vulnerability.

To be clear, it&amp;rsquo;s NOT just a GP vulnerability, but really SMB (the thing that does &amp;ldquo;sharing&amp;rdquo;) on your servers.

The link to that FAQ is now at:

http://blogs.technet.com/b/askpfeplat/archive/2015/02/23/guidance-on-deployment-of-ms15-011-and-ms15-014.aspx

For me, the #1 question I get is &amp;hellip; &amp;ldquo;Where is the ADMX file they keep mentioning and h ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Microsoft put the petal to the metal and put together a great Q&amp;A about the “JESBUG” GP Vulnerability.&lt;/p&gt;

&lt;p&gt;To be clear, it’s NOT just a GP vulnerability, but really SMB (the thing that does “sharing”) on your servers.&lt;/p&gt;

&lt;p&gt;The link to that FAQ is now at:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://blogs.technet.com/b/askpfeplat/archive/2015/02/23/guidance-on-deployment-of-ms15-011-and-ms15-014.aspx&quot;&gt;http://blogs.technet.com/b/askpfeplat/archive/2015/02/23/guidance-on-deployment-of-ms15-011-and-ms15-014.aspx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For me, the #1 question I get is … “Where is the ADMX file they keep mentioning and how do I get it installed?”&lt;/p&gt;

&lt;p&gt;The answer is IN the FAQ.&lt;/p&gt;

&lt;p&gt;And if you need a refresher on how to update the Central Store, then the BASIC gist is here in this video:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=acYb2wQeL94&quot;&gt;https://www.youtube.com/watch?v=acYb2wQeL94&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But of course, you’ll learn a *LOT MORE* in my LIVE GP Class about the care-and-feeding of your Central Store.&lt;/p&gt;

&lt;p&gt;Next Class: March 9th – 12th in Salt Lake City.&lt;/p&gt;

&lt;p&gt;Link: &lt;a href=&quot;https://www.gpanswers.com/live-class&quot;&gt;www.GPanswers.com/class&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Group Policy Preferences: Powerful *AND* mysterious. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/group-policy-preferences-powerful-and-mysterious</link>
        <pubDate>2015-02-06T14:58:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I think the reason that GPPreferences is both heralded and feared, is that &amp;hellip; they are both POWERFUL but MYSTERIOUS.

In my GP Training class we spend a WHOLE DAY and then some on the GPPrefs.. because.. of both of their POWER and their MYSTERY.

I found these quickie introductory articles on the GPPrefs and thought I would share them. It&amp;rsquo;s a three part series.. and a quick read:


	http://windowsitpro.com/windows-server-2003-end-support/logon-scripts-group-policy-preferences- ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I think the reason that GPPreferences is both heralded and feared, is that … they are both POWERFUL but MYSTERIOUS.&lt;/p&gt;

&lt;p&gt;In my GP Training class we spend a WHOLE DAY and then some on the GPPrefs.. because.. of both of their POWER and their MYSTERY.&lt;/p&gt;

&lt;p&gt;I found these quickie introductory articles on the GPPrefs and thought I would share them. It’s a three part series.. and a quick read:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href=&quot;http://windowsitpro.com/windows-server-2003-end-support/logon-scripts-group-policy-preferences-and-server-2003-migration-par&quot;&gt;http://windowsitpro.com/windows-server-2003-end-support/logon-scripts-group-policy-preferences-and-server-2003-migration-par&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;http://windowsitpro.com/windows-server-2003-end-support/logon-scripts-group-policy-preferences-and-server-2003-end-life-part&quot;&gt;http://windowsitpro.com/windows-server-2003-end-support/logon-scripts-group-policy-preferences-and-server-2003-end-life-part&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;http://windowsitpro.com/windows-server-2003-end-support/logon-scripts-group-policy-preferences-and-server-2003-end-life-pa-0&quot;&gt;http://windowsitpro.com/windows-server-2003-end-support/logon-scripts-group-policy-preferences-and-server-2003-end-life-pa-0&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Just to put a fine point on it: You’ve already paid for the power of the GPPrefs. But if you don’t know what they can do, or exactly how to use them (without blowing your toes off) you’re missing out.&lt;/p&gt;

&lt;p&gt;To get you where you need to go, I humbly suggest my upcoming training class in Salt Lake City Mar 9 – 12.&lt;br /&gt;
Get prices and sign up at &lt;a href=&quot;https://www.gpanswers.com/training&quot; target=&quot;_blank&quot;&gt;www.GPanswers.com/training&lt;/a&gt;. Discounts available with 4+ people coming.&lt;/p&gt;

&lt;p&gt;Remember: Microsoft never goes “backward”.. so this stuff will be valid for Windows 10 when it hits !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> GPResults Hotfix for GPMC (and quick demo of PP GP Compliance Reporter) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/gpresults-hotfix-for-gpmc-and-quick-demo-of-pp-gp-compliance-reporter</link>
        <pubDate>2015-01-06T19:48:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft always says “Use the latest GPMC Console.”
That advice was great.. until Windows 8.1 because of a big ol’ bug.
Which is now fixed !
So if you use Windows 8.1 (or Server 2012 R2) as your GPMC station, check out this video which demonstrates a Microsoft hotfix (and also a workaround to a well known GP Results overall problem.)
Here’s the video:&amp;nbsp;GPMC GP Results Hotfix
Remember about my upcoming LIVE Group Policy Class.
Go to www.GPanswers.com/training for the details ! ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Microsoft always says “Use the latest GPMC Console.”&lt;/p&gt;
&lt;p&gt;That advice was great.. until Windows 8.1 because of a big ol’ bug.&lt;/p&gt;
&lt;p&gt;Which is now fixed !&lt;/p&gt;
&lt;p&gt;So if you use Windows 8.1 (or Server 2012 R2) as your GPMC station, check out this video which demonstrates a Microsoft hotfix (and also a workaround to a well known GP Results overall problem.)&lt;/p&gt;
&lt;p&gt;Here’s the video: &lt;a href=&quot;http://youtu.be/5BX-Qowjw6o&quot;&gt;GPMC GP Results Hotfix&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Remember about my upcoming LIVE Group Policy Class.&lt;/p&gt;
&lt;p&gt;Go to &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training &lt;/a&gt;for the details !&lt;/p&gt;
&lt;p&gt;(and don’t miss out !)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Yet Another GP Problem.. that really isn&#039;t really a Group Policy problem. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/yet-another-gp-problem-that-really-isnt-really-a-group-policy-problem</link>
        <pubDate>2014-10-28T13:21:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Here’s a link to a classic issue I see.
The “alarm” gets raised that there is some kind of GP issue.
But when you get down and acquire ACTUAL DATA, you find .. it’s not GP at all.
Link to article on Microsoft’s website.
More information on my speech at TechEd 2014 here.
Additional awesome getting started info on WPA here. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Here’s a link to a classic issue I see.&lt;/p&gt;
&lt;p&gt;The “alarm” gets raised that there is some kind of GP issue.&lt;/p&gt;
&lt;p&gt;But when you get down and acquire ACTUAL DATA, you find .. it’s not GP at all.&lt;/p&gt;
&lt;p&gt;Link to article &lt;a href=&quot;http://blogs.technet.com/b/askpfeplat/archive/2014/10/27/becoming-an-wpa-xpert-part-11-troubleshooting-long-group-policy-processing.aspx&quot;&gt;on Microsoft’s website&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;More information on my speech &lt;a href=&quot;https://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/WIN-B328#fbid=&quot;&gt;at TechEd 2014 here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Additional awesome getting started &lt;a href=&quot;http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/WIN-B359#fbid=&quot;&gt;info on WPA here&lt;/a&gt;.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Get back the &quot;Are you sure you want to delete a file&quot; prompt (in Windows 8) using Group Policy. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/get-back-the-are-you-sure-you-want-to-delete-a-file-prompt-in-windows-8-using-group-policy</link>
        <pubDate>2014-07-28T16:05:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This is a little video I made to show you how to:


	Manually bring back the &amp;ldquo;Are you sure&amp;rdquo; prompt &amp;hellip; say, if you had one computer to do this on. Or
	Automatically using Group Policy, if you had, say, 8 zillion computers to do this on.


Video is under two minutes long. Here it is. Enjoy. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;This is a little video I made to show you how to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Manually bring back the “Are you sure” prompt … say, if you had one computer to do this on. Or&lt;/li&gt;
	&lt;li&gt;Automatically using Group Policy, if you had, say, 8 zillion computers to do this on.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Video is under two minutes long. &lt;a href=&quot;http://youtu.be/a0GvYB8G6Vs&quot;&gt;Here it is.&lt;/a&gt; Enjoy.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Latest Windows 8.1 and Server 2012 R2 ADMX Templates now available </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/latest-windows-8-1-and-server-2012-r2-admx-templates-now-available</link>
        <pubDate>2014-07-08T16:51:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft from time to time publishes updated Admin Templates (ADMX and ADML) files when a new OS is released.
The latest download is now available at:
http://www.microsoft.com/en-us/download/details.aspx?id=43413
They usually also produce an updated settings spreadsheet, but that’s on the way, and not here yet.
To be honest: The best way you’re going to learn how to use and manage these files is if you take my live or online Group Policy training. I really, really go over this in depth. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Microsoft from time to time publishes updated Admin Templates (ADMX and ADML) files when a new OS is released.&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-size: 14px;line-height: 1.5em&quot;&gt;The latest download is now available at:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.microsoft.com/en-us/download/details.aspx?id=43413&quot;&gt;http://www.microsoft.com/en-us/download/details.aspx?id=43413&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;They usually also produce an updated settings spreadsheet, but that’s on the way, and not here yet.&lt;/p&gt;
&lt;p&gt;To be honest: The best way you’re going to learn how to use and manage these files is if you take my live or online Group Policy training. I really, really go over this in depth.&lt;/p&gt;
&lt;p&gt;But, as a service to the community, &lt;a href=&quot;http://www.youtube.com/watch?v=acYb2wQeL94&quot;&gt;I have this video&lt;/a&gt;, from the last time Microsoft released ADMX files. &lt;a href=&quot;http://www.youtube.com/watch?v=acYb2wQeL94&quot;&gt;So .. watch it&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Some other FAQs:&lt;/p&gt;
&lt;p&gt;1) If you already have files in the central store, just LEAVE THEM and overwrite what’s there with these latest ones.&lt;/p&gt;
&lt;p&gt;2) You don’t have to have Windows 8.1 or Server 2012 R2 to use these ADMX files.&lt;/p&gt;
&lt;p&gt;3) You don’t have to “touch” or “update” the GPOs in any way after you update the ADMX files.&lt;/p&gt;
&lt;p&gt;Hope this helps. And if you really want to conquor group policy, preferences, security, servers, RDS, loopback, WMI, ADMX files and TONS MORE.. &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;Join me at my next live class or join the GP Online University.&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Preventing Windows Store Apps from popping up all across your network. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/preventing-windows-store-apps-from-popping-up-all-across-your-network</link>
        <pubDate>2014-06-30T13:05:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I was asked how to minimize the impact of users’ purchasing and downloading their own applications from the Windows 8 Store.
Turns out, it’s one easy policy setting.
This setting is “weird” inasmuch as it appears on both user AND computer side, making it quite flexible.&amp;nbsp;You’ll find this setting at…
User Configuration | Administrative Templates | Windows Components | Store
-and-
Computer Configuration | Administrative Templates | Windows Components | Store
Here’s the pict ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I was asked how to minimize the impact of users’ purchasing and downloading their own applications from the Windows 8 Store.&lt;/p&gt;
&lt;p&gt;Turns out, it’s one easy policy setting.&lt;/p&gt;
&lt;p&gt;This setting is “weird” inasmuch as it appears on both user AND computer side, making it quite flexible. You’ll find this setting at…&lt;/p&gt;
&lt;p&gt;User Configuration | Administrative Templates | Windows Components | Store&lt;/p&gt;
&lt;p&gt;-and-&lt;/p&gt;
&lt;p&gt;Computer Configuration | Administrative Templates | Windows Components | Store&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://screencast.com/t/1JAQgcQ7xBd&quot; target=&quot;_blank&quot;&gt;Here’s the picture&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Hope this helps you out, and see in Atlanta Aug 18-21 ! &lt;a href=&quot;https://www.gpanswers.com/training&quot; target=&quot;_blank&quot;&gt;www.GPanswers.com/training&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> RSAT is not evil. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/rsat-is-not-evil</link>
        <pubDate>2014-06-16T20:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Here’s an email I got and my response. The names have been changed to protect the innocent.&lt;/p&gt;
&lt;p&gt;—&lt;/p&gt;
&lt;p&gt;Hi Jeremy,&lt;br&gt;
Let me briefly introduce myself. I’m working as a system administrator in a public institution. I would say that I’m relatively new in the field (just 3 years). Recently I encountered a problem at my workplace that bothered me a lot. I was confused and therefore need some suggestions/advice. Maybe you can help to clear the confusion.&lt;/p&gt;
&lt;p&gt;By the way, I also have a copy of your book, “Group Policy: Fundamentals, Security, and the Managed Desktop” and I like reading it. It’s very informative.&lt;/p&gt;
&lt;p&gt;At my workplace, we have:&lt;/p&gt;
&lt;p&gt;– One Domain Controller that running Server 2008.&lt;br&gt;
– Our client environment consists of Windows 7 and Windows 8.&lt;/p&gt;
&lt;p&gt;In order to manage the new features/setting in Windows 8 through GPMC, I decided to:&lt;/p&gt;
&lt;p&gt;– Use Windows 8 Management Station with RSAT installed.&lt;br&gt;
– I also created the Central Store with the ADMX for Win 8 and Server 2012.&lt;/p&gt;
&lt;p&gt;Controlling the settings from Win 8 management station was working fine for me.&lt;/p&gt;
&lt;p&gt;I didn’t have any problems with the group policy and the settings were applied to the client machines as planned.&lt;/p&gt;
&lt;p&gt;However, my boss doesn’t agree with the use of a Windows 8 RSAT / Management Station.&lt;/p&gt;
&lt;p&gt;According to him RSAT is compromising the security and defeating the purpose of the Domain Controller.&lt;/p&gt;
&lt;p&gt;He argues:&lt;br&gt;
-That RSAT doesn’t have a record of who logged in to the DC. He’s saying that when someone logs in to DC, either using Remote Desktop Connection or physically present in front of the server, DC authenticates and has a record.&lt;/p&gt;
&lt;p&gt;-Second, he argues that the best way to manage or control settings of Windows 8 machines is by using server 2012 and not using a Win 8 Management Station with RSAT installed. He thinks that this is vulnerable and Win 8 is never meant to serve as a server in managing client machines, and that everything needs to be done from the server instead of Management Station.&lt;/p&gt;
&lt;p&gt;I was very confused with his opinions regarding RSAT.&lt;/p&gt;
&lt;p&gt;Is he right that RSAT is compromising the security and defeating the purpose of DC, and that WIN 8 is never meant to be used to edit the group policy? Please advice. Looking forward to hearing from you.&lt;br&gt;
Thanks, – Jake&lt;/p&gt;
&lt;p&gt;—&lt;/p&gt;
&lt;p&gt;So, Jake … your boss is partially right and partially wrong.&lt;/p&gt;
&lt;p&gt;1. All Windows systems have auditing. SO if you use a Windows 8 machine and log on, you can track that, and “Forward the events” somewhere for an audit record.&lt;br&gt;
2. Note: DCs do specifically log to the event log WHO logged in.&lt;/p&gt;
&lt;p&gt;3. That being said, when it comes to logging GPO creation, it also does that anyway.&lt;/p&gt;
&lt;p&gt;4. In no case, ever.. does it tell you *WHAT* was changed/done inside a GPO. That data doesn’t get captured.&lt;/p&gt;
&lt;p&gt;5. There is no “intrinsic security risk” just by using a Windows 8 management station with RSAT vs. using a DC to make a GPO. It’s what I recommend.&lt;/p&gt;
&lt;p&gt;6. You noted you only had ONE DC .. that’s .. um.. bad. If you had a problem or it went down, no one could log on. Consider having more than one DC.&lt;/p&gt;
&lt;p&gt;Hope these notes help you out.&lt;/p&gt;
&lt;p&gt;-Jeremy Moskowitz, Enterprise Mobility MVP&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Group Policy Settings and Deprecation </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/group-policy-settings-and-deprecation</link>
        <pubDate>2014-06-10T18:20:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In case you&amp;rsquo;re not familiar with the SAT vocab word deprecate (DEP-ri-kate), in computer terms it means to &amp;ldquo;spin down&amp;rdquo; or &amp;ldquo;take out of service.&amp;rdquo; So anytime a feature or something isn&amp;rsquo;t available anymore (or IS still available but shouldn&amp;rsquo;t be used), that feature is said to have been DEPRECATED.

I got this question from a friend, and thought it was interesting. Here&amp;rsquo;s the email question and my answer.

Q: Jeremy, have any Group Policy settings  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In case you’re not familiar with the SAT vocab word deprecate (DEP-ri-kate), in computer terms it means to “spin down” or “take out of service.” So anytime a feature or something isn’t available anymore (or IS still available but shouldn’t be used), that feature is said to have been DEPRECATED.&lt;/p&gt;

&lt;p&gt;I got this question from a friend, and thought it was interesting. Here’s the email question and my answer.&lt;/p&gt;

&lt;p&gt;Q: Jeremy, have any Group Policy settings been deprecated, and if so, what was the story there?&lt;/p&gt;

&lt;p&gt;A: Here’s the inside scoop of Group Policy settings, and the history of deprecation (as far as I know.)&lt;/p&gt;

&lt;p&gt;There is no “insider baseball here” and everything here is drawn from public sources. Note: I could have my facts totally wrong here, this isn’t validated in any meaningful way. So, use at your own risk (though there is like.. zero risk here.)&lt;/p&gt;

&lt;p&gt;Here’s the “birth” story of any given Group Policy setting:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;The Group Policy team itself doesn’t own *&lt;strong&gt;MOST&lt;/strong&gt;* of the settings you find in Group Policy land. I think they do own the ones which pertain to Group Policy client itself, and login scripts and such. Basically if the setting configures “the engine” .. the Group Policy team owns it.&lt;/li&gt;
	&lt;li&gt;The Group Policy team also own the entirety of Group Policy Preferences, whose editors are hardcoded into DLLs which ship with the GPMC.&lt;/li&gt;
	&lt;li&gt;Other teams, example, the Shell team own their own ADMX settings. They submit settings to the Group Policy team for inclusion in the windows ship vehicle.&lt;/li&gt;
	&lt;li&gt;Those settings are cleaned up as needed by the Group Policy team for inclusion into Windows.&lt;/li&gt;
	&lt;li&gt;Teams are welcome to ship their own ADMX settings outside of Windows, say, APP-V and UE-V which have their own downloadable ADMX settings templates.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As for deprecation of settings .. here’s the “death” story:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;The Group Policy team has done a very good job of NOT deprecating *&lt;strong&gt;ANY&lt;/strong&gt;* settings, except for two, which were related to how the Windows 2000 Group Policy engine could operate.&lt;/li&gt;
	&lt;li&gt;So, said another way, to my knowledge only TWO SPECIFIC ADM/ADMX settings were removed in the history of Windows. (Again: I could be wrong.)&lt;/li&gt;
	&lt;li&gt;All other settings owned by product teams have survived. Many have undergone NAME CHANGES and/or restrictions.
	&lt;ol&gt;
		&lt;li&gt;For instance “Remove Games link from Start menu” might have started off life as “Windows Vista and later” (I think), but has since changed to “Windows Server 2008, Windows 7 and Windows Vista.” (&lt;a href=&quot;http://screencast.com/t/wYcqfrsKZ&quot;&gt;http://screencast.com/t/wYcqfrsKZ&lt;/a&gt;) .&lt;/li&gt;
		&lt;li&gt;And, for instance, “Prevent Access to the Control Panel” has been renamed to “Prevent Access to the Control Panel and PC Settings” (to reflect newness in Windows 8+.)&lt;/li&gt;
	&lt;/ol&gt;
	&lt;/li&gt;
	&lt;li&gt;The “deprecation heard round the world” was Internet Explorer Maintenance settings. Those are actually NEITHER Policy nor Preference. And the way they were killed was strange:
	&lt;ol&gt;
		&lt;li&gt;You lost your ability to *&lt;strong&gt;PROCESS&lt;/strong&gt;* IEM settings when the client had IE10 or later.&lt;/li&gt;
		&lt;li&gt;You lost your ability to *&lt;strong&gt;EDIT&lt;/strong&gt;* IEM settings when your management station got IE10 or later.&lt;/li&gt;
	&lt;/ol&gt;
	&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;So this document came out to help: &lt;a href=&quot;http://technet.microsoft.com/en-us/library/jj890998.aspx&quot;&gt;http://technet.microsoft.com/en-us/library/jj890998.aspx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But that’s it.&lt;/p&gt;

&lt;p&gt;In more recent memory, at TechEd 2014 I made a formal announcement of Microsoft’s Group Policy team announcing that they are deprecating Password fields in Group Policy Preferences. That speech is here: &lt;a href=&quot;http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/WIN-B328#fbid&quot;&gt;http://channel9.msdn.com/Events/TechEd/NorthAmerica/2014/WIN-B328#fbid&lt;/a&gt;=&lt;/p&gt;

&lt;p&gt;And you can learn more about the issue and the remediation here: &lt;a href=&quot;http://support.microsoft.com/kb/2962486&quot;&gt;http://support.microsoft.com/kb/2962486&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Bad Advice: Putting too much stuff into you image. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/bad-advice-putting-too-much-stuff-into-you-image</link>
        <pubDate>2014-03-18T18:07:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

This week I got a question. I&amp;rsquo;m paraphrasing it for clarity, but here&amp;rsquo;s the general gist:

&amp;ldquo;Hey Jeremy&amp;hellip; I got some advice to make things &amp;ldquo;go faster&amp;rdquo; by putting as much stuff into my image as possible. What do you think of this advice?&amp;rdquo;

In short: Good intentions, bad advice.

Here&amp;rsquo;s my the short and sweet answer: The &amp;ldquo;more fatter&amp;rdquo; you make your image, you do save in initial &amp;ldquo;possible waits&amp;rdquo; for client machine ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;This week I got a question. I’m paraphrasing it for clarity, but here’s the general gist:&lt;/p&gt;

&lt;p&gt;“Hey Jeremy… I got some advice to make things “go faster” by putting as much stuff into my image as possible. What do you think of this advice?”&lt;/p&gt;

&lt;p&gt;In short: Good intentions, bad advice.&lt;/p&gt;

&lt;p&gt;Here’s my the short and sweet answer: The “more fatter” you make your image, you do save in initial “possible waits” for client machines. That is, if you pre-load all your software, settings, stop services, and so on… then, you’re “mostly done” when that user sits down on Day 1.&lt;/p&gt;

&lt;p&gt;But IMHO, it’s not about Day 1. Day 1 will come and go.&lt;/p&gt;

&lt;p&gt;It’s Day 2+ you need to be concerned about.&lt;/p&gt;

&lt;p&gt;Let’s talk about Day 1:&lt;br /&gt;
On day one that user will get his first burst of GPOs, which will “do stuff” to the machine, and if you’re using some software deployment tool (SCCM, GPOs, whatever.) then the software will apply too.&lt;/p&gt;

&lt;p&gt;Again: This is still DAY 1.&lt;/p&gt;

&lt;p&gt;So, said another way: On Day 1, Mr. User will suffer (a little.)&lt;/p&gt;

&lt;p&gt;But then by Day 2 (heck, really even just after the “burst” on Day 1)…&lt;br /&gt;
The storm is over.&lt;/p&gt;

&lt;p&gt;And, at that point you’ve got the ability to FLEXIBLY MANAGE that machine, instead of hardcoding that machine with un-managable applications, setttings, locked services and so on.&lt;/p&gt;

&lt;p&gt;So my general advice (which might not be applicable for ALL cases) is:&lt;/p&gt;

&lt;p&gt;– Get the OS.&lt;br /&gt;
– Get as many patches as you can.&lt;br /&gt;
– Avoid installing software if you’ve got a managed way to deploy and monitor installations.&lt;br /&gt;
….and THAT’s your image.&lt;/p&gt;

&lt;p&gt;Then drive all flexible changes you can to the desktop and OS using Group Policy (GP, GPPrefs and PolicyPak settings) along with deploying software via your software deployment tool.&lt;/p&gt;

&lt;p&gt;Again: This is general advice which won’t work for every org or case. It’s just my opinion after zillions of admins have explained how they want to go from “totally (or poorly) unmanaged” to “totally managed.”&lt;/p&gt;

&lt;p&gt;This is the first step in a journey.&lt;/p&gt;

&lt;p&gt;We have less than THREE weeks to go for the Public Class in VA/DC. April 7 – 11th. If you’re on the journey from unmanaged to managed.. take that NEXT step and see you in class. Sign up: www.GPanswers.com/training&lt;/p&gt;

&lt;p&gt;Thanks and see ya there !&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What&#039;s the deal with Skydrive when you&#039;ve got domain joined Win 8.1 out there? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/whats-the-deal-with-skydrive-when-youve-got-domain-joined-win-8-1-out-there</link>
        <pubDate>2014-01-12T18:37:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Two tips about SkyDrive and Group Policy.
Tip #1: Why some users aren’t sync’ing properly to Skydrive
This tip comes from frequent contributor Chris Jaramillo, who always brings it home with nice tidbits. Here’s the tip Chris wrote up (edited only lightly for clarity)
Happy New Year! And since it’s the start of a New Year, it must be time to another GPO related tip.
I recently ran across a scenario where my Domain Joined Windows 8.1 PCs would not properly synchronize SkyDrive content ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Two tips about SkyDrive and Group Policy.&lt;/p&gt;
&lt;h3&gt;Tip #1: Why some users aren’t sync’ing properly to Skydrive&lt;/h3&gt;
&lt;p&gt;This tip comes from frequent contributor Chris Jaramillo, who always brings it home with nice tidbits. Here’s the tip Chris wrote up (edited only lightly for clarity)&lt;/p&gt;
&lt;p&gt;Happy New Year! And since it’s the start of a New Year, it must be time to another GPO related tip.&lt;/p&gt;
&lt;p&gt;I recently ran across a scenario where my Domain Joined Windows 8.1 PCs would not properly synchronize SkyDrive content with a Domain User logged in who had been ‘Linked’/’Connected’ to a Microsoft Account. After great weeping and gnashing of teeth, I finally located &lt;a href=&quot;https://social.technet.microsoft.com/Forums/scriptcenter/en-US/33e59ac9-8369-403a-ad06-728844d7ba4e/skydrive-app-in-windows-81-not-showing-all-folders-when-using-domain-account-linked-to-microsoft&quot;&gt;this article&lt;/a&gt;, which pointed to &lt;a href=&quot;https://social.technet.microsoft.com/Forums/windows/en-US/def63360-2ee2-44e5-87c2-18d406b6df62/windows-81-skydrive-doesnt-sync-in-domain-account&quot;&gt;this article&lt;/a&gt;, which contained the fix.&lt;/p&gt;
&lt;p&gt;The issue is that the &lt;b&gt;Prohibit User from manually redirecting Profile Folders&lt;/b&gt; GPO setting prevents the SkyDrive client from properly redirecting and as a result it will not complete its initial configuration and will not sync. Many ‘legacy’ enterprise environments may have this setting Enabled. To fix the problem, the user/admin can simply set this setting back to &lt;b&gt;Disabled&lt;/b&gt; or &lt;b&gt;Not Configured&lt;/b&gt;. However, that will obviously have impact on Windows Explorer UI for users that have Folder Redirection configured via GPO.&lt;/p&gt;
&lt;p&gt;Summary: You can either:&lt;/p&gt;
&lt;p&gt;A) prevent manual redirection of Profile Folders &lt;/p&gt;
&lt;p&gt;-or-&lt;/p&gt;
&lt;p&gt;B) You can automatically sync Windows 8.1 to SkyDrive..&lt;/p&gt;
&lt;p&gt; but you can’t have both.&lt;/p&gt;
&lt;p&gt;I’m still trying to figure out why our friends at Microsoft would create this scenario. However, at least do have an option to allow Domain users to use Sky Drive, even if it’s not a good option.  I hope that you find this one useful.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Tip #1 from Chris Jaramillo.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Tip 2: How to turn off Skydrive sync (and some other Skydrive GP settings)&lt;/h3&gt;
&lt;p&gt;In the “I don’t have much to add” category, Greg Shields put together a little article explaining where the ADMX / ADML files are for Skydrive, what those settings are (and what he wishes was there.)&lt;/p&gt;
&lt;p&gt;One of those settings DOES kill the WIndows 8.1 &lt;–&gt; Skydrive sync; which might be useful for domain-joined machines.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://redmondmag.com/articles/2013/12/01/beware-of-skydrives-auto-sync.aspx&quot; target=&quot;_blank&quot;&gt;Here’s the link to the article at RedmondMag&lt;/a&gt;.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Windows 8.1 and Windows 2012 R2 ADMX Templates now available </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/windows-8-1-and-windows-2012-r2-admx-templates-now-available</link>
        <pubDate>2013-12-05T20:10:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Boom:
http://www.microsoft.com/en-US/download/details.aspx?id=41193
Here’s a video I made a while ago to explain the Central Store.
Jeremy Explains the Central Store
For more (a lot more) .. I humbly suggest my GP Training at
www.GPanswers.com/training .. Live or Online.
See you Soon ! ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Boom:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.microsoft.com/en-US/download/details.aspx?id=41193&quot;&gt;http://www.microsoft.com/en-US/download/details.aspx?id=41193&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Here’s a video I made a while ago to explain the Central Store.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=Q4DBdQo4XZs&quot;&gt;Jeremy Explains the Central Store&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For more (a lot more) .. I humbly suggest my GP Training at&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training&lt;/a&gt; .. Live or Online.&lt;/p&gt;
&lt;p&gt;See you Soon !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How I worked with Bob to improve Group Policy logon times by 15-30 seconds. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-i-worked-with-bob-to-improve-group-policy-logon-times-by-15-30-seconds</link>
        <pubDate>2013-11-21T18:43:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Let me jump to the end of the story: I didn&amp;rsquo;t really do anything here.

Bob did all the hard work. &amp;nbsp;I did POINT Bob in the right direction though and get him thinking about the problem.

Bob came to me with the following query: &amp;ldquo;We played with deploying printers via GP and ultimately decided not to.&amp;nbsp; However, despite removing the deployed printers from GP, every machine still goes through the &amp;ldquo;Applying Group Policy Printers policy&amp;rdquo; step even though there are ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Let me jump to the end of the story: I didn’t really do anything here.&lt;/p&gt;

&lt;p&gt;Bob did all the hard work.  I did POINT Bob in the right direction though and get him thinking about the problem.&lt;/p&gt;

&lt;p&gt;Bob came to me with the following query: “We played with deploying printers via GP and ultimately decided not to.  However, despite removing the deployed printers from GP, every machine still goes through the “Applying Group Policy Printers policy” step even though there are no printers deployed that way and I can’t figure out how to get rid of it…  On some machines, it’s just a few seconds delay, but on others, it’s upwards of 30 seconds and I’d really like to get rid of it.  Any ideas?”&lt;/p&gt;

&lt;p&gt;I THOUGHT Bob was talking about Group Policy Preferences Printers. But he wasn’t. He was talking about “Deployed Printers.”&lt;/p&gt;

&lt;p&gt;This is totally different, and honestly, one of the parts of GP which isn’t my favorite.&lt;/p&gt;

&lt;p&gt;Bob found the golden ticket all on his own. Here’s what Bob replied:&lt;/p&gt;

&lt;p&gt;“I figured it out from this article:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://social.technet.microsoft.com/Forums/windowsserver/en-US/ae1d3dac-a0a1-4636-ab5b-9da0e77a5add/policy-references-old-printer-deployments-how-to-clean-the-reference&quot;&gt;http://social.technet.microsoft.com/Forums/windowsserver/en-US/ae1d3dac-a0a1-4636-ab5b-9da0e77a5add/policy-references-old-printer-deployments-how-to-clean-the-reference&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The relevant info was:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;While you ‘re in adsiedit, highlight the GPO node itself, “properties”, look for the attribute “gPCUserExtensionNames”. This is an array of an array of GUIDs.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Copy the entry to notepad, identify a block in square brackets (“[]”) that starts with the GUID {8A28E2C5-8D06-49A4-A08C-632DAA493E17} and remove the whole square brackets block. Then, look simply for the GUID {180F39F3-CF17-4C68-8410-94B71452A22D} (shouldn’be present, but better be careful) and remove just the GUID.&lt;/p&gt;

&lt;p&gt;This cleans up the AD part of your GPO and afterwards, deployed printers will not be processed anymore during user gpo refresh.”&lt;/p&gt;

&lt;p&gt;Logins are now 15-30 seconds faster.&lt;/p&gt;

&lt;p&gt;Thanx for the help! ?&lt;/p&gt;

&lt;p&gt;”&lt;/p&gt;

&lt;p&gt;So the moral of the story is.. if you’ve ever tried “Deployed Printers” and then.. well, stopped… then this could be something that helps you out if logon times have increased.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Microsoft&#039;s Official Windows 8.1 and Server 2012 R2 GP Excel Spreadsheet </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/microsoft-admx-8-1-excel-spreadsheet</link>
        <pubDate>2013-11-08T14:34:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In the last post, I posted about how Ryan (a fellow GPanswers Team member like you) spent some quality time with the ADMX files from Microsoft and produced his own “What’s new in Windows 8.1” XLS spreadsheet.
This week Microsoft caught up..and the official spreadsheet is out. Note: As of THIS writing, the official ADMX file download is NOT out, but the spreadsheet IS.
The link is here:
http://www.microsoft.com/en-us/download/details.aspx?id=25250
Here are some tips:

First: Dont down ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In the last post, I posted about how Ryan (a fellow GPanswers Team member like you) spent some quality time with the ADMX files from Microsoft and produced his own “What’s new in Windows 8.1” XLS spreadsheet.&lt;/p&gt;
&lt;p&gt;This week Microsoft caught up..and the official spreadsheet is out. Note: As of THIS writing, the official ADMX file download is NOT out, but the spreadsheet IS.&lt;/p&gt;
&lt;p&gt;The link is here:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.microsoft.com/en-us/download/details.aspx?id=25250&quot;&gt;http://www.microsoft.com/en-us/download/details.aspx?id=25250&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Here are some tips:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;First: Dont download the WRONG spreadsheet. The one you want is  WindowsServer2012R2andWindows8.1GroupPolicySettings.xlsx and is 319k.&lt;/li&gt;
&lt;li&gt;Next: Use Column D and set it to TRUE to see the LATEST (Win 8.1 only / newest) policy settings.&lt;/li&gt;
&lt;li&gt;Finally: Use the entire Security tab to see the security specific settings. And in that tab,  check out COL H and G.. Where Col H is “reboot required?” and G are interesting notes about those security settings.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Hope this helps you out !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Exactly what&#039;s new in Group Policy Settings for Win8.1, RT and IE11. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/exactly-whats-new-in-group-policy-settings-for-win8-1-rt-and-ie11</link>
        <pubDate>2013-11-04T01:41:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Ryan Blaszczyk a GPanswers team member supplied this to me…
“I got impatient waiting on Microsoft. So after importing the ADMX files from my Win8.1 box into my lab’s Central Store, I took the painstaking time of going through every single setting looking for anything referencing:

Windows 8.1
Windows 8.1 RT
or IE11.

Obviously, I may have missed any net-new setting that Microsoft added that is backwards OS applicable.
And, obviously, anything that they removed.
Just thought I woul ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Ryan Blaszczyk a GPanswers team member supplied this to me…&lt;/p&gt;
&lt;p&gt;“I got impatient waiting on Microsoft. So after importing the ADMX files from my Win8.1 box into my lab’s Central Store, I took the painstaking time of going through every single setting looking for anything referencing:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows 8.1&lt;/li&gt;
&lt;li&gt;Windows 8.1 RT&lt;/li&gt;
&lt;li&gt;or IE11.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Obviously, I may have missed any net-new setting that Microsoft added that is &lt;em&gt;backwards&lt;/em&gt; OS applicable.&lt;/p&gt;
&lt;p&gt;And, obviously, anything that they removed.&lt;/p&gt;
&lt;p&gt;Just thought I would pass it along to show off my massive copy/paste and Excel formatting skills. Just thought I would pass it along for some light reading.”&lt;/p&gt;
&lt;p&gt;Here’s Ryan’s un-official Excel download: &lt;a href=&quot;https://www.gpanswers.com/media/Win8.1IE11.xlsx&quot;&gt;Windows8.1PolicySettings&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Thanks Ryan !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to make the Ultimate ADMX Central Store </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-make-the-ultimate-admx-central-store</link>
        <pubDate>2013-10-31T19:14:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Guest post from Chris Jaramillo (a GPanswers.com regular friend!) with a little help from Jeremy Moskowitz, Enterprise Mobility MVP.

Well, another OS release from Microsoft, and you &amp;ldquo;workin&amp;rsquo; it&amp;rdquo; Group Policy Admins know what that means: Time to update the central store with the latest definitions.

GPO Definitions: Latest and Greatest

GPO&amp;rsquo;s definitions start out life on each operating system type. The newest (as of this writing is 2012 R2 and Windows 8.1.)

You  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Guest post from Chris Jaramillo (a GPanswers.com regular friend!) with a little help from Jeremy Moskowitz, Enterprise Mobility MVP.&lt;/p&gt;

&lt;p&gt;Well, another OS release from Microsoft, and you “workin’ it” Group Policy Admins know what that means: Time to update the central store with the latest definitions.&lt;/p&gt;

&lt;h3&gt;GPO Definitions: Latest and Greatest&lt;/h3&gt;

&lt;p&gt;GPO’s definitions start out life on each operating system type. The newest (as of this writing is 2012 R2 and Windows 8.1.)&lt;/p&gt;

&lt;p&gt;You would EXPECT them to ship with the same Group Policy definitions, right?&lt;/p&gt;

&lt;p&gt;Think again.&lt;/p&gt;

&lt;p&gt;Well, I (Chris) did a quick WinDiff of the PolicyDefinitions folders on fresh 2012R2 and Win8.1 builds:&lt;/p&gt;

&lt;p&gt;Default on clean install of both Windows 8.1 and 2012R2 systems&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;167 common ADMX files (and their corresponding AMDL)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;ADMX files which are only on a clean install of 8.1:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;deviceredirection&lt;/li&gt;
	&lt;li&gt;enhancedstorage (Available on 2012R2 via a Feature)&lt;/li&gt;
	&lt;li&gt;sdiagschd&lt;/li&gt;
	&lt;li&gt;search (Available on 2012R2 via a Feature)&lt;/li&gt;
	&lt;li&gt;shapecollector (Available on 2012R2 via a Feature)&lt;/li&gt;
	&lt;li&gt;winstoreui (Available on 2012R2 via a Feature)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;ADMX files which are only on a clean install of 2012 R2:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;grouppolicy-server&lt;/li&gt;
	&lt;li&gt;grouppolicypreferences&lt;/li&gt;
	&lt;li&gt;mmcsnapins2&lt;/li&gt;
	&lt;li&gt;napxpqec&lt;/li&gt;
	&lt;li&gt;pswdsync&lt;/li&gt;
	&lt;li&gt;servermanager (Available on Win8.1 via RSAT)&lt;/li&gt;
	&lt;li&gt;snis&lt;/li&gt;
	&lt;li&gt;terminalserver-server&lt;/li&gt;
	&lt;li&gt;windowsserver&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;ADMX files which you can get only on 2012 R2 Only, when you install a Role:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;fileservervssagent&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;ADMX files which you can get on either 2012 R2 and Win 8.1, when you install a Feature&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;searchocr&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So in short, you get the issue as last time. That is, you have to grab some of them from the workstation OS and others from the Server OS. And/or you need to turn on specific features or Roles to get these ADMX files to actually appear at all !&lt;/p&gt;

&lt;p&gt;If you had to manually do this, this would make Central Store management almost unbearable.&lt;/p&gt;

&lt;p&gt;It would require installing all Roles/Features on each of a Vista, Windows 7, Windows 8, Windows 8.1, 2008R1, 2008R2, 2012R1, and 2012R2 nodes, each with the latest Service Pack.&lt;/p&gt;

&lt;p&gt;Then starting with Vista, copy the PolicyDefinitions folder, overwriting with 20018R1, then Windows 7, 2008R2, Windows 8, 2012R1, Windows 8.1, and finally 2012R2. Even then, I have seen instances where MS has removed certain older policy settings from certain newer versions of the same ADMX !&lt;/p&gt;

&lt;h3&gt;Jeremy’s 2¢&lt;/h3&gt;

&lt;p&gt;So, here’s my (Jeremy’s) 2¢: Chris is right, but there’s some good news. You DON’T have to go through ALL those gyrations to get the “latest pack” of ADMX files.&lt;/p&gt;

&lt;p&gt;Traditionally, Microsoft makes available a download of all the latest ADMX files all in one shot.&lt;/p&gt;

&lt;p&gt;The basic rule of thumb would be to simply always just overwrite what’s already in the Central Store *WITH* what Microsoft provides.&lt;/p&gt;

&lt;p&gt;So if you had any “extras”.. that’s cool, they just stay there and you can use them. But you’re always overwriting the old ADMX files with the LATEST ADMX files.&lt;/p&gt;

&lt;p&gt;As of this MOMENT, Microsoft doesn’t yet have the “latest” ADMX files from Win 8.1 and 2012R2 yet available. I’m pretty sure they’re coming soon. When they do, I’ll post about it.&lt;/p&gt;

&lt;p&gt;If it were me, I’d just limp along a little while longer until MS produces them as a full download.&lt;/p&gt;

&lt;p&gt;So, that’s the story: Standby for when it drops from MS.&lt;/p&gt;

&lt;h3&gt;Chris Final 2¢&lt;/h3&gt;

&lt;p&gt;Special notes: In the 2008R2 version of AppCompat.ADMX, “Prevent access to 16-bit applications” was a user AND computer option. In the 2012R2 version of the same ADMX, the user option is gone. I’m pretty sure I’ve seen IE settings disappear in a newer ADMX as well.) Add on the fact that certain applications (such as IE) have their ADMX/adml files updated when the application is released (sometimes out of band from the OS release), or that certain hotfixes (such as the 2012R1 WSUS patch that I forwarded you a week or two ago) will update ADMX/adml files, and it’s enough to make your head spin.&lt;/p&gt;

&lt;p&gt;So, even with populating the latest versions of all of the possible ADMX files, that may not populate the admin templates with all available settings for all client/server/apps (which was kind of the point of a Central Store). However, doing so probably the closest thing to an all-encompassing Central Store that is possible.&lt;/p&gt;

&lt;p&gt;Chris extra notes: My recommendation is to keep a copy of the PolicyDefinitions folder from each OS version (including Service Packs) handy, just in case you temporarily need a previous version of the ADMX.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Can you speed up login times when using GPPrefs Printers deployment? (And does it matter?) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/can-you-speed-up-login-times-when-using-gpprefs-printers-deployment-and-does-it-matter</link>
        <pubDate>2013-10-16T18:21:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The Question: To pre-install or NOT to Pre-Install

On linked in, someone asked the following question:&amp;nbsp;If you pre-install &amp;ldquo;big / universal drivers&amp;rdquo; on your target machine, will you will save login time when GPPreferences is used to deploy shared printers?

The idea is that the driver is &amp;ldquo;already there&amp;rdquo; and GPPrefs would just &amp;ldquo;do nothing.&amp;rdquo;

So.. SOMEONE had to figure it out. It might as well be me. ?

Tests and Methodology

Results: Here&amp;rsquo;s ]]>
        </description>
        <content:encoded>
            &lt;h3&gt;The Question: To pre-install or NOT to Pre-Install&lt;/h3&gt;

&lt;p&gt;On linked in, someone asked the following question: If you pre-install “big / universal drivers” on your target machine, will you will save login time when GPPreferences is used to deploy shared printers?&lt;/p&gt;

&lt;p&gt;The idea is that the driver is “already there” and GPPrefs would just “do nothing.”&lt;/p&gt;

&lt;p&gt;So.. SOMEONE had to figure it out. It might as well be me. ?&lt;/p&gt;

&lt;h3&gt;Tests and Methodology&lt;/h3&gt;

&lt;p&gt;Results: Here’s the result of my testing using the HP PCL 6 64-bit universal  printer driver. It’s a 17MB download. Then installing it on the server and doing a roundup of HP*.* I find 48MB of HP files within c:\windows\system32\spool\drivers\x64\3 after sharing a universal printer.&lt;/p&gt;

&lt;p&gt;(Note: It doesn’t actually matter if the raw byte count is TRUE count or not, as the times I get on MY machine are RELATIVE to what you’ll see.)&lt;/p&gt;

&lt;p&gt;I turned on the setting which enables me to SEE *WHEN* and *HOW LONG* each GP CSE takes to process. I also put a stopwatch next to it, then COUNTED HOW LONG these words appeared (&lt;a href=&quot;http://screencast.com/t/YWDfqIwu&quot;&gt;http://screencast.com/t/YWDfqIwu&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Here are the test cases / results.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Again, WARNING: I am on a ludicrously fast testlab / laptop. &lt;/strong&gt;The point is NOT for me to report &lt;strong&gt;exact seconds or &lt;/strong&gt;even total time to log on.  The point is the FINAL RATIO of how long each test case takes VERSUS another test case.&lt;/p&gt;

&lt;p&gt;The FINAL RATIO should be the same for just about anyone based upon these numbers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario 1: &lt;/strong&gt;No GPPrefs Printers linked anywhere.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Result:&lt;/strong&gt; ZERO seconds / “Applying Group Policy Printers policy” never appear.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario 2:&lt;/strong&gt; Universal Printer Driver shared on server in &lt;a href=&quot;///\\DC\HPPRINT1&quot;&gt;\\DC\HPPRINT1&lt;/a&gt;. GPPreferences item is linked to West Sales Users OU. Mr. WestSalesUser 1 logs on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Result:&lt;/strong&gt; 29 seconds for the CLIENT to show “Applying Group Policy Printers policy”… then MOVE ON.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario 3&lt;/strong&gt;: Same as scenario 2. BUT.. Mr. WestSalesUser1 has already logged on and downloaded the driver. NOW Mr. WestSalesUser2 logs on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Result:&lt;/strong&gt; 3 seconds for the CLIENT to show “Applying Group Policy Printers policy”… then MOVE ON.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;*INTERESTING RIGHT?!* – &lt;/strong&gt;More insights and thoughts below. Let’s continue onward.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario 4&lt;/strong&gt;: Universal Print Driver is &lt;strong&gt;pre-installed&lt;/strong&gt; on target machine. GPPreferences item is linked to West Sales Users OU. Mr. WestSalesUser 1 logs on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Result&lt;/strong&gt;: 6 seconds for the client to show “Applying Group Policy Printers policy”… then MOVE ON.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scenario 5&lt;/strong&gt;: Same as 4. Mr. WestSalesUser1 has already logged on and used the driver. NOW Mr. WestSalesUser2 logs on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Result&lt;/strong&gt;: 3 seconds for the client to show “Applying Group Policy Printers policy”… then MOVE ON.&lt;/p&gt;

&lt;h3&gt;So.. how do we interpret these results?&lt;/h3&gt;

&lt;p&gt;Answer: Pre-installing the “big / universal” printer driver BEFORE using GPPreferences yields an 80% time improvement for the first user and a 90% time improvement for user #2.&lt;/p&gt;

&lt;p&gt;However, if the FIRST user “suffers” and downloads the print driver via GPPreferences / the network, the improvement for user #2 is the same for over the network AND local installs of the driver.&lt;/p&gt;

&lt;h3&gt;Counter-intuitive thinking (so stick with me)&lt;/h3&gt;

&lt;p&gt;You might think my final advice would be “Yes, of course pre-stage universal drivers.. you get an 80%- 90% improvement in first-user login time!”&lt;/p&gt;

&lt;p&gt;But that is NOT what I would suggest.&lt;/p&gt;

&lt;p&gt;My belief is and has always been “The First Login Time For Any User Doesn’t Matter.”&lt;/p&gt;

&lt;p&gt;Even if it takes, say, 3 times longer than the NEXT login (for the same user, or for the second user on the same machine)… my feeling has always been… “SO WHAT?”&lt;/p&gt;

&lt;p&gt;Before you throw things at me, think about it: The first login time is “forgettable”. Its not an every day occurrence.&lt;/p&gt;

&lt;p&gt;Sure.. If there’s some delay that can be eliminated at EVERY login (from login 2 onward) you should do it. (Crappy login scripts which copy big files EVERY time, or things that CRAWL the file system, etc etc.) OF COURSE — dump that crap — and make EVERY login time faster.&lt;/p&gt;

&lt;p&gt;But that’s not what we’re talking about HERE.&lt;/p&gt;

&lt;p&gt;HERE, in the case of “Do we” or “Don’t we” pre-install big universal print drivers, we DONT gain speed at EVERY login.&lt;/p&gt;

&lt;p&gt;So, my final thought is: Generally *DONT* pre-install big univeral print drivers. You don’t get benefit at EVERY login.&lt;/p&gt;

&lt;h3&gt;Is there an exception?&lt;/h3&gt;

&lt;p&gt;Sure. Here goes: If you use non-persistent VDI where EVERY login feels like the FIRST login, then I could likely get behind pre-baking in items like this which make EVEN THE FIRST LOGIN go faster.&lt;/p&gt;

&lt;p&gt;Again: That’s only because every login ACTS like its the FIRST login.&lt;/p&gt;

&lt;p&gt;There are possibly other time-critical logins (Nurse’s stations, Stock Floor Trader) where maybe, again, would I agree that baking them in feels like the right thing to do to save X number of seconds (because you don’t know who has NEVER logged into that machine before.)&lt;/p&gt;

&lt;p&gt;There’s my wrapup on this topic. I hope it helps you out. Please make your insightful (but kind) comments below. Thanks !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> WSUS &quot;fixed&quot; for Win 8 and WS2012 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/wsus-fixed-for-win-8-and-ws2012</link>
        <pubDate>2013-10-13T15:32:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Tip o&amp;rsquo; the hat to Chris Jaramillo who first pointed this problem out to me -and- the solution.

Here&amp;rsquo;s the lashup:


	You&amp;rsquo;ve got Windows 8 and/or
	Windows Server 2012
	You&amp;rsquo;ve got WSUS and
	You&amp;rsquo;re using the existing GP settings to manage WSUS


And, darnit.. Win8 and/or WS2012 are simply not playing ball with the WSUS GP settings.

So Win8 and WS2012 machines are getting updates (but not WHEN you want) THEN they&amp;rsquo;re rebooting (also NOT when you want ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Tip o’ the hat to Chris Jaramillo who first pointed this problem out to me -and- the solution.&lt;/p&gt;

&lt;p&gt;Here’s the lashup:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You’ve got Windows 8 and/or&lt;/li&gt;
	&lt;li&gt;Windows Server 2012&lt;/li&gt;
	&lt;li&gt;You’ve got WSUS and&lt;/li&gt;
	&lt;li&gt;You’re using the existing GP settings to manage WSUS&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And, darnit.. Win8 and/or WS2012 are simply not playing ball with the WSUS GP settings.&lt;/p&gt;

&lt;p&gt;So Win8 and WS2012 machines are getting updates (but not WHEN you want) THEN they’re rebooting (also NOT when you want.)&lt;/p&gt;

&lt;p&gt;Why?&lt;/p&gt;

&lt;p&gt;Those systems (Win8 / WS2012) weren’t coded to read those policy settings.&lt;/p&gt;

&lt;p&gt;But hark !!&lt;/p&gt;

&lt;p&gt;A hotfix has been made available to make Win8 and WS2012 act like Win7 and WS08 with regards to “doing what’s in the WSUS GP” settings.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://blogs.technet.com/b/wsus/archive/2013/10/08/enabling-a-more-predictable-windows-update-experience-for-windows-8-and-windows-server-2012-kb-2885694.aspx&quot;&gt;Here’s the Microsoft blog entry on the subject.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://support.microsoft.com/kb/2885694&quot;&gt;Here’s the hotfix download to get you there.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks again to Chris Jaramillo for this tip !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> &quot;Totally exposed&quot; at the doctor&#039;s office. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/totally-exposed-at-the-doctors-office</link>
        <pubDate>2013-10-02T00:40:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Ow.

I hurt myself, so I went to the doctor&amp;rsquo;s office.

And, it was one of these places which sees celebrity clients. Specifically, local sports stars in the Philadelphia area.

You know the routine: Take your shirt off, freeze half to death, then wait twenty minutes for the doctor to finally come in and tell you to take two Advil.

Gee, thanks.

But just before he came in, I took a picture of this computer.

(The red stuff, is obviously mine. And I blurred out a lot as I&amp;rsquo; ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Ow.&lt;/p&gt;

&lt;p&gt;I hurt myself, so I went to the doctor’s office.&lt;/p&gt;

&lt;p&gt;And, it was one of these places which sees celebrity clients. Specifically, local sports stars in the Philadelphia area.&lt;/p&gt;

&lt;p&gt;You know the routine: Take your shirt off, freeze half to death, then wait twenty minutes for the doctor to finally come in and tell you to take two Advil.&lt;/p&gt;

&lt;p&gt;Gee, thanks.&lt;/p&gt;

&lt;p&gt;But just before he came in, &lt;a href=&quot;http://screencast.com/t/4HXEzEYosYr&quot;&gt;I took a picture of this computer&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;(The red stuff, is obviously mine. And I blurred out a lot as I’ll describe below).&lt;/p&gt;

&lt;p&gt;Let’s take a look at what a huge, mega error it was to leave me alone with this computer:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Item 1: That’s me highlighted in the blue bar in section 1. Then ALSO the FULL NAMES, BIRTHDATES and PATIENT IDs of 10 more clients. Full. Freekin’. Names. &lt;strong&gt;Hello HIPPA COMPLIANCE !?&lt;/strong&gt; Also pointed to in item 1 is MY healthcare plan, so the doctor can determine if he should spring for various tests. The crappier the plan I guess, the less they try to perform tests.&lt;/li&gt;
	&lt;li&gt;Item 2: It’s XP. Great. So my medical records are protected by an operating system which will get no patching at all starting in April 2014. Grrrrrrreeeat !&lt;/li&gt;
	&lt;li&gt;Item 3: Thanks for the attack vector and giving me the computer name. When I call the nurse’s station pretending to work for IT, it’ll make me look more credible that I have this information in hand. (No no.. I wouldn’t do that.. right?)&lt;/li&gt;
	&lt;li&gt;Item #4: This is custom application. And, you can see the menu system: there’s a zillion settings for the Nurse, Doctor, or others.. (like me if I was being naughty) to misconfigure in this application. If they were using PolicyPak to deliver application settings, they could be guaranteed that those settings would be set and maintained. (What am I talking about? Attend my next webinar on application settings management at &lt;a href=&quot;https://www.policypak.com&quot;&gt;www.policypak.com&lt;/a&gt;) .&lt;/li&gt;
	&lt;li&gt;Finally.. The main item is.. &lt;strong&gt;the damn keyboard and mouse are just fully unlocked&lt;/strong&gt;. I had 20 full minutes to poke around here. I didn’t just snap this picture when the Nurse left the room. I took it 20 minutes &lt;strong&gt;AFTER&lt;/strong&gt; she left.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Did I *&lt;strong&gt;ACTUALLY&lt;/strong&gt;* touch the keyboard and move the mouse around?&lt;/p&gt;

&lt;p&gt;Look, I’m not 12 years old anymore, so.. &lt;strong&gt;no&lt;/strong&gt; I didn’t.&lt;/p&gt;

&lt;p&gt;But I could.&lt;/p&gt;

&lt;p&gt;And if this was, instead, an APPOINTMENT for a 12 year old, you KNOW his or hands would be on that keyboard.&lt;/p&gt;

&lt;p&gt;Are you doing everything you can at YOUR organization to be more secure? &lt;strong&gt;Learn how to ENSURE that the RIGHT settings are delivered so naughty people cannot do things they shouldn’t do.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In my training class, I show you exactly how to use the Group Policy infrastructure you already have to do it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next class: Las Vegas, Dec 2 – 6.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sign up at &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training&lt;/a&gt;&lt;/strong&gt; .. And ensure your computers aren’t “totally exposed.”&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Good Group Policy Design. What it should &quot;do&quot; for you and your team. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/good-group-policy-design-what-it-should-do-for-you-and-your-team</link>
        <pubDate>2013-07-16T14:39:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ One of the things I get asked about a lot is Group Policy Object &amp;ldquo;design.&amp;rdquo;

Design could mean a lot of things. Group Policy Design to me means:


	What you name your GPOs.
	What you put inside your GPOs.
	What GPOs are linked where.
	OU design.
	Use of Blocked Inheritance and Enforced properties.


When I perform my (paid) Group Policy Health Check consulting service&amp;hellip; these are the kinds of things I look at overall.

To be honest, and I&amp;rsquo;m just callin&amp;rsquo; ]]>
        </description>
        <content:encoded>
            &lt;p&gt;One of the things I get asked about a lot is Group Policy Object “design.”&lt;/p&gt;

&lt;p&gt;Design could mean a lot of things. Group Policy Design to me means:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;What you name your GPOs.&lt;/li&gt;
	&lt;li&gt;What you put inside your GPOs.&lt;/li&gt;
	&lt;li&gt;What GPOs are linked where.&lt;/li&gt;
	&lt;li&gt;OU design.&lt;/li&gt;
	&lt;li&gt;Use of Blocked Inheritance and Enforced properties.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When I perform my (paid) Group Policy Health Check consulting service… these are the kinds of things I look at overall.&lt;/p&gt;

&lt;p&gt;To be honest, and I’m just callin’ it like it is here… I don’t usually see ALL of these elements designed well.&lt;/p&gt;

&lt;p&gt;Usually ONE, sometimes ALL of these elements are near impossible to discern what’s going on.&lt;/p&gt;

&lt;p&gt;Here’s one big overriding tip I can suggest if you decide you want to think about design (or, more likely a redesign.)&lt;/p&gt;

&lt;p&gt;Good: Could someone from the outside look at your design and be able to basically figure out what is going on?&lt;/p&gt;

&lt;p&gt;Better: Could someone from the outside look at your design and be able to figure out WHY you did it?&lt;/p&gt;

&lt;p&gt;Best: Could someone from the outside look at your design and figure out what you did and why you did it, and NOT need any extra documentation?&lt;/p&gt;

&lt;p&gt;To be clear: I’m not saying “don’t document your naming conventions” or “don’t make careful notes about what you’re doing and why.”&lt;/p&gt;

&lt;p&gt;I *AM* saying that a good design should “jump off the screen” at you. If you got a new boss TOMORROW and you needed to spend 10 minutes explaining WHAT was done and WHY it was done that way… would it make sense based on what you have, in Active Directory (OUs) and the GPMC (GPOs)… TODAY?&lt;/p&gt;

&lt;p&gt;Here’s the best (two) parts about GP design:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Your design doesn’t have to look like anyone else. It just needs to make sense. &lt;/li&gt;
	&lt;li&gt;If you screwed it up the first time, it’s not heinous to get it repaired. You do need some direction and a trusted guide though.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If “Cleanliness is next to Godliness” is a real thing, then maybe you should think about getting cleaned up.&lt;/p&gt;

&lt;p&gt;If you’re feeling dirty all over right now, here’s your two options: take either my Group Policy training class (Live or Online) or have me perform my (paid) Group Policy Health Check consulting service … you and your company can get cleaned up .. fast.&lt;/p&gt;

&lt;p&gt;If you’re serious about either one (training or consulting) then give Laura a call at 215-391-0096 for a quote.&lt;/p&gt;

&lt;p&gt;You can also reserve a seat in the next live class (Denver Aug 12 -16, 2013) or get the Online University at www.GPanswers.com/training.&lt;/p&gt;

&lt;p&gt;We have limited seats left in the Denver class, and I only take ONE Group Policy Health Check client per month. First come, first served.&lt;/p&gt;

&lt;p&gt;See you soon.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> To BLOCK or NOT to Block.. That is the Question ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/to-block-or-not-to-block-that-is-the-question</link>
        <pubDate>2013-07-09T16:42:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I got this fun email from Mads Lomholt from the Oslo Norway Norwegian Fanclub of GPanswers.com. (I didn&amp;rsquo;t know we had a Norwegian fanclub branch of GPanswers.com, but I&amp;rsquo;m super happy to learn it&amp;rsquo;s alive and doing well!) &amp;nbsp;Here&amp;rsquo;s his question (and my answer!)

&amp;mdash;

Mr Moskowitz! ?&amp;nbsp;Do you take requests?

Is there any situation where blocking inheritance of GPOs (often followed by enforcing GPOs which are higher) is a good and lasting solution?

I am not ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I got this fun email from Mads Lomholt from the Oslo Norway Norwegian Fanclub of GPanswers.com. (I didn’t know we had a Norwegian fanclub branch of GPanswers.com, but I’m super happy to learn it’s alive and doing well!)  Here’s his question (and my answer!)&lt;/p&gt;

&lt;p&gt;—&lt;/p&gt;

&lt;h3&gt;Mr Moskowitz! ? Do you take requests?&lt;/h3&gt;

&lt;p&gt;Is there any situation where blocking inheritance of GPOs (often followed by enforcing GPOs which are higher) is a good and lasting solution?&lt;/p&gt;

&lt;p&gt;I am not an expert on this, but so far I have seen only bad things happen when people dive into blocking and enforcing GPOs.&lt;/p&gt;

&lt;p&gt;To a certain extent I believe I understand the principles, but why not craft the OU structure to account for this instead of blocking/enforcing?&lt;/p&gt;

&lt;p&gt;I’ve read that Microsoft states: “It is recommended that Enforced and Block Inheritance be used sparingly”, Okay. Sure.&lt;/p&gt;

&lt;p&gt;Excited to hear the expert judgment of my question!&lt;/p&gt;

&lt;p&gt;Mads Lomholt&lt;br /&gt;
Norwegian fanclub, Oslo ?&lt;/p&gt;

&lt;h3&gt;Jeremy’s answer:&lt;/h3&gt;

&lt;p&gt;Mads:&lt;br /&gt;
Great question. Let’s clarify some items.&lt;br /&gt;
First: You don’t / can’t block inheritance of ONE GPO. People sometimes think that blocking is about a particular GPO. It’s not. Its about saying “From this point onward, we’re starting fresh and ignoring GPOs before this point.”&lt;br /&gt;
So, said another way, when you Block Inheritance upon an OU you’re starting fresh and saying that you don’t want policy setting (higher than here) from affecting your users or computers.&lt;br /&gt;
However, what’s also true is that you cannot block any GPOs where their links have the Enforced property. This means any GPO’s links that are enforced will always “make it through” any Block Inheritance.&lt;br /&gt;
So, when is Blocking Inheritance on an OU good? Well, anytime you want to “break free” from GPOs set higher up. I usually recommend Block Inheritance as a GOOD THING when OU administrators are really totally in charge of their own Group Policy desires.&lt;br /&gt;
For instance, in the domain, lets say Company X has:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;North Sales OU&lt;/li&gt;
	&lt;li&gt;East Sales OU&lt;/li&gt;
	&lt;li&gt;All of Marketing OU&lt;/li&gt;
	&lt;li&gt;All of Research OU&lt;/li&gt;
	&lt;li&gt;Other OUs…&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let’s assume that the administrators in the company are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Fred: OU admin, manages North Sales OU (and nothing else).&lt;/li&gt;
	&lt;li&gt;Mary: OU admin manages East Sales OU (and nothing else).&lt;/li&gt;
	&lt;li&gt;Gary: Domain admin, manages the domain AND “All of Marketing OU” and “All of Research OU” and some other OUs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Gary might make some decisions at the domain which would affect Fred and Mary.&lt;/p&gt;

&lt;p&gt;If Fred and Mary basically are allowed to “do their own thing” and don’t really answer to Gary, then they should Block Inheritance to create a clean slate for their OUs.&lt;br /&gt;
But, if there’s something REALLY important (like a security setting which should affect everyone) then Gary is able to link it to the domain and Enforce it, which will definitely affect everyone.&lt;/p&gt;

&lt;p&gt;So, that’s a GOOD reason to use Block Inheritance.&lt;/p&gt;

&lt;p&gt;However, going back to your original question: I often see Block Inheritance used way, way too much. And, as such, I see the Enforced property used way, way too much.&lt;/p&gt;

&lt;p&gt;I would agree: designing first to try to avoid a lot of blocking and enforcing is ideal whenever possible. But in my case above there are perfectly fine times to use it.&lt;br /&gt;
Additionally, it should be noted that if administrators are well versed in Group Policy Preferences, then Item Level Targeting feature can be used to usually avoid Block Inheritances and subsequent enforces.&lt;/p&gt;

&lt;p&gt;That’s because you’re specifically targeting WHICH users or computers should get whatever setting you want. (Note that PolicyPak ALSO hooks into the Group PolicyPreferences Item Level Targeting as seen in this demo https://www.policypak.com/videos/sn6j7q1clmq.html. So in this way you don’t have to have lots of weird design just to manage applications’ settings via Group Policy).&lt;/p&gt;

&lt;p&gt;So, Mads, I think basically you answered your own question. You saw that having lots of blocking and enforcing cannot be good. But you also saw (I think) that there would be some times where you couldn’t architect around it.&lt;/p&gt;

&lt;p&gt;I hope this article helps you and others out.&lt;/p&gt;

&lt;p&gt;Thanks !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Deliver IE Favorites using Group Policy Preferences </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/deliver-ie-favorites-using-group-policy-preferences</link>
        <pubDate>2013-06-18T17:24:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I created a video this morning, because I got a request from fellow GPanswers.com team member like you &amp;mdash; Thomas P from Massachusetts.

He wanted to know the answer to a common question, which I demonstrate in my ONLINE and LIVE Group Policy classes (www.GPanswers.com/training.)

Next one: Denver, CO &amp;ndash; Aug 12 &amp;ndash; 16th !

He wanted to learn how to deliver IE Favorites using Group Policy. Well, Thomas P (and all the Thomas P&amp;rsquo;s out there who wanted to know) .. Here&amp;rsquo; ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I created a video this morning, because I got a request from fellow GPanswers.com team member like you — Thomas P from Massachusetts.&lt;/p&gt;

&lt;p&gt;He wanted to know the answer to a common question, which I demonstrate in my ONLINE and LIVE Group Policy classes (www.GPanswers.com/training.)&lt;/p&gt;

&lt;p&gt;Next one: Denver, CO – Aug 12 – 16th !&lt;/p&gt;

&lt;p&gt;He wanted to learn how to deliver IE Favorites using Group Policy. Well, Thomas P (and all the Thomas P’s out there who wanted to know) .. Here’s the video (sends you to YouTube):&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=wzfqEKaF9Gw&quot;&gt;http://www.youtube.com/watch?v=wzfqEKaF9Gw&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Next: To see some other amazing stuff you COULD be doing with IE, here’s a second video:&lt;br /&gt;
&lt;a href=&quot;https://www.policypak.com/products/manage-internet-explorer-using-group-policy.html&quot; target=&quot;_blank&quot;&gt;https://www.policypak.com/products/manage-internet-explorer-using-group-policy.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Final thoughts for the day: It’s not too late to sign up for Denver for August. We DONT have unlimited seats (duh).&lt;/p&gt;

&lt;p&gt;And you’ll be able to FINALLY learn the RIGHT WAY to transition from XP to Win7 or 8 without blowing up the network or looking like a dufus (or is it doofus?)&lt;/p&gt;

&lt;p&gt;Regardless: You don’t want to look like one.&lt;/p&gt;

&lt;p&gt;So, get your act together, get the training you need, and see you in Devner. (For Pete’s sake, or, really, for your own sake.)&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/training/get-training/&quot;&gt;www.GPanswers.com/training&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;(Course outline and pricing and stuff is right there.)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Exactly why the GPMC Backspace and arrow keys don&#039;t work (and how to fix them). </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/exactly-why-the-gpmc-backspace-and-arrow-keys-dont-work-and-how-to-fix-them</link>
        <pubDate>2013-03-26T21:54:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team,
Here’s an email I got in my inbox yesterday *AND* it was asked in my live Chicago class (25 awesome administrators, pumping their brains full of GP goodness.)
When two people ask the same question in the same day .. here’s the question and the answer.
”
Hey Dr. M. – have a good one for you.
When I try to rename a Policy in GPM, the ‘t’ on my keyboard does not type, the arrow keys do not function, &amp;amp; the Backspace key does not function..
I have no special program runnin ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team,&lt;/p&gt;
&lt;p&gt;Here’s an email I got in my inbox yesterday *AND* it was asked in my live Chicago class (25 awesome administrators, pumping their brains full of GP goodness.)&lt;/p&gt;
&lt;p&gt;When two people ask the same question in the same day .. here’s the question and the answer.&lt;/p&gt;
&lt;p&gt;”&lt;/p&gt;
&lt;p&gt;Hey Dr. M. – have a good one for you.&lt;br&gt;
When I try to rename a Policy in GPM, the ‘t’ on my keyboard does not type, the arrow keys do not function, &amp; the Backspace key does not function..&lt;br&gt;
I have no special program running with regards to the keyboard. I run a MS keyboard/mouse hardware.&lt;br&gt;
This ONLY happens when I’m in GPMC… it does not happen when in AD Users &amp; Computers.&lt;br&gt;
Any idea? Have you see this before?&lt;br&gt;
Just asking.&lt;br&gt;
Thanks&lt;br&gt;
Regards,&lt;br&gt;
[Name Redacted Because I forgot to ask permission]&lt;br&gt;
”&lt;/p&gt;
&lt;p&gt;Answer:&lt;br&gt;
First, thank you for referring to me as my proper name, “Dr. M.” ?&lt;/p&gt;
&lt;p&gt;Next, yes, I do know the answer. I’ve got a Doctorate in Group Policy-ology now for 10 years.&lt;/p&gt;
&lt;p&gt;Your pain is caused by a bug in the MMC code. There’s been a hotfix pill you can swallow.&lt;/p&gt;
&lt;p&gt;It’s for Server 2008 R2 SP1 and also Windows 7 SP1.&lt;/p&gt;
&lt;p&gt;I posted about it when it happened, but, I’m guessing maybe not everyone got the memo.&lt;/p&gt;
&lt;p&gt;Take one of these and call me in the morning: http://support.microsoft.com/kb/2466373&lt;/p&gt;
&lt;p&gt;PS: It works like a champ for me and I instantly put it on every Windows Server 2008 R2 SP1 and Windows 7 SP1 machine I build.&lt;/p&gt;
&lt;p&gt;I hope it helps you out !&lt;/p&gt;
&lt;p&gt;Your GP Doc..&lt;/p&gt;
&lt;p&gt;-Jeremy Moskowitz, Enterprise Mobility MVP&lt;br&gt;
Founder PolicyPak Software&lt;br&gt;
www.PolicyPak.com&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to use Microsoft&#039;s latest Win 8 / Server 2012 ADMX Files </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-use-microsofts-latest-win-8-server-2012-admx-files</link>
        <pubDate>2013-03-14T15:27:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft has released its &amp;ldquo;Latest, Greatest&amp;rdquo; ADMX files which work on all GPMCs (from Windows 7 and later).

They&amp;rsquo;re downloadable here:&amp;nbsp;http://www.microsoft.com/en-us/download/details.aspx?id=36991

I&amp;rsquo;ve put together a video to help you check it out and understand it. It&amp;rsquo;s here:&amp;nbsp;

PS: PolicyPak also uses the Group Policy Central Store. So, if you&amp;rsquo;d like to see a video for how we do that, here &amp;rsquo;tis:&amp;nbsp;https://www.policypak.com/videos/s ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Microsoft has released its “Latest, Greatest” ADMX files which work on all GPMCs (from Windows 7 and later).&lt;/p&gt;

&lt;p&gt;They’re downloadable here: &lt;a href=&quot;http://www.microsoft.com/en-us/download/details.aspx?id=36991&quot;&gt;http://www.microsoft.com/en-us/download/details.aspx?id=36991&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I’ve put together a video to help you check it out and understand it. It’s here: &lt;/p&gt;

&lt;p&gt;PS: PolicyPak also uses the Group Policy Central Store. So, if you’d like to see a video for how we do that, here ’tis: https://www.policypak.com/videos/sph1irhpgdm&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> 9 Group Policy Troubleshooting Strategies You Can Use Right now. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/9-group-policy-troubleshooting-strategies-you-can-use-right-now</link>
        <pubDate>2013-02-25T20:51:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Troubleshooting Group Policy often makes you feel like you&amp;rsquo;re forced to &amp;ldquo;go at it alone.&amp;rdquo; You can feel a little helpless when customers are being nasty toward you, and you&amp;rsquo;re confused about where to start.

So it&amp;rsquo;s no surprise that when people come to my live Group Policy Master classes, one BIG THING they want is strategies on how to best troubleshoot Group Policy.

(Next live class: Chicago, Monday March 25 &amp;ndash; March 29th) &amp;ndash; www.GPanswers.com/trainin ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Troubleshooting Group Policy often makes you feel like you’re forced to “go at it alone.” You can feel a little helpless when customers are being nasty toward you, and you’re confused about where to start.&lt;/p&gt;

&lt;p&gt;So it’s no surprise that when people come to my live Group Policy Master classes, one BIG THING they want is strategies on how to best troubleshoot Group Policy.&lt;/p&gt;

&lt;p&gt;(Next live class: Chicago, Monday March 25 – March 29th) – &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Answer: There is no silver bullet toward Group Policy troubleshooting. There is a “holistic approach” to Group Policy troubleshooting, but that takes more hands-on time (which you’d get with me if you come to class. ? ) But for now, here are some base-hit  things which you can do if you’re stuck and in a rut.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Check for disabled GPOs&lt;/strong&gt;: If the GPO is disabled or half the GPO is disabled, you need to hunt it down. Maybe someone decided to disable a GPO link and didn’t tell you?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Understand Inheritance&lt;/strong&gt;: Between local, site, domain, and multiple nested OUs, it can be a challenge to locate the GPO you need to fix.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WMI Filters getting in the way?&lt;/strong&gt;: Introducing WMI filters can make troubleshooting even harder. Don’t know what WMI filters are? Maybe you have ’em and don’t even know it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Permissions problems&lt;/strong&gt;: Ensuring that users and computers are in the correct site, domain, and OU is one battle; however, ensuring that they have the correct permissions to access GPOs is quite another.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Different processing between different OS (XP / 7/ 8 / WS 08 / WS12)&lt;/strong&gt;: Need I say more?  You HAVE to learn the differences here, or you will be bit on the ass when you needed to have this knowledge at your fingertips (but didn’t have it.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Replication problems&lt;/strong&gt;: The health of the GPO itself on Domain Controllers is important when hunting down policy settings that aren’t applying.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Infrastructure problems&lt;/strong&gt;: Group Policy processing requires that all pieces of your infrastructure are healthy, including such seemingly unrelated pieces as DNS, the services running on the client, and the ability to pass network protocols between clients and domain controllers. Good Active Directory design equals good (consistent) Group Policy processing. The first place to look when Active Directory (or replication) behaves strangely is DNS. As my good friend Mark Minasi likes to say, “The second place to look for replication problems is DNS, too.” That’s because problems with Active Directory almost always result from the DNS misconfiguration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Loopback policy processing:&lt;/strong&gt; Sometimes, by mistake, an administrator has enabled loopback policy processing for a computer (or multiple computers). When this happens, the user sees unexpected behavior because the GPOs that would normally apply to him are suddenly out of the ordinary. Getting a full grasp on how loopback policy processing works is very, very tricky. Not only do we have two different modes (Replace or Merge), on top of that you can have complex permission settings on the GPOs themselves, making it hard to calculate which settings a given user will take on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Slow links:&lt;/strong&gt; You’ve got a VPN for your Windows users or you’ve rolled out DirectAccess for a seamless VPN experience. Now how and when are your clients going to process GPOs? Well, it depends. If you’re seeing inconsistent behavior, this could be why.&lt;/p&gt;

&lt;p&gt;Hopefully, this gives you a little shortcut if you’re stuck. So, again, the best way to get smarter in this stuff is to NOT go at it alone.&lt;/p&gt;

&lt;p&gt;Take the class, &lt;strong&gt;for the love of Pete&lt;/strong&gt; and get the secret weapons you need to solve the serious Group Policy problems you already have. With hands on labs, you’ll be pre-prepared before your next problem actually bubbles up.&lt;/p&gt;

&lt;p&gt;Again: Next live class: Chicago, Monday March 25 – March 29th.  &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;https://www.gpanswers.com/training&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This will be my last one for some time – I guarantee it. If you miss this one, you literally won’t be able to take a class from me for a long, long time.&lt;/p&gt;

&lt;p&gt;Sign up online or call 302-351-4903 and talk with Jackie and you can use a PO. Discounts for 4+ students in the same class.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;See you there.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;/p&gt;

&lt;p&gt;GPanswers.com (Group Policy Community)&lt;/p&gt;

&lt;p&gt;PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Killing Java using Group Policy and other notes </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/killing-java-using-group-policy-and-other-notes</link>
        <pubDate>2013-01-21T12:18:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Hello GPanswers.com Team.. This last week was a biiiiig week. In no particular order

1. All the book orders have shipped, so if you don&amp;rsquo;t have yours yet, it should be very, very soon. (If you&amp;rsquo;re new and don&amp;rsquo;t know what I&amp;rsquo;m talking about, my latest 800 page book on Group Policy is available at www.GPanswers.com/book, as a signed copy.) (More about the book at the end of today&amp;rsquo;s email.)

2. Speaking of NEW PEOPLE, we had a huge influx of people join us after read ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Hello GPanswers.com Team.. This last week was a biiiiig week. In no particular order&lt;/p&gt;

&lt;p&gt;1. All the book orders have shipped, so if you don’t have yours yet, it should be very, very soon. (If you’re new and don’t know what I’m talking about, my latest 800 page book on Group Policy is available at www.GPanswers.com/book, as a signed copy.) (More about the book at the end of today’s email.)&lt;/p&gt;

&lt;p&gt;2. Speaking of NEW PEOPLE, we had a huge influx of people join us after reading the article &quot;Hone your IT skills with these five web apps&quot;. GPanswers.com is #3 in this article: &lt;a href=&quot;http://www.techrepublic.com/blog/five-apps/hone-your-it-skills-with-these-five-web-apps/1679&quot;&gt;http://www.techrepublic.com/blog/five-apps/hone-your-it-skills-with-these-five-web-apps/1679&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I’m not sure GPanswers.com qualifies as an &quot;app&quot;, but — hey, I’ll take it !&lt;br /&gt;
Thank you and welcome to all of our newest GPanswers.com Team members !&lt;/p&gt;

&lt;p&gt;3. So, the big news story of last week was.. Java.&lt;/p&gt;

&lt;p&gt;Unless you were under a rock, you learned that the Department of Homeland security suggested that everyone (literally, not joking) DISABLE Java (at least for now.)&lt;/p&gt;

&lt;p&gt;The rationale, is that even with the &quot;fix&quot; (Java 7 u11) , the fix isn’t really a &quot;fix&quot; at all. But rather, it simply updates the warning levels and messages to end users. (And users are so grrrrrrreat at knowing what to do when they see warning messages.) Um, no they’re not.&lt;/p&gt;

&lt;p&gt;Okay. So, how, exactly would you stop Java capital N, NOW on all of your machines? (At least until the dust settles?)&lt;/p&gt;

&lt;p&gt;I can tell you that there is no &quot;in the box&quot; way to perform this function, and ensure it’s going to work in all browsers, consistently. However, I’ve created a video (two videos really) at my &quot;other&quot; blog at PolicyPak.com to show you Exactly how to turn off Java NOW in your enterprise:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.policypak.com/blog/entry/exactly-how-are-you-going-to-turn-off-java-now-in-your-enterprise.html&quot;&gt;https://www.policypak.com/blog/entry/exactly-how-are-you-going-to-turn-off-java-now-in-your-enterprise.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I did find some other &quot;ideas&quot; floating around on the internet. I tried those ideas and make it work, for about  two hours of banging my head against the wall, but had to give up. Sometimes you gotta just get the right tool for the right job.&lt;/p&gt;

&lt;p&gt;Hope this helps you out and makes your company more secure..&lt;/p&gt;

&lt;p&gt;PS: This article &lt;a href=&quot;http://tinyurl.com/a2usfs2&quot;&gt;http://tinyurl.com/a2usfs2&lt;/a&gt; has some good, reasoned information about the problem and where it’s going.&lt;/p&gt;

&lt;p&gt;4. I have some notes for folks still thinking about getting a copy of the book:&lt;/p&gt;

&lt;h3&gt;Note 1:&lt;/h3&gt;

&lt;p&gt;  I decided to &quot;buy my own book&quot;.  That is, I wanted to see for myself how good or bad the Amazon version of my latest book was. I have to say, I found it to be a very pleasurable experience reading the book on the iPad Kindle app. (That’s all I tested it on, so your mileage may vary.)&lt;/p&gt;

&lt;p&gt;First, on the iPad Kindle app, all the figures are in COLOR. Which is really great. I like that.&lt;/p&gt;

&lt;p&gt;Second, what I had heard from readers about the PREVIOUS edition of the Kindle book was that figures were hard to see sometimes and tables were difficult to manage. Something must have improved in the process, because in my experience in the new book, figures will &quot;Zoom&quot; in and become full screen if you want. And tables have a special function to look at different cells with &lt;- and -&gt;  buttons. In short, I thought it was awesome and personally approve of how it works on an the iPad Kindle app.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Caveat 1&lt;/strong&gt;: Again, I don’t own a Kindle DEVICE. I tried this out on the Kindle iPad app, so that’s all I tested.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Caveat 2:&lt;/strong&gt; If you buy the Kindle edition of the book and hate the experience, please don’t blame me — take it up with Amazon. I only wrote the text and have zero to do with the Amazon or printed edition’s final results.&lt;/p&gt;

&lt;h3&gt;Note 2:&lt;/h3&gt;

&lt;p&gt;There are a handful of very small errata (errors) in the book. The most notable is Figure 1.1.. Yes, the first official figure in the book is misprinted. (Don’t shoot the messenger.. I went back to my writing notes, and something happened between my directive to change it, and the printing process.) In Figure 1.1, I show Vista as your management station and not Windows 8, as might be expected in a Win 8 book.&lt;br /&gt;
There are a handful of other little issues, and I’ll be posting the errata to the website at some not-so-far-in-the-future point. But for now, that’s the big &quot;headsmacker&quot;.&lt;br /&gt;
Note that the same figure can be seen in the &quot;Look inside&quot; in Amazon and also when you buy the Kindle version.&lt;/p&gt;

&lt;p&gt;5. Last call to get your own copies before I stop talking about it for a while (no guarantees).&lt;/p&gt;

&lt;p&gt;Here’s exactly how to do it:&lt;/p&gt;

&lt;p&gt;1.    Signed from me, &quot;printed on dead trees&quot; edition: &lt;a href=&quot;https://www.gpanswers.com/book&quot;&gt;www.GPanswers.com/book&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2.    Cheaper, not-signed, &quot;printed on dead trees&quot; edition from Amazon: &lt;a href=&quot;http://www.amazon.com/Group-Policy-Fundamentals-Security-Managed/dp/1118289404/ref=sr_1_1?ie=UTF8&amp;qid=1358787512&amp;sr=8-1&amp;keywords=jeremy+moskowitz&quot;&gt;http://www.amazon.com/Group-Policy-Fundamentals-Security-Managed/dp/1118289404/ref=sr_1_1?ie=UTF8&amp;qid=1358787512&amp;sr=8-1&amp;keywords=jeremy+moskowitz&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;3.    Even cheaper Kindle edition: &lt;a href=&quot;http://www.amazon.com/Group-Policy-Fundamentals-Security-ebook/dp/B00ATL9TSE/ref=tmm_kin_title_1?ie=UTF8&amp;qid=1358787512&amp;sr=8-1&quot;&gt;http://www.amazon.com/Group-Policy-Fundamentals-Security-ebook/dp/B00ATL9TSE/ref=tmm_kin_title_1?ie=UTF8&amp;qid=1358787512&amp;sr=8-1&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;REMEMBER: Get the version with the LEAF on the cover. All others are now.. older.&lt;br /&gt;
Bonus eChapters available for free at &lt;a href=&quot;https://www.gpanswers.com/book&quot;&gt;www.GPanswers.com/book&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Deploying Office 2013 Using Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/deploying-office-2013-using-group-policy</link>
        <pubDate>2012-10-23T00:44:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

I found this document on Microsoft&amp;rsquo;s website I thought you might like. It&amp;rsquo;s only a mere 353 pages and describes how to deploy Office using various techniques. The one that gets the LEAST amount of talk? Group Policy.

https://blogs.msdn.microsoft.com/mssmallbiz/2012/10/22/free-microsoft-ebook-deployment-guide-for-microsoft-office-2013/

Which is too bad. I mean, sure. If you have a killer software deployment tool already; then, yes, you should use it. I&amp;rsquo;m not sayin ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;I found this document on Microsoft’s website I thought you might like. It’s only a mere 353 pages and describes how to deploy Office using various techniques. The one that gets the LEAST amount of talk? Group Policy.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.msdn.microsoft.com/mssmallbiz/2012/10/22/free-microsoft-ebook-deployment-guide-for-microsoft-office-2013/&quot;&gt;https://blogs.msdn.microsoft.com/mssmallbiz/2012/10/22/free-microsoft-ebook-deployment-guide-for-microsoft-office-2013/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Which is too bad. I mean, sure. If you have a killer software deployment tool already; then, yes, you should use it. I’m not saying &quot;Don’t use it.&quot; I am, however, saying, that there are plenty of reasons you might want to use Group Policy to perform your next Office deployment.&lt;/p&gt;

&lt;p&gt;First.. it’s free.&lt;br /&gt;
Second, it works.&lt;br /&gt;
Third, while there are multiple steps (12 steps to be exact) they are very straightforward. (If you know the steps, and do it in the right order.)&lt;/p&gt;

&lt;p&gt;It’s straightforward in the same way where putting together a computer from scratch is straightforward. Its not hard; you just need to know how to do it and get a few tips along the way.&lt;/p&gt;

&lt;p&gt;So of the 353 pages in the guide I just pointed you toward exactly FOUR pages focus on deploying Office using Group Policy. FOUR. F-O-U-R. Four. Four pages on deployment.&lt;/p&gt;

&lt;p&gt;The bad news: I’m sorry. The doc just doesn’t spell it all out to ensure you’re not going to fail.&lt;br /&gt;
The good news: There are lots of tips on specific policy settings to use for, say, Outlook, Excel, and the like. Those are neat and helpful.&lt;br /&gt;
The best news: If you want to deploy Office 2010 or 2013 using Group Policy. I cover this topic in easy-to-follow detail in my &quot;Jeremy’s 12 Step Office Deployment Program&quot; in my LIVE and ONLINE Group Policy Training.&lt;/p&gt;

&lt;p&gt;(Note: &quot;Jeremy’s 12 Step Program&quot; not to be confused with other helpful 12-step programs.)&lt;/p&gt;

&lt;p&gt;Yep, in about an hour, I show you exactly how to deploy either Office 2010 or Office 2013, giving you the exact step-by-steps and tools and scripts you need to make this happen. Then, here’s what happens next: You try it out for yourself and see if you can do it in the lab, with me there ready to help you if you trip up.&lt;/p&gt;

&lt;p&gt;Look, I know deploying Office 2010 or 2013 using Group Policy isn’t for everyone. Use the guide I pointed you toward for tips on Office 2013 deployment regardless on how you deploy. I think it’s a good guide with helpful stuff.&lt;/p&gt;

&lt;p&gt;But if you want to learn how to really deploy Office 2010 or 2013 using Group Policy, I’ll see you in class.&lt;/p&gt;

&lt;p&gt;For my USA peeps…&lt;br /&gt;
—&lt;br /&gt;
I’ll be teaching my 5-day FULL Group Policy Master Class (Dec 3- 7) in Tampa, FL&lt;br /&gt;
Click here: www.GPanswers.com/training to check it out and/or secure your seat. We DO still have some seats left (down to seven), and we DO give discounts if you bring 3+ people or become a PolicyPak customer before your class. Call 215-391-0096 for POs or to check on discounts.&lt;/p&gt;

&lt;p&gt;For my UK, Scandinavian, and European friends…&lt;br /&gt;
—&lt;/p&gt;

&lt;p&gt;I’ll be teaching my 3-day ACCELERATED Group Policy Master Class. (Nov 13 – 15)&lt;br /&gt;
in Sweden. (Click here: &lt;a href=&quot;http://www.labcenter.se/Profiles#lab=Mastering_Group_Policy)&quot;&gt;http://www.labcenter.se/Profiles#lab=Mastering_Group_Policy)&lt;/a&gt;&lt;br /&gt;
The super-general outline on the page is in Swedish.&lt;/p&gt;

&lt;p&gt;To be clear: The Office 2010 / 2013 talk &amp; lab is NOT included in this accelerated class. But I’ll make the lesson from my Online University available to anyone in the class who wants it as a free bonus for attending !&lt;/p&gt;

&lt;p&gt;So, I don’t speak Swedish, so I’ll be teaching in English. This is an AMAZING opportunity to get the training you’ve always wanted, faster, from me, without a huge expense. If you only speak English like me, then CALL them at +46 08 10 20 00 and they will save you a seat. Also: if you want my full ACCELERATED class outline for this class, email me directly. Its not specifically on the site.&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> ManageEngine ADManager Plus - Free AD Utilities to Try </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/manageengine-admanager-plus-free-ad-utilities-to-try</link>
        <pubDate>2012-10-04T11:58:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The Internet is full of free Active Directory tools out there. Some are worthwhile, some aren&amp;#39;t.

I kind of like it when companies provide free tools. Of course, they do it to increase brand awareness for their pay tools.

But thats okay by me if the tools work and do some magic that would be hard for me to do on my own, without looking up commands, functions, and tons of documentation with lots of steps.

My friends at ManageEngine offer a package suite of free AD tools called ADManag ]]>
        </description>
        <content:encoded>
            &lt;p&gt;The Internet is full of free Active Directory tools out there. Some are worthwhile, some aren&#039;t.&lt;/p&gt;

&lt;p&gt;I kind of like it when companies provide free tools. Of course, they do it to increase brand awareness for their pay tools.&lt;/p&gt;

&lt;p&gt;But thats okay by me if the tools work and do some magic that would be hard for me to do on my own, without looking up commands, functions, and tons of documentation with lots of steps.&lt;/p&gt;

&lt;p&gt;My friends at ManageEngine offer a package suite of free AD tools called ADManager Plus. Most of these tools center around the objective of simplicity. They take cumbersome or annoying AD tasks and make them simple and straightforward. All of the tools in ADManager Plus are based on Powershell cmdlets. This requires PowerShell to be installed on the machine where these tools are run. Most of the tools list the PowerShell cmdlet the tool is based on if you prefer to simply use PowerShell. The entire suite installs in less than a minute and very intuitive to use right from the get-go.&lt;/p&gt;

&lt;p&gt;Lets take a look at three tools in their set. The set can be &lt;a href=&quot;http://www.manageengine.com/products/free-windows-active-directory-tools/free-active-directory-tools-index.html&quot;&gt;downloaded here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Note: It should be noted that ManageEngine does advertise on GPanswers.com, but this is an independent and hopefully un-biased review. Besides, these are free tools. How can you go wrong?&lt;/p&gt;

&lt;h3&gt;Domain Controller Roles Reporter&lt;/h3&gt;

&lt;p&gt;The first free tool is their Domain Controller Roles Reporter. We all know the traditional but complex process of opening up three separate AD tools (AD Users and Computers, AD Schema and AD Domains and Trust) to figure out which DCs host the five operation master roles as well as which servers act as global catalog servers. Instead of utilizing multiple tools, Domain Controller Roles Reporter lists each DC in your AD structure as well as their assigned roles; all in one easy to view list. Imagine obtaining all of your DC roles in less than a minute. That is easily obtainable with this tool. Although my demonstration domain consists of only one domain controller, you can get the drift of this easy-to-use utility in the screen shot below.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image002_2340478544.png&quot;&gt;&lt;img alt=&quot;clip_image002&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image002_thumb1949275904.png&quot; style=&quot;height:365px; width:593px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Active Directory Replication Manager&lt;/h3&gt;

&lt;p&gt;Another great simplifying tool is their AD Replication Manager.&lt;/p&gt;

&lt;p&gt;Any domain administrator knows the rigmarole of using AD Sites and Services to replicate designated DCs within their domain structure. Again, ManageEngine offers you a simple design in this utility. With the single click of a mouse, one can replicate all of the DCs within your domain or even forest. It will even allow you the ability to replicate any two DCs of your choosing whether they are assigned as AD Connectors or not. Each of these capabilities is illustrated in the screenshost below.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image004_21483793804.png&quot;&gt;&lt;img alt=&quot;clip_image004&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image004_thumb1115308292.png&quot; style=&quot;height:360px; width:574px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image006_2927590616.png&quot;&gt;&lt;img alt=&quot;clip_image006&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image006_thumb1535539990.png&quot; style=&quot;height:279px; width:583px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt; &lt;/h2&gt;

&lt;h3&gt;Last Logon Reporter&lt;/h3&gt;

&lt;p&gt;The Last Logon Reporter may be the standout of the bunch.&lt;/p&gt;

&lt;p&gt;Every administrator has been asked at some point within an organization about when the last time a particular employee logged onto the network.&lt;/p&gt;

&lt;p&gt;In an AD environment consisting of many domain controllers, this can be a time consuming task. Just trying to find which domain controller the user last logged onto is a time consuming enough. Once again, ManageEngine provides a one stop utility that allows you the ability to retrieve the information you need quickly and efficiently. Below is a demonstration of the simple two-step process that provides you with the last logon time for any user in your domain.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image008_2201205993.png&quot;&gt;&lt;img alt=&quot;clip_image008&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image008_thumb1043931589.png&quot; style=&quot;height:319px; width:674px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image010_2971824883.png&quot;&gt;&lt;img alt=&quot;clip_image010&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image010_thumb1828784746.png&quot; style=&quot;height:417px; width:670px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt; &lt;/h2&gt;

&lt;h3&gt; &lt;/h3&gt;

&lt;h3&gt;Terminal Session Manager&lt;/h3&gt;

&lt;p&gt;How many times have you attempted to use the Windows RDP client to connect to a remote server, only to be informed that the server has exceeded the maximum number of allowed connections. You then had to access the terminal services manager for that server from another machine in order to log the sessions off.&lt;/p&gt;

&lt;p&gt;ManageEngine&#039;s Terminal Session Manager will search your network for remote sessions and list them all, again in one viewable list. You can then obtain information concerning any of these sessions and either disconnect them or log them off. This two-step process is outlined below.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image012_2672136409.png&quot;&gt;&lt;img alt=&quot;clip_image012&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image012_thumb1612336512.png&quot; style=&quot;height:439px; width:687px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image014_254654355.png&quot;&gt;&lt;img alt=&quot;clip_image014&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image014_thumb768058058.png&quot; style=&quot;height:248px; width:701px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Believe it or not, we&#039;ve barely scratched the surface in covering all of the great applications that make up the ADManager Plus suite.&lt;/p&gt;

&lt;p&gt;Other tools include a Password Policy Manager, a Local User Management utility and a DC Monitoring utility. Other applications help identify AD object name duplicates, empty passwords and we still haven&#039;t covered them all. ADManage Plus may be free, but it offers definite value to the network administrator today who will find at least one of these tools a fantastic addition to their network administrator tool belt.&lt;/p&gt;

&lt;p&gt;Hope you like the tool roundup !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> 7 Things I think you&#039;ll like this week </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/7-things-i-think-youll-like-this-week</link>
        <pubDate>2012-09-11T14:16:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team: This is a variety pack of interesting stuff. Here goes..

Item 1: My Group Policy Master Class in Florida is ON. That is, we have enough people signed up to run the class, and I&amp;rsquo;ll be there with bells on. (See the end of this email for signup details.)

&amp;mdash;

Item 2: Are you following me on Twitter? Why the heck not? I have two accounts (one for each of my two lives): jeremymoskowitz and policypak. Don&amp;rsquo;t miss out on the direct line to my brain.

&amp;mdash;

Item 3: Ar ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team: This is a variety pack of interesting stuff. Here goes..&lt;/p&gt;

&lt;p&gt;Item 1: My Group Policy Master Class in Florida is ON. That is, we have enough people signed up to run the class, and I’ll be there with bells on. (See the end of this email for signup details.)&lt;/p&gt;

&lt;p&gt;—&lt;/p&gt;

&lt;p&gt;Item 2: Are you following me on Twitter? Why the heck not? I have two accounts (one for each of my two lives): &lt;a href=&quot;https://twitter.com/jeremymoskowitz&quot;&gt;jeremymoskowitz&lt;/a&gt; and &lt;a href=&quot;https://twitter.com/policypak&quot;&gt;policypak&lt;/a&gt;. Don’t miss out on the direct line to my brain.&lt;/p&gt;

&lt;p&gt;—&lt;/p&gt;

&lt;p&gt;Item 3: Article on how the most common fingerprint reader software can be “worked around” by the bad guys.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://blog.crackpassword.com/2012/08/upek-fingerprint-readers-a-huge-security-hole/&quot;&gt;http://blog.crackpassword.com/2012/08/upek-fingerprint-readers-a-huge-security-hole/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I like what the security team found, but it misses the fact that if the machine was using Bitlocker (see my previous musings on Bitlocker) then this attack would not be possible. To perform this attack, the user would need to boot OUTSIDE of Windows (say, using Windows PE or Linux Boot disc) then get the information that way.&lt;/p&gt;

&lt;p&gt;—&lt;/p&gt;

&lt;p&gt;Item 4: New eBook by my pal Darwin Sanoy.&lt;/p&gt;

&lt;p&gt;I’d say something like 40 – 70% of organizations are jumping from 32-bit XP to 64-bit Windows 7. In my estimation there’s very little reason not to.&lt;/p&gt;

&lt;p&gt;But, there are some pitfalls associated with 64-bit Windows and the applications which run on them.&lt;/p&gt;

&lt;p&gt;So, Darwin came out with this eBook called: Under the Microscope: Deploying and Supporting Applications on 64-bit Windows&lt;/p&gt;

&lt;p&gt;(&lt;a href=&quot;http://csi-windows.com/blog/all/30-csi-news-training-updates-additions/382-ebook-deploying-and-supporting-applications-on-64-bit-windows&quot;&gt;http://csi-windows.com/blog/all/30-csi-news-training-updates-additions/382-ebook-deploying-and-supporting-applications-on-64-bit-windows&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;When I reviewed the book, I told him to price it at $29.99, then another $20 for the lab manuals. But he must have messed up and priced the whole kit and caboodle instead, at $9.99.&lt;/p&gt;

&lt;p&gt;Darwin: If you’re reading this man, personally, I don’t get it. $9.99 is waaaayy too little to charge for all the awesome stuff in this book.&lt;/p&gt;

&lt;p&gt;The eBook is 95 pages, and jam packed of stuff, I, personally didn’t even know existed. So, I love that. Thanks Darwin.&lt;/p&gt;

&lt;p&gt;That link again is &lt;a href=&quot;http://csi-windows.com/blog/all/30-csi-news-training-updates-additions/382-ebook-deploying-and-supporting-applications-on-64-bit-windows&quot;&gt;http://csi-windows.com/blog/all/30-csi-news-training-updates-additions/382-ebook-deploying-and-supporting-applications-on-64-bit-windows&lt;/a&gt; . Get a copy.&lt;/p&gt;

&lt;p&gt;—&lt;/p&gt;

&lt;p&gt;Item 5: Windows Server 2012 is out.&lt;/p&gt;

&lt;p&gt;You can download the evaluation ISO or VHD here: &lt;a href=&quot;http://technet.microsoft.com/en-US/evalcenter/hh670538.aspx&quot;&gt;http://technet.microsoft.com/en-US/evalcenter/hh670538.aspx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;—&lt;/p&gt;

&lt;p&gt;Item 6: A neat free ebook on Windows Server 2012 is out.&lt;/p&gt;

&lt;p&gt;Introducing Windows Server 2012 (RTM Edition).&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://blogs.msdn.com/b/microsoft_press/archive/2012/09/05/free-ebook-introducing-windows-server-2012-rtm-edition.aspx&quot;&gt;http://blogs.msdn.com/b/microsoft_press/archive/2012/09/05/free-ebook-introducing-windows-server-2012-rtm-edition.aspx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;—&lt;/p&gt;

&lt;p&gt;Item 7: I like this article from Greg Shields:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://redmondmag.com/articles/2012/08/01/a-treatise-on-fiefdoms.aspx&quot;&gt;http://redmondmag.com/articles/2012/08/01/a-treatise-on-fiefdoms.aspx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;“We’re not allowed to access GPPs [Group Policy Preferences] because they’re handled by the Active Directory team.” it what Greg Shields hears all the time.&lt;/p&gt;

&lt;p&gt;If this is your problem: Read this article, print it out, hand it to the boss, then ask him nicely if you can get the Group Policy training you need.&lt;/p&gt;

&lt;p&gt;Where you ask? (See next note!)&lt;/p&gt;

&lt;p&gt;—&lt;/p&gt;

&lt;p&gt;Final thoughts..&lt;/p&gt;

&lt;p&gt;Okay Team… my next class is in Tampa, Florida. December 3 – 7.&lt;/p&gt;

&lt;p&gt;Sign up here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/training/sign-up-now-live/&quot;&gt;https://www.gpanswers.com/training/sign-up-now-live/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Again, the class in on, dittily on, neighborino. So, get on a plane or hop in a car, and get your butt trained in Group Policy awesomeness already.&lt;/p&gt;

&lt;p&gt;Yes, you’ll learn all you need to know for XP, Windows 7 and Windows 8. Yes the class is fully guaranteed. Yes, it’s me teaching the course. Yes, the costs are right on the webpage. Yes, we can give you a discount if 3+ people from your company show up. No, you cannot have any drinks from my mini-bar in my hotel room.&lt;/p&gt;

&lt;p&gt;Instead of thinking of all the reasons you CANNOT come to the class… turn it around.&lt;/p&gt;

&lt;p&gt;Think of all the amazing skills and knowledge you’ll have when you return.&lt;/p&gt;

&lt;p&gt;You’ve always wanted to take my class. If you have to move a mountain or two to get here, will it be worth it?&lt;/p&gt;

&lt;p&gt;See you in class.&lt;/p&gt;

&lt;p&gt;-Jeremy Moskowitz&lt;/p&gt;

&lt;p&gt;GPanswers.com.&lt;/p&gt;

&lt;p&gt;PolicyPak Software&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Sometimes, you gotta ask the duck. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/sometimes-you-gotta-ask-the-duck</link>
        <pubDate>2012-08-20T12:19:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I was going to entitle this blog post What the duck?

But I thought better of it.

Here&amp;#39;s the deal: People often ask me how to troubleshoot things. Very, very specific things.

Instead, let&amp;#39;s take a step back and talk about two (similar) techniques to get YOUR troubleshooting skills better aligned.

Method one: What do you think?

In Galaxy Quest, this was a deleted scene. But I loooove it. At 1 minute and 10 seconds to 2 minutes 14 seconds in, Tech Sargent Chen is being asked  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I was going to entitle this blog post What the duck?&lt;/p&gt;

&lt;p&gt;But I thought better of it.&lt;/p&gt;

&lt;p&gt;Here&#039;s the deal: People often ask me how to troubleshoot things. Very, very specific things.&lt;/p&gt;

&lt;p&gt;Instead, let&#039;s take a step back and talk about two (similar) techniques to get YOUR troubleshooting skills better aligned.&lt;/p&gt;

&lt;p&gt;Method one: What do you think?&lt;/p&gt;

&lt;p&gt;In Galaxy Quest, this was a deleted scene. But I loooove it. At 1 minute and 10 seconds to 2 minutes 14 seconds in, Tech Sargent Chen is being asked how to fix something&quot;. It doesn&#039;t really matter what that SOMETHING is.&lt;/p&gt;

&lt;p&gt;Watch how he handles it end to end&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=9b4s5CfPD4Y&quot; target=&quot;_new&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/video587814939e002000086037.jpg&quot; style=&quot;border-style:none&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;How to actually perform troubleshooting (1 minute 10 seconds to 2 minutes 14 seconds.)&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Yes, laugh at it of course.. but there&#039;s some actual validity to what is going on here. By simply asking What does that mean? during  a crisis, you can quickly get to the bottom of many many issues and find the root causes of a world or problems.&lt;/p&gt;

&lt;p&gt;This very recently helped me troubleshoot a problem on my web site, but can be used for just about anything.&lt;/p&gt;

&lt;p&gt;Method two: Ask the duck?&lt;/p&gt;

&lt;p&gt;I had never heard of this one before, but GPanswers.com fan John Straffin pointed this out to me when he wrote in and said he had an Ask the duck moment.&lt;/p&gt;

&lt;p&gt;I had NO idea what he was talking about, but he pointed me toward this Livejournal entry: &lt;a href=&quot;http://hwrnmnbsol.livejournal.com/148664.html&quot;&gt;http://hwrnmnbsol.livejournal.com/148664.html&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;and this Wikipedia entry:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Rubber_duck_debugging&quot;&gt;http://en.wikipedia.org/wiki/Rubber_duck_debugging&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Reading it says it all. In short, re-explaining your challenge to a fake friend can help reframe your brain and make discoveries in all kinds of unique ways.&lt;/p&gt;

&lt;p&gt;Now, I Ask the duck all the time.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Bitlocker .. it aint just for Laptops </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/bitlocker-it-aint-just-for-laptops</link>
        <pubDate>2012-08-16T14:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

I went to the doctor today. Nothing major. (Cough, cough.)

Anyway.. I&amp;rsquo;m walking down the hall, and I see this:


Look closely at the door name: Nope, nothing special in THERE.
Then, look toward the handle. Yep&amp;hellip; KEY in the DOOR.

That&amp;rsquo;s okay. It&amp;rsquo;s only my personal medical records in there. No biggie, right? Sigh.

So, this got me thinking about, ya know.. being Evil.. which I am not.. and none of you are. (Little known fact: Everyone on GPanswers.com a ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;I went to the doctor today. Nothing major. (Cough, cough.)&lt;/p&gt;

&lt;p&gt;Anyway.. I’m walking down the hall, and I see this:&lt;br /&gt;
&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/IT-ROOM717595596.jpg&quot;&gt;&lt;img alt=&quot;IT-ROOM&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/IT-ROOM_thumb243467401.jpg&quot;/&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Look closely at the door name: Nope, nothing special in THERE.&lt;br /&gt;
Then, look toward the handle. Yep… KEY in the DOOR.&lt;/p&gt;

&lt;p&gt;That’s okay. It’s only my personal medical records in there. No biggie, right? Sigh.&lt;/p&gt;

&lt;p&gt;So, this got me thinking about, ya know.. being Evil.. which I am not.. and none of you are. (Little known fact: Everyone on GPanswers.com and PolicyPak.com goes thru a strict pre-screening regiment to ensure only &quot;Non Jerkfaces&quot; are getting these tips, thoughts, and updates.)&lt;/p&gt;

&lt;p&gt;Anyhoo.. seeing this totally unlocked and MARKED door made me think about what it would take to be Evil if I wanted to.&lt;/p&gt;

&lt;p&gt;And the most evil thing I could think of, was taking a drive out of a server. (No, I didn’t go in the door, and don’t know if that’s possible without a screwdriver.)&lt;/p&gt;

&lt;p&gt;Some servers use RAID of course, which stripes the data across multiple drives. Could stealing just one drive mean I get anything? Well, with enough elbow grease I suppose I could go &quot;block level&quot; on that drive and see what I could find. Not easy, but, hey, possible…at least PLAUSABLE.&lt;/p&gt;

&lt;p&gt;So this is making me think about how to protect against &quot;Un-Jeremy stealing a server disk.&lt;/p&gt;

&lt;p&gt;The answer is simple: Bitlocker.&lt;/p&gt;

&lt;p&gt;If I stole a drive in the 60 seconds it took me to make the photo, I would have $100 in metal, and not much else.&lt;/p&gt;

&lt;p&gt;I know people think of Bitlocker as a great idea for LAPTOPS. No brainer, sure.&lt;/p&gt;

&lt;p&gt;But desktop and servers are equally vulnerable, honestly.. they’re just LESS PORTABLE.&lt;/p&gt;

&lt;p&gt;Yes, you may have some physical security.. but.. that’s possibly circumventable. (How many times have you seen the cleaning crew in a bank branch late at night? Here in Philly at least, it’s ALL THE TIME ! No joke.)&lt;/p&gt;

&lt;p&gt;So you could have &quot;theoretically high&quot; security, but still &quot;circumventable security.&quot;&lt;/p&gt;

&lt;p&gt;Bitlocker in Windows 8 and Server 2012 have some new features, which make me pretty happy. For my own systems, I use Bitlocker, but the big pain in the neck is WAITING for a drive to FULLY Bitlocker itself. Windows 8 now can use &quot;Used Disk Space Only&quot; .. which is awesome when I throw a new 1TB drive up.&lt;/p&gt;

&lt;p&gt;For desktop and servers, there’s &quot;Network Unlock&quot; which also auto-unlocks machines as they boot (when they see that they’re on the network.) If they’re OFF the network, those drives, once again, become $100 pieces of metal.&lt;/p&gt;

&lt;p&gt;So, in short, if you’re hesitant to consider Bitlocker for DESKTOPS and SERVERS.. reconsider, then start thinking about it.&lt;/p&gt;

&lt;p&gt;I did.. in the 60 seconds it took me to take that photo.&lt;/p&gt;

&lt;p&gt;PS: Class is filling in nicely in Tampa, FL. Smart, good looking NON-Evil people like you are joining up to learn more about managing Windows 7, 8, Server 2008 and 2012. Tampa, Florida, December.. Be there:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/training/sign-up-now-live/&quot;&gt;https://www.gpanswers.com/training/sign-up-now-live/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Q&amp;A: Yes we take POs. No we cannot &quot;save&quot; a seat for you without a CC or PO. Price is right on the website. Yes, we do group discounts. Call Laura at 215-391-0096 for help with a PO or group. Yes you will get smarter. No it’s not boring. Yes, it’s me teaching. Yes, you will be tired and loving every second of it. Yes, you could possibly get a raise after taking the class because you’re smarter (no guarantees.)&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Group Policy Powershell for Beginners and Experts </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/group-policy-powershell-for-beginners-and-experts</link>
        <pubDate>2012-06-19T14:14:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Folks.. People are asking me how to learn more about Group Policy + PowerShell.

Well, at TechEd 2012, I worked with Jeff Hicks (PowerShell MVP) to give a one-two combo talk on Group Policy + PowerShell.

First, here is a link to the whole darn talk&amp;hellip; !

Next, here&amp;#39;s a link to Jeff hicks page which has the Show Notes.

Lastly.. Here are some fun pictures Jeff played the part of Professor PowerShell and I played the part of The Pointy Haired Boss.

PS: This talk mentions my Gr ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Folks.. People are asking me how to learn more about Group Policy + PowerShell.&lt;/p&gt;

&lt;p&gt;Well, at TechEd 2012, I worked with Jeff Hicks (PowerShell MVP) to give a one-two combo talk on Group Policy + PowerShell.&lt;/p&gt;

&lt;p&gt;First, here is a &lt;a href=&quot;http://video.ch9.ms/teched/2012/na/WSV415.wmv&quot;&gt;link to the whole darn talk… !&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Next, here&#039;s a &lt;a href=&quot;http://jdhitsolutions.com/blog/2012/06/teched-2012-slides-and-demos/&quot;&gt;link to Jeff hicks page which has the Show Notes&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Lastly.. Here are some fun pictures Jeff played the part of Professor PowerShell and I played the part of The Pointy Haired Boss.&lt;/p&gt;

&lt;p&gt;PS: This talk mentions my Group Policy Health Check service.. which can help orgs of all sizes reduce login times, increase security, and figure out precisely what you&#039;re doing right and wrong with GP. Make contact &lt;a href=&quot;https://www.gpanswers.com/about-us/1/&quot;&gt;by clicking here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/2005-01-10%2014.54.12_2388434605.jpg&quot;&gt;&lt;img alt=&quot;2005-01-10 14.54.12&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/2005-01-10%2014.54.12_thumb1324189422.jpg&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/2005-01-10%2015.06.58_21454672137.jpg&quot;&gt;&lt;img alt=&quot;2005-01-10 15.06.58&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/2005-01-10%2015.06.58_thumb63365195.jpg&quot; style=&quot;margin:0px&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/2005-01-10%2015.31.11_2360072441.jpg&quot;&gt;&lt;img alt=&quot;2005-01-10 15.31.11&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/2005-01-10%2015.31.11_thumb676979967.jpg&quot; style=&quot;margin:0px&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/2005-01-10%2015.40.58_270662303.jpg&quot;&gt;&lt;img alt=&quot;2005-01-10 15.40.58&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/2005-01-10%2015.40.58_thumb1868710849.jpg&quot; style=&quot;margin:0px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> TechEd 2011 US WrapUp </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/teched-2011-us-wrapup</link>
        <pubDate>2012-06-18T11:15:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

I am back from TechEd Orlando, and &amp;hellip; Holy Moly.. I cannot fathom how much &amp;quot;stuff&amp;quot; goes on at TechEd every year.

First.. THANK YOU to everyone who I met in person, came to my talks and got to spend some time with. You guys really make TechEd fun for me.. because the amount of work leading up to TechEd is backbreaking. Thanks for being so .. great !

So, at TechEd, in my own little piece of the TechEd world, I had FOUR &amp;quot;duties.&amp;quot;&amp;nbsp; Three speeches and a b ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;I am back from TechEd Orlando, and … Holy Moly.. I cannot fathom how much &quot;stuff&quot; goes on at TechEd every year.&lt;/p&gt;

&lt;p&gt;First.. THANK YOU to everyone who I met in person, came to my talks and got to spend some time with. You guys really make TechEd fun for me.. because the amount of work leading up to TechEd is backbreaking. Thanks for being so .. great !&lt;/p&gt;

&lt;p&gt;So, at TechEd, in my own little piece of the TechEd world, I had FOUR &quot;duties.&quot;  Three speeches and a book giveaway and signing. I have pictures from two of these events:&lt;/p&gt;

&lt;p&gt;Here are pictures from the Viewfinity Book Signing Event:&lt;br /&gt;
&lt;a href=&quot;https://www.dropbox.com/sh/tvjoa9gtaaqwg2s/YGS8Am8mo_&quot;&gt;https://www.dropbox.com/sh/tvjoa9gtaaqwg2s/YGS8Am8mo_&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Yes.. that’s the line.. and EVERYONE got a copy of my Group Policy book for Windows 7. Killer !&lt;br /&gt;
The best part was.. MOST people were already part of the GPanswers.com Team, and when and where to be there.. Awesome !&lt;/p&gt;

&lt;p&gt;Also, super fun, was my speech with Jeff Hicks, PowerShell MVP. Jeff played the part of &quot;Professor PowerShell.&quot; I played the part of the &quot;Pointy Haired Boss.&quot; Here are the pics:&lt;br /&gt;
&lt;a href=&quot;https://www.dropbox.com/sh/v6vvqw09ak69qqb/15KXzzoXzZ&quot;&gt;https://www.dropbox.com/sh/v6vvqw09ak69qqb/15KXzzoXzZ&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you couldn’t make TechEd Orlando, I hope to see some of you in TechEd Europe.&lt;/p&gt;

&lt;p&gt;If I won’t see you NEXT week, here are two other things you might want to check out THIS WEEK:&lt;/p&gt;

&lt;p&gt;1) Tomorrow .. Tuesday, June 19th … for those in my local area (like 100 miles of Philadelphia) I’ll be speaking at the &quot;GR8 Exchange Lync &amp; System Center Conference.&quot; It’s not free, but it’s a really good deal at only $179. Me and lots of other speakers I think you’ll like. Check it out here: &lt;a href=&quot;http://exchangelync.eventbrite.com/&quot;&gt;http://exchangelync.eventbrite.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;2) Also Tomorrow.. Tuesday, June 19th… My friends at Avecto are having a webinar that DOESN’T have me. But, it looks interesting anyway, so I thought I would share. 10.00 AM EST.&lt;/p&gt;

&lt;p&gt;Okay… Thanks Team.. and.. talk with you soon !&lt;/p&gt;

&lt;p&gt;PS: I got a tremendous amount of feedback from my speeches at TechEd. Here’s my favorite comment:&lt;/p&gt;

&lt;p&gt;&quot;&lt;br /&gt;
Mr. Moskowitz is a fantastic presenter, and an absolute treat to see. His presentation showed me ideas I’ve never thought of implementing before, and now I’m VERY eager to use them at my business (although I don’t think my users will be as enthusiastic!) ? Thanks, Mr. Moskowitz!&lt;br /&gt;
&quot;&lt;/p&gt;

&lt;p&gt;Thanks whoever-you-are ! If you’re interested in getting me at your own organization for a private class, please email me, and make contact. I’ve got some available dates now that TechEd is over, but I’m assuming those dates will fill up fast.&lt;/p&gt;

&lt;p&gt;Thanks !&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Windows 8 Group Policy spreadsheet </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/windows-8-group-policy-spreadsheet</link>
        <pubDate>2012-05-26T20:58:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The Windows Server 8 and Windows 8 Preview edition have a new spreadsheet which covers all the Group Policy settings that are controllable.

It&amp;#39;s right here: http://www.microsoft.com/en-us/download/details.aspx?id=25250

So, get it while it&amp;#39;s hot and make a cool discovery ! ]]>
        </description>
        <content:encoded>
            &lt;p&gt;The Windows Server 8 and Windows 8 Preview edition have a new spreadsheet which covers all the Group Policy settings that are controllable.&lt;/p&gt;

&lt;p&gt;It&#039;s right here: &lt;a href=&quot;http://www.microsoft.com/en-us/download/details.aspx?id=25250&quot;&gt;http://www.microsoft.com/en-us/download/details.aspx?id=25250&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So, get it while it&#039;s hot and make a cool discovery !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Warning: Group Policy Isnt just for Swedes ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/warning-group-policy-isnt-just-for-swedes</link>
        <pubDate>2012-05-15T11:27:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Sweden was&amp;hellip; AWESOME ! And now I&amp;rsquo;m back and ready to kill it here in the USA.

While I was away in Sweden.. something magical happened. We had 10 people already sign up for the Salem, OR class. Holy crap. Maybe the fastest &amp;quot;ON&amp;quot; we&amp;rsquo;ve ever had. So.. um&amp;hellip; don&amp;rsquo;t wait if you&amp;rsquo;d like to get smarter in Win7 / Win 8 / Security / GPOs and have some fun. (www.GPanswers.com/training).

So, in Sweden, I recorded a podcast in front of a super nice and warm li ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Sweden was… AWESOME ! And now I’m back and ready to kill it here in the USA.&lt;/p&gt;

&lt;p&gt;While I was away in Sweden.. something magical happened. We had 10 people already sign up for the Salem, OR class. Holy crap. Maybe the fastest &quot;ON&quot; we’ve ever had. So.. um… don’t wait if you’d like to get smarter in Win7 / Win 8 / Security / GPOs and have some fun. (&lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;So, in Sweden, I recorded a podcast in front of a super nice and warm live studio audience.&lt;/p&gt;

&lt;p&gt;Special thanks to my hosts at Labcenter.se (Michael Anderberg, and Johan Person, Michael Nystrom), who were super awesome to me during my time there. In this podcast you’ll learn:&lt;/p&gt;

&lt;p&gt;– What its like to be an MVP (and if there’s a secret handshake).&lt;/p&gt;

&lt;p&gt;– Why did I get starting diving deep into Group Policy?&lt;/p&gt;

&lt;p&gt;– Why my childhood helped me become the GP geek I am.&lt;/p&gt;

&lt;p&gt;– Learn a GP trick to .. um… be an Evil Genius. (Don’t do this.)&lt;/p&gt;

&lt;p&gt;– What the big secret of GP is, that most people don’t know.&lt;/p&gt;

&lt;p&gt;– What GP does GREAT and also NOT so great (and how to fix it.)&lt;/p&gt;

&lt;p&gt;And.. like lots of other fun stuff.&lt;/p&gt;

&lt;p&gt;The link is…&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://moskowitzinc.infusionsoft.com/app/linkClick/364/1d1e1a3bae61d021/4707048/b9c8669df6fdd932&quot;&gt;https://moskowitzinc.infusionsoft.com/app/linkClick/364/1d1e1a3bae61d021/4707048/b9c8669df6fdd932&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Enjoy.. ! And leave a comment / Tweet it. And, if you’re not following me on twitter.. whatruwaitingfor ?&lt;/p&gt;

&lt;p&gt;Twitter: &lt;a href=&quot;https://twitter.com/jeremymoskowitz&quot;&gt;jeremymoskowitz&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Clean Naming for GPOs (Notes from the field): Part II </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/clean-naming-for-gpos-notes-from-the-field-part-ii</link>
        <pubDate>2012-01-31T10:19:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

I wanted to share with you some of your peers humble suggestions for Group Policy naming. Again, what works for THEM might NOT work for you, but at least it can give you some food for thought.

From Ondrej in Slovakia:

I use names for GPO and I think it&amp;rsquo;s good way to have them this way:

GPO_RDS_APP_Office2010_v01
-&amp;nbsp;&amp;nbsp;&amp;nbsp; GPO &amp;ndash; to make unique name for GPOs
-&amp;nbsp;&amp;nbsp;&amp;nbsp; RDS &amp;ndash; name of part of change (Remote Desktop Services)
-&amp;nbsp;&amp;nbsp;&amp;nbs ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;I wanted to share with you some of your peers humble suggestions for Group Policy naming. Again, what works for THEM might NOT work for you, but at least it can give you some food for thought.&lt;/p&gt;

&lt;h3&gt;From Ondrej in Slovakia:&lt;/h3&gt;

&lt;p&gt;I use names for GPO and I think it’s good way to have them this way:&lt;/p&gt;

&lt;p&gt;GPO_RDS_APP_Office2010_v01&lt;br /&gt;
-    GPO – to make unique name for GPOs&lt;br /&gt;
-    RDS – name of part of change (Remote Desktop Services)&lt;br /&gt;
-    APP – managing APPlication (Software Restriction)&lt;br /&gt;
-    Office2010 – name of application&lt;br /&gt;
-    V01 – version of GPO&lt;/p&gt;

&lt;p&gt;GPO_DisableIPV6_v01&lt;br /&gt;
-    GPO – to make unique name for GPOs&lt;br /&gt;
-    DisableIPV6 – short accurate name of changes in GPO&lt;br /&gt;
-    V01 – version of GPO&lt;/p&gt;

&lt;p&gt;I think it’s very good to have versioning of GPO policies. When I change GPO I increase version number and I keep max 2 older GPOs for just history and help to find out changes I made.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;From Charl in South Africa&lt;/h3&gt;

&lt;h3&gt;who has 2,000 GPOs !&lt;/h3&gt;

&lt;p&gt;(edited a little for clarity):&lt;/p&gt;

&lt;p&gt;&quot;Here’s what we do:&lt;/p&gt;

&lt;p&gt;-If the policy is domain linked, the GPO will start with the name of the domain it’s in; this works very well if you have multiple domains.&lt;/p&gt;

&lt;p&gt;– For the GPOs linked to our old servers structure we kept the names as starting with &quot;Servers&quot; and these are slowly being migrated to the new servers OU structure and the names for these GPOs start with NS (New Servers – OK, it’s actually my company’s name that starts with an N, followed by S for servers).&lt;/p&gt;

&lt;p&gt;– The OU is &quot;Nxxxx  Servers&quot;. Next up is the GPOs linked for the XP OUs and they start with XP and similarly the Windows 7 GPOs start with NUW (Again, first letter of my company’s name being an N followed by U and W which stands for Users and Workstations).&lt;/p&gt;

&lt;p&gt;– The next part of the name is followed by a dash (-), C and/or U and then another dash (-). This indicates whether the GPO has the Computer, User or both nodes enabled.&lt;/p&gt;

&lt;p&gt;– The next part of the name indicates what the function of the GPO is and if there are multiple functions, these are separated by commas (,).&lt;/p&gt;

&lt;p&gt;– Lastly, the name ends with a colon (:) followed by the department who ‘owns’&lt;br /&gt;
this GPO, i.e. Security, ServerOps, End User Computing, etc. Again, we only have about 5 owners.&lt;/p&gt;

&lt;p&gt;So, on a daily basis I use the GPMC scripts to dump all the GPO names into a single file, DTS/SSIS then into SQL and then the fun starts:&lt;/p&gt;

&lt;p&gt;– By using the dashes, commas and colons as separators, I can see with a stored procedure, which GPOs do not have owners as there is no colon and one of the owners defined after the colon. Which GPOs do not indicate whether they are Computer, User or both nodes-enabled GPOs.&lt;/p&gt;

&lt;p&gt;– I can see which GPOs do not conform to the proper naming convention. It it does not start with a one of the five top-level GPO names, I know immediately that I have a problem.&lt;/p&gt;

&lt;p&gt;– Digging a bit further (all automated now!) I can even see who made a GPO and indicated it is a Computer GPO, but the User node is still enabled. The exception reports only run IF something is wrong and the GPO guys from Server Ops know that Big Daddy form Security is watching them.&lt;/p&gt;

&lt;p&gt;– For GPOs linked lower down, we use the abbreviations of the child OUs in the GPO name as well just after the top-level name.&lt;/p&gt;

&lt;p&gt;So, by looking at a GPO name, I can identify where it is linked, whether is Computer/User/both, function and owner. Here’s an example:&lt;/p&gt;

&lt;p&gt;I.e. XP-C-Power management, Screensaver lockdown:SO&lt;/p&gt;

&lt;p&gt;I can quickly parse this, and see that the GPO is linked to OU containing XP machines, Computer node enabled, sets power management and screensaver and belongs to Server Ops.&lt;/p&gt;

&lt;p&gt;How’s that for being in empowered?&quot;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> A Clean naming Convention for GPOs </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/a-clean-naming-convention-for-gpos</link>
        <pubDate>2012-01-25T12:54:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Many people ask me: Is there an ideal way to name GPOs?

Well, yes and no.

First, the big problem is that the swimming pool where the GPOs live that is, the Group Policy Objects node in the GPMC just sort of all runs together. One big blaaaah of all the GPOs.

So, first off there is no way to partition them or organize them. They&amp;#39;re all just there.

Therefore, having a naming convention that works for your company could prove to be a lifesaver.

There no right or perfect way to cr ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Many people ask me: Is there an ideal way to name GPOs?&lt;/p&gt;

&lt;p&gt;Well, yes and no.&lt;/p&gt;

&lt;p&gt;First, the big problem is that the swimming pool where the GPOs live that is, the Group Policy Objects node in the GPMC just sort of all runs together. One big blaaaah of all the GPOs.&lt;/p&gt;

&lt;p&gt;So, first off there is no way to partition them or organize them. They&#039;re all just there.&lt;/p&gt;

&lt;p&gt;Therefore, having a naming convention that works for your company could prove to be a lifesaver.&lt;/p&gt;

&lt;p&gt;There no right or perfect way to create a GPOs name. One suggestion is a four part naming convention.&lt;/p&gt;

&lt;p&gt;Part I: The Where.&lt;/p&gt;

&lt;p&gt;Part II: The What.&lt;/p&gt;

&lt;p&gt;Part III: The Who&lt;/p&gt;

&lt;p&gt;Part IV: The Type.&lt;/p&gt;

&lt;p&gt;For instance a GPO might be in charge of opening Port 123 on Sales Computers. Great. So, here&#039;s a name I might use:&lt;/p&gt;

&lt;p&gt;EAST SALES COMPUTERS Firewall Open Port 123 (C) – JeremyM&lt;/p&gt;

&lt;p&gt;All four elements are there. And in the Group Policy Objects list, all the GPOs are listed Alphabetically, so you&#039;ll see each Where together quickly. The (C) tells me that the C-omputer side of the GPO is used and not the user side. The name on the end shows who is the ultimate owner of the GPO or who is in charge or who to contact for issues or updates. (You could also put this in the GPO comment fields.)&lt;/p&gt;

&lt;p&gt;Another perfectly fine choice is to re-arrange this list. Like:&lt;/p&gt;

&lt;p&gt;(C) EAST SALES COMPUTERS Firewall Open Port 123 EAST SALES COMPUTERS – JeremyM&lt;/p&gt;

&lt;p&gt;This will sort with all the Computer side GPOs grouped together first, then WITHIN that, all the EAST SALES COMPUTERS linked GPOs.&lt;/p&gt;

&lt;p&gt;Again you&#039;re welcome to have the names be anything you want.. just note that whatever&#039;s first that&#039;s what&#039;s sorted upon based upon Alpha. Having all four elements makes things a lot easier, in this guys opinion.&lt;/p&gt;

&lt;p&gt;A final trick here, is that sometimes I use an Underscore character _ to signify GPOs which are domain linked or are special in some way. For instance  _PolicyPak License GPO Expires 1-1-14 will bubble up to the top quite easily seen by everyone (as underscore is sorted BEFORE the letter A.) q&lt;/p&gt;

&lt;p&gt;What&#039;s your naming convention? There&#039;s Shoot me your email with your solution. Thanks !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Office 365 - Lync download (broken. Annoying.) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/office-365-lync-download-broken-annoying</link>
        <pubDate>2011-12-21T13:07:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If this saves you an hour, I have done my due diligence.

In short, if you&amp;rsquo;re trying to get a new Win7 machine going with Office 365, installing the Lync client is the first step.

Except the download won&amp;rsquo;t &amp;quot;start.&amp;quot;



I even ran Process Monitor against it to see what it was doing, and the install is in an endless loop looking for an MSI registry key that doesn&amp;rsquo;t exist.

Sigh.

Well, there IS a workaround, but I had to dig for it.

Look for a nice post f ]]>
        </description>
        <content:encoded>
            &lt;p&gt;If this saves you an hour, I have done my due diligence.&lt;/p&gt;

&lt;p&gt;In short, if you’re trying to get a new Win7 machine going with Office 365, installing the Lync client is the first step.&lt;/p&gt;

&lt;p&gt;Except the download won’t &quot;start.&quot;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/image_2115419676.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/image_thumb2138497091.png&quot; style=&quot;height:452px; width:740px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I even ran Process Monitor against it to see what it was doing, and the install is in an endless loop looking for an MSI registry key that doesn’t exist.&lt;/p&gt;

&lt;p&gt;Sigh.&lt;/p&gt;

&lt;p&gt;Well, there IS a workaround, but I had to dig for it.&lt;/p&gt;

&lt;p&gt;Look for a nice post from a helpful Microsoftie here. This helped me out, and hope it will help you out too.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://community.office365.com/en-us/f/166/p/16355/75977.aspx?PageIndex=2&quot;&gt;http://community.office365.com/en-us/f/166/p/16355/75977.aspx?PageIndex=2&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Managing XenApp using Group Policy - Part I </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/managing-xenapp-using-group-policy-part-i</link>
        <pubDate>2011-11-14T11:15:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I&amp;rsquo;ve been playing with XenApp 6.5 the last couple of weeks. I&amp;rsquo;ve been thinking a lot about Group Policy with regards to Citrix and XenApp servers. Really, there&amp;rsquo;s two pieces:


	Managing Applications and settings for users on XenApp servers &amp;hellip; and&amp;hellip;
	Managing the XenApp servers themselves.


This is just part I: Managing Applications and Settings for Users on XenApp Servers.

Managing Applications and Settings for Users on XenApp Servers Using Group Policy ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I’ve been playing with XenApp 6.5 the last couple of weeks. I’ve been thinking a lot about Group Policy with regards to Citrix and XenApp servers. Really, there’s two pieces:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Managing Applications and settings for users on XenApp servers … and…&lt;/li&gt;
	&lt;li&gt;Managing the XenApp servers themselves.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This is just part I: Managing Applications and Settings for Users on XenApp Servers.&lt;/p&gt;

&lt;h3&gt;Managing Applications and Settings for Users on XenApp Servers Using Group Policy&lt;/h3&gt;

&lt;p&gt;One of the things that people ask me over and over again is… &quot;On my Citrix XenApp servers, is there any way to manage my common applications’ settings using Group Policy?&quot;&lt;/p&gt;

&lt;p&gt;Here are the three normal ways you can do this:&lt;/p&gt;

&lt;h3&gt;Application Has an ADM/ ADMX template&lt;/h3&gt;

&lt;p&gt;Unless the application has a managed way to deal with it’s settings (ADM or ADMX template) you’ve got a problem. Office applications have ADM templates. Great. But name five other applications with ADM or ADMX templates.&lt;/p&gt;

&lt;p&gt;In short: You can’t.&lt;/p&gt;

&lt;h3&gt;Managing XenApp Applications Using GP Preferences&lt;/h3&gt;

&lt;p&gt;In some circumstances, you could use Group Policy Preferences if you knew exactly what registry punch to punch (if available.)&lt;/p&gt;

&lt;p&gt;Here’s a blog entry from Mr. XenApp Blog (Eric Haavarstein), on exactly how to do this. And, he shows how to use a tool from Fellow Enterprise Mobility MVP Mark Heitbrink which converts registry punches to GPPReferences Registry items. Awesome !&lt;/p&gt;

&lt;p&gt;So, the blog entry is: &lt;a href=&quot;http://www.xenappblog.com/2011/group-policy-management-import-registry-files/&quot;&gt;http://www.xenappblog.com/2011/group-policy-management-import-registry-files/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And Mark’s tool is found here: &lt;a href=&quot;http://reg2xml.com/&quot;&gt;http://reg2xml.com/&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;True Application Lock Down PLUS non-Registry based Applications&lt;/h3&gt;

&lt;p&gt;I like the tip from Eric and the tool from Mark. They’re great if that’s all you need to do.&lt;/p&gt;

&lt;p&gt;But they DO have two major limitations. How to you still perform:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Dynamic changes if you want to. Do you know what to tweak any specific entry if you needed to to make a simple change? Ouch. Painful.&lt;/li&gt;
	&lt;li&gt;True lock down so users can’t work around your settings? You can’t do that with Group Policy Preferences. Users can just change the setting you put down.&lt;/li&gt;
	&lt;li&gt;File-based applications like FireFox, OpenOffice, Flash player, or others? You can’t manage those with Group Policy Preferences (since their stuff doesn’t live in the Registry.)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So what are you going to do?&lt;/p&gt;

&lt;p&gt;Good news.&lt;/p&gt;

&lt;p&gt;PolicyPak Software (&lt;a href=&quot;http://www.PolicyPak.com&quot;&gt;www.PolicyPak.com&lt;/a&gt;) can do this. Big time.&lt;/p&gt;

&lt;p&gt;Here is a video to show you exactly how you would do this.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=1-dRjgMxyKA&amp;feature=youtube_gdata_player&quot; target=&quot;_new&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/videof16acef3456b803305578.jpg&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The &quot;cherry on top&quot; is that PolicyPak is fully CitrixReady and also works with XenDesktop. Here’s a video for that too: &lt;a href=&quot;https://www.policypak.com/technology-and-downloads/policypak-expands-xendesktop.html&quot;&gt;https://www.policypak.com/technology-and-downloads/policypak-expands-xendesktop.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you’re interested in trying this out for yourself, you’ll need to sign up for a demonstration at &lt;a href=&quot;http://www.PolicyPak.com/webinar&quot;&gt;www.PolicyPak.com/webinar&lt;/a&gt;. After that, you can get the download can give this a try yourself.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Why isn&#039;t Group Policy Working on this Client? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/why-isnt-group-policy-working-on-this-client</link>
        <pubDate>2011-10-11T12:31:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Answer: Did You Check the DNS Configuration of the Client?

One of the most frequently encountered problems with Windows 2000 and above is that things just &amp;lsquo;stop working&amp;rsquo; when DNS gets out of whack.

Specifically, if you&amp;rsquo;re not seeing Group Policy apply to your client machines, make sure their DNS client is pointing to a Domain Controller or other authoritative source for the domain. If it&amp;rsquo;s pointing to the wrong place or not pointing anywhere, Group Policy will simpl ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Answer: Did You Check the DNS Configuration of the Client?&lt;/p&gt;

&lt;p&gt;One of the most frequently encountered problems with Windows 2000 and above is that things just ‘stop working’ when DNS gets out of whack.&lt;/p&gt;

&lt;p&gt;Specifically, if you’re not seeing Group Policy apply to your client machines, make sure their DNS client is pointing to a Domain Controller or other authoritative source for the domain. If it’s pointing to the wrong place or not pointing anywhere, Group Policy will simply not be downloaded.&lt;/p&gt;

&lt;p&gt;As a colleague of mine likes to say, ‘Healthy DNS equals a healthy Active Directory.’&lt;/p&gt;

&lt;p&gt;Moreover, in the age of multiple forests and cross-forest trusts, Group Policy could be applying from just about anywhere and everywhere. It’s more important than ever to verify that all DNS server pointers are designed properly and working as they should.&lt;/p&gt;

&lt;p&gt;For instance, if clients cannot access their ‘home’ Domain Controllers while leveraging a cross-forest trust, they won’t get Group Policy.&lt;/p&gt;

&lt;p&gt;Finally, to put a fine point on it, DNS leverages only the fully qualified name.&lt;/p&gt;

&lt;p&gt;It’s not enough to verify that you can resolve a computer named xppro1 as opposed to xppro1.corp.com.&lt;/p&gt;

&lt;p&gt;The first is actually the NetBIOS name and not the fully qualified domain name.&lt;/p&gt;

&lt;p&gt;The second is the fully qualified domain name.&lt;/p&gt;

&lt;p&gt;If you find yourself in a DNS resolution situation where resolving the NetBIOS name will work, but the fully qualified name will not work, then you have a DNS problem that needs to be addressed.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> I&#039;m not perfect </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/im-not-perfect</link>
        <pubDate>2011-10-03T10:47:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ But I do try. ?

Sometimes &amp;quot;imperfections&amp;quot; make it into my book. So, with that in mind, I&amp;rsquo;ve posted a list of the known errata for my Group Policy: Fundamentals, Security and the Managed Desktop book. It&amp;rsquo;s right here:

https://www.gpanswers.com/books/book-resources/

Also, for item #3, I created a video to show you how it&amp;rsquo;s done. Check it out here:

http://youtu.be/T6qkKtt0Mjk

Enjoy, Thanks ! ]]>
        </description>
        <content:encoded>
            &lt;p&gt;But I do try. ?&lt;/p&gt;

&lt;p&gt;Sometimes &quot;imperfections&quot; make it into my book. So, with that in mind, I’ve posted a list of the known errata for my Group Policy: Fundamentals, Security and the Managed Desktop book. It’s right here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/books/book-resources/&quot;&gt;https://www.gpanswers.com/books/book-resources/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Also, for item #3, I created a video to show you how it’s done. Check it out here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://youtu.be/T6qkKtt0Mjk&quot;&gt;http://youtu.be/T6qkKtt0Mjk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Enjoy, Thanks !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Group Policy &quot;Vocabulary&quot; </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/group-policy-vocabulary</link>
        <pubDate>2011-09-11T19:47:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Let&amp;rsquo;s take a step back and get some of the terminology of Group Policy down. I find that when I&amp;rsquo;m talking with IT folks, sometimes they &amp;ldquo;blur the lines&amp;rdquo; here and there.

I&amp;rsquo;m a &amp;ldquo;precise&amp;rdquo; kind of guy, so if you are too, hope you&amp;rsquo;ll enjoy these definitions.

&amp;nbsp;

() Group Policy: The mechanism in Active Directory which allows administrators to perform
change and configuration management and policy-based management.

() Group Policy Object: ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Let’s take a step back and get some of the terminology of Group Policy down. I find that when I’m talking with IT folks, sometimes they “blur the lines” here and there.&lt;/p&gt;

&lt;p&gt;I’m a “precise” kind of guy, so if you are too, hope you’ll enjoy these definitions.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;() Group Policy: The mechanism in Active Directory which allows administrators to perform&lt;br /&gt;
change and configuration management and policy-based management.&lt;/p&gt;

&lt;p&gt;() Group Policy Object: This is the “noun” of Group Policy. The “thing” you create which allows you to make the control happen.&lt;/p&gt;

&lt;p&gt;() Policy setting: This is one possible setting within a GPO you can perform. For instance, “Prohibit access to the Control Panel” is one Policy Setting.&lt;/p&gt;

&lt;p&gt;() Enabled: One of the three usual settings within a policy setting. Enabled means “do this thing at this level.” So if you “Enable” something, you’re saying to “do it.”&lt;/p&gt;

&lt;p&gt;() Disabled: Disabled can have several meanings. But usually it means “if set at a higher level, then un-do it.” For instance, if at the Domain Level you ENABLE “Prohibit Access to the control panel” then at the OU level you “Disable” it, you’re effectively reversing the setting.&lt;/p&gt;

&lt;p&gt;() Group Policy Preferences: Sometimes called Group Policy Preferences Extensions. In the book I call these GPPEs or GPPrefs for short. GP Prefs are 21 new superpowers which add to the original 18 “in the box” superpowers.&lt;/p&gt;

&lt;p&gt;() Item: Any time you create a new “thing” with GP Prefs, you create an “item.” Items can be Shortcuts, drive mappings, ODBC settings and a whole lot more.&lt;/p&gt;

&lt;p&gt;() RSoP: Resultant set of Policy. This is the “sum total” of all the settings a user or computer is supposed to get. You can run various tools to see RSoP reports, but not all reports work the way you would expect with the new GP Prefs.&lt;/p&gt;

&lt;p&gt;() GPMC: Group Policy Management Console. There are several versions of this tool. The latest works on Windows 7 or Server 2008 R2.&lt;/p&gt;

&lt;p&gt;() RSAT: Remote Server Administration Toolkit. Remember “Adminpak” for WS03? RSAT is kinda like the Adminpak, but it works on Win7 or Server 2008 R2 and has the newest GPMC.&lt;/p&gt;

&lt;p&gt;() AGPM: Microsoft’s Advanced Group Policy Management tool. It’s an add-on to the GPMC you already know and love. It doesn’t add more “stuff” to the desktop, but adds “Change management” and workflow to Group Policy.&lt;/p&gt;

&lt;p&gt;() GPanswers.com: Your secret place to get smarter in Group Policy. Pass it on. (Not everyone is on this super secret newsletter, but if you think they should be, please send them to GPanswers.com where they can just sign up.)&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;This is GP 101.. If you’re ready to take your game to the next level, join us in San Francisco on Dec 5th 2011 for a 5 day intensive GP training workshop!&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training&lt;/a&gt; !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Supercookies.. the ugly snack you can kill using Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/supercookies-the-ugly-snack-you-can-kill-using-group-policy</link>
        <pubDate>2011-08-22T22:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Here&amp;rsquo;s the deal: You know what cookies are. They&amp;rsquo;re little text files which save little bits of data about you. Say, the username of your favorite website, when you click &amp;quot;Remember me.&amp;quot;

When you clear our your Internet Browser&amp;rsquo;s cache and cookies (say, in IE, Firefox, Chrome, etc) you wipe these files out.

Poof. Easy.

But what if a website decided to do a handful of &amp;quot;evil things.&amp;quot; First, let&amp;rsquo;s say they read these cookies on your computer. Next ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Here’s the deal: You know what cookies are. They’re little text files which save little bits of data about you. Say, the username of your favorite website, when you click &quot;Remember me.&quot;&lt;/p&gt;

&lt;p&gt;When you clear our your Internet Browser’s cache and cookies (say, in IE, Firefox, Chrome, etc) you wipe these files out.&lt;/p&gt;

&lt;p&gt;Poof. Easy.&lt;/p&gt;

&lt;p&gt;But what if a website decided to do a handful of &quot;evil things.&quot; First, let’s say they read these cookies on your computer. Next, they used these cookies to build a &quot;profile&quot; about you, then store that profile in a secret area that cannot be quickly cleared out.  So, here’s the one-two-three punch:&lt;/p&gt;

&lt;p&gt;() Punch #1 — the &quot;profile&quot; part is built so they can target you with ads on things they know you’re searching for. Say, Diapers, Diamonds, or Disinfectants.&lt;br /&gt;
() Punch #2 — the normal cookies part isn’t stored in your web browser’s normal cookies location. It’s often stored in the special cache within something you likely have on every desktop: Flash Player.&lt;br /&gt;
() Punch #3 (theoretical): Sell your personal / company data to the REAL bad guys.&lt;/p&gt;

&lt;p&gt;Ow ow ow ow ow.&lt;/p&gt;

&lt;p&gt;So, yes, indeed. Flash Player has a cache that can be used to store data — any kind of data, like personal data.&lt;/p&gt;

&lt;p&gt;Hence the term — Supercookies. Because when you &quot;clear cache and cookies&quot; you don’t clear this out.&lt;/p&gt;

&lt;p&gt;Great ! Just what we need .. another computer threat !&lt;/p&gt;

&lt;p&gt;Okay, so how do you prevent the threat? There are two kinds of people I want to give the answer to: NON-IT folks and IT folks.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;NON-IT Folks:&lt;/h2&gt;

&lt;p&gt;This advice will help if you have a handful of computers, because you’ll need to run around to each machine.&lt;/p&gt;

&lt;h3&gt;Option 1: Control Panel&lt;/h3&gt;

&lt;p&gt;Go to your Windows Control Panel, type in the word Flash as seen here then click on the Flash icon that appears.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/image_21096024427.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/image_thumb1661058519.png&quot; style=&quot;height:240px; width:695px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Then, on each computer change the setting to &quot;Block all sites from storing information on this computer&quot; as seen here.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/image_41377765961.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/image_thumb_12009939863.png&quot; style=&quot;height:549px; width:703px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Boom. No more supercookies.&lt;/p&gt;

&lt;h3&gt;Option 2 (Still for Non-IT folks, but untested.):&lt;/h3&gt;

&lt;p&gt;There’s a special web page you can go to which should perform the same thing — only it’s a web page, and not your real control panel.  I’ve read that this MIGHT work for some versions, and not for other versions, so I wouldn’t rely on it if you really needed to… but I’m adding it here for completeness. Here’s the page anyway (use at your own risk.)&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html#117498&quot;&gt;http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager03.html#117498&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;IT-Folks (Protecting your enterprise)&lt;/h2&gt;

&lt;p&gt;So, I’m sure you know where I’m going with this if you’ve got a lot of computers to manage: Use Group Policy!&lt;/p&gt;

&lt;p&gt;Problem time though… Flash has no ADM / ADMX template to manage. It turns out Flash stores it’s files in a weird place, in a weird format, and as a system file.&lt;/p&gt;

&lt;p&gt;So, you can’t use &quot;out of the box&quot; Group Policy to configure it.&lt;/p&gt;

&lt;p&gt;Not to get all &quot;commercial&quot;, but I created a video for you to see how lots of companies are handling this latest security threat.&lt;/p&gt;

&lt;p&gt;Here’s the link: &lt;a href=&quot;https://www.policypak.com/products/manage-flash-player-using-group-policy.html&quot;&gt;https://www.policypak.com/products/manage-flash-player-using-group-policy.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;TIP: If you’re truly impatient, fast forward to the 3.00 minute mark.&lt;/p&gt;

&lt;p&gt;TIP 2: Sign up for one of my webinars and see how you can mitigate other security threats lurking in Acrobat, Java and other key components of your systems!&lt;/p&gt;

&lt;p&gt;Here’s the link: &lt;a href=&quot;https://www.policypak.com/component/gpa/?view=webinar&quot;&gt;https://www.policypak.com/component/gpa/?view=webinar&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Talk soon!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz, Enterprise Mobility MVP&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The EASY way, is the HARD way. The HARD way, is the EASY way. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-easy-way-is-the-hard-way-the-hard-way-is-the-easy-way</link>
        <pubDate>2011-08-09T10:56:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This week&amp;rsquo;s tip isn&amp;rsquo;t technical. It&amp;rsquo;s philosophical.

I had a mentor who once said to me: &amp;quot;The EASY way is the HARD way. The HARD way, is the EASY way.&amp;quot;

What the heck is he talking about?

Here&amp;rsquo;s an example. I live in the city, and I own a scooter.

I usually take my scooter to the scooter shop all the way across town. A whole 12 minutes away! I&amp;rsquo;d also need to be &amp;quot;picked up&amp;quot; and wait half the day to get it done. OMG, who has time for THA ]]>
        </description>
        <content:encoded>
            &lt;p&gt;This week’s tip isn’t technical. It’s philosophical.&lt;/p&gt;

&lt;p&gt;I had a mentor who once said to me: &quot;The EASY way is the HARD way. The HARD way, is the EASY way.&quot;&lt;/p&gt;

&lt;p&gt;What the heck is he talking about?&lt;/p&gt;

&lt;p&gt;Here’s an example. I live in the city, and I own a scooter.&lt;/p&gt;

&lt;p&gt;I usually take my scooter to the scooter shop all the way across town. A whole 12 minutes away! I’d also need to be &quot;picked up&quot; and wait half the day to get it done. OMG, who has time for THAT !?&lt;/p&gt;

&lt;p&gt;So I figured, okay, why don’t I just bring my scooter to my corner car repair guy — who is awesome and reasonably priced, and does great work on my cars. He says he can do my oil change in a ‘jiffy’ (oil change pun intended.)&lt;/p&gt;

&lt;p&gt;I take the scooter over there. Its a mere 60 seconds from my house (maybe less.) And he says &quot;No problem I can just do this while you wait.&quot;&lt;/p&gt;

&lt;p&gt;&quot;Awesome!&quot; I think.. &quot;All the TIME I’ll save.&quot;&lt;/p&gt;

&lt;p&gt;Then he starts taking various things apart. The WRONG things apart. I literally see a spring pop out of the whatever-the-heck-he’s-working-on and it (no joke) rolls down the street.&lt;/p&gt;

&lt;p&gt;He gets the spring, puts it back together and says.. &quot;Oops.. that wasn’t it.&quot;&lt;/p&gt;

&lt;p&gt;Then he does end up finding the right oil drain. And drains the oil to transfer to an Eco-Friendly recycle vessel.&lt;/p&gt;

&lt;p&gt;He comments: &quot;Oh wow.. this oil weird. Its green! That’s wild.. I’ve never seen that before.&quot;&lt;/p&gt;

&lt;p&gt;Now I have sinking &quot;pit of my stomach&quot; feeling that I’ve just done something wrong. Wrong guy — wrong tools — wrong skills.&lt;/p&gt;

&lt;p&gt;&quot;So, Jeremy, what kind of oil does it take? 10w-30 ?&quot;   Arrgh.. I’m NOT the car / scooter professional. How the heck am I supposed to know?&lt;/p&gt;

&lt;p&gt;So, now I’m finding holding the owners manual, flipping thru it, and it says &quot;HP4 oil only&quot; which is apparently a Honda-specific thing, and.. so, he pokes around his shop, and, of course, doesn’t have what I need.&lt;/p&gt;

&lt;p&gt;I -could- have scooted to Pep Boys and maybe get it myself, but now my oil is drained out the scooter — rendering it unscotter-able, and I’m stuck there. Grrr.&lt;/p&gt;

&lt;p&gt;&quot;Hmm.. Pep boys can deliver it to us.. will take most of the day to get it.&quot; he says.&lt;/p&gt;

&lt;p&gt;What started at 9.00 AM is now done by 5.00 PM. Fine, all fine. We got what we needed and it’s all done and fine.&lt;/p&gt;

&lt;p&gt;But… What’s the moral of the story?  &lt;/p&gt;

&lt;p&gt;The EASY way was the HARD way.  The HARD way was the EASY way.&lt;/p&gt;

&lt;p&gt;So, when we try to take the EASY way, it quite often &quot;ends in tears&quot; (as a friend likes to say.)&lt;/p&gt;

&lt;p&gt;We TRY to take a shortcut.. using the wrong tools, people or technology to get the job done. Hoping to save some time, or a buck.&lt;/p&gt;

&lt;p&gt;And what do we get? Sometimes, you get lucky and it works out great. But, if you’re like me, any &quot;easy&quot; shortcut ends up hurting — painfully.&lt;/p&gt;

&lt;p&gt;What would the &quot;hard&quot; way have looked like:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Using the RIGHT place — the scooter shop.&lt;/li&gt;
	&lt;li&gt;Using the RIGHT people — the professional scooter dudes.&lt;/li&gt;
	&lt;li&gt;Using the RIGHT tools — the right OIL they have in stock.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The &quot;hard&quot; part about this would have been to get picked up or just wait the hour to get it done at the RIGHT place. Indeed, the HARD way really wasn’t that HARD at all, now was it?&lt;/p&gt;

&lt;p&gt;And, going the &quot;hard way&quot; — I would have saved the heartache of seeing my scooter &quot;spring apart&quot; by the wrong guy.&lt;/p&gt;

&lt;p&gt;Oh sure.. the scooter is fine now. But was it worth the risk of going the &quot;easy way?&quot;&lt;/p&gt;

&lt;p&gt;Next time you have an important decision to make remember: The EASY way, is the HARD way. The HARD way, is the EASY way.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Troubleshoot ANY Computer Problem (mostly) -or- the Zen of Enterprise Computer Troubleshooting </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-troubleshoot-any-computer-problem-mostly-or-the-zen-of-enterprise-computer-troubleshooting</link>
        <pubDate>2011-07-25T15:31:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This tip is a blast from the past, but I&amp;#39;ve re-tooled it for today, because this has been on my mind again recently.

But we all have troubles with computers. That&amp;#39;s our job. But if you can follow these simple suggestions, you can troubleshoot yourself out of just about any computer problem Group Policy or otherwise.

So, let&amp;rsquo;s dig in and talk about the Zen of Enterprise Computer Troubleshooting.

First thing&amp;rsquo;s first: duplicate it.

Having one machine, in isolation do ]]>
        </description>
        <content:encoded>
            &lt;p&gt;This tip is a blast from the past, but I&#039;ve re-tooled it for today, because this has been on my mind again recently.&lt;/p&gt;

&lt;p&gt;But we all have troubles with computers. That&#039;s our job. But if you can follow these simple suggestions, you can troubleshoot yourself out of just about any computer problem Group Policy or otherwise.&lt;/p&gt;

&lt;p&gt;So, let’s dig in and talk about the Zen of Enterprise Computer Troubleshooting.&lt;/p&gt;

&lt;h3&gt;First thing’s first: duplicate it.&lt;/h3&gt;

&lt;p&gt;Having one machine, in isolation does NOT a big problem make.&lt;/p&gt;

&lt;p&gt;It FEELS like a big problem when Sally’s machine isn’t processing GPOs, or when my own laptop refuses to run Application XYZ today, but it did yesterday.&lt;/p&gt;

&lt;p&gt;It’s frustrating, and infuriating, annoying, and .. well… that’s not the point.&lt;/p&gt;

&lt;p&gt;The point is, my friend, it’s an &quot;isolated issue.&quot; And honestly, isolated issues are just that. Isolated.&lt;/p&gt;

&lt;p&gt;Until you can get another machine to do exactly the same thing, you really have no problem to troubleshoot at all, enterprise speaking.&lt;/p&gt;

&lt;p&gt;Your problem feels big. But, honestly, until you can duplicate it, it’s shaky grounds for troubleshooting.&lt;/p&gt;

&lt;p&gt;If the problem is in virtual world, like VMware, or HyperV, try to reproduce it in the physical world just to rule that out. Weird stuff can live inside those virtual worlds sometimes.&lt;/p&gt;

&lt;h3&gt;Second thing: Log Files — The application log and Windows Logs and the applications log&lt;/h3&gt;

&lt;p&gt;Next, let’s not forget about log files.&lt;/p&gt;

&lt;p&gt;Many areas of the computer have various logging levels. When it comes to troubleshooting, 8 out of 10 times, I just lose my brain and forget to check the most obvious of places: the logfiles !&lt;/p&gt;

&lt;p&gt;Start out by checking Windows Application and System logs. An application may quietly write the secret answer to your problem in those logs, and bingo.. problem solved.&lt;/p&gt;

&lt;p&gt;Logs help you keep your sanity, because you can prove to yourself, after 20 hours of working on something (and you’re starting to see flying purple elephants)… that the thing  you think you’re seeing is something you’re actually seeing.&lt;/p&gt;

&lt;p&gt;Many applications, themselves, have log files. Digging into those can sometimes be key gateway to figuring out what the problem is.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;Third Thing: Shoot a video of the problem&lt;/h3&gt;

&lt;p&gt;If you&#039;re trying to reproduce a problem that you can&#039;t easily produce, use Camtasia or some other screen capture utility to actually watch yourself reproduce the problem. This is the ultimate tool to prove to the developer (or the boss) there really is a problem here.&lt;/p&gt;

&lt;p&gt;It could get you a quicker repair, more time to troubleshoot, or the funding you need to take your problem to the next level.&lt;/p&gt;

&lt;p&gt;In a recent case for me, I saw the problem.. got it on video .. then was never able to reproduce it again.&lt;/p&gt;

&lt;p&gt;Having it on video was awesome to have, because at least I knew I wasn&#039;t crazy. After hours of trying to reproduce the issue again, at least I had something to prove I did get the problem to fire off one time. Closer inspection of the video (the next day) showed I had a different networking connection the first time, versus all the next times.&lt;/p&gt;

&lt;p&gt;And.. Bingo. That was my problem.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;Forth thing: Ask for help&lt;/h3&gt;

&lt;p&gt;Googling / Binging / Technetting for a solution can only take you so far. Don’t be afraid to ask a college or trusted friend for help, look over your shoulder, or help in troubleshoot. That&#039;s a good way to show someone what you&#039;ve done so far and what did and didn&#039;t work.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;(PS: This shouldn’t be blanket permission for everyone to just email me when they’re having their own personal Group Policy struggles.. For that we have the community forum at GPanwers.com, okay? ? &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Additionally, give that &quot;helper friend&quot; permission to suggest WILD IDEAS. You’ve already thought of all the easy stuff. Now give them permission to &quot;go a little crazy&quot; and suggest some off the beaten path solutions to your problems.  In short, I’m saying to leverage the resources you have. I have my own &quot;inner circle&quot; to leverage when I need help, and you should foster yours. Know where to post and request help for issues when you need help, and learn the kinds of responses you can get from those systems.&lt;/p&gt;

&lt;h3&gt;Fifth thing: Learn to Give up.&lt;/h3&gt;

&lt;p&gt;Here’s something about me that you may not know. I do yoga.&lt;/p&gt;

&lt;p&gt;I’m no &quot;yoga superman&quot; or anything. I’m 6 ft 2 and weigh, well, more than I should.&lt;/p&gt;

&lt;p&gt;But the point is, that I really love it. And why? Well, beyond the health reasons, there’s  something more.&lt;/p&gt;

&lt;p&gt;I get to understand my own limitations. Instead of stretching my body to a stupid level — where I might grab my legs behind my ears and actually hurt myself– I know to &quot;give up&quot; and do something else more productive during that time.&lt;br /&gt;
Even if I’m little embarrassed that the WHOLE CLASS can do the stretch (whatever it is), and I can’t  I don’t care. I try to put that whole &quot;pride thing&quot; behind me and learn to acknowledge my own abilities. Why? Because I’m 6 ft 2 &quot;big guy&quot;, and not 5 ft 3 &quot;Yoga gal.&quot; We’re going to have different limitations. I can’t stretch like she can, and she can’t lift two 5 gallon water bottles into her house up two flights of stairs at the same time.&lt;/p&gt;

&lt;p&gt;Why bring this up now? Because after you’ve done all the proper troubleshooting you can, and after you’ve asked all the people in your inner circle, and after you’ve hit the books, and after you’ve Googled / Binged your brains out… it’s time to give up.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Learn to GIVE UP.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;But learn to give up in the right way. Microsoft product support (PSS) is there for you to troubleshoot your Microsoft related stuff.&lt;/p&gt;

&lt;p&gt;Heck, you might have free support incidents as part of a Microsfot Technet Plus subscription or other channel.&lt;/p&gt;

&lt;p&gt;The point of all of our jobs, at its core is to SOLVE PROBLEMS with the TOOLS WE CHOOSE.&lt;/p&gt;

&lt;p&gt;I can swing a hammer only so much before I need to call in a carpenter and show me what&lt;/p&gt;

&lt;p&gt;I’m doing wrong.&lt;/p&gt;

&lt;p&gt;It doesn’t help our companies or our personal sanity to keep swinging the hammer only to find we really needed a screwdriver and a blowtorch and a lesson in how to use those tools in the first place.&lt;/p&gt;

&lt;p&gt;Not to get all &quot;touchy feely&quot; here, but there is a point we all need to find it within ourselves where we say: &quot;I’ve done all we can. It’s worth X dollars in value to me to get the answers I need to continue being effective.&quot;&lt;/p&gt;

&lt;p&gt;So I do personally call Microsoft Product Support Services when I&#039;m at the end of my rope.  They do an AMAZING job and will not close the support call until YOU are satisfied the problem has been solved. I love that.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;How does this tie in to Group Policy Troubleshooting?&lt;/h3&gt;

&lt;p&gt;I want you to think of the above steps as overall advice, and not specifically for Group Policy.&lt;/p&gt;

&lt;p&gt;As for Group Policy troubleshooting, or troubleshooting in general, my (recapped) suggestions are to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Validate your findings on another machine. Just one machine in isolation does not a &quot;problem&quot; make (even if you’re tempted to feel that way.)&lt;/li&gt;
	&lt;li&gt;Try similar and dissimilar machines. If the problem is happening on XP, does it happen with Windows 7 too? Vice / Versa?&lt;/li&gt;
	&lt;li&gt;Have you been able to take screenshots or videos to share with others?&lt;/li&gt;
	&lt;li&gt;Have you asked someone on your &quot;inner circle&quot; to look over your shoulder to make sure you didn’t just make a bone-headed mistake?&lt;/li&gt;
	&lt;li&gt;Have you enabled all the logs you can? In GP, for instance, there’s at least three Windows event logs and also some auxiliary logs for &quot;GP-related&quot; functions like MSI packages, etc.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Of course in my class, you&#039;ll learn incredibly practical tips on troubleshooting Group Policy specifically, with precise step-by-steps using what I&#039;ve learned over the years.&lt;/p&gt;

&lt;p&gt;That will help you get out of hot water faster and back in business usually the same day.&lt;/p&gt;

&lt;p&gt;See you in class.. !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Group Policy: Talk is Cheap </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/group-policy-talk-is-cheap</link>
        <pubDate>2011-07-12T11:37:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you haven&amp;rsquo;t yet utilized the updated GPMC&amp;rsquo;s new &amp;quot;Comments&amp;quot; feature, it&amp;rsquo;s pretty neat. The idea is that you can specify a comment over a GPO about, say, who created it,&amp;nbsp; who supports it, and what it&amp;rsquo;s supposed to be doing.

But something came up in my last class that I was teaching and I thought was neat and I wanted to share with you.

Someone wanted to know how they could create a comment ONE TIME, then &amp;quot;recycle&amp;quot; that comment to other GPOs ]]>
        </description>
        <content:encoded>
            &lt;p&gt;If you haven’t yet utilized the updated GPMC’s new &quot;Comments&quot; feature, it’s pretty neat. The idea is that you can specify a comment over a GPO about, say, who created it,  who supports it, and what it’s supposed to be doing.&lt;/p&gt;

&lt;p&gt;But something came up in my last class that I was teaching and I thought was neat and I wanted to share with you.&lt;/p&gt;

&lt;p&gt;Someone wanted to know how they could create a comment ONE TIME, then &quot;recycle&quot; that comment to other GPOs.&lt;/p&gt;

&lt;p&gt;So, imagine I had a comment in a GPO which says: &quot;Mean Man Moskowitz made me make this GPO.&quot; An then imagine that comment could be applicable to multiple GPOs.&lt;/p&gt;

&lt;p&gt;But, how do you repro the comment over and over again?&lt;/p&gt;

&lt;p&gt;Turns out: it’s short and sweet. And no scripting or programming required.&lt;/p&gt;

&lt;p&gt;The comment is inside the GPT (SYSVOL) portion of the GPO in a file called &quot;GPO.CMT.&quot;&lt;/p&gt;

&lt;p&gt;Just copy that file to the ANOTHER GPO’s GPT (that’s the portion that lives in SYSVOL) and.. whamo !&lt;/p&gt;

&lt;p&gt;You’ve copied the comment.&lt;/p&gt;

&lt;p&gt;I don’t know if this is &quot;officially sanctioned&quot; or not, but it seemed to work pretty well when I tested it out! So, use at your own risk, I guess.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Why Local GPOs Matter </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/why-local-gpos-matter</link>
        <pubDate>2011-07-07T12:29:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I know lots of people who used them, then decided to dump &amp;rsquo;em.. only to begin recently using them again.

What gives?

Let&amp;rsquo;s go back.. way back.. to a time you may not remember. That&amp;rsquo;s right: a time when your organization DIDN&amp;rsquo;T have AD. That&amp;rsquo;s right.

Before Caring about AD.

Or, BC AD.

So, when your world was BC AD, you couldn&amp;rsquo;t use AD-based GPOs to do all the dirty work for you. That&amp;rsquo;s because you didn&amp;rsquo;t have AD. (I do realize that ma ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I know lots of people who used them, then decided to dump ’em.. only to begin recently using them again.&lt;/p&gt;

&lt;p&gt;What gives?&lt;/p&gt;

&lt;p&gt;Let’s go back.. way back.. to a time you may not remember. That’s right: a time when your organization DIDN’T have AD. That’s right.&lt;/p&gt;

&lt;p&gt;Before Caring about AD.&lt;/p&gt;

&lt;p&gt;Or, BC AD.&lt;/p&gt;

&lt;p&gt;So, when your world was BC AD, you couldn’t use AD-based GPOs to do all the dirty work for you. That’s because you didn’t have AD. (I do realize that many people grew up only starting with Windows 2000 and newer. And for that, be happy my friends.)&lt;/p&gt;

&lt;p&gt;Anyhoo.. that’s when LGPOs were handy. LGPOs, or Local Group Policy Objects were great, because you got the power of Group Policy, but kind of in 1 on 1 sort of way. LGPOs mean that you walk up to a machine and type &quot;gpedit.msc&quot; and edit the Local Group Policy.&lt;/p&gt;

&lt;p&gt;When you do — EVERYONE on that machine is affected. Sounds great! Let’s &quot;Prevent access to the Control Panel&quot; for everyone and give everyone the same &quot;Active Desktop Wallpaper.&quot; Whee.&lt;br /&gt;
Great. Until you realize that when YOU want to log on, you’re stuck without Control Panel and can’t change the desktop background to that Porsche 911 Carerra you always wanted.&lt;/p&gt;

&lt;p&gt;So, Vista and Windows 7 have a new trick up its sleeve called MLGPOs, or Multiple Local GPOs. I cover MLGPOs in huge detail in the updated Green book . But, here’s the summary. There are now THREE levels of Local GPOs for that matter.&lt;/p&gt;

&lt;p&gt;Level 1: Affects everyone&lt;br /&gt;
Level 2A: Affects the person if they’re a Joe User&lt;br /&gt;
Level 2B: Affects the person if they’re a local Admin&lt;br /&gt;
Level 3: Affects a specific person based on username&lt;/p&gt;

&lt;p&gt;So, you see there are three levels. But, there are four lines listed above, because a person can only be a USER *OR* an Admin. Not both.&lt;/p&gt;

&lt;p&gt;Therefore, MLGPOs affect &quot;Everyone First&quot; then get more specific as they apply DOWN toward the most specific — the specific person based on username.&lt;/p&gt;

&lt;p&gt;Now, if people stopped using LGPOs, do MLGPOs matter? Yep.&lt;/p&gt;

&lt;p&gt;Here’s a scenario: imagine you wanted to implement a baseline of setting on your machine. Then, once you make contact and join a domain, you want the AD-based GPOs to override the local settings.&lt;/p&gt;

&lt;p&gt;Neat! So now if you machine gets &quot;lost in transit&quot; between your &quot;build shop in the basement&quot; and it’s final destination in Kenya, you’ve at least got some baseline setting built-in. And, provided you set up the AD-based GPOs perfectly, you’ll be able to &quot;revert&quot; the LGPO settings on the machine.&lt;/p&gt;

&lt;p&gt;But wait. I have an even better idea. There’s a new policy setting — just for Vista and later. And it’s called &quot;Turn Off Local Group Policy Objects Processing.&quot; My suggestion would be to take a GPO and link it to a place in AD where you computers join after the machine makes it to Kenya.&lt;/p&gt;

&lt;p&gt;So, the machine makes it to Kenya, safe and sound, but full of Local GPO settings that would usually affect everyone on the machine.&lt;/p&gt;

&lt;p&gt;But, now that you’ve set up that special policy setting in the domain, you get a little magic.&lt;/p&gt;

&lt;p&gt;The machine joins the domain, and LGPOs are immediately neutralized the moment the machine is joined.&lt;/p&gt;

&lt;p&gt;Neat, right ?&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Why Group Policy ISN&#039;T SLOW </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/why-group-policy-isnt-slow</link>
        <pubDate>2011-06-22T12:06:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Last week, I finished giving a Group Policy Master class. In the middle of the class one of the guys asked me &amp;quot;Jeremy, now that we&amp;rsquo;ve been using GP a little while, and are really embracing GPOs, things are a little bit slower sometimes when new users log on.&amp;quot;

And my response might shock you.

I said &amp;quot;Awesome !&amp;quot;

He was a little taken back. And I know why. He thought he had a problem. But he doesn&amp;rsquo;t. He just missed a key point about how GP works.

Let&amp;rsqu ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Last week, I finished giving a Group Policy Master class. In the middle of the class one of the guys asked me &quot;Jeremy, now that we’ve been using GP a little while, and are really embracing GPOs, things are a little bit slower sometimes when new users log on.&quot;&lt;/p&gt;

&lt;p&gt;And my response might shock you.&lt;/p&gt;

&lt;p&gt;I said &quot;Awesome !&quot;&lt;/p&gt;

&lt;p&gt;He was a little taken back. And I know why. He thought he had a problem. But he doesn’t. He just missed a key point about how GP works.&lt;/p&gt;

&lt;p&gt;Let’s imagine that you wanted to do something a little crazy. And, I know you wouldn’t really want to do what I’m about to describe; it’s just something for us to hang our hats on, okay? So, imagine you wanted to (yikes) re-ACL your entire hard drive. Yep. That’s the directive. Ouch. Again, it’s just theoretical, so go with me here.&lt;/p&gt;

&lt;p&gt;So, in simple terms you have a handful of options:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Use a startup-script which manually does the deed&lt;/li&gt;
	&lt;li&gt;Manually run a script which does the deed on each machine&lt;br /&gt;
	or&lt;/li&gt;
	&lt;li&gt;Use GP to deliver the same set of instructions via the NTFS security node&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;They all do the same thing, right? Right. And the action they’re taking (the actual&lt;br /&gt;
&quot;thing&quot; they’re doing) is kind of slow and painful ,right?&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;So is the GP engine the cause of this &quot;slowdown?&quot; No. It’s the &quot;action&quot; you’re doing. The theoretical re-ACL’ing of the hard drive.&lt;/p&gt;

&lt;p&gt;So I was kind of excited when he said that sometimes things are slower because that means he’s actually DOING something with GP. So, I like to say that GP is a &quot;Blame the message, not the messenger&quot; technology.&lt;/p&gt;

&lt;p&gt;A little later in the GP 2.0 Catch-up class I showed him how to bust apart Windows 7’s new logging mechanism and see — precisely — how long a &quot;GP Cycle&quot; takes. That way he can be really really sure how long GP was taking to process each step if he wanted to. Heck, it might not even be that anything he’s DOING with GP is even causing the slowdown!&lt;/p&gt;

&lt;p&gt;In other words — Group Policy might not be likely to blame AT ALL for any slowdown. By showing him how to &quot;bust apart&quot; the logs, he could see that GP wasn’t taking long at all ! The culprit was, well, something else.&lt;/p&gt;

&lt;p&gt;But in any case, the next time you think &quot;Hey, the computer is running a little slowly&quot; take a step back. It means it’s working. (But also consider getting smarter in GP troubleshooting it too, to be 100% sure GP isn’t the culprit !)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Why is Group policy not working ? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/why-is-group-policy-not-working</link>
        <pubDate>2011-06-15T12:43:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This tip is a &amp;quot;blast from the past&amp;quot;&amp;hellip; I talked about this some time ago, and bringing it back, as it appears to be a hot topic right now.

Let&amp;rsquo;s start with Replication Problems.

Remember that a GPO is make up of two halves: the GPC and GPT.

And they get replicated to all DCs. What if one of your DCs isn&amp;rsquo;t getting the message about the updated GPO? And then, some of your client machines are trying to ask that DC for the latest GPO information.

Right, they ge ]]>
        </description>
        <content:encoded>
            &lt;p&gt;This tip is a &quot;blast from the past&quot;… I talked about this some time ago, and bringing it back, as it appears to be a hot topic right now.&lt;/p&gt;

&lt;p&gt;Let’s start with Replication Problems.&lt;/p&gt;

&lt;p&gt;Remember that a GPO is make up of two halves: the GPC and GPT.&lt;/p&gt;

&lt;p&gt;And they get replicated to all DCs. What if one of your DCs isn’t getting the message about the updated GPO? And then, some of your client machines are trying to ask that DC for the latest GPO information.&lt;/p&gt;

&lt;p&gt;Right, they get either no information or the wrong information.&lt;/p&gt;

&lt;p&gt;So what can you do?&lt;/p&gt;

&lt;p&gt;First, try GPOtool. It’s a download from the &lt;a href=&quot;http://www.microsoft.com/downloads/en/details.aspx?familyid=9d467a69-57ff-4ae7-96ee-b18c4790cffd&quot;&gt;Microsoft 2003 Resource Kit&lt;/a&gt;. It can help you troubleshoot to see if the GPC and GPT are on all of your DCs.&lt;/p&gt;

&lt;p&gt;But, here’s another tip: try creating a new user and then using Active Directory Users and Computers to &quot;Change Domain Controllers&quot; and verify that new account &quot;makes it&quot; to all your DCs. That will verify the path of the GPC.&lt;/p&gt;

&lt;p&gt;Similarly, try creating a new text file (like a readme file or something) and dropping it into SYSVOL. Then, check out the SYSVOL on all DCs and make sure that readme file &quot;makes it.&quot; This will verify the path of the GPT.&lt;/p&gt;

&lt;p&gt;If the GPC and GPT are successfully replicating to all DCs (and you’ve verified that replication itself is working A-OK) there are lots of other things to check, which we’ll examine in other tips !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Group Policy and backups using Powershell </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/group-policy-and-backups-using-powershell</link>
        <pubDate>2011-06-07T13:38:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ My pal and fellow MVP Jeff Hicks noticed something. He noticed that the Group Policy Powershell cmdlets had a Backup-GPO and Restore-GPO (seen here&amp;hellip;)



But there was no way to really get into the &amp;quot;Manage Backups&amp;quot; stuff that you can only get to within the GUI.



So he created it. You can see Jeff&amp;rsquo;s interesting blog post about using PowerShell to get to this part of the world here: http://jdhitsolutions.com/blog/2011/05/get-gpo-backup/

Also, I wanted to say THAN ]]>
        </description>
        <content:encoded>
            &lt;p&gt;My pal and fellow MVP Jeff Hicks noticed something. He noticed that the Group Policy Powershell cmdlets had a Backup-GPO and Restore-GPO (seen here…)&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image001_2884113573.png&quot;&gt;&lt;img alt=&quot;clip_image001&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/clip_image001_thumb1392714463.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But there was no way to really get into the &quot;Manage Backups&quot; stuff that you can only get to within the GUI.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/image_2957498699.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/image_thumb2094714436.png&quot; style=&quot;height:352px; width:417px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So he created it. You can see Jeff’s interesting blog post about using PowerShell to get to this part of the world here: &lt;a href=&quot;http://jdhitsolutions.com/blog/2011/05/get-gpo-backup/&quot;&gt;http://jdhitsolutions.com/blog/2011/05/get-gpo-backup/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Also, I wanted to say THANKS to the folks who showed up for my &quot;Secret Group Policy Meetup&quot; at TechEd.&lt;/p&gt;

&lt;p&gt;We got to the bottom of some sticky issues for those who attended and had a really fun overall &quot;rap&quot; session.&lt;/p&gt;

&lt;p&gt;We even had several guest stars: Aaron Margosis, Microsoft Technical Services and fellow TechEd speaker, Thorbjorn Svolvold, Group Policy big-brain from Specops software and Zach Alexander from the Group Policy team at Microsoft. Thanks everyone for attending !&lt;/p&gt;

&lt;p&gt;Photo Credit: &lt;strong&gt;Takayuki Shodai &lt;/strong&gt;also in attendance, but not shown, since he’s taking the picture. Thanks Takayuki !&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/image_4950138902.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/image_thumb_1764508855.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Time . . Is of the Essence ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/time-is-of-the-essence</link>
        <pubDate>2011-05-09T09:35:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I ran GPupdate today on one of my Windows 7 machines and got this. . .



It&amp;#39;s kind of a mouthful, but here&amp;#39;s the short, sweet story here.

Group Policy relies on the Kerberos protocol. Kerberos relies on the clock. If the clock between your client and your server is skewed by more than the allowable value (normally 5 minutes) then you won&amp;#39;t process GPOs correctly !

So, this warning, is saying: My clock is weird versus the domain controllers.

No problem. Usually, a reboot ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I ran GPupdate today on one of my Windows 7 machines and got this. . .&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_2256712071.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb1216598822.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It&#039;s kind of a mouthful, but here&#039;s the short, sweet story here.&lt;/p&gt;

&lt;p&gt;Group Policy relies on the Kerberos protocol. Kerberos relies on the clock. If the clock between your client and your server is skewed by more than the allowable value (normally 5 minutes) then you won&#039;t process GPOs correctly !&lt;/p&gt;

&lt;p&gt;So, this warning, is saying: My clock is weird versus the domain controllers.&lt;/p&gt;

&lt;p&gt;No problem. Usually, a reboot fixes this kind of thing. Or it gets fixed on it&#039;s own when the time sync service does its thing.&lt;/p&gt;

&lt;p&gt;But, one of the key troubleshooting steps for GPOs is to VERIFY that your clients time is within 5 minutes of your DCs times.&lt;/p&gt;

&lt;p&gt;Do this, and you’re off and running (sometimes.) ?&lt;/p&gt;

&lt;p&gt;PS: Quick update from Jeff L. who suggested I also turn you on to this Microsoft KB article: &lt;a href=&quot;http://support.microsoft.com/kb/816042&quot;&gt;http://support.microsoft.com/kb/816042&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Charlie Sheen your GPOs . . . Winning ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/charlie-sheen-your-gpos-winning</link>
        <pubDate>2011-04-20T00:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I&amp;#39;m not going to beat up Charlie Sheen in this blog post.&amp;nbsp; You&amp;#39;ll see where the Charlie Sheen stuff comes into play. Lets get right down to GP bizness.

Lets pretend you had this setup. I have two GPOs linked to the East Sales Users OU: GPO 111 and GPO 222.

And, lets also pretend that they affect the same policy setting: Remove Games Link from Start Menu.



If we run a Group Policy Results report we can quickly see that BOTH GPOs (GPO 111 and GPO 222)

were correctly app ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I&#039;m not going to beat up Charlie Sheen in this blog post.  You&#039;ll see where the Charlie Sheen stuff comes into play. Lets get right down to GP bizness.&lt;/p&gt;

&lt;p&gt;Lets pretend you had this setup. I have two GPOs linked to the East Sales Users OU: GPO 111 and GPO 222.&lt;/p&gt;

&lt;p&gt;And, lets also pretend that they affect the same policy setting: Remove Games Link from Start Menu.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_4746452047.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb_12077394782.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If we run a Group Policy Results report we can quickly see that BOTH GPOs (GPO 111 and GPO 222)&lt;/p&gt;

&lt;p&gt;were correctly applied to the client machine (Win7Computer-32). As seen here.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_81077578501.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb_3634548375.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now, remember, I&#039;ve said that GPO 111 and GPO 222 conflict on how they apply the Remove Games Link from Start Menu setting.&lt;/p&gt;

&lt;p&gt;So, which one is going to win ?&lt;/p&gt;

&lt;p&gt;Well, the quickest way to see the Winning GPO is to run the Group Policy Results report as seen here. In my not too complex (on purpose) example here we can see that GPO 111 is Winning over GPO&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_62081247882.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb_2777494614.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But what if we add something at another level, say the Domain level and Enforce those settings down?&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_10627012070.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb_45885799.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If the GPO is Enforced, then that GPO should be the Winning GPO, and in my re-run GP Results report example here, thats precisely what has occurred.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_12485706090.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb_51341489680.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So, in short, the Winning GPO is the one which ultimately gets to express the setting upon the client computer.&lt;/p&gt;

&lt;p&gt;If you can&#039;t figure out WHY a particular value is appearing on the client, look no further than looking for the one that&#039;s Winning !!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Why you cannot see Site-Based GPOs inside the Inheritance Tab of the GPMC </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/why-you-cannot-see-site-based-gpos-inside-the-inheritance-tab-of-the-gpmc</link>
        <pubDate>2011-04-03T18:31:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ A fellow reader like you, named Dave King emailed me this screenshot.

Dave asked me a short, sweet question and included a killer screenshot.

First the question, then the screenshot

Jeremy..

If I set a GPO to be applied at the SITE level and it is working fine, and set another at the DOMAIN level and it is working fine&amp;hellip;

When I go to the node and look at the applied Policies it shows only the one linked at the DOMAIN level.

What happed to the SITE one?

It is there and  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;A fellow reader like you, named Dave King emailed me this screenshot.&lt;/p&gt;

&lt;p&gt;Dave asked me a short, sweet question and included a killer screenshot.&lt;/p&gt;

&lt;p&gt;First the question, then the screenshot&lt;/p&gt;

&lt;p&gt;Jeremy..&lt;/p&gt;

&lt;p&gt;If I set a GPO to be applied at the SITE level and it is working fine, and set another at the DOMAIN level and it is working fine…&lt;/p&gt;

&lt;p&gt;When I go to the node and look at the applied Policies it shows only the one linked at the DOMAIN level.&lt;/p&gt;

&lt;p&gt;What happed to the SITE one?&lt;/p&gt;

&lt;p&gt;It is there and working, and when I run a Resultant set of Policy on the node it DOES show the SITE GPO and the DOMAIN GPO.&lt;/p&gt;

&lt;p&gt;But it does not show the SITE GPO’s influence on the Node without running the RSOP.&lt;/p&gt;

&lt;p&gt;Is there any explanation for this behavior?&lt;/p&gt;

&lt;p&gt;Thanks,&lt;/p&gt;

&lt;p&gt;*Dave*&lt;/p&gt;

&lt;p&gt;First,  Dave, THANK YOU for having this so clearly marked up, expressing exactly what your problem was, and how I can help. This makes the job of helping you MUCH EASIER. (That is to say, if you are looking for a little help, I would please first encourage you to use the GPanswers.com forums.. THEN ask for help.) And if you ARE going to ask for help or look to get a question answered, THIS is exactly how to do it.&lt;/p&gt;

&lt;p&gt;Now, lets take a look at the screenshot. (Seriously.. this is the EXACT screenshot I got from Dave. I didn&#039;t make these markups.. he did. Thank you Dave !)&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/AD1_2860469196.jpg&quot;&gt;&lt;img alt=&quot;AD1&quot; src=&quot;https://www.gpanswers.com/media/Jeremy%20Moskowitz/AD1_thumb1067423443.jpg&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What Dave is witnessing is completely normal. Dave is noticing that Site-Linked GPOs (in this example Hide Screen Saver Option, linked to Default-First-Site-Name) is actually WORKING on the client. He explains this when he tells me that he sees it show up in the RSOP (gpresult /R) report on the client.&lt;/p&gt;

&lt;p&gt;Cool.&lt;/p&gt;

&lt;p&gt;So the question really is.. Why can&#039;t I see it here, in the Group Policy Inheritance tab?&lt;/p&gt;

&lt;p&gt;The answer is simple. The GPMC itself cannot know WHO will be in that site at any given time. So, to avoid confusion it won&#039;t show site-based GPOs in the Group Policy Inheritance tab.  For instance, lets pretend that Default First Site was really named Detroit. And, lets also pretend that there was a second site named Dublin (either Ireland, or Ohio.)&lt;/p&gt;

&lt;p&gt;Now, if there is a GPO linked to Detroit and others linked to Dublin what is the Resultant Set of Policy RIGHT NOW for anyone in the Human Resources OU? Answer? We don&#039;t know.&lt;/p&gt;

&lt;p&gt;We don&#039;t know, because we don&#039;t know if we&#039;re talking about users in Detroit or Dublin. So, the GPMC Group Policy Inheritance tab simply doesn&#039;t show (ie: assume) where the user (or computer) is at that moment.&lt;/p&gt;

&lt;p&gt;Therefore, you&#039;ll see the GPO in the RSOP reports on the computer (because the computer ITSELF knows where it&#039;s at).. but the GPMC simply cannot make any assumptions.&lt;/p&gt;

&lt;p&gt;Mystery Solved !&lt;/p&gt;

&lt;p&gt;Thanks Dave.. This was a fun one !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Windows Group Policy vs. Logon Scripts. What&#039;s the right option? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/windows-group-policy-vs-logon-scripts-whats-the-right-option</link>
        <pubDate>2011-03-23T10:35:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I thought I would tip the hat this week to a Microsoft Premiere Field engineer who attempts to answer the age old question:

Windows Group Policy vs. Logon Scripts. What&amp;#39;s the right option?

Since in a previous blog post of mine, I demonstrated why I personally feel Group Policy has the advantage, I thought I would share what I recently found about a balanced rationale about why one might one to use the built-in AD Users and Computers, versus Group Policy for logon scripts.

Here&amp;#39;s ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I thought I would tip the hat this week to a Microsoft Premiere Field engineer who attempts to answer the age old question:&lt;/p&gt;

&lt;p&gt;Windows Group Policy vs. Logon Scripts. What&#039;s the right option?&lt;/p&gt;

&lt;p&gt;Since in a previous blog post of mine, I demonstrated why I personally feel Group Policy has the advantage, I thought I would share what I recently found about a balanced rationale about why one might one to use the built-in AD Users and Computers, versus Group Policy for logon scripts.&lt;/p&gt;

&lt;p&gt;Here&#039;s the link to his article. Enjoy.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://blogs.technet.microsoft.com/mspfe/2011/03/15/windows-group-policy-vs-logon-scripts-whats-the-right-option/&quot;&gt;https://blogs.technet.microsoft.com/mspfe/2011/03/15/windows-group-policy-vs-logon-scripts-whats-the-right-option/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;PS: My remaining seats in my April 11 14th Denver class are melting away like snow on a warm spring day. Don&#039;t wait if you&#039;re still interested. Confirm your seat TODAY by using &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training&lt;/a&gt; and signing up online or call 302-351-4903 and Diane will help you with a PO. Discounts for large teams !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Showing and Hiding Scripts using Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/showing-and-hiding-scripts-using-group-policy</link>
        <pubDate>2011-02-28T20:03:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This came up today with a group of new friends I met today in Wisonsin at a K12 education conference.

Someone asked How can I prevent people from stopping login scripts as they run?

I thought about this for a second, and realized, he was using Active Directory Users and Computers and running an old school script like this.



It was an easy fix. Simply start using Group Policy Scripts, which can be found here:



Doing it this way, if you DID want to run Logon Scripts visible, you  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;This came up today with a group of new friends I met today in Wisonsin at a K12 education conference.&lt;/p&gt;

&lt;p&gt;Someone asked How can I prevent people from stopping login scripts as they run?&lt;/p&gt;

&lt;p&gt;I thought about this for a second, and realized, he was using Active Directory Users and Computers and running an old school script like this.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_2759133390.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb196364483.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It was an easy fix. Simply start using Group Policy Scripts, which can be found here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_4639908639.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb_1902822739.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Doing it this way, if you DID want to run Logon Scripts visible, you would need to set&lt;/p&gt;

&lt;p&gt;User Configuration | Policies | Administrative Templates |System | Logon/Logoff&lt;/p&gt;

&lt;p&gt;Run Logon Script Visible.&lt;/p&gt;

&lt;p&gt;Hope that helps !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> GPMC Backspace Bug: Not fixed in Windows 7 / Server 2008 SP1.. but in this Hotfix ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/gpmc-backspace-bug-not-fixed-in-windows-7-server-2008-sp1-but-in-this-hotfix</link>
        <pubDate>2011-02-12T09:05:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This one has been bugging me for a LONG time, and likely affects your life too.

You&amp;#39;re going along, typing in the name of a GPO, then.. Uh-oh.. a little typo.

You hit backspace, and Crappers.. it doesn&amp;#39;t work !

My own personal workaround to this is to use Ctrl-Shift + Left arrow and wipe out the whole entry, or, of course, use the mouse to fix.

But, there&amp;#39;s a hotfix, waiting for you, and it&amp;#39;s right here.

Here&amp;#39;s the weird part.. apparently, this hotfix isn&amp;#39;t ]]>
        </description>
        <content:encoded>
            &lt;p&gt;This one has been bugging me for a LONG time, and likely affects your life too.&lt;/p&gt;

&lt;p&gt;You&#039;re going along, typing in the name of a GPO, then.. Uh-oh.. a little typo.&lt;/p&gt;

&lt;p&gt;You hit backspace, and Crappers.. it doesn&#039;t work !&lt;/p&gt;

&lt;p&gt;My own personal workaround to this is to use Ctrl-Shift + Left arrow and wipe out the whole entry, or, of course, use the mouse to fix.&lt;/p&gt;

&lt;p&gt;But, there&#039;s a hotfix, waiting for you, and it&#039;s right here.&lt;/p&gt;

&lt;p&gt;Here&#039;s the weird part.. apparently, this hotfix isn&#039;t inside Windows 7 SP1or Server 2008 SP1 (if I&#039;m reading the article correctly.) And the hotfix download page seems to say that it will only be part of SP2 !!&lt;/p&gt;

&lt;p&gt;So, even AFTER you apply SP1 (when available) you should apply this hotfix to your machines running the GPMC.&lt;/p&gt;

&lt;p&gt;The link to the hotfix is here: &lt;a href=&quot;http://support.microsoft.com/kb/2466373&quot;&gt;http://support.microsoft.com/kb/2466373&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Special Thanks to Mark Parris who provided the inspiration to this tip. His blog can be found here: &lt;a href=&quot;https://markparris.co.uk&quot;&gt;https://markparris.co.uk&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Group Policy the GPMC–It’s part of the operating system </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/group-policy-the-gpmcits-part-of-the-operating-system</link>
        <pubDate>2011-02-09T08:19:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ One thing that seems to be confusing for the newer GP-practitioner is what GPMC version should I use?

The answer: Always the latest one.

That one, right now, is the GPMC for Windows 7 or Windows Server 2008 R2.

Those are equal in their capabilities.

You can install the Windows Server 2008 R2 as a feature of the operating system using the Server Manager utility as seen here.



You can install the Windows 7 GPMC by installing a downloadable piece called RSAT Remote Server Administ ]]>
        </description>
        <content:encoded>
            &lt;p&gt;One thing that seems to be confusing for the newer GP-practitioner is what GPMC version should I use?&lt;/p&gt;

&lt;p&gt;The answer: Always the latest one.&lt;/p&gt;

&lt;p&gt;That one, right now, is the GPMC for Windows 7 or Windows Server 2008 R2.&lt;/p&gt;

&lt;p&gt;Those are equal in their capabilities.&lt;/p&gt;

&lt;p&gt;You can install the Windows Server 2008 R2 as a feature of the operating system using the Server Manager utility as seen here.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_6714642957.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb_21521959626.png&quot; style=&quot;height:451px; width:749px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can install the Windows 7 GPMC by installing a downloadable piece called RSAT Remote Server Administration Toolkit.&lt;/p&gt;

&lt;p&gt;That RSAT utility is found &lt;a href=&quot;http://www.microsoft.com/downloads/en/details.aspx?FamilyID=7d2f6ad7-656b-4313-a005-4e344e43997d&quot;&gt;here&lt;/a&gt;, and note.. there are 32-bit and 64-bit versions.&lt;/p&gt;

&lt;p&gt;Once installed (and it takes a while) you can install the GPMC in the Turn Windows features on or off as seen here.&lt;/p&gt;

&lt;p&gt;Then, run GPMC.MSC, and you&#039;ll be off and running using the GPMC console !&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_2576743230.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb620978121.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;By using the latest GPMC, on either Windows 7 or Server 2008 R2, you&#039;ll always have access to the latest abilities. Like GP Preferences, or creating AppLocker policies.&lt;/p&gt;

&lt;p&gt;So, if you&#039;re using the old XP GPMC, get on board with the latest, greatest GPMC. You&#039;ll be happy you did !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to Schedule a GPO to Fire Off within certain time blocks </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-schedule-a-gpo-to-fire-off-within-certain-time-blocks</link>
        <pubDate>2011-01-24T17:24:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Thanks to GPanswers.com member Bart for the meat of this tip !

You might have a situation where you want GPOs to apply to a collection of computers but only within certain time blocks.

Sure, you could manually link and unlink the GPO when the proper times come. But you&amp;#39;re too busy for that.

Instead, use PowerShell, and automate the task!

First things first. Make sure the policy refresh interval on the workstations is set small enough to apply the activated GPO settings during the ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;em&gt;Thanks to GPanswers.com member Bart for the meat of this tip !&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;You might have a situation where you want GPOs to apply to a collection of computers but only within certain time blocks.&lt;/p&gt;

&lt;p&gt;Sure, you could manually link and unlink the GPO when the proper times come. But you&#039;re too busy for that.&lt;/p&gt;

&lt;p&gt;Instead, use PowerShell, and automate the task!&lt;/p&gt;

&lt;p&gt;First things first. Make sure the policy refresh interval on the workstations is set &lt;em&gt;small enough &lt;/em&gt;to apply the activated GPO settings during the times you want. Normally, computers update every 90 120 minutes. To use this tip, you might want to tighten up the refresh interval just for this collection (like a Training room OU or Kiosk OU or something.) I wouldn&#039;t recommend you do this for your whole population. Do this using the policy settings located at “Computer Configuration | Administrative Templates | System | Group Policy | Group Policy refresh interval for computers.”&lt;/p&gt;

&lt;p&gt;Where this came in handy was to activate and deactivate additional (outgoing) firewall rules specifically for a classroom setup for specific classes.&lt;/p&gt;

&lt;p&gt;To use, simply set up a scheduled task to LINK and UNLINK the GPOs as needed.&lt;/p&gt;

&lt;p&gt;To Enable:&lt;br /&gt;
Powershell -importsystemmodules -command “&amp; {set-gplink -name ‘GPO_Computer_Classroom Outgoing Firewall’ -target ‘ou=classroom,ou=computer management,dc=yourdomain,dc=local’ -linkenabled YES}”&lt;/p&gt;

&lt;p&gt;To Disable:&lt;br /&gt;
Powershell -importsystemmodules -command “&amp; {set-gplink -name ‘GPO_Computer_Classroom Outgoing Firewall’ -target ‘ou=classroom,ou=computer management,dc=yourdomain,dc=local’ -linkenabled NO}”&lt;/p&gt;

&lt;p&gt;PS: For more information, the PowerShell Cmdlets for managing GPO’s come with Windows 7 and W2k8-R2. For an overview of all GPO Cmdlets have a look at the TechNet site: &lt;a href=&quot;http://technet.microsoft.com/en-us/library/ee461027.aspx&quot;&gt;http://technet.microsoft.com/en-us/library/ee461027.aspx&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Lockdown PCs -- Hard. With Windows 7  - - Easy. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/lockdown-pcs-hard-with-windows-7-easy</link>
        <pubDate>2011-01-16T15:51:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The Lockdown Question

Hey Jeremy, what&amp;#39;s the best way to lock down my Windows machines? I hear this question dozens of times a year from students who are sitting down at the first day of my Group Policy training workshops. They are often very eager to get right down to business and wrestle this particular problem to the ground because they know that when they go back to their offices and implement what they&amp;#39;re about to learn, that their environment will be more predictable and more se ]]>
        </description>
        <content:encoded>
            &lt;h3&gt;The Lockdown Question&lt;/h3&gt;

&lt;p&gt;Hey Jeremy, what&#039;s the best way to lock down my Windows machines? I hear this question dozens of times a year from students who are sitting down at the first day of my Group Policy training workshops. They are often very eager to get right down to business and wrestle this particular problem to the ground because they know that when they go back to their offices and implement what they&#039;re about to learn, that their environment will be more predictable and more secure.&lt;/p&gt;

&lt;p&gt;See, I know we all feel it would be best if our pesky users would just stop playing with stuff within Windows, their applications and on their desktops.&lt;/p&gt;

&lt;p&gt;And, sure, that&#039;s part of the art of desktop lockdown. But my suggestion would be to look at desktop lockdown from a holistic and incremental approach. There&#039;s no one best way to lock down your Windows machines.&lt;/p&gt;

&lt;p&gt;But what is true, is that the technologies built-in to Windows 7 have enabled more control than ever and enabled a wide variety of situations. Lets explore some of my favorite ways to get started with desktop lockdown, then I&#039;ll give you some tips on how to expand your controls as you need to.&lt;/p&gt;

&lt;h3&gt;Lead with Group Policy and Group Policy Preferences&lt;/h3&gt;

&lt;p&gt;This pair of technologies is arguably the most powerful arrow in your quiver. But using Group Policy, you can restrict a user from some of Windows most tempting locations such as the control panel, desktop, Start Menu, Task Bar and more. Once a GPO is created, most of these settings are found within the User Configuration | Administrative Templates section. There are way too many settings to review here, but I would encourage you to poke around, take stock of the ones that are most interesting to you then try them out in your test lab — before rolling out into production.&lt;/p&gt;

&lt;p&gt;When performing lockdown tests, I would suggest that you use two people, a designer and a tester. The Designer should set up the Group Policy settings and lockdown tests, then the Tester would validate the tests and try to wiggle around the designers intentions. Using two people during testing ensures good feedback. One person always validates the other.&lt;/p&gt;

&lt;p&gt;As you&#039;re working through your resting, do note that some policy settings are reliant upon other policy settings being enabled or other conditions being set or present on the client machine before you actually see the result you&#039;re expecting. So again, having a Designer design and a Tester test helps make sure the settings you want to achieve have actually occurred on the client machine.&lt;/p&gt;

&lt;p&gt;Group Policy Preferences also enables you to deliver desktop settings. Though not specifically designed for desktop lockdown, they can helpful in guiding users away from temptation and toward standardization.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/clip_image002_2915157820.jpg&quot;&gt;&lt;img alt=&quot;clip_image002&quot; src=&quot;/media/Jeremy%20Moskowitz/clip_image002_thumb1698796506.jpg&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Caption: The Group Policy Preferences can implement IE settings&lt;/p&gt;

&lt;p&gt;Sometimes what the doctor ordered is a blend between &lt;em&gt;both&lt;/em&gt; Group Policy and Group Policy Preferences. For instance, you might want use Group Policy Preferences to set a particular setting, plus use Group Policy controls to lock down certain areas of IE.&lt;/p&gt;

&lt;p&gt;This is an advanced skill, which takes a little practice and patience. But with enough time, you&#039;ll find the right balance using the two.&lt;/p&gt;

&lt;p&gt;I would also suggest that you check out a favorite document of mine entitled &lt;a href=&quot;http://www.microsoft.com/downloads/en/details.aspx?FamilyID=1DE3C7CE-5AF8-4E54-84B8-1FAB6161730F&quot;&gt;Group Policy Settings for Creating a Steady State&lt;/a&gt; which can be found here with literally dozens of ideas to help you get started.&lt;/p&gt;

&lt;h3&gt;Focus, then Expand&lt;/h3&gt;

&lt;p&gt;So going back to my students who ask me Hey Jeremy, what&#039;s the best way to lock down my Windows machines? As you can tell, I love to lead with the core lockdown starting with Group Policy and Group Policy Preferences, then expand outward using additional Windows 7 technologies.&lt;/p&gt;

&lt;p&gt;If you&#039;re looking for more hard-core controls, you might want to consider checking out this the recently published document from Microsoft entitled &lt;a href=&quot;http://www.microsoft.com/downloads/en/details.aspx?FamilyID=ef232619-7600-4768-b111-f60ba13862ea&quot;&gt;Creating a Steady State by Using Microsoft Technologies&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Inside you&#039;ll discover some extra ideas you can try out, such as mandatory profiles, working with AppLocker to prevent applications from running, and even wiping back the hard drive of a machine every night!&lt;/p&gt;

&lt;p&gt;We&#039;ve just scratched the surface. For additional specific tips and tricks on desktop lockdown, it&#039;s a common feature in my GPanswers.com Tip of the Week. You can sign up the free tip of the week at &lt;a href=&quot;https://www.gpanswers.com/sign-up&quot;&gt;https://www.gpanswers.com/register&lt;/a&gt;. You can also get hands-on experience with Group Policy and desktop lockdown in my in-person or online-based Group Policy Master Class at &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;BIO:&lt;/p&gt;

&lt;h3&gt;Jeremy Moskowitz, GPanswers.com and PolicyPak.com&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;&lt;a href=&quot;http://click.email.microsoftemail.com/?qs=e52cd336a6efd223f2ca175372c943e75979e572c583486f6fa4b12ee27eb7c6668303d5469189e7&quot;&gt;Jeremy Moskowitz&lt;/a&gt; is a Enterprise Mobility MVP, the Chief Propeller-Head for &lt;a href=&quot;http://click.email.microsoftemail.com/?qs=e52cd336a6efd223e176f7b5094252d2c439dbd98af2e792fcb52dc3021ad50b252ea895cf05a86b&quot;&gt;GPanswers.com&lt;/a&gt; and Founder of &lt;a href=&quot;http://click.email.microsoftemail.com/?qs=e52cd336a6efd2236b9c1bc8bddddda752a036cc4e5d1f2510a970d0661c18417790870cf840e1a0&quot;&gt;PolicyPak&lt;/a&gt;, which makes software to increase desktop lockdown using Group Policy. Thousands of IT professionals have taken his Group Policy training. GPanswers.com was ranked as one of “The 20 most useful Microsoft sites for IT professionals” by ComputerWorld magazine. Jeremy is also a STEP member.&lt;/em&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Backup Procedures so Easy, Even Your Mom Could (and should) do it. (Repost, with updates) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/backup-procedures-so-easy-even-your-mom-could-and-should-do-it-repost-with-updates</link>
        <pubDate>2010-12-24T07:52:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Presenting.. &amp;ldquo;Jeremy Moskowitz&amp;rsquo;s guide to how to backup your computer (which should be enough for most mere mortals who are not IT pros.)

If you ARE an IT pro, I would encourage you to PRINT and hand-deliver this to everyone during your Xmas or NY-eve party. It may seem like a weird gift NOW, but your friends and family will thank you that you took a moment to set them up with the protection they need.

In a departure of my usual IT-focused subject matter on GPanswers.com, this  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Presenting.. “Jeremy Moskowitz’s guide to how to backup your computer (which should be enough for most mere mortals who are not IT pros.)&lt;/p&gt;

&lt;p&gt;If you ARE an IT pro, I would encourage you to PRINT and hand-deliver this to everyone during your Xmas or NY-eve party. It may seem like a weird gift NOW, but your friends and family will thank you that you took a moment to set them up with the protection they need.&lt;/p&gt;

&lt;p&gt;In a departure of my usual IT-focused subject matter on GPanswers.com, this guide is not specifically geared toward IT managers or even IT pros. Again, this is a guide that you should give to anyone and everyone you know with a computer.&lt;/p&gt;

&lt;p&gt;IT backup and restore procedures will be significantly different than this.&lt;/p&gt;

&lt;p&gt;This is for “regular Joe and Jane” with one, two or maybe three computers in the house. I wrote this document up after I saw this picture (See below). In short, you never know what is going to happen to your data.There are *EIGHT* things you need to do to keep absolutely safe. Omitting any of these steps is not advised, but I can see if you only performed just ONE, you would still be BETTER OFF than almost most everyone I know. Doing all seven is a near guarantee you will not be “up the creek when the water really hits.”&lt;/p&gt;

&lt;p&gt;The Motto I live by: “There are people who back up their data, and those who will.” That’s because DISK DRIVES ALWAYS FAIL. ALWAYS. It’s is a guarantee.  Even the newest ones with no moving parts. They all fail. Eventually. Read more to discover how “mere mortals” (not IT folks) should be backing up their data to prevent disaster.&lt;/p&gt;

&lt;p&gt;Look at &lt;a href=&quot;http://www.powerpage.org/airport-security-destroys-womans-macbook-offers-to-make-amends/&quot;&gt;this picture&lt;/a&gt;. Ow. You never know what’s going to happen.&lt;/p&gt;

&lt;p&gt;I know.. You’re thinking “Holy cow, Moskowitz. Really? Seven things I gotta do? You’ve got to be kidding me.”&lt;/p&gt;

&lt;p&gt;Sorry. Yes. One method isn’t enough. Two *CAN* be enough. But you cannot count that any ONE method will always work.&lt;/p&gt;

&lt;p&gt;That’s why you need at LEAST TWO. And the others are GOOD IDEAS.&lt;/p&gt;

&lt;p&gt;Let me explain how I do it, and you can copy or otherwise parrot what I do. Or not. For the record, I haven’t lost any data since 1994, your mileage may vary.&lt;/p&gt;

&lt;h3&gt;Thing #1: Get an online backup service.&lt;/h3&gt;

&lt;p&gt;What is an online backup service?&lt;/p&gt;

&lt;p&gt;It’s a little application that runs on your PC or Mac and constantly backs up your files to the online service thru the Intertubes. I use Carbonite.com (don’t sign up until you read this whole thing.) Others seem to like Mozy.com.&lt;/p&gt;

&lt;p&gt;Q:How does it protect you:&lt;br /&gt;
A:You tell it where your “data” is.. (or let it decide) and if you DELETE a file, or a directory, you go online and RESTORE it.&lt;/p&gt;

&lt;p&gt;Q: What happens if I blow away my whole hard drive or change hard drives&lt;br /&gt;
A: You can get it all back.. your data. Pictures, docs, etc. Not applications. You can transfer your subscription to other computers at the same time.&lt;/p&gt;

&lt;p&gt;Q: What about applications I’ve installed:&lt;br /&gt;
A: You should have another copy of these somewhere. At least a LIST of what’s important, offline, somewhere. See my answer a little later.&lt;/p&gt;

&lt;p&gt;Q: What about if I overwrite a file by accident&lt;br /&gt;
A: Carbonite says they keep 3 months of backups of a file. Never used it.&lt;/p&gt;

&lt;p&gt;Q: What does it cost:&lt;br /&gt;
A: $55 a year for “all you can eat.” Multi-year discounts. Get it. It’s a freekin’ no-brainer. $55 a year per computer.. GIGS of storage. They do not monitor storage usage unless it&#039;s clearly over-the-top, crazypants Gigabytes.&lt;/p&gt;

&lt;p&gt;Q: Mac and PC?&lt;br /&gt;
A: Yes. Get it.&lt;/p&gt;

&lt;p&gt;Q: Do I need to license each computer in my house?&lt;br /&gt;
A: Yes. Do that.&lt;/p&gt;

&lt;p&gt;Q: Does it take 90 years to upload all my stuff?&lt;br /&gt;
A: Yes. The first time is quite painful for your internet connection. After that, easy.&lt;/p&gt;

&lt;p&gt;Q: Are there other backup services like this?&lt;br /&gt;
A: Yes, lots. I happen to use this one. Carbonite.com. Others like Mozy.com.&lt;/p&gt;

&lt;p&gt;Q: Does it handle open files? If my Outlook is running does it back that up?&lt;br /&gt;
A: No. This is a pain in the neck, and you&#039;ll occasionally have to just reboot your machine, log on, then go to sleep (leaving the computer on.) Only then will 100% of the files be uploaded to the service.&lt;/p&gt;

&lt;p&gt;Q: Is it safe? Do they sell my personal data to the mafia?&lt;br /&gt;
A: In the last century, you decided to trust your banks with your money. Now, in the 21st century you have to have some trust in services that hold your data. My stuff is up there as are millions of other peoples. Seems safe. But, make sure, ya know, you&#039;re not using a lousy password to access the stuff through their web page.&lt;/p&gt;

&lt;h3&gt;Thing #2: Get a full-disk backup program&lt;/h3&gt;

&lt;p&gt;If you’re not using Windows 7, do that soon. Inside Windows 7 is a very decent “Full Disk backup” program. XP has one too, but it’s not quite as good.&lt;/p&gt;

&lt;p&gt;In Windows 7, just type “Backup” at the start prompt. The Windows 7 default backup routine is to take a full disk backup. If you ARE an IT Pro reading this, or a home user capable of using the command prompt, my suggested command to run to automate the process is:&lt;/p&gt;

&lt;p&gt;wbadmin start backup -backuptarget:O: -include:C: -allcritical -quiet&lt;/p&gt;

&lt;p&gt;(Where O: is whatever drive letter houses an external USB disk.) This will ensure that all the Windows 7 important bits are captured and ready to be placed upon the disk. I have found this to be more reliable than the GUI version of the backup tool.&lt;/p&gt;

&lt;p&gt;Macs have a built-in excellent program called Time Machine. Check it out, and use it.&lt;/p&gt;

&lt;p&gt;If you’re using XP, or even Windows 7, I might suggest something like&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.acronis.com/homecomputing/products/trueimage/&quot;&gt;http://www.acronis.com/homecomputing/products/trueimage/&lt;/a&gt; (Able to successfully backup and restore to same machine. Have not tried their Universal Restore option.)&lt;br /&gt;
or&lt;br /&gt;
&lt;a href=&quot;http://www.symantec.com/norton/ghost&quot;&gt;http://www.symantec.com/norton/ghost&lt;/a&gt; (personally, this did not work for me; tried it and didn&#039;t get 100% backup, posted to their forums and got lousy responses.)&lt;/p&gt;

&lt;p&gt;These products take full SNAPSHOTS of your machine, (and increments) and puts them on an external USB disk (more later). When the crap hits, you boot off a CD (that you make) and .. whamo.. pull from your recovery backup.&lt;/p&gt;

&lt;h3&gt;Thing #3: Backup to an external USB drive (and back up MOST important stuff here.)&lt;/h3&gt;

&lt;p&gt;In Step #2, you saved an “image” of your PC somewhere. Where? Here. External USB disks are just DIRT CHEAP.&lt;/p&gt;

&lt;p&gt;Here’s 250GB for $39.99. More Googling with yield better results, even.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.tigerdirect.com/applications/searchtools/item-details.asp?EdpNo=18657&amp;csid=_21&quot;&gt;http://www.tigerdirect.com/applications/searchtools/item-details.asp?EdpNo=18657&amp;csid=_21&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Get two or three. See next FAQ for why.&lt;/p&gt;

&lt;h3&gt;Thing #4: Don’t keep all your backups / computers in your house !&lt;/h3&gt;

&lt;p&gt;Keep one backup in the house at all times, another at your Mom’s or in the safe deposit box at the bank. True, the bad guys can break in and steal your backup at Mom’s, so a safe deposit box is actually way better.&lt;/p&gt;

&lt;p&gt;Why are you doing this “offsite backup?” So, if your house burns down, so does your laptop, -AND- the backup you have in the house. Having another at your Mom’s or in the Safe at the bank is a GOOD IDEA.. But this takes DILLIGENCE.&lt;/p&gt;

&lt;p&gt;I know someone who did thing #3 (above) but his laptop *AND* his backup were caught in a flood. If he did Thing #4 as suggested here, he would still have been protected.&lt;/p&gt;

&lt;p&gt;So, what do *I* do? Every Monday, I rotate my sets of drives such that I always have TWO in the bank and ONE coming back to me for making a new backup for the next week.&lt;/p&gt;

&lt;h3&gt;Thing #5: Making DIRECT copies of your most critical data to the external disk drives&lt;/h3&gt;

&lt;p&gt;If you have EXTRA room after thing #2, then make a DIRECT copy (drag and drop, xcopy, etc) of your MOST IMPORTANT STUFF directly to the external disk drive.&lt;/p&gt;

&lt;p&gt;Why? Because if something got CORRUPTED in the snapshot backup of step #2, you at least have YOUR MOST IMPORTANT STUFF as just regular “plain ol’ files” for you to recover.&lt;/p&gt;

&lt;p&gt;Just plug in your USB backup and, COPY BACK.&lt;/p&gt;

&lt;p&gt;This year, I blew up my humongous .mp3 collection. This became a no brainer for me to repair. I backed up 3 days earlier. I simply deleted all the MP3 on my desktop, and copied the backed up files to their normal home. Boom. Done.&lt;/p&gt;

&lt;h3&gt;Thing #6: Rotate between AT LEAST two, possibly three USB drives.&lt;/h3&gt;

&lt;p&gt;This is similar to #4, but three is better than two. This gives me THREE weeks to get something back from the dead if I messed up.&lt;/p&gt;

&lt;h3&gt;Thing #7: Keep copies of your ORIGINAL disks, downloadables, KEYCODES and Drivers.&lt;/h3&gt;

&lt;p&gt;I have some key “special” folders in case I need them:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Keycodes: c:datakeycodes. It has WORD and TXT files with all the keycodes of everything I’ve ever bought, ever.&lt;/li&gt;
	&lt;li&gt;ISOs: c:ISOs.  This is a collection of the DVDs and CD-ROMs I have physically purchased, including Quickbooks and Microsoft Visio. If you&#039;re unfamiliar with how to take your store-bought DVDs and CDs and make ISO files, consider asking your IT friend for a tutorial. This usually requires (free or cheap) software to convert your CDs and DVDs with applications on them to ISO files.&lt;/li&gt;
	&lt;li&gt;Drivers: c:Drivers: This has every driver I would need to get my Laptop and desktops system back going again (sound, video, network, disk, etc.)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This collection is enormously helpful if need to restore them or repair them, or I’m building / re-building a system.&lt;/p&gt;

&lt;p&gt;I built a new Windows 7 machine last Thursday and was up and running in 3 hours because I had all my ISOs, keycodes and drivers — all in one place, ready to go.&lt;/p&gt;

&lt;h3&gt;Thing #8: Test your restore procedure.&lt;/h3&gt;

&lt;p&gt;This can be really tricky, especially for item #2 (full snapshot backup.)&lt;/p&gt;

&lt;p&gt;For laptops, invest in a second hard drive, even if you use it JUST for this test. That’s right. For about $70 or so, you can get, say, this drive:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.newegg.com/Product/Product.aspx?Item=N82E16822148374&amp;cm_re=500GB_laptop_drive-_-22-148-374-_-Product&quot;&gt;http://www.newegg.com/Product/Product.aspx?Item=N82E16822148374&amp;cm_re=500GB_laptop_drive-_-22-148-374-_-Product&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And then TEST RESTORE from Step #2 onto this drive. MOST laptops can quickly pull out the drive, replace it with this new drive, and allow you to test your restore in full.&lt;/p&gt;

&lt;p&gt;Then, when your test is complete, keep using that disk, or swap back to the original. Do this every 3-6 months or so.&lt;/p&gt;

&lt;p&gt;For Desktops.. same deal. Get another drive. Get a technical friend to help you if you need to. This procedure IS harder on a desktop than a laptop.&lt;/p&gt;

&lt;p&gt;But do TRY to do a similar “full recovery” test. You will be SO GLAD you did this NOW and find problems NOW, as opposed to WHEN the problem occurs and you cannot correct from it anymore.&lt;/p&gt;

&lt;p&gt;If you don’t want to do this, at LEAST try to do perform test restores of your DATA from your ONLINE service and your external USB-drive extra-copies&lt;/p&gt;

&lt;p&gt;For extra credit, try to recover data from ANOTHER COMPUTER, in case yours becomes a smoldering mess or you drop it in a lake or something.&lt;/p&gt;

&lt;p&gt;Other advice:&lt;/p&gt;

&lt;p&gt;1. &lt;strong&gt;If you do just ONE thing on this list, do #5: c&lt;/strong&gt;opy your most critical stuff to cheap external USB disks. You’re a &lt;strong&gt;total fool if you do not&lt;/strong&gt; at this point because USB disks are so cheap, and they work on Macs and PCs.&lt;/p&gt;

&lt;p&gt;2. Its better to do at least ONE of these than NONE of these. I’ve outlined 8 steps here. But if you only want to do one, but do it religiously, it’s better than doing NONE.&lt;/p&gt;

&lt;p&gt;3. Don’t count on one method working 100% of the time. That’s why I use three methods and hope ONE of them works when the time comes.&lt;/p&gt;

&lt;p&gt;4. Keep it simple. The LESS COMPLICATED you backup and restore procedure is, the better.&lt;/p&gt;

&lt;p&gt;5. If all else fails, and you didn’t listen to me AT ALL, and your hard drive dies, and you DON’T KNOW WHAT TO DO Go here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.ontrackdatarecovery.com/hard-drive-recovery/&quot;&gt;http://www.ontrackdatarecovery.com/hard-drive-recovery/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For a SMALL FORTUNE, they will open your hard drive and try to recover your data.&lt;/p&gt;

&lt;p&gt;It’s not surprising that these companies stay in business. Most people do not back up. Will you pay NOW (cheap backup) or LATER (expensive recovery service that doesn’t always work?)&lt;/p&gt;

&lt;p&gt;It’s up to you.&lt;/p&gt;

&lt;p&gt;That is all.&lt;/p&gt;

&lt;p&gt;Good luck.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Google Chrome-MSI and ADMX files </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/google-chrome-msi-and-admx-files</link>
        <pubDate>2010-12-17T13:35:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This is a short and a sweet one. Sort of.

Google has announced an MSI file for deploying their Chrome browser, en-mass to your PCs.

How?

Well, they&amp;#39;ve got an MSI now. And you can use, say, your favorite software distribution mechanism, like.. oh, gosh, I don&amp;#39;t know the in-the-box-and-widely-under-used Group Policy Software Installation ?

Check out the link here.. Now before you DO, I suggest you read onward.

http://www.google.com/apps/intl/en/business/chromebrowser.html
 ]]>
        </description>
        <content:encoded>
            &lt;p&gt;This is a short and a sweet one. Sort of.&lt;/p&gt;

&lt;p&gt;Google has announced an MSI file for deploying their Chrome browser, en-mass to your PCs.&lt;/p&gt;

&lt;p&gt;How?&lt;/p&gt;

&lt;p&gt;Well, they&#039;ve got an MSI now. And you can use, say, your favorite software distribution mechanism, like.. oh, gosh, I don&#039;t know the in-the-box-and-widely-under-used Group Policy Software Installation ?&lt;/p&gt;

&lt;p&gt;Check out the link here.. Now before you DO, I suggest you read onward.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.google.com/apps/intl/en/business/chromebrowser.html&quot;&gt;http://www.google.com/apps/intl/en/business/chromebrowser.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The trick appears to be that, while the MSI is available to anyone, I&#039;m actually NOT SURE if anyone (everyone) is allowed to use it unless they&#039;re a Google Chrome for Business company. I clicked on the link to download the MSI, and saw a huge EULA in front of me. I copied and pasted it into Word (take THAT, Google Docs !) and it was a whopping 13 pages and 6,553 words.&lt;/p&gt;

&lt;p&gt;Ohkay.&lt;/p&gt;

&lt;p&gt;First things first Item 1.3 in the Eula has double-word typo, as in 1.3 Your agreement with Google will also include the the terms I&#039;m not above typos myself, but then again, I don&#039;t have 11 billion lawyers working for me.&lt;/p&gt;

&lt;p&gt;Next.. I did try to buzz through the document looking for words like Customer and other such stuff to help me learn what the scoop is. But I really can&#039;t tell if I&#039;m allowed to use it. Honestly, this isn&#039;t my area of expertise, so I don&#039;t have direct advice on whether or not it&#039;s legal, quasi-legal, or totally illegal to use this MSI if you&#039;re not a Google Chrome for Business member. I guess- I could contact Google Sales, and maybe they&#039;ll get a hold of me.&lt;/p&gt;

&lt;p&gt;But, if you KNOW the answer, then just email me, and I&#039;ll post a follow-up.&lt;/p&gt;

&lt;p&gt;Part II of this little story is that there&#039;s also ADM and ADMX/ADML files as well.  Once you put the ADM, ADMX &amp; ADML files in the right place, you&#039;re cookin with gas and configuring Chrome a-go-go.&lt;/p&gt;

&lt;p&gt;The link to THAT is here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.google.com/support/a/bin/answer.py?hlrm=en&amp;answer=187945&quot;&gt;http://www.google.com/support/a/bin/answer.py?hlrm=en&amp;answer=187945&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Interesting stuff.&lt;/p&gt;

&lt;p&gt;That&#039;s it for now.&lt;/p&gt;

&lt;p&gt;PS: Learn how to deploy MSI files, upgrade them, manage them, patch them, revoke them and more.  Learn how to manage ADM, ADMX and ADML files and not shoot yourself in the foot or blow up your network.&lt;/p&gt;

&lt;p&gt;I still have the &lt;bleep&gt;-ing discount going for my GPanswers.com Home Study Course  Silver Kits. Gotta email me for the &lt;bleep&gt;-ing discount code.&lt;/p&gt;

&lt;p&gt;Check out my Group Policy training with the Online University here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/training/sign-up-now-online/&quot;&gt;https://www.gpanswers.com/training/sign-up-now-online/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Talk soon!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Using Powershell to find Group Policy Strangeness </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/using-powershell-to-find-group-policy-strangeness</link>
        <pubDate>2010-11-30T09:52:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Do you have any GPOs which are &amp;ldquo;not doing anything&amp;rdquo;? If so, why?

If you have zillions of GPOs, here&amp;rsquo;s a quick cleanup tip.

Use a Windows 7 machine and PowerShell to quickly find all GPOs which have all their settings disabled.

Here&amp;#39;s an example GPO with all the settings disabled.



Sure, you COULD click on every stinkin GPO you have in your domain.

-OR- you can use Powershell to quickly get to the bottom of things.

1. On a Windows 7 machine, open a comma ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Do you have any GPOs which are “not doing anything”? If so, why?&lt;/p&gt;

&lt;p&gt;If you have zillions of GPOs, here’s a quick cleanup tip.&lt;/p&gt;

&lt;p&gt;Use a Windows 7 machine and PowerShell to quickly find all GPOs which have all their settings disabled.&lt;/p&gt;

&lt;p&gt;Here&#039;s an example GPO with all the settings disabled.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_41079487600.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb_1219566344.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Sure, you COULD click on every stinkin GPO you have in your domain.&lt;/p&gt;

&lt;p&gt;-OR- you can use Powershell to quickly get to the bottom of things.&lt;/p&gt;

&lt;p&gt;1. On a Windows 7 machine, open a command prompt.&lt;/p&gt;

&lt;p&gt;2. Type “Powershell” (no quotes.)&lt;/p&gt;

&lt;p&gt;3. Type import-module Grouppolicy (no quotes.)&lt;/p&gt;

&lt;p&gt;4. Type the command you see here: get-gpo all | sort gpostatus&lt;/p&gt;

&lt;p&gt;The ones with AllSettingsDisabled will bubble up to the top.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_244441429.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb1259058483.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;All the Powershell propeller-heads are rolling their eyes right now, because they know there&#039;s a cleaner way to produce the output of this showing ONLY the ones that actually match the GpoStatus of AllSettingsDisabled.&lt;/p&gt;

&lt;p&gt;Yes, yes, you purists&lt;/p&gt;

&lt;p&gt;Here&#039;s how to do it:&lt;/p&gt;

&lt;p&gt;get-gpo all | where { $_.GPOstatus eq AllSettingsDisabled}&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Jeremy%20Moskowitz/image_61386978727.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Jeremy%20Moskowitz/image_thumb_2662370804.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hope this helps you out!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> How to use Group Policy to control Services </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/how-to-use-group-policy-to-control-services</link>
        <pubDate>2010-10-19T00:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Guest post by Alan Burchill (Enterprise Mobility MVP) from the Group Policy Center

Services are programs that are configured to run in the background of a Windows computer weather or not there is a users that is logged on. They are essential part of windows and are essential to the operation of any windows computers. Without services computer could not perform automatic updates, run scheduled tasks or even connect to a file share. Therefore the ability to control Windows Services is a vita ta ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;em&gt;Guest post by &lt;/em&gt;&lt;a href=&quot;http://twitter.com/alanburchill&quot; target=&quot;_blank&quot;&gt;&lt;em&gt;Alan Burchill&lt;/em&gt;&lt;/a&gt;&lt;em&gt; (Enterprise Mobility MVP) from the &lt;a href=&quot;http://www.grouppolicy.biz&quot; target=&quot;_blank&quot;&gt;Group Policy Center&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Services are programs that are configured to run in the background of a Windows computer weather or not there is a users that is logged on. They are essential part of windows and are essential to the operation of any windows computers. Without services computer could not perform automatic updates, run scheduled tasks or even connect to a file share. Therefore the ability to control Windows Services is a vita task for IT administrators.&lt;/p&gt;

&lt;p&gt;Quite often disabling services on a computer is the best way to reduce the security surface of a computer or to improve performance by turning off un-used components of the OS. Inversely it is also very important to have the ability to turn on services to enable certain functionality or to ensure that certain services are not turned off.&lt;/p&gt;

&lt;p&gt;Below I will go through the two ways you can control services in windows by using Group Policy each ways has its own advantages and/disadvantages but together you can pretty much control any system service the way you want.&lt;/p&gt;

&lt;p&gt;In the examples below I am going to show you how to enable the Applications Identification service that is required to be enabled to make AppLocker work in Windows 7.&lt;/p&gt;

&lt;h3&gt;Using Group Policy to configured a Service&lt;/h3&gt;

&lt;p&gt;Even since Group Policy was introduced to Windows 2000 you have been able to configured some aspects of services using native group policy.&lt;/p&gt;

&lt;p&gt;Now that you can control service using Group Policy Preference there are only two reason that you will still want to use this method.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;You want to control services on Windows 2000 or a computer that does not have the client side extensions installed.&lt;/li&gt;
	&lt;li&gt;You want to configure the security so that non-administrators can start,stop and pause the service.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Step 1.&lt;/strong&gt; Edit a computer Group Policy Object that is targeted at the computer that you want to configure&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2.&lt;/strong&gt; Select the services that you want to configure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; If the service that you want to configure is not present in the list you will need to install GPMC on a computer that has the service running. This is a painful restriction of controlling services this way and&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Alan%20Burchill/image_21294000100.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Alan%20Burchill/image_thumb704028350.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3.&lt;/strong&gt; From the menu click on Action &gt; Properties then tick Define this policy setting and then configured the service startup mode to what you want it configured.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Alan%20Burchill/image_42055868625.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Alan%20Burchill/image_thumb_1814803155.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4.&lt;/strong&gt; If you click on the Edit Security button you can also configured who has control over the service. This would be useful if you want to give end users the ability to start and stop specific services. &lt;strong&gt;Tip:&lt;/strong&gt; Tick Start, stop and pause for INTERACTIVE if you want the logged on user to control the services.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Alan%20Burchill/image_81041755203.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Alan%20Burchill/image_thumb_3451780321.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now that you have configured the services via group policy you will need to reboot the computer for the new startup mode to take affect. This means if you are disabling a service then it will not stop until your next reboot which could be may days, weeks or even months after you made the policy change.&lt;/p&gt;

&lt;h3&gt;Using &lt;a href=&quot;http://www.grouppolicy.biz/2010/03/what-are-group-policy-preferences/&quot; target=&quot;_blank&quot;&gt;Group Policy Preferences&lt;/a&gt; to configure a Service&lt;/h3&gt;

&lt;p&gt;The newer and almost always better way to configure service now is to you the Group Policy Preference Services options. As opposed to the native method which only allowed you to control the startup and security of service, preference now allows you much greater control.&lt;/p&gt;

&lt;p&gt;The only reasons you would not want to use Group Policy Preference to control services are:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;You need to configured the startup mode of a service on a computer running Windows 2000 or one that is not running the client side extensions.&lt;/li&gt;
	&lt;li&gt;You want to be able to configured the security to allow non-admin to start, stop or pause the service.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Always remember that when you do configure a service startup mode using the native method that this will take precedence over Group Policy Preferences and you can use the security options in conjunction with preferences.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1.&lt;/strong&gt; Edit a computer Group Policy Object that is targeted to the computers that you want to control the service.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2.&lt;/strong&gt; Navigate to Computer Configuration &gt; Preferences &gt; Control Panel Settings &gt; Services&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Alan%20Burchill/image_101827958181.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Alan%20Burchill/image_thumb_4579980554.png&quot; style=&quot;height:286px; width:755px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3.&lt;/strong&gt; In the menu click on Action &gt; New &gt; Service and now click on the button next to the Service Name field.&lt;/p&gt;

&lt;p&gt;Note: From here you can either type in the service name in the Service Name field or click on the button to chose the service from a predefined list of services.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Alan%20Burchill/image_121163076388.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Alan%20Burchill/image_thumb_52118238621.png&quot; style=&quot;height:452px; width:408px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4&lt;/strong&gt;. Select the service name that you want to configured and then click Select&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Alan%20Burchill/image_14367191469.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Alan%20Burchill/image_thumb_61995128179.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5.&lt;/strong&gt; Now you can configure the Startup mode from the Startup mode drop down box and you can configure a service action.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Alan%20Burchill/image_181281292518.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Alan%20Burchill/image_thumb_8925959015.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Service Action will take place each time there is a group policy refresh so that you do not need to wait for the computer to reboot for the latest startup mode to take affect. This can also be handy to configure if you want a service to start if it crashes or if you have a pesky service that requires restarting on a regular basis to keep running properly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 6.&lt;/strong&gt; Click on the Recovery tab to configure the recovery options of the service as you would configure in the service control panel.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/media/Alan%20Burchill/image_20232549529.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;/media/Alan%20Burchill/image_thumb_92061806625.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 7.&lt;/strong&gt; As this is a preference you can also configure the standard Common options from such as item level targeting which will allow you to granularly control what computer you target this setting.&lt;/p&gt;

&lt;p&gt;As you can see with the combination of Group Policy Preferences and the native policies there is nothing you cant configure to your system services Enjoy&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This post was originally posted here &lt;/em&gt;&lt;a href=&quot;http://www.grouppolicy.biz/2010/08/how-to-use-group-policy-to-control-services/&quot;&gt;&lt;em&gt;http://www.grouppolicy.biz/2010/08/how-to-use-group-policy-to-control-services/&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Office 2010: Group Policy Deployment Bonanza </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/office-2010-group-policy-deployment-bonanza</link>
        <pubDate>2010-10-18T20:59:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I&amp;rsquo;m not exactly sure why.. but sometimes Microsoft goes on a little jag about something. They get a particular bee in their bonnet, then BLAMMO! Tons of stuff on one focused topic comes out, all at once, just overwhelming us.

Well, this kind of just happened recently. And NO, I&amp;rsquo;m not talking about &amp;ldquo;Windows 7 Phone Mobile System 7 Mobility Solution for Mobile Phones&amp;rdquo; &amp;hellip; or whatever-the-heck-it&amp;rsquo;s called.

I&amp;rsquo;m talking about Office 2010. And, specifical ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I’m not exactly sure why.. but sometimes Microsoft goes on a little jag about something. They get a particular bee in their bonnet, then BLAMMO! Tons of stuff on one focused topic comes out, all at once, just overwhelming us.&lt;/p&gt;

&lt;p&gt;Well, this kind of just happened recently. And NO, I’m not talking about “Windows 7 Phone Mobile System 7 Mobility Solution for Mobile Phones” … or whatever-the-heck-it’s called.&lt;/p&gt;

&lt;p&gt;I’m talking about Office 2010. And, specifically, deploying that big ‘ol beast using Group Policy.&lt;/p&gt;

&lt;p&gt;I do cover how to deploy Office 2010 (and Office 2007 for that matter) in my big green book (www.GPanswers.com/book) but it’s also true Microsoft has made some newly available docs which give some extra oomph to dealing with that rollout.&lt;/p&gt;

&lt;p&gt;PS: If you’re coming to my Chicago class NEXT WEEK, then GOOD NEWS !    I’ve decided to put my working gloves on, and POOF ! Now, you’ve got a brand new “unannounced” extra bonus lesson with hands-on labs for “Office 2010 + Group Policy = Deployment !” So, see you there. (Two seats left, by the way… &lt;a href=&quot;https://www.gpanswers.com/training&quot;&gt;https://www.gpanswers.com/training&lt;/a&gt; if you want to claim ’em.)&lt;/p&gt;

&lt;p&gt;If you can’t make it to Chicago, here’s the “self help” resources I talked about.&lt;/p&gt;

&lt;p&gt;() TechNet Magazine Auto Deploy Office 2010 with Free Tools:&lt;br /&gt;
&lt;a href=&quot;http://technet.microsoft.com/en-us/magazine/ff956190.aspx&quot;&gt;http://technet.microsoft.com/en-us/magazine/ff956190.aspx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;() Deploy Office 2010 by using Group Policy computer startup scripts&lt;br /&gt;
&lt;a href=&quot;http://technet.microsoft.com/en-us/library/ff602181.aspx&quot;&gt;http://technet.microsoft.com/en-us/library/ff602181.aspx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;() For IT professionals: Group Policy for Microsoft Office 2010&lt;br /&gt;
&lt;a href=&quot;http://tinyurl.com/23g8txf&quot;&gt;http://tinyurl.com/23g8txf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;() Office 2010 Administrative Template files (ADM, ADMX, ADML) and Office Customization Tool&lt;br /&gt;
&lt;a href=&quot;http://technet.microsoft.com/en-us/library/cc178992.aspx#section8&quot;&gt;http://technet.microsoft.com/en-us/library/cc178992.aspx#section8&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I do gotta say “Thanks Microsoft.”  Having to slog though without the docs (even, heck.. WITH the docs) out on your own is PAINFUL. Really. But these newer docs do ease that pain a little bit. I know people are hep on trying to roll out Office 2010.. and it isn’t easy.&lt;/p&gt;

&lt;p&gt;Hopefully these docs help you make the magic happen. Until next time !&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> ADMX Overlap </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/admx-overlap</link>
        <pubDate>2010-10-10T12:23:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ By now you saw the video related to this blog posting. If you haven&amp;rsquo;t yet, then STOP, watch this, then come back here:

http://tinyurl.com/admx-overlap-video

Okay. Now that you understand the &amp;ldquo;ADMX overlap&amp;rdquo; issue a little more, here&amp;rsquo;s the EXACT list of files that are exclusive to each operating system. So, if you want to have &amp;ldquo;100% of it all&amp;rdquo; be sure to copy up ONE operating system&amp;rsquo;s ADMX files, then hunt the rest of these down, and also put them in ]]>
        </description>
        <content:encoded>
            &lt;p&gt;By now you saw the video related to this blog posting. If you haven’t yet, then STOP, watch this, then come back here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://tinyurl.com/admx-overlap-video&quot; target=&quot;_blank&quot;&gt;http://tinyurl.com/admx-overlap-video&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Okay. Now that you understand the “ADMX overlap” issue a little more, here’s the EXACT list of files that are exclusive to each operating system. So, if you want to have “100% of it all” be sure to copy up ONE operating system’s ADMX files, then hunt the rest of these down, and also put them in the Central Store.&lt;/p&gt;

&lt;p&gt;(For more information on the Central Store, I would suggest my live or GP Online University Training course. Just click Training | Get Training and check it out.) Here’s the list:&lt;/p&gt;

&lt;p&gt;Server 2008 R2 “only” ADMX / AXML files:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Adfs.admx&lt;/li&gt;
	&lt;li&gt;GroupPolicyPreferences.admx&lt;/li&gt;
	&lt;li&gt;Group Policy-Server.admx&lt;/li&gt;
	&lt;li&gt;Kdc.admx&lt;/li&gt;
	&lt;li&gt;MMCSnapIns2.admx&lt;/li&gt;
	&lt;li&gt;NAPXPQex.admx&lt;/li&gt;
	&lt;li&gt;PowerShellExecutionPolicy.admx&lt;/li&gt;
	&lt;li&gt;PswdSync.admx&lt;/li&gt;
	&lt;li&gt;ServerManager.admx&lt;/li&gt;
	&lt;li&gt;Snis.admx&lt;/li&gt;
	&lt;li&gt;TerminaServer-Server.admx&lt;/li&gt;
	&lt;li&gt;WindowsServer.admx&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Windows 7 only ADMX files:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;DeviceRedirection.admx&lt;/li&gt;
	&lt;li&gt;Sdiagschd.admx&lt;/li&gt;
	&lt;li&gt;Search.admx&lt;/li&gt;
&lt;/ul&gt;
        </content:encoded>
    </item>
        <item>
        <title> Internet Explorer 9 (Beta) Group Policy Settings </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/internet-explorer-9-beta-group-policy-settings</link>
        <pubDate>2010-09-27T18:53:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ 

Guest Post by Alan Burchill (Enterprise Mobility MVP) from the Group Policy Center.

Microsoft has now released to the public the newest version of Internet Explorer 9 Beta to the public. If the new functionality alone is not enough to get you to use it is just remember that it is now a Fully Hardware accelerated which makes it much faster than any other browser on the market!!

With any new version IE there comes new features and with new features comes new group policy settings so belo ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;img alt=&quot;IE9-banner2&quot; src=&quot;https://www.gpanswers.com/media/Alan%20Burchill/IE9-banner2_32016300834.jpg&quot; style=&quot;border-width:0px; float:none; margin-left:auto; margin-right:auto&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Guest Post by Alan Burchill (Enterprise Mobility MVP) from the &lt;/em&gt;&lt;a href=&quot;http://www.grouppolicy.biz&quot; target=&quot;_blank&quot;&gt;&lt;em&gt;Group Policy Center&lt;/em&gt;&lt;/a&gt;&lt;em&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Microsoft has now released to the public the newest version of Internet Explorer 9 Beta to the public. If the new functionality alone is not enough to get you to use it is just remember that it is now a &lt;a href=&quot;http://blogs.msdn.com/b/ie/archive/2010/09/10/the-architecture-of-full-hardware-acceleration-of-all-web-page-content.aspx&quot; target=&quot;_blank&quot;&gt;Fully Hardware accelerated&lt;/a&gt; which makes it much faster than any &lt;a href=&quot;http://www.smartergeek.info/2010/09/microsoft-shows-off-ie9-hardware-acceleration-beating-the-pants-off-chrome-7/&quot; target=&quot;_blank&quot;&gt;other browser&lt;/a&gt; on the market!!&lt;/p&gt;

&lt;p&gt;With any new version IE there comes new features and with new features comes new group policy settings so below I go through the new policy settings and how you can get started right now with managing IE9 using Group Policy.&lt;/p&gt;

&lt;p&gt;To get started you will need to download and install IE9 on whatever computer you are using Group Policy Management Console (a.k.a. GPMC) to edit your Group Policy settings as with anything to do with Group Policy it is normally best to make changes from a systems that has the newest software on it in your organisation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WARNING:&lt;/strong&gt; This software is still Beta so you are strongly recommended to isolate any testing you do with IE9 and Group Policy from your production environment.&lt;/p&gt;

&lt;h2&gt;Internet Explorer 9 Administrative Template Group Policy Settings&lt;/h2&gt;

&lt;p&gt;There are only 8 new Admin Template group policy setting but remember that just like previous version most of the  other older IE policy settings will still apply to this newer of IE. Theses settings are of course not final and Microsoft could change or added/remove more setting before the product goes RTW.&lt;/p&gt;

&lt;p&gt;As IE 9 only supports Windows Vista and Windows 7 you now only get ADMX files for the new policy settings which will automatically get placed into the C:WindowsPolicyDefenitions folder on the computer you install IE9. &lt;strong&gt;Note:&lt;/strong&gt; You will need to upload inetres the ADMX and ADML file to the central store (if you are using a admin template &lt;a href=&quot;http://support.microsoft.com/kb/929841&quot; target=&quot;_blank&quot;&gt;central store&lt;/a&gt;.) So once the new ADMX / ADML files are loaded you will be able to configured the new IE setting under Administrative Templates in the Group Policy Editor. Sweet!&lt;/p&gt;

&lt;p&gt;To save you the time of trying to find where the new policy settings are yourself I have listed the 8 new Administrative Template settings with the location that they can be found so you can check them out yourself.&lt;/p&gt;

&lt;h3&gt;Disable add-on performance notification&lt;/h3&gt;

&lt;p&gt;Administrative Templates &gt; Windows Components &gt; Internet Explorer&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_21072348703.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_thumb686842717.png&quot; style=&quot;border-width:0px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Turn off Managing SmartScreen Filter&lt;/h3&gt;

&lt;p&gt;Administrative Templates &gt; Windows Components &gt; Internet Explorer&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_61483669861.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_thumb_21793683744.png&quot; style=&quot;border-width:0px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Allow Internet Explorer 8 Shutdown Behaviour&lt;/h3&gt;

&lt;p&gt;Administrative Templates &gt; Windows Components &gt; Internet Explorer&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_101024977349.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_thumb_41907871328.png&quot; style=&quot;border-width:0px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Automatically enable newly installed add-ons&lt;/h3&gt;

&lt;p&gt;Administrative Templates &gt; Windows Components &gt; Internet Explorer&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_121048850499.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_thumb_5778563206.png&quot; style=&quot;border-width:0px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Prevent Deleting Download History&lt;/h3&gt;

&lt;p&gt;Administrative Templates &gt; Windows Components &gt; Internet Explorer &gt; Delete Browsing History&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_14131569788.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_thumb_6952470974.png&quot; style=&quot;border-width:0px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Enable WebM software (when available)&lt;/h3&gt;

&lt;p&gt;Administrative Templates &gt; Windows Components &gt; Internet Explorer &gt; Advanced Settings &gt; Multimedia&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_161253865382.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_thumb_7141387247.png&quot; style=&quot;border-width:0px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Prevent configuration of search from the Address bar&lt;/h3&gt;

&lt;p&gt;Administrative Templates &gt; Windows Components &gt; Internet Explorer &gt; Advanced Settings &gt; Searching&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_181809225991.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_thumb_8159381841.png&quot; style=&quot;border-width:0px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Install binaries signed by MD2 and MD4 signing technologies&lt;/h3&gt;

&lt;p&gt;Administrative Templates &gt; Windows Components &gt; Internet Explorer &gt; Security Features &gt; Binary Behaviour Security Restrictions&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_202030053439.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_thumb_994323779.png&quot; style=&quot;border-width:0px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Internet Explorer 9 Internet Explorer Maintenance Group Policy&lt;/h2&gt;

&lt;p&gt;The other way you can configured IE9 with Group policy is by going to Windows Settings &gt; Internet Explorer Maintenance section and as with previous version you can configure you IE setting (e.g. Home Page) or you can Import the current Program and/or Security using the Import Program Setting option.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_261368240014.png&quot;&gt;&lt;img alt=&quot;image&quot; src=&quot;https://www.gpanswers.com/media/Alan%20Burchill/image_thumb_121455891627.png&quot; style=&quot;border-width:0px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Internet Explorer 9 Group Policy Preferences Group Policy&lt;/h2&gt;

&lt;p&gt;Umm err Unfortunately at this point in time there is no support for Group Policy Preferences with Internet Explorer 9. This may or may not change in the future but at least for now you can use Admin Templates and IE Maintenance mode to keep you going.&lt;/p&gt;

&lt;p&gt;As the beta has only just been released then it is highly likely that there will be more information coming soon&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This article was original posted on the Group Policy Center at &lt;/em&gt;&lt;a href=&quot;http://www.grouppolicy.biz/2010/09/internet-explorer-9-beta-group-policy-settings/&quot;&gt;&lt;em&gt;http://www.grouppolicy.biz/2010/09/internet-explorer-9-beta-group-policy-settings/&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> GPanswers.com: It&#039;s fun to steal (or... The art of search.) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/gpanswers-com-its-fun-to-steal-or-the-art-of-search</link>
        <pubDate>2010-09-15T16:09:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I really can&amp;rsquo;t take credit for this one. I&amp;rsquo;m going to just give the shout outs &amp;ldquo;in advance&amp;rdquo; to my friends who made this blog entry possible: Alex Verboon, Alan Burchill GP MVP, Darren Mar-Elia GP MVP, Mark Heitbrink GP MVP and the Group Policy Team itself.

Okay, with that out of the way, here&amp;rsquo;s &amp;ldquo;Jeremy&amp;rsquo;s 100% ripped-off guide to searching for stuff in Group Policy.&amp;rdquo;

Item 1: Online Group Policy Search
&amp;mdash;&amp;mdash;

There&amp;rsquo;s a new &amp;ld ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I really can’t take credit for this one. I’m going to just give the shout outs “in advance” to my friends who made this blog entry possible: Alex Verboon, Alan Burchill GP MVP, Darren Mar-Elia GP MVP, Mark Heitbrink GP MVP and the Group Policy Team itself.&lt;/p&gt;

&lt;p&gt;Okay, with that out of the way, here’s “Jeremy’s 100% ripped-off guide to searching for stuff in Group Policy.”&lt;/p&gt;

&lt;p&gt;Item 1: Online Group Policy Search&lt;br /&gt;
——&lt;/p&gt;

&lt;p&gt;There’s a new “online” ability to search for Group Policy settings and items. It’s DUN-DUN-DUN “In the cloud!” Aiighh.. Run for your life !! Okay, not really. It’s just a web page. Go to this address, and start searching for new Group Policy settings you didn’t know existed:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot; http://gps.cloudapp.net/&quot; target=&quot;_blank&quot;&gt;http://gps.cloudapp.net/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Item 1B: Online Group Policy Search, now inside Explorer&lt;br /&gt;
——————————————————–&lt;/p&gt;

&lt;p&gt;I first came across this tip in a post from Alex Verboon. I’m not sure if Alan Burchill, Enterprise Mobility MVP had the same idea at the same time, or what, but they both discovered how you can link that “cloud app” to Windows 7 Explorer’s search. So, you can search for Group Policy settings, right from Windows Explorer.&lt;/p&gt;

&lt;p&gt;Weird. Geeky. Neat.&lt;/p&gt;

&lt;p&gt;The writeup is here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.grouppolicy.biz/2010/06/msdn-group-policy-search-out-now/&quot; target=&quot;_blank&quot;&gt;http://www.grouppolicy.biz/2010/06/msdn-group-policy-search-out-now/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Item 2A:  Searching for GPOs with comments.. Using Powershell&lt;br /&gt;
————————————————————–&lt;/p&gt;

&lt;p&gt;The Group Policy team has a new blog entry which talks about the first two items I’ve listed. And-  that blog entry continues to talk about Group Policy cmdlets in PowerShell.&lt;/p&gt;

&lt;p&gt;The idea is that you can use the Group Policy cmdlets to search for attributes about GPOs themselves. Neat.&lt;/p&gt;

&lt;p&gt;They’ve got a big ol’ PowerShell script you can use if you like right there.&lt;/p&gt;

&lt;p&gt;However, my pal Jeff Hicks, PowerShell MVP helped me get it down to one quick line if you want to try it out. (Actually, it’s two lines.) Remember, you need a Windows 7 or Windows Server 2008 R2 machine with PowerShell installed to try this out.&lt;/p&gt;

&lt;p&gt;Line 1: Import-Module GroupPolicy&lt;br /&gt;
Line 2:  get-gpo -all | where {$_.description} | Select Displayname,Description&lt;/p&gt;

&lt;p&gt;When I run this command, I get the following output.. Neat !&lt;/p&gt;

&lt;p&gt;DisplayName                      Description&lt;br /&gt;
———–                     ———–&lt;br /&gt;
OU 1                           Yep. Here’s a comment.&lt;/p&gt;

&lt;p&gt;Item 2B: Searching for GPOs.. with comments .. No PowerShell&lt;br /&gt;
————————————————————&lt;/p&gt;

&lt;p&gt;PowerShell isn’t for everyone; thought it is becoming the “de facto” way of doing lots of scripting. Mark Heitbrink, Enterprise Mobility MVP supplied this little nugget of goodness.&lt;/p&gt;

&lt;p&gt;Note that this requires that you’ve got the Group Policy Scripts installed from &lt;a href=&quot;http://www.microsoft.com/downloads/en/details.aspx?familyid=38c1a89b-a6d2-4f2a-a944-9236999aee65&amp;displaylang=en&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;After that, you can use these canned VB scripts to run a command like&lt;/p&gt;

&lt;p&gt;cscript getreportforallgpos /c:gpo-report | find /i “something” c:gpo-report*.html&lt;/p&gt;

&lt;p&gt;Final thoughts…&lt;br /&gt;
——————&lt;/p&gt;

&lt;p&gt;That’s it. That’s all the stealing I’m doing for one day. Thanks to all my helpers.&lt;/p&gt;

&lt;p&gt;PS: The inspiration of the title of this blog entry is from a song on of my favorite albums that no one ever heard of. Track 2; there’s a preview if you want to listen.&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/Its-Fun-Steal-Mono-Puff/dp/B0000069SW&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/Its-Fun-Steal-Mono-Puff/dp/B0000069SW&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;PS: One seat left in Chicago with the FIRST7CHICAGO $300 off discount. Get the GP Training you need to rollout and secure your Windows 7 and Server 2008 R2 machines. Use that coupon code at checkout. &lt;a href=&quot;https://www.gpanswers.com/training&quot; target=&quot;_self&quot;&gt;https://www.gpanswers.com/training&lt;/a&gt; Don’t be that guy or gal who missed out. You can also call Diane at 302-351-4903 if you don’t want to sign up online.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> GPMC on Windows Server 2008 R2 and PowerShell </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/gpmc-on-windows-server-2008-r2-and-powershell</link>
        <pubDate>2010-08-04T15:10:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

I&amp;rsquo;m racing toward getting out the door for my 30+ day trip to tour Australia and speak at Microsoft TechEd Australia and New Zealand.

But, I had a quick second to share a fun little PowerShell + GP tip&amp;hellip; If you&amp;rsquo;ve NEVER used PowerShell before.. try this one. It&amp;rsquo;s fun and easy.

If you want to install the GPMC on a Windows Server 2008 R2 machine via command line, you can use PowerShell. The commands are as follows:


	Import-Module Servermanager
	Add-Wind ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;I’m racing toward getting out the door for my 30+ day trip to tour Australia and speak at Microsoft TechEd Australia and New Zealand.&lt;/p&gt;

&lt;p&gt;But, I had a quick second to share a fun little PowerShell + GP tip… If you’ve NEVER used PowerShell before.. try this one. It’s fun and easy.&lt;/p&gt;

&lt;p&gt;If you want to install the GPMC on a Windows Server 2008 R2 machine via command line, you can use PowerShell. The commands are as follows:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Import-Module Servermanager&lt;/li&gt;
	&lt;li&gt;Add-WindowsFeature GPMC&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Then, if you then run the following command you will see the status as installed&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Get-WindowsFeature GPMC&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Try it.. something “special” that’s unexpected and neat happens. It’s super-fun !&lt;/p&gt;

&lt;p&gt;Also.. I came across this super-nice write up of my latest book. I can’t even figure out the person’s name to thank him for such a nice review..  but, Thank You Mr. or Ms. Whomever you are.&lt;/p&gt;

&lt;p&gt;Here’s the review:&lt;br /&gt;
&lt;a href=&quot;http://www.anotherwindowsblog.com/2010/08/book-highlight-group-policy.html&quot; target=&quot;_blank&quot;&gt;http://www.anotherwindowsblog.com/2010/08/book-highlight-group-policy.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now, get your signed copies at:&lt;br /&gt;
www.GPanswers.com/book&lt;/p&gt;

&lt;p&gt;Limited number, since I’m running out the door, and won’t have any to sign for a month !&lt;/p&gt;

&lt;p&gt;Talk soon.. Gotta run !&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> GP &quot;must knows&quot; - 4 of them ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/gp-must-knows-4-of-them</link>
        <pubDate>2010-07-13T20:41:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Last week was a big week over here at the Group Policy HQ.

Here&amp;rsquo;s four fun and informative things that I think you&amp;rsquo;ll want to know.

Item 1: Quick, Informative Interview
Matt Hester, Tech Evangelist from Microsoft sits down with me and asks &amp;ldquo;What&amp;rsquo;s new and cool in modern GP?&amp;rdquo; When my wife saw this video, she dubbed it &amp;ldquo;Schmoozin&amp;rsquo; with the Mosk.&amp;rdquo; Anyway, it&amp;rsquo;s fun and it&amp;rsquo;s here:&amp;nbsp;
https://moskowitzinc.infusionsoft.com/link/3346 ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Last week was a big week over here at the Group Policy HQ.&lt;/p&gt;

&lt;p&gt;Here’s four fun and informative things that I think you’ll want to know.&lt;/p&gt;

&lt;p&gt;Item 1: Quick, Informative Interview&lt;br /&gt;
Matt Hester, Tech Evangelist from Microsoft sits down with me and asks “What’s new and cool in modern GP?” When my wife saw this video, she dubbed it “Schmoozin’ with the Mosk.” Anyway, it’s fun and it’s here: &lt;br /&gt;
https://moskowitzinc.infusionsoft.com/link/33465afc20/b8a1a0&lt;/p&gt;

&lt;p&gt;2. My TechEd 2010 speech Replay — Application Smackdown with Applocker This was the #5 top-most rated session within all of the 900+ sessions at TechEd 2010. You get to check it out, for free! Learn how to smack down your apps.. Now! Here’s the link:&lt;br /&gt;
https://moskowitzinc.infusionsoft.com/link/33465afc20/bbaee0&lt;/p&gt;

&lt;p&gt;Of course, when you’re ready for hands-on AppLocker training, I’ve got it in my GP Workshop, of course! (www.GPanswers.com/training) — in my GP 2.0 Catchup Class.. and more information in the newest book (www.GPanswers.com/book) in Chapter 8 — Implementing Security with Group Policy !&lt;/p&gt;

&lt;p&gt;3. An article I wrote that found it’s way into Network world This was tweeted about 80 billion times last week… “Seven tips for using group policy in Windows 7”&lt;br /&gt;
https://moskowitzinc.infusionsoft.com/link/33465afc20/bebc20&lt;/p&gt;

&lt;p&gt;And.. Lastly…&lt;br /&gt;
4. I’ve received lots of questions asking me: “Hey Moskowitz, is your book available as an e-Book somewhere?”&lt;/p&gt;

&lt;p&gt;Yes, and yes again. Here’s what’s what:&lt;/p&gt;

&lt;p&gt;1. If you want to get the newest book as a Kindle edition, you can get it from Amazon. Click here:&lt;br /&gt;
http://www.amazon.com/dp/0470581859/&lt;/p&gt;

&lt;p&gt;2. There are some EXTRA (free) bonus chapters for the GREEN (newest) book here:&lt;br /&gt;
http://dev.gpanswers.com/books/extra-echapters.html#tabs&lt;br /&gt;
(look left)&lt;/p&gt;

&lt;p&gt;3. I also have some (older, but still relevant!) eChapter (pay) PDF downloads at the same link:&lt;br /&gt;
http://dev.gpanswers.com/books/extra-echapters.html#tabs&lt;br /&gt;
(look right)&lt;/p&gt;

&lt;p&gt;Also… if you buy the Kindle edition, I’m happy to sign your Kindle’s or iPad screen with a sharpie next time I see you. Just ask!&lt;/p&gt;

&lt;p&gt;PS: Holy cow! HUUGE Class in DC coming up next week.. Super crazy excited. If you still want to come, I think we have a spot left. You MUST CALL at this point if you want to secure a seat. 302-351-8408.&lt;/p&gt;

&lt;p&gt;PPS: I’ve had some upcoming “extra time” suddenly materialize after the DC class. If you think you / your company might be interested in a PRIVATE On-Site class, where I teach your team — PERSONALLY — how to overcome GP and desktop management challenges…  then just buzz me. I’m at 302-351-8408. We can talk about what your challenges are and how a GP class can help you out. Then, we’ll fit it into YOUR schedule. Talk with you soon. (The sooner you call, the sooner you’ll get over the issue your company has and you’ll be happier and more productive.)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> I Practice Safe Group Policy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/i-practice-safe-group-policy</link>
        <pubDate>2010-07-07T13:43:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Sometimes I get asked if there is anything that we can do to be &amp;ldquo;safer&amp;rdquo; around Group Policy usage.

The answer is a resounding &amp;ldquo;Yes.&amp;rdquo; Here are some quick tips for you to put into practice NOW, if you&amp;rsquo;re not already on the right track:

Tip 1: Create, link, then disable a GPO

Sounds counter-intuitive, but this tip can be a quick fix to a big problem. I don&amp;rsquo;t usually like &amp;ldquo;big fat GPOs with lots of stuff in them.&amp;rdquo; That&amp;rsquo;s not my preferred ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Sometimes I get asked if there is anything that we can do to be “safer” around Group Policy usage.&lt;/p&gt;

&lt;p&gt;The answer is a resounding “Yes.” Here are some quick tips for you to put into practice NOW, if you’re not already on the right track:&lt;/p&gt;

&lt;p&gt;Tip 1: Create, link, then disable a GPO&lt;/p&gt;

&lt;p&gt;Sounds counter-intuitive, but this tip can be a quick fix to a big problem. I don’t usually like “big fat GPOs with lots of stuff in them.” That’s not my preferred method of GPO creation. But there are clearcut times when you NEED multiple policy settings or multiple preference settings WITHIN a GPO .. and that’s a-ok.&lt;/p&gt;

&lt;p&gt;The problem is, you won’t be able to “implement all the settings at once.” So, in essence you’ll have “half-created” GPOs replicating around with your clients getting those partially completed GPOs.&lt;/p&gt;

&lt;p&gt;The tip is: Disable the GPO, add what you need to add, then ENABLE it. (You can choose your method: on the LINK, or on the GPO itself.)&lt;/p&gt;

&lt;p&gt;So, if you’re working on setting up a GPO which dictates Firewall Rules, you want to ensure that they get ALL the firewall rules one time, instead of possibly downloading the GPO (incomplete) then re-downloading it later.&lt;/p&gt;

&lt;p&gt;Tip 2: Think, then name.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;This tip is easy to understand. Don’t name your GPOs “Our wonderful desktop settings” or “Everyone’s security settings” because that’s not descriptive enough. Surely there’s something SPECIFIC these GPOs could be named, like “Sales: Desktop Background” or “Marketing: Firewall Settings.” Clarity, clarity, clarity. You likely don’t work alone, so it’s important to be clear and deliberate in how you name your GPOs.&lt;/p&gt;

&lt;p&gt;Tip 3: Use GP Comments&lt;/p&gt;

&lt;p&gt;You can implement comments about the GPO itself and the settings within the GPOs. So don’t miss out by leaving “breadcrumbs” behind for “the next person” who edits those GPOs. Explain WHY you did something inside the GP comments. Your “future friend” will thank you !&lt;/p&gt;

&lt;p&gt;I know you’re looking for more best practices, base-hits and big-wins you can use TODAY to make your world safer and more predictable.&lt;/p&gt;

&lt;p&gt;I have exactly 4 spots left for my upcoming 5-day Group Policy Master Class (near Dulles Airport, airport code: IAD.)&lt;/p&gt;

&lt;p&gt;I know the takeaways you get from the class will be mega-valuable and I guarantee this will help you with your upcoming Windows 7 rollout, create a smoother transition from XP and relieve the pain around desktop and security management. The best part is you’ll get the hands-on training you need for your real-world problems of today and tomorrow.&lt;/p&gt;

&lt;p&gt;Knowing that budgets are tight, I’ve set up class at a hotel with a free airport shuttle (so no rental car needed) and a killer nightly hotel rate.&lt;/p&gt;

&lt;p&gt;If you’re thinking about making it.. now is the time. Before the end of this week if you want a guaranteed seat.&lt;/p&gt;

&lt;p&gt;Dates: July 19th (Monday) – July 22nd (Friday).&lt;/p&gt;

&lt;p&gt;Ensure your seat by:&lt;/p&gt;

&lt;p&gt;1. &lt;a href=&quot;https://www.gpanswers.com/training/sign-up-now-live/&quot;&gt;https://www.gpanswers.com/training/sign-up-now-live/&lt;/a&gt;&lt;br /&gt;
(I know the website says “The class is full” but I can take 4 more people !)&lt;/p&gt;

&lt;p&gt;2. Calling 302-351-4903 and Diane will help you if you need an invoice for a PO. We need the PO in hand to guarantee your seat.&lt;/p&gt;

&lt;p&gt;Also… !&lt;/p&gt;

&lt;p&gt;“Manager’s Special” PolicyPak Webinar – Today at 2.30 PM EST.&lt;/p&gt;

&lt;p&gt;Bring your IT Manager to my “PolicyPak: Save Time, Money, and Effort (and increase security and santity)” talk today. He / She only needs to stay for 15 minutes of the full 60 minute talk. So agenda is:&lt;/p&gt;

&lt;p&gt;() “Manager-speak” (how the company will save Time, Money, and Effort) for 15-minutes&lt;br /&gt;
() “Geek speak” for 45-minutes with me and learn how to use my free PolicyPak software to make your life easier.&lt;/p&gt;

&lt;p&gt;You BOTH need to sign up at &lt;a href=&quot;https://www.policypak.com&quot;&gt;https://www.policypak.com/demo&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I’ll draw a free book for one lucky geek who brings his/her IT manager along!&lt;br /&gt;
Or… One lucky IT pro who brings his/her geek along!&lt;/p&gt;

&lt;p&gt;That’s it. See you in the July 19th class or today online !&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Full Disk / Bitlocker Security Hackable </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/full-disk-bitlocker-security-hackable</link>
        <pubDate>2010-05-26T14:39:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

Thanks to those folks who wrote in and thanked me for waving the banner around this issue.

Also, thanks to those folks who asked some clarifying questions. Okay, here are my summarized thoughts (basically, answers to your questions):

1. Sure, it would be great if copy machines could JOIN the Windows domain. Then, heck yeah, you could possibly use some GP trickery to make them more secure. BUT, that wasn&amp;rsquo;t what I was implying. ?

2. I supplied some GP-based security tips ye ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;Thanks to those folks who wrote in and thanked me for waving the banner around this issue.&lt;/p&gt;

&lt;p&gt;Also, thanks to those folks who asked some clarifying questions. Okay, here are my summarized thoughts (basically, answers to your questions):&lt;/p&gt;

&lt;p&gt;1. Sure, it would be great if copy machines could JOIN the Windows domain. Then, heck yeah, you could possibly use some GP trickery to make them more secure. BUT, that wasn’t what I was implying. ?&lt;/p&gt;

&lt;p&gt;2. I supplied some GP-based security tips yesterday. One that encrypted the page file, and another one which totally removed it at shutdown. I also said that the best (bestest?) way to get protected is via full disk encryption. So, I totally stand by that.. Full disk encryption is arguably, the best (fastest / intermediate) way to get “pretty darn secure.” I would however, also suggest that I would only perform the “remove page file at shutdown” for machines where there is no other possible solution for security.&lt;/p&gt;

&lt;p&gt;Heck, let’s break this “are we secure?” problem down .. way way down, just for fun here.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Question :Okay… Does NTFS provide “security” ?&lt;br /&gt;
Answer: Sorry. No. So, in short, if I steal your laptop, and it’s got no full disk encryption, then I can boot it from a USB stick, CD-ROM, or just rip the hard drive out and mount it in my non-Windows (ie: Linux machine) and.. bingo.. I have your files.&lt;/p&gt;

&lt;p&gt;Question: Does applying either / both of those policy settings I suggested yesterday really make you more “secure”?&lt;br /&gt;
Answer: It’s better than NOTHING for desktops that HAVE to be out in the open, and for whatever reason can not get full disk encryption. And even then, it only protects the page file, which may or may not contain interesting stuff. To be super clear, I would suggest against enabling the “remove page at logoff” for servers at all costs, because rebooting your servers (or workstations with large page files) could take a loooong time.&lt;/p&gt;

&lt;p&gt;Question: Does EFS (encrypting file system) provide “security” ?&lt;br /&gt;
Answer:  While I haven’t personally attempted to “bypass” EFS, I’ve seen several writeups of how to bypass it. Indeed, this one tool (found by quick Internet search) claims to immediately make child’s play of EFS. (Again, untested.. http://tinyurl.com/2buburp)&lt;br /&gt;
PS: I swear I didn’t do anything special to get that TinyURL.. that was auto-assigned to me.&lt;/p&gt;

&lt;p&gt;Question: Does full disk encryption provide “security” ?&lt;br /&gt;
Answer: It’s an excellent start. Again, it’s the best thing we can do for the majority of attacks. But there are still vulnerabilities.  &lt;/p&gt;

&lt;p&gt;Question: Okay.. what vulnerabilities am I still exposed to?&lt;br /&gt;
Answer: Three parts&lt;/p&gt;

&lt;p&gt;() This one I knew about (which was discovered at Princeton University):&lt;br /&gt;
This vulnerability is based on the idea that you can “copy” the memory of a PC. Very interesting.&lt;br /&gt;
http://www.youtube.com/watch?v=JDaicPIgn9U&lt;/p&gt;

&lt;p&gt;() This one I didn’t. This uses Firewire to slurp out the computer’s memory via DMA:&lt;br /&gt;
http://tinyurl.com/2pea3y&lt;br /&gt;
Thanks to Darren Mar-Elia, fellow GP MVP for this lead.&lt;/p&gt;

&lt;p&gt;() A little internet searching came up with this commercial tool to bust Bitlocker / Truecrypt:&lt;br /&gt;
http://www.lostpassword.com/kit-forensic.htm&lt;br /&gt;
This actually seems to be similar to the Princeton attack; and requires memory to be “captured.” Or, you can try a lengthy “brute force” attack if the machine was fully shutdown.&lt;/p&gt;

&lt;p&gt;Also, I think  reasonable reading as well, is the Microsoft response to the Princeton attack, and you can find that here:&lt;/p&gt;

&lt;p&gt;http://windowsteamblog.com/windows/b/windowssecurity/archive/2009/12/07/windows-bitlocker-claims.aspx&lt;/p&gt;

&lt;p&gt;In short, I am in agreement with Microsoft’s summary of the assessment:&lt;/p&gt;

&lt;p&gt;“This sort of targeted attack poses a relatively low risk to folks who use BitLocker in the real world.”&lt;/p&gt;

&lt;p&gt;Agreed.&lt;/p&gt;

&lt;p&gt;If you’re concerned about attack #1 and #3, then make sure your computers settings are configured (using GP, of course!) to make the computer fully shut down (hibernate) on idle. Then require the Bitlocker password pin or USB key at startup. Yes, this is kind of a pain in the neck. But it is the way to prevent that attack.&lt;/p&gt;

&lt;p&gt;If you’re concerned about attack #2, then use GP (again!) to disable built-in Firewire ports unless absolutely necessary.&lt;/p&gt;

&lt;p&gt;To be superduper, crazy clear.. there is no “magic bullet” for security. Here’s some reading to get into the concept of “defense in depth.”&lt;/p&gt;

&lt;p&gt;http://www.amazon.com/Protect-Your-Windows-Network-Perimeter/dp/0321336437&lt;/p&gt;

&lt;p&gt;The book isn’t “super technical” in a “click here, do this” kind of way. But it did “get it into my thick skull” that I need to be doing everything I can, at multiple layers to thwart the bad guys and protect my network and keep my company safe.&lt;/p&gt;

&lt;p&gt;So.. hopefully this article helps you out.&lt;/p&gt;

&lt;p&gt;Here are some I can help you get more secure.&lt;/p&gt;

&lt;p&gt;1) I do cover how to do both hardware lockout and power configuration (among many, many security items that I cover) in my GP class (coming soon to Washington, DC — July 19th! www.GPanswers.com/training !) A handful of seats left.&lt;/p&gt;

&lt;p&gt;and&lt;/p&gt;

&lt;p&gt;2) This whole “defense in depth” idea is why I designed PolicyPak. Group Policy does a great job configuring some of the in-the-box operating system items. But what about the rest of the operating system and add-on applications? Hope to see you today or next week online (www.PolicyPak.com/demo)&lt;/p&gt;

&lt;p&gt;and&lt;/p&gt;

&lt;p&gt;3) Of course, you can get a book. ? www.GPanswers.com/book&lt;/p&gt;

&lt;p&gt;That’s it. Talk with you soon!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Copier Machine Threat - Hard Drive Scare / Encryption </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/copier-machine-threat-hard-drive-scare-encryption</link>
        <pubDate>2010-05-25T19:16:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I came across this little piece of reporting by CBS news.

I have to admit.. I was totally caught off guard by this one.

Seems &amp;ldquo;gobsmackingly obvious&amp;rdquo; now that I think about it. But I never did.

This is a report on how all the major brands of copiers STORE the images on local hard drives. Making it SUPER EASY for the bad guys to get your (recycled) copiers and get your important corporate data. Watch this, then, please, figure out who to contact in your company and decide HOW ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I came across this little piece of reporting by CBS news.&lt;/p&gt;

&lt;p&gt;I have to admit.. I was totally caught off guard by this one.&lt;/p&gt;

&lt;p&gt;Seems “gobsmackingly obvious” now that I think about it. But I never did.&lt;/p&gt;

&lt;p&gt;This is a report on how all the major brands of copiers STORE the images on local hard drives. Making it SUPER EASY for the bad guys to get your (recycled) copiers and get your important corporate data. Watch this, then, please, figure out who to contact in your company and decide HOW your copy machines are recycled.&lt;/p&gt;

&lt;p&gt;https://moskowitzinc.infusionsoft.com/link/3043060c20/b28720&lt;/p&gt;

&lt;p&gt;What else can you do? Well, from a Group Policy perspective, on our Windows PCs (and not copy machines) here are three ideas:&lt;/p&gt;

&lt;p&gt;Idea 1:&lt;br /&gt;
Computer Configuration | Policies | Administrative Templates … | System | File System | Enable NTFS pagefile encryption&lt;/p&gt;

&lt;p&gt;Idea 2:&lt;br /&gt;
“Clear Page File at Shutdown”…&lt;br /&gt;
Check out http://support.microsoft.com/kb/314834&lt;br /&gt;
(not a group policy setting, but can be delivered as a registry preference.)&lt;br /&gt;
PS: This one likely wouldn’t beat the forensics apps, but it’s better than nothing.&lt;/p&gt;

&lt;p&gt;Idea 3:&lt;br /&gt;
You could of course, go “Full disk encryption” like BitLocker or TrueCrypt.. that would do the trick as well.&lt;/p&gt;

&lt;p&gt;So, that’s three things to at least CONSIDER in thoughts around this problem for high security machines that COULD be recycled.  True.. I’ve seen companies that literally “shred” the drives in a big “drive cruncher machine”.. but, that seems extreme considering there are software solutions to this very problem.&lt;/p&gt;

&lt;p&gt;Note, of course, that enabling these items could slow down your system (especially that second one at shutdown time.) But it might be worth it depending on the situation. For what it’s worth, I’m using BitLocker on one machine, TrueCrypt on another and notice no appreciable slowdown.&lt;/p&gt;

&lt;p&gt;Speaking of security, and “doing all you can” to thwart the bad guys… I’m doing my weekly PolicyPak demonstration tomorrow at 2.00 PM Eastern. If you want “extra thumbscrews” to ensure that your security is maintained at all times, then join me for this free informative talk.&lt;/p&gt;

&lt;p&gt;Here’s the link:&lt;br /&gt;
&lt;a href=&quot;https://www.policypak.com/&quot;&gt;www.policypak.com/demo&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks.&lt;/p&gt;

&lt;p&gt;PS: And my pants are already back on, thank you very much.&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Group Policy: Disabled </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/group-policy-disabled</link>
        <pubDate>2010-05-19T14:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Hey Team:

Short sweet tip, and a short sweet announcement.

Short sweet tip first:

You are the King or Queen of your castle, er, domain.

I like to think of every policy setting as a little &amp;ldquo;edict&amp;rdquo; that I&amp;rsquo;m forcing my user population to embrace.

Well, on the Policy side of the house there are a zillion policy settings that can be set to one of three states:

&amp;ndash; Enabled,
&amp;ndash; Disabled,
-or Not Configured.

Enabled means: &amp;ldquo;Do this thing, and do it ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Hey Team:&lt;/p&gt;

&lt;p&gt;Short sweet tip, and a short sweet announcement.&lt;/p&gt;

&lt;p&gt;Short sweet tip first:&lt;/p&gt;

&lt;p&gt;You are the King or Queen of your castle, er, domain.&lt;/p&gt;

&lt;p&gt;I like to think of every policy setting as a little “edict” that I’m forcing my user population to embrace.&lt;/p&gt;

&lt;p&gt;Well, on the Policy side of the house there are a zillion policy settings that can be set to one of three states:&lt;/p&gt;

&lt;p&gt;– Enabled,&lt;br /&gt;
– Disabled,&lt;br /&gt;
-or Not Configured.&lt;/p&gt;

&lt;p&gt;Enabled means: “Do this thing, and do it at the level I’m currently working within.”&lt;/p&gt;

&lt;p&gt;So, if you’ve got a GPO, link it over to the domain (thus affecting all user accounts in the domain) and Enable a policy setting like “Prohibit Access to the Control Panel.” Then, as expected, everyone in your kingdom will magically embrace the stone-cold fact that their days of messing around within the Control Panel are now over!&lt;/p&gt;

&lt;p&gt;Huzzah! Mission accomplished! You and your other network sovereigns cry out with joy!&lt;/p&gt;

&lt;p&gt;Except this decree affects YOU as well. Oops… Seems like you poured the burning hot oil on yourself on this one.&lt;/p&gt;

&lt;p&gt;Okay.. Great. What are you to do?&lt;/p&gt;

&lt;p&gt;Disable that same policy setting from earlier — but now, at a level that affects YOUR (the King and Queen’s men) accounts.&lt;/p&gt;

&lt;p&gt;That’s right. Disable.&lt;/p&gt;

&lt;p&gt;Disabled’s job isn’t (generally) to “disable” stuff. No, no!&lt;/p&gt;

&lt;p&gt;The “Disabled” setting’s job is to “invert” a higher-level policy.&lt;/p&gt;

&lt;p&gt;So, assuming you had an OU called “Exalted Leaders OU” and your account was in there, you could simply create a new GPO, link it over to the GPO named “Exalted Leaders OU” and edit the policy setting for the SAME SETTING — “Prohibit Access to the Control Panel.”&lt;/p&gt;

&lt;p&gt;Except this time.. instead of ENABLING the policy — you’ll DISABLE it, thus rendering it innocuous to your user account.&lt;/p&gt;

&lt;p&gt;It’s like your own “suit of armor” to avoid the burning hot oil.&lt;/p&gt;

&lt;p&gt;Try it out and let me know what you think, either in the comments of this blog post on GPanswers.com.&lt;/p&gt;

&lt;p&gt;Okay.. and now for the short, sweet announcement:&lt;/p&gt;

&lt;p&gt;That is.. the upcoming Washington DC (Northern VA) class — July 19th is OFFICIALLY ON.&lt;/p&gt;

&lt;p&gt;We already have 10 people signed up with guaranteed seats, and another 9 people “swearing on a stack of Group Policy Bibles” that they are working on POs and whatnot.&lt;/p&gt;

&lt;p&gt;Since we only have so many seats, ensure your butt is in the right place by securing your seat before they’re all claimed!&lt;/p&gt;

&lt;p&gt;Go to &lt;a href=&quot;http://www.gpanswers.com/training&quot;&gt;www.GPanswers.com/training&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;And to answer your question before you ask it: Yes, yes.. the class is fully updated for WS08 and Win7. The result is that after the class is over, you’ll actually KNOW WHAT TO DO when you’re rolling out and managing Windows 7 and Windows Server 2008 and R2.&lt;/p&gt;

&lt;p&gt;On that page, you can:&lt;/p&gt;

&lt;p&gt;[] Read what the class is all about, and check out the hands-on lab content.&lt;br /&gt;
[] Watch the 20+ video testimonials.&lt;br /&gt;
[] Click SIGN UP and we’ll send you a Welcome letter. &lt;/p&gt;

&lt;p&gt;Oh, again: Everyone taking the class gets my newly updated book (Which, by the way, is FLYING off the shelves here at GP H.Q. Thank you, thank you, and sincerely thank YOU for being so enthusiastic and supportive.  My publisher says thanks, too.  ?  )&lt;/p&gt;

&lt;p&gt;On Amazon it’s ranked #2 in “Networking books.”  Awesome!!&lt;/p&gt;

&lt;p&gt;() Get your own signed copy: &lt;a href=&quot;http://www.gpanswers.com/book.&quot;&gt;www.GPanswers.com/book.&lt;/a&gt;&lt;br /&gt;
() Get it on Amazon.. http://www.amazon.com/gp/bestsellers/books/377894011/&lt;/p&gt;

&lt;p&gt;PS: Hey.. who’s gonna help me out and write some nice stuff on Amazon about the book? ? Thanks in advance !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> What is AGPM4? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-is-agpm4</link>
        <pubDate>2010-04-29T22:07:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ (Note: This tip may look familiar. It&amp;rsquo;s a &amp;ldquo;re-do&amp;rdquo; of something I blogged about back in 2008, but I wanted to re-talk about it, adding some new 2010 Juice to this 2008 discussion.)

Note: UK &amp;amp; European people / Aussie &amp;amp; New Zealand people&amp;hellip; I have a special request at the VERY END of this email, so, please don&amp;rsquo;t ignore ! Just jump to the end right now if you only have a second.

Okay.. on with the deep thoughts of the day:

Dealing with GPOs can sometim ]]>
        </description>
        <content:encoded>
            &lt;p&gt;(Note: This tip may look familiar. It’s a “re-do” of something I blogged about back in 2008, but I wanted to re-talk about it, adding some new 2010 Juice to this 2008 discussion.)&lt;/p&gt;

&lt;p&gt;Note: UK &amp; European people / Aussie &amp; New Zealand people… I have a special request at the VERY END of this email, so, please don’t ignore ! Just jump to the end right now if you only have a second.&lt;/p&gt;

&lt;p&gt;Okay.. on with the deep thoughts of the day:&lt;/p&gt;

&lt;p&gt;Dealing with GPOs can sometimes feel like you’re juggling grenades.&lt;/p&gt;

&lt;p&gt;As soon as you open a GPO for editing, it’s already whizzing around your network,&lt;br /&gt;
replicating around your DCs and potentially available for any clients looking for&lt;br /&gt;
an update.&lt;/p&gt;

&lt;p&gt;What if you’re in the middle of editing a GPO and you suddenly get called away, with, say a half-finished GPO?&lt;/p&gt;

&lt;p&gt;Well, it’s likely at least SOME Windows machines will ask for that update and download it.&lt;/p&gt;

&lt;p&gt;Also, I don’t know about you, but even with my daily GP comings-and-goings, I&lt;br /&gt;
still kinda wish there was an “Are you sure?” prompt when I’m editing stuff or&lt;br /&gt;
for when I’m about to do a bone-headed move.&lt;/p&gt;

&lt;p&gt;Let’s think about all the times I wish I could put some process around my GP world. For instance, there&lt;br /&gt;
is no “Are you sure” when…&lt;/p&gt;

&lt;p&gt;() Creating GPO&lt;br /&gt;
() Editing GPO&lt;br /&gt;
() Linking a GPO&lt;br /&gt;
() Deleting a GPO&lt;/p&gt;

&lt;p&gt;You get the idea. There’s a lot of potential for quick damage there.&lt;/p&gt;

&lt;p&gt;And, no way to see history of a GPO and “roll back” a set of changes once a GPO is rolled forward (though there is manual backup and restore capability.)&lt;/p&gt;

&lt;p&gt;That’s why I like products that put a little “process” around GP management.&lt;/p&gt;

&lt;p&gt;Microsoft’s AGPM v 4.0 was recently released as part of the MDOP subscription service (http://www.Microsoft.com/mdop) and it’s got some neat-o features. Since AGPM 3.0, there are a handful of new items, but nothing too radical.&lt;/p&gt;

&lt;p&gt;It’s strange, but I ask a lot of people if they’ve even HEARD of Microsoft’s AGPM (Advanced Group Policy Management) product, and I often get blank stares.&lt;/p&gt;

&lt;p&gt;So, in the interest of GP Public service, I’m here to clear up what it is and what it does. Let’s spend a quick minute discussing what it is and how to get it.&lt;/p&gt;

&lt;p&gt;What it is: It’s one of the 6 tools which are part of the Microsoft Desktop Optimization Pak (MDOP).&lt;/p&gt;

&lt;p&gt;What does it do: It puts “Change management” around GPOs, so you have a full trackable history of what people did plus a way to roll back if there are problems.&lt;/p&gt;

&lt;p&gt;How to get it: MDOP is a yearly subscription service which is only available to Microsoft SA customers who then ADDITIONALLY pay about $10 a seat, PER year.&lt;/p&gt;

&lt;p&gt;Holy moly factor: Yep. With the SA costs and the yearly ongoing $10 a sat, it can be expensive, but because MDOP is a set of 6 products, it’s actually a pretty good bargain overall. But it’s pretty understandable to have a strong reaction to the cost.&lt;/p&gt;

&lt;p&gt;AGPM’s Philosophy: You can think of AGPM almost like a library system. (At least, that’s how I think of it.) Only one person can have a GPO “checked out” at any given time for editing. And those edits don’t happen ONLINE and LIVE. They happen OFFLINE and are trackable. Essentially removing any direct impact to live computers — until you’re ready to rock.&lt;/p&gt;

&lt;p&gt;What’s new in AGPM 4.0 vs AGPM 3.0: There’s a smattering of stuff, but here’s the hitlist:&lt;/p&gt;

&lt;p&gt;() Searchable names and fields within the “Change Control” node&lt;br /&gt;
() Windows 7 and Windows Server 2008 R2 compatibility&lt;br /&gt;
() Export / Import from “test lab” to “production” domain or forest&lt;/p&gt;

&lt;p&gt;Note that two COMMON MISCONCEPTIONS about AGPM are:&lt;/p&gt;

&lt;p&gt;1. You have to deploy some “client” or “agent” to every machine. False. Totally false. Yes, AGPM has a “client” piece, but it’s just a fancy way to describe the “GPMC-add-on” piece which shows the AGPM stuff within the GPMC.&lt;/p&gt;

&lt;p&gt;2. You get the ability to control “more stuff” on your target machines. False. Totally false. Remember: Group Policy “magic” only occurs when you have a new CSE (client-side extension) on your target machine, which can pick up your “directives” inside the GPO. AGPM doesn’t do this. Products like Specops Deploy, BeyondTrust Priv Manager, and PolicyPak Application Manager all ship “true CSEs” which extend Group Policy’s magic and ability. AGPM does no such thing.&lt;/p&gt;

&lt;p&gt;So, are you using AGPM? Here’s my one-question survey:&lt;/p&gt;

&lt;p&gt;http://www.surveymonkey.com/s/TYBZXFB&lt;/p&gt;

&lt;p&gt;PS: If you have no plans to be an SA customer and then get the MDOP suite, then, note you can get MDOP comparible functionality from 3rd party vendors, like NetIQ with their GPA product, Quest with their GPOAdmin product, or ScriptLogic with their Active Administrator product.&lt;/p&gt;

&lt;p&gt;In the effort of full disclosure, note that some of those 3rd party vendors do occasionally advertise on GPanswers.com (but they didn’t know this email was going out until.. well, right this second.)&lt;/p&gt;

&lt;p&gt;Other notes:&lt;/p&gt;

&lt;p&gt;1. My new book thoroughly covers AGPM 4.0 in a deep, deep way. And, that chapter is totally, totally FREE. Head over to http://dev.gpanswers.com/book and click eChapters and find the AGPM chapter on the LEFT (GREEN) side. It suggests a way for you test this all yourself. You’re then also in the “right place” if you wanted to get your own signed copy of the printed book to get the rest of the story.&lt;/p&gt;

&lt;p&gt;2. I’m doing a “Do more with Group Policy and PolicyPak” LIVE demonstration TOMORROW at 11.00 AM EST (weird time, I know.). But sign up for the free live demonstration at https://www.policypak.com/demo. See you there !&lt;/p&gt;

&lt;p&gt;3. We’ve got lots of PEOPLE COMING in my upcoming class in Washington, DC / VA July 19th. Some discount seats still left. Honestly, these will not last long. $200 + Free book for the next three people who sign up at http://dev.gpanswers.com/training/live-courses.html and use discount code FIRSTFIVEDC at checkout.&lt;/p&gt;

&lt;p&gt;3. If you’re in UK / Europe and might want me to have a public training class over there, please click this link: http://www.surveymonkey.com/s/R62QWFJ&lt;/p&gt;

&lt;p&gt;4. If you’re in AUS or NZ, and might want me to have a public training class over there, please click this link: http://www.surveymonkey.com/s/RH79CXY&lt;/p&gt;

&lt;p&gt;5. If you’re “happy and you know it” .. clap your hands. Just seeing if you’re paying attention.&lt;/p&gt;

&lt;p&gt;Thanks for reaching the end of this long email. ?&lt;/p&gt;

&lt;p&gt;PS: Going on vacation for a week after my talk on Friday. Diane is here all week if you need a PO for the class or any other special situation. 302-351-4903. Thanks Team !&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Use the GPupdate /force (Part 2) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/use-the-gpupdate-force-part-2</link>
        <pubDate>2010-03-16T23:09:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So, in a previous installment, we explored GPupdate /force.
One use, as we examined enabled us to move a user or computer account around in AD, and have it’s new location “magically picked up.”
Let’s examine the other use of of GPupdate /force. Let’s take a closer examination of how “GP does it’s thing.” When a user (or computer) get it’s first batch of GPOs, it has to download them.
Now, the good news is that WHAT it downloads is really, really small. Usually 1, 2, 3 or 4k  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So, in a previous installment, we explored GPupdate /force.&lt;/p&gt;
&lt;p&gt;One use, as we examined enabled us to move a user or computer account around in AD, and have it’s new location “magically picked up.”&lt;/p&gt;
&lt;p&gt;Let’s examine the other use of of GPupdate /force. Let’s take a closer examination of how “GP does it’s thing.” When a user (or computer) get it’s first batch of GPOs, it has to download them.&lt;/p&gt;
&lt;p&gt;Now, the good news is that WHAT it downloads is really, really small. Usually 1, 2, 3 or 4k ish. That’s KILOBYTES, like what my VIC-20 was packin’ back in the day.&lt;/p&gt;
&lt;p&gt;So, okay. First myth busted: the download “payload” of Group Policy objects isn’t that big (under most circumstances.)&lt;/p&gt;
&lt;p&gt;Now, it’s true that the stuff the GPO is DOING can have an impact. But, even then, it’s usually pretty nominal if you’re sticking mostly to GPPrefs and/or Admin Templates (registry settings.)&lt;/p&gt;
&lt;p&gt;Okay. So, back to /force versus no /force. ?&lt;/p&gt;
&lt;p&gt;So if your user or computer is just sitting there a while, it asks, every so often “Hey.. any updated (or new) GPOs out there for me?” If the answer is YES, it downloads JUST the new or changed GPOs and processes those.&lt;/p&gt;
&lt;p&gt;Wow. Neat. So how does it KNOW which ones are NEW or CHANGED? The GPO Version number, of course. This is little internal counter (found on both the user and computer sides.) If either version changes, then blamo! the GPO comes down and is processed.&lt;/p&gt;
&lt;p&gt;Okay, okay. Back to /force versus no /force. &lt;/p&gt;
&lt;p&gt;When you run GPupdate by itself (no force) you’re “accelerating the hands of time” and forcing the user and computer side to ask “Hey.. any updated (or new) GPOs out there for me?” Again, if YES, those come down and apply.&lt;/p&gt;
&lt;p&gt;Then why would you ever NEED /force ?&lt;/p&gt;
&lt;p&gt;Honestly, under most circumstances.. you shouldn’t.&lt;/p&gt;
&lt;p&gt;A key case when you WOULD need the /force would be, say, if someone with local admin rights did a no-no, like change a value that only the protected SYSTEM should get to. For example, if a local administrator deleted a registry key, which restricted access to the control panel. Now — REGULAR USERS cannot do this. But ADMINS can.&lt;/p&gt;
&lt;p&gt;Then running a GPupdate — by itself — wouldn’t fix the problem. Only a GPupdate /force will “re-bring down” the settings — EVEN IF THE VERSION NUMBER HAS NOT CHANGED. Only this will shore up the hole that local admin has created.&lt;/p&gt;
&lt;p&gt;That being said… On the other hand, I have seen plenty of times where GPupdate /force is like a kick to the system’s head. There is some magical quality about /force which does sometimes “jumpstart” you out of a problem, and .. whoa.. things seem to “just be all a-ok, ducky” right now.&lt;/p&gt;
&lt;p&gt;Has the /force helped you get out of a pickle? Post your story to my GPanswers.com blog.&lt;/p&gt;
&lt;p&gt;Ready to learn more? Group Policy University.. Live or Online. &lt;/p&gt;
&lt;p&gt;Next Live.. the week of Seattle April 19th.&lt;br&gt;Online.. whenever you need it it.&lt;br&gt;One line: www.GPanswers.com/training&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Oodles of Great News today... </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/oodles-of-great-news-today</link>
        <pubDate>2010-01-07T15:36:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team&amp;hellip;

Several pieces of good news this week !

1. LAX Class &amp;mdash; On on on ! March 22 &amp;ndash; 26th.

We&amp;rsquo;ve got the first seven people signed up for my GPanswers five-day training class !

That means the class is ON ! Now, the only problem is.. will you be able to get one of the remaining seats?

If you were waiting for the class to be OFFICIALLY ON, well, we are now. So, don&amp;rsquo;t miss out.

Sorry, we cannot &amp;ldquo;save you a seat.&amp;rdquo; You can save your own seat  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team…&lt;/p&gt;

&lt;p&gt;Several pieces of good news this week !&lt;/p&gt;

&lt;p&gt;1. LAX Class — On on on ! March 22 – 26th.&lt;/p&gt;

&lt;p&gt;We’ve got the first seven people signed up for my GPanswers five-day training class !&lt;/p&gt;

&lt;p&gt;That means the class is ON ! Now, the only problem is.. will you be able to get one of the remaining seats?&lt;/p&gt;

&lt;p&gt;If you were waiting for the class to be OFFICIALLY ON, well, we are now. So, don’t miss out.&lt;/p&gt;

&lt;p&gt;Sorry, we cannot “save you a seat.” You can save your own seat when you use a credit card or utilize a PO. Then, your seat is a GUARANTEED. Sign up at…&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/training/sign-up-now-live/&quot;&gt;https://www.gpanswers.com/training/sign-up-now-live/&lt;/a&gt;&lt;br /&gt;
or call Diane at 302-351-4903 for POs / special arrangements.&lt;/p&gt;

&lt;p&gt;Special deals available for “Lone Wolf or Self-Pay” consultants, and discounts available when you sign up 3 or more.  Must call Diane to take advantage of these specials.&lt;/p&gt;

&lt;p&gt;Sign up today. See you in LA.&lt;/p&gt;

&lt;p&gt;2. I’ve been granted another year as a Enterprise Mobility MVP. There are exactly nine GP MVPs. Yowsa. Anyway, thank you for supporting my efforts here.&lt;/p&gt;

&lt;p&gt;[MORE BY CLICKING CLICK FOR MORE]&lt;/p&gt;

&lt;p&gt;3. Speaking of thanking you.. check this crazy picture out… (safe for work.)&lt;br /&gt;
&lt;a href=&quot;/images/gpanswers_number3.png&quot; target=&quot;_blank&quot;&gt;https://www.gpanswers.com/images/gpanswers_number3.png&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is a picture (you can see the flash) of something printed in SQL Server magazine. Remember that “Community Choice” award survey I asked you to fill out? Something must have worked and you must have told two friends, because of all the websites… we came in #3 overall.&lt;/p&gt;

&lt;p&gt;Holy cow.&lt;/p&gt;

&lt;p&gt;We even beat out the MAGAZINE’S OWN website (the one who took the survey !)&lt;/p&gt;

&lt;p&gt;What? Must have been a “rounding error” or something, but I’ll take it.&lt;/p&gt;

&lt;p&gt;THANK YOU.&lt;/p&gt;

&lt;p&gt;4. There’s a GPPreferences hotfix / rollup now available for Windows Vista clients.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://support.microsoft.com/kb/KB977983&quot;&gt;http://support.microsoft.com/kb/KB977983&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There’s no new functionality in here (and some is slated to come, retroactively for Vista at some point..) But this is a nice hotfix rollup if you’re using Vista clients.&lt;/p&gt;

&lt;p&gt;5. Team… I want to expand the GP FAQ we have online at GPanswers.com. Do you have a BURNING FAQ question you want answered? If so, send me an email with the subject line of BURNING FAQ, and I’ll try to answer it in an upcoming Tip of the Week / online in the FAQ section. Remember: Subject line of BURNING FAQ, and please, hold-yer-horses for an immediate answer. I’ll be hand-crafting the answers of the ones I pick and then presenting those answers at a later time. I likely won’t be able to answer all. I hope you’ll understand.&lt;/p&gt;

&lt;p&gt;That’s it for now. Thanks team. You’re the best! Have a great 2010, and see a bunch of you lucky ones in LA in March!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Twitter: &lt;a href=&quot;https://twitter.com/jeremymoskowitz&quot;&gt;jeremymoskowitz&lt;/a&gt;&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Backup Tips for the 21st Century: Backup procedures so easy, your Mom could (and should) do it. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/backup-tips-for-the-21st-century-backup-procedures-so-easy-your-mom-could-and-should-do-it</link>
        <pubDate>2009-12-28T20:23:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Presenting..

&amp;ldquo;Jeremy Moskowitz&amp;rsquo;s guide to how to backup your computer (which should be enough for most people)&amp;rdquo;

In a departure of my usual stuff here, this guide is not specifically geared toward IT managers or even IT pros. Rather, this is a guide that you should give to anyone and everyone you know with a computer.

IT backup and restore procedures will be significantly different than this. This is for &amp;ldquo;regular Joe and Jane&amp;rdquo; with one, two or maybe three co ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Presenting..&lt;/p&gt;

&lt;p&gt;“Jeremy Moskowitz’s guide to how to backup your computer (which should be enough for most people)”&lt;/p&gt;

&lt;p&gt;In a departure of my usual stuff here, this guide is not specifically geared toward IT managers or even IT pros. Rather, this is a guide that you should give to anyone and everyone you know with a computer.&lt;/p&gt;

&lt;p&gt;IT backup and restore procedures will be significantly different than this. This is for “regular Joe and Jane” with one, two or maybe three computers in the house.&lt;/p&gt;

&lt;p&gt;I wrote this document up after I saw &lt;a href=&quot;http://www.powerpage.org/airport-security-destroys-womans-macbook-offers-to-make-amends/&quot;&gt;this picture (See below)&lt;/a&gt;. In short, you never know what is going to happen to your data.&lt;/p&gt;

&lt;p&gt;There are *SEVEN* things you need to do to keep absolutely safe.&lt;/p&gt;

&lt;p&gt;Omitting any of these steps is not advised, but I can see if you only did just ONE, you would still be BETTER OFF than most. Doing all seven is a near guarantee you will not be “up the creek when the water really hits.”&lt;/p&gt;

&lt;p&gt;The Motto I live by: “There are people who back up their data, and those who will.”&lt;/p&gt;

&lt;p&gt;That’s because DISK DRIVES ALWAYS FAIL.  ALWAYS. It’s is a guarantee.  Even the newest ones with no moving parts. They all fail. Eventually.&lt;/p&gt;

&lt;p&gt;Read more to discover how “mere mortals” (not IT folks) should be backing up their data to prevent disaster.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Look at &lt;a href=&quot;http://www.powerpage.org/airport-security-destroys-womans-macbook-offers-to-make-amends/&quot;&gt;this picture&lt;/a&gt;. Ow. You never know what’s going to happen.&lt;/p&gt;

&lt;p&gt;I know.. You’re thinking “Holy cow, Moskowitz. Really? Seven things I gotta do? You’ve got to be kidding me.”&lt;/p&gt;

&lt;p&gt;Sorry. Yes. One method isn’t enough. Two *CAN* be enough. But you cannot count that any ONE method will always work.&lt;/p&gt;

&lt;p&gt;That’s why you need at LEAST TWO. And the others are GOOD IDEAS.&lt;/p&gt;

&lt;p&gt;Let me explain how I do it, and you can copy or otherwise parrot what I do. Or not. For the record, I haven’t lost any data since 1994, your mileage may vary.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thing #1: Get an online backup service.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;() What is it:&lt;/p&gt;

&lt;p&gt;It’s a little application that runs on your PC or Mac and constantly backs up your files to the online service thru the Intertubes. I use Carbonite.com (don’t sign up until you read this whole thing.) Others seem to like Mozy.com.&lt;/p&gt;

&lt;p&gt;() How does it protect you:&lt;br /&gt;
You tell it where your “data” is.. (or let it decide) and if you DELETE a file, or a directory, you go online and RESTORE it.&lt;/p&gt;

&lt;p&gt;() What happens if I blow away my whole hard drive or change hard drives&lt;br /&gt;
You can get it all back.. your data. Pictures, docs, etc. Not applications. You can transfer your subscription to other computers at the same time.&lt;/p&gt;

&lt;p&gt;() What about applications I’ve installed:&lt;br /&gt;
You should have another copy of these somewhere. At least a LIST of what’s important, offline, somewhere. See my answer a little later.&lt;/p&gt;

&lt;p&gt;() What about if I overwrite a file by accident&lt;br /&gt;
Carbonite says they keep 3 months of backups of a file. Never used it.&lt;/p&gt;

&lt;p&gt;() What does it cost:&lt;br /&gt;
$55 a year for “all you can eat.” Multi-year discounts. Get it. It’s a freekin’ no-brainer. $55 a year per computer.. GIGS of storage. They do not monitor.&lt;/p&gt;

&lt;p&gt;() Mac and PC?&lt;br /&gt;
Yes. Get it.&lt;/p&gt;

&lt;p&gt;() Do I need to license each computer in my house?&lt;br /&gt;
Yes. Do that.&lt;/p&gt;

&lt;p&gt;() Does it take 90 years to upload all my stuff?&lt;br /&gt;
Yes. The first time is quite painful for your internet connection. After that, easy.&lt;/p&gt;

&lt;p&gt;() Are there other backup services like this?&lt;br /&gt;
Yes, lots. I happen to use this one. Carbonite.com. Others like Mozy.com.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thing #2: Get a full-disk backup program&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you’re not using Windows 7, do that soon. Inside Windows 7 is a very decent “Full Disk backup” program. XP has one too, but it’s not quite as good.&lt;/p&gt;

&lt;p&gt;In Windows 7, just type “Backup” at the start prompt. The Windows 7 default backup routine is to take a full disk backup. Macs have a built-in excellent program called Time Machine. Check it out, and use it.&lt;/p&gt;

&lt;p&gt;If you’re using XP, or even Windows 7, I might suggest something like&lt;/p&gt;

&lt;p&gt;http://www.acronis.com/homecomputing/products/trueimage/&lt;br /&gt;
or&lt;br /&gt;
http://www.symantec.com/norton/ghost&lt;/p&gt;

&lt;p&gt;This takes a full SNAPSHOT of your machine, (and increments) and puts them on an external USB disk (more later). When the shit hits, you boot off a CD (that you make) and .. whamo.. pull from your recovery backup.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thing #3: Backup to an external USB drive (and back up MOST important stuff here.)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In Step #2, you saved an “image” of your PC somewhere. Where? Here. External USB disks are just DIRT CHEAP.&lt;/p&gt;

&lt;p&gt;Here’s 250GB for $59.99. More Googling with yield better results, even.&lt;/p&gt;

&lt;p&gt;http://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=4853000&amp;Sku=H450-8200&lt;/p&gt;

&lt;p&gt;Get two or three. See next FAQ for why.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thing #4: Don’t keep all your backups / computers in your house !&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Keep one backup in the house, another at your Mom’s or in the safe at the bank. True, the bad guys can break in and steal your backup at Mom’s, so a safe deposit box is better.&lt;/p&gt;

&lt;p&gt;Why are you doing this “offsite backup?” So, if your house burns down, so does your laptop, -AND- the backup you have in the house. Having another at your Mom’s or in the Safe at the bank is a GOOD IDEA.. But this takes DILLIGENCE.&lt;/p&gt;

&lt;p&gt;I know someone who did thing #3 (above) but his laptop *AND* his backup were caught in a flood. If he did Thing #4 as suggested here, he would still have been protected.&lt;/p&gt;

&lt;p&gt;So, what do *I* do? Every Monday, I rotate to have TWO in the bank and ONE coming back to me for making a new backup.&lt;/p&gt;

&lt;p&gt;If you have EXTRA room after thing #2, then make a DIRECT copy of your MOST IMPORTANT STUFF directly to the external disk drive.&lt;/p&gt;

&lt;p&gt;Why? Because if something got CORRUPTED in the backup of step #2, you at least have YOUR MOST IMPORTANT STUFF as just regular “plain ol’ files” for you to recover.&lt;/p&gt;

&lt;p&gt;Just plug in your USB backup and, COPY BACK.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thing #5: Rotate between AT LEAST two, possibly three USB drives.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is similar to #4, but three is better than two. This gives me THREE weeks to get something back from the dead if I messed up.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thing #6 Keep copies of your ORIGINAL disks, downloadables, KEYCODES and Drivers.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I have some key “special” folders in case I need them:&lt;/p&gt;

&lt;p&gt;() Keycodes: c:datakeycodes. It has WORD and TXT files with all the keycodes of everything I’ve ever bought.&lt;/p&gt;

&lt;p&gt;()ISOs: c:ISOs.  This is a collection of the DVDs and CD-ROMs I have physically purchased, including Quickbooks and Microsoft Visio. To make ISO files, consider&lt;/p&gt;

&lt;p&gt;()Drivers: c:Drivers: This has every driver I would need to get my Laptop and desktops system back going again (sound, video, network, disk, etc.)&lt;/p&gt;

&lt;p&gt;This collection is enormously helpful if need to restore them or repair them, or I’m building / re-building a system.&lt;/p&gt;

&lt;p&gt;For instance, this week, I built a new Windows 7 machine last Thursday and was up and running in 3 hours because I had all my ISOs, keycodes and drivers — all in one place, ready to go.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thing #7: Test your restore procedure.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This can be really tricky, especially for item #2 (full snapshot backup.)&lt;/p&gt;

&lt;p&gt;For laptops, invest in a second hard drive, even if you use it JUST for this test. That’s right. For about $100 or so, you can get, say, this drive:&lt;/p&gt;

&lt;p&gt;http://www.newegg.com/Product/Product.aspx?Item=N82E16822148374&amp;cm_re=500GB_laptop_drive-_-22-148-374-_-Product&lt;/p&gt;

&lt;p&gt;And then TEST RESTORE from Step #2 onto this drive. MOST laptops can quickly pull out the drive, replace it with this new drive, and allow you to test your restore in full.&lt;/p&gt;

&lt;p&gt;Then, when your test is complete, keep using that disk, or swap back to the original. Do this every 3-6 months or so.&lt;/p&gt;

&lt;p&gt;For Desktops.. same deal. Get another drive. Get a technical friend to help you if you need to. It IS harder on a desktop than a laptop.&lt;/p&gt;

&lt;p&gt;But do TRY to do a similar “full recovery” test. You will be SO GLAD you did this NOW and find problems NOW, as opposed to WHEN the problem occurs and you cannot correct from it anymore.&lt;/p&gt;

&lt;p&gt;If you don’t want to do this, at LEAST try to do perform test restores of your DATA from your ONLINE service and your external USB-drive extra-copies&lt;/p&gt;

&lt;p&gt;For extra credit, try to recover data from ANOTHER COMPUTER, in case yours becomes a smoldering mess or you drop it in a lake or something.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Other advice:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;1. If you do just ONE thing on this list, do #3. You’re a total fool if you do not at this point because USB disks are so cheap, and they work on Macs and PCs.&lt;/p&gt;

&lt;p&gt;2. Its better to do ONE of these than NONE of these. I’ve outlined 7 steps here. But if you only want to do one, but do it religiously, it’s better than doing NONE.&lt;/p&gt;

&lt;p&gt;3. Don’t count on one method working 100% of the time. That’s why I use three methods and hope ONE of them works when the time comes.&lt;/p&gt;

&lt;p&gt;4. Keep it simple. The LESS COMPLICATED you backup and restore procedure is, the better.&lt;/p&gt;

&lt;p&gt;5. If all else fails, and you didn’t listen to me AT ALL, and your hard drive dies, and you DON’T KNOW WHAT TO DO Go here:&lt;/p&gt;

&lt;p&gt;http://www.ontrackdatarecovery.com/hard-drive-recovery/&lt;/p&gt;

&lt;p&gt;For a SMALL FORTUNE, they will open your hard drive and try to recover your data.&lt;/p&gt;

&lt;p&gt;It’s not surprising that these companies stay in business. Most people do not back up. Will you pay NOW (cheap backup) or LATER (expensive recovery service that doesn’t always work?)&lt;/p&gt;

&lt;p&gt;It’s up to you.&lt;/p&gt;

&lt;p&gt;That is all.&lt;/p&gt;

&lt;p&gt;Good luck.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Office 2010: How are you going to deploy it? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/office-2010-how-are-you-going-to-deploy-it</link>
        <pubDate>2009-12-10T15:53:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The Office 2010 deployment story using Group Policy doesn&amp;rsquo;t get any better than Office 2007. You could argue it gets worse. There is no longer any possible way to deploy Office 2007 via Group Policy (outside of 3rd party tools like Specops Deploy.)

I found this plucky little document entitled &amp;ldquo;Deployment Options for Microsoft Office 2010&amp;rdquo; found here http://tinyurl.com/yfredq2.

In short, there&amp;rsquo;s a PDF, Visio and XPS document showing Microsoft&amp;rsquo;s sanctioned ways  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;The Office 2010 deployment story using Group Policy doesn’t get any better than Office 2007. You could argue it gets worse. There is no longer any possible way to deploy Office 2007 via Group Policy (outside of 3rd party tools like Specops Deploy.)&lt;/p&gt;

&lt;p&gt;I found this plucky little document entitled “Deployment Options for Microsoft Office 2010” found here &lt;a href=&quot;http://tinyurl.com/yfredq2&quot;&gt;http://tinyurl.com/yfredq2&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;In short, there’s a PDF, Visio and XPS document showing Microsoft’s sanctioned ways to deploy Office. Yes, Group Policy is on the list, but it’s the same way as Office 2007: Group Policy using Startup Scripts.&lt;/p&gt;

&lt;p&gt;Just for fun, I tried deploying Office 2010 using Group Policy Software Installation. No dice. There’s a single error message in the event log with a non-obvious message about the failure.&lt;/p&gt;

&lt;p&gt;Great.&lt;/p&gt;

&lt;p&gt;So, here are the official steps (which will work for both Office 2007 and Office 2010). This is my suggested method for deploying, since the other options are spendy.. (click MORE) to read the answer.&lt;/p&gt;

&lt;p&gt;Step 1: Create a config.xml File&lt;br /&gt;
We saw the Office 2007 version of this earlier. It’s the same idea in Office 2010. It’s used when clients initially install Office 2010. You can set the installation to be silent, for instance.&lt;br /&gt;
At last check the Config.xml file for Office 2010 was documented here… &lt;a href=&quot;http://tinyurl.com/ye4sorx&quot;&gt;Shortened to http://tinyurl.com/ye4sorx&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Step 2: Create a Custom MSP File&lt;br /&gt;
Like Office 2007, the Office 2010 config.xml file in Step 1 can only take us so far. Again, to create more Office simply run setup.exe /admin, and-voila!-the Office 2010 customization tool.&lt;br /&gt;
At last check the Office Customization Tool (OCT) can be found here: Shortened to &lt;a href=&quot;http://tinyurl.com/ybtkxen&quot;&gt;http://tinyurl.com/ybtkxen&lt;/a&gt;&lt;br /&gt;
Again, it produces .MSP files.&lt;/p&gt;

&lt;p&gt;Step 3: Place your MSP in the “Updates” folder&lt;br /&gt;
At installation time, you can have clients embrace the customizations you set in Step 2. Simply put the MSP file in the “Updates” folder on the network installation point of Office.&lt;/p&gt;

&lt;p&gt;Step 4: Use Startup Scripts to Deploy Office 2007 or Office 2010&lt;br /&gt;
Use this suggested start up script to kick off you Office 2007 or Office 2010 installation: &lt;a href=&quot;http://go.microsoft.com/fwlink/?LinkID=94264&quot;&gt;http://go.microsoft.com/fwlink/?LinkID=94264&lt;/a&gt;&lt;br /&gt;
You can use the script to ensure that you’re selecting the proper config.xml file you created in Step 1.&lt;/p&gt;

&lt;p&gt;Optional: Re-Patch Your Target Machines&lt;br /&gt;
You can always create a specific MSP file for a specific machine or two using the OCT. For instance, maybe you just want one or two machines to not have Microsoft Access 2010.&lt;br /&gt;
After creating the MSP file, use the information about msiexec /p I detailed in the section “Using MSIEXEC to Patch a Distribution Point” in my book.&lt;/p&gt;

&lt;p&gt;Except you don’t update the distribution point. Instead, you patch the specific machines, individually.&lt;/p&gt;

&lt;p&gt;You’ll likely need another startup script to figure this out if you want to target specific machines.&lt;/p&gt;

&lt;p&gt;If you’ve found a creative way to work around these Office 2007 or Office 2010 issues, I want to hear about it. Be sure to e-mail me and let me know your best techniques for deploying a customized Office 2007 or Office 2010 installation using Group Policy.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The WSJ missed the point </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-wsj-missed-the-point</link>
        <pubDate>2009-11-18T15:47:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I read the paper every day. I get the Wall Street Journal delivered to my house.

Say what you will about the Wall Street Journal, but there&amp;rsquo;s some (usually) great stuff in there.

Anyway, on Monday there was an article called

&amp;ldquo;It&amp;rsquo;s a FREE country&amp;hellip; so why can&amp;rsquo;t we pick the technology we use in the office?&amp;rdquo;

You can catch up with the article here&amp;hellip;

But I think the WSJ missed the point. The article&amp;rsquo;s premise about why we (IT) continues t ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I read the paper every day. I get the Wall Street Journal delivered to my house.&lt;/p&gt;

&lt;p&gt;Say what you will about the Wall Street Journal, but there’s some (usually) great stuff in there.&lt;/p&gt;

&lt;p&gt;Anyway, on Monday there was an article called&lt;/p&gt;

&lt;p&gt;“It’s a FREE country… so why can’t we pick the technology we use in the office?”&lt;/p&gt;

&lt;p&gt;You can catch up with &lt;a href=&quot;http://online.wsj.com/article/SB10001424052748703567204574499032945309844.html&quot;&gt;the article here&lt;/a&gt;…&lt;/p&gt;

&lt;p&gt;But I think the WSJ missed the point. The article’s premise about why we (IT) continues to use older technology.&lt;/p&gt;

&lt;p&gt;First off, if you look at the “Green IT” picture they have (with the birds) you can see that’s an Amiga 500 keyboard with a drawn-in monitor on top.&lt;/p&gt;

&lt;p&gt;Heh.&lt;/p&gt;

&lt;p&gt;Anyway..&lt;/p&gt;

&lt;p&gt;Here’s the premise (quoted directly from the article):&lt;/p&gt;

&lt;p&gt;“&lt;br /&gt;
Companies now have an array of technologies at their disposal to give employees greater freedom without breaking the bank or laying out a welcome mat for hackers. “Virtual machine” software, for example, lets companies install a package of essential work software on a computer and wall it off from the rest of the system. So, employees can install personal programs on the machine with minimal interference with the work software.&lt;br /&gt;
…&lt;br /&gt;
In my case, I’ve installed a search engine called Google Desktop that lets me quickly scour my hard drive for files, and a product by Xobni Corp. that does something similar for Outlook email, even though neither is approved by my IT department. And those programs have made a world of difference. In a simple test, it took Outlook two minutes to track down an email from a few months ago, based on a few search terms. Xobni found the message before I finished typing the words.&lt;br /&gt;
“&lt;/p&gt;

&lt;p&gt;Ow. Sorry, WSJ, you’re missing it guys.&lt;/p&gt;

&lt;p&gt;I’m not exactly sure where to start, or how long I want to rant here, so, I’ll just tackle one or two points here.&lt;br /&gt;
Here’s the “Jeremy Op-Ed” part…&lt;/p&gt;

&lt;p&gt;These “let users do what they will” strategies may, yes, may indeed work out. But not in all cases. They do certainly work out great in “free-wheeling” offices with low numbers of users, and tech-savvy users. They can work where users are willing to partially pay for the direct and indirect costs involved.&lt;/p&gt;

&lt;p&gt;This relates to my world. Heck — I actually use Xobni too, and it’s great. But it didn’t work for a while, and I had to figure out how spend my own time on to fix it.&lt;/p&gt;

&lt;p&gt;But this strategy is simply not for everyone.&lt;/p&gt;

&lt;p&gt;Ultimately, giving up control to the users means more work for an already-overworked IT department.&lt;/p&gt;

&lt;p&gt;Giving choice to users means, opens up scenarios that most IT departments would not like to think about.&lt;/p&gt;

&lt;p&gt;“Sir, are you running IE, Firefox, Opera or Safari? Great. Um, let me Google, er, Bing to see how to clear out the cache.. hang on.”&lt;/p&gt;

&lt;p&gt;(Meanwhile that support call cost the company $125 in hard or soft dollars.)&lt;/p&gt;

&lt;p&gt;Ow.&lt;/p&gt;

&lt;p&gt;I’m all for giving users what they want — if they can support it themselves and not drain IT resources. But the reality is in most enterprises, giving users “more stuff” end up meaning “MORE WORK” for us, the IT department.&lt;/p&gt;

&lt;p&gt;The WSJ goes on to detail one company (Kraft) which allows employees to choose non-standard Macs instead of PCs.&lt;/p&gt;

&lt;p&gt;PS: I’m NOT anti-Mac, by the way.. I’m anti-de-standardization. (Hey, I just made up a word!) ?&lt;/p&gt;

&lt;p&gt;“&lt;br /&gt;
Employees who choose Macs are expected to solve technical problems by consulting an online discussion group at Kraft, rather than going through the help desk, which deals mainly with Windows users.&lt;br /&gt;
“&lt;/p&gt;

&lt;p&gt;Is this the right solution to the problem? Can users be self-supporting in a complex environment like yours?&lt;/p&gt;

&lt;p&gt;And what about virtualization? The WSJ’s idea that you can just give em a VPC and go seems shortsighted to me. Those machines still need patching, lest they get infected and spit evil goo upon other virtual and real machines. There’s no mention of the enterprise-wide virtual desktop issue.. Things that Microsoft Med-V and VMware’s ACE try to solve.&lt;/p&gt;

&lt;p&gt;Long story short… I think the WSJ missed the point.&lt;/p&gt;

&lt;p&gt;We (IT) don’t control because we WANT to. We control because we HAVE to.&lt;/p&gt;

&lt;p&gt;Group Policy is the “in the box” way to control Windows machines. We make things “more standard” to make them “more supportable.” More supportable means that we, in IT have a limited set of issues to troubleshoot, instead of an UNLIMITED set to troubleshoot. (At least we hope.)&lt;/p&gt;

&lt;p&gt;I’m all for more freedom, if it doesn’t take US and OUR EYES away from the prize.&lt;/p&gt;

&lt;p&gt;What’s the right way to handle this?&lt;/p&gt;

&lt;p&gt;Maybe we should all be running Amiga 500s. (I kid.. I kid.. I’m a kidder.)&lt;/p&gt;

&lt;p&gt;Comment on my BLOG to continue the discussion.&lt;/p&gt;

&lt;p&gt;The link is here:&lt;/p&gt;

&lt;p&gt;http://dev.gpanswers.com/blog/617-the-wsj-missed-the-point.html&lt;/p&gt;

&lt;p&gt;Thanks team!&lt;/p&gt;

&lt;p&gt;Thing 4: Gold for the Price of Silver (Repeat from Monday!)&lt;br /&gt;
——&lt;/p&gt;

&lt;p&gt;I am running a little “Special” on my Group Policy Online University classes. I have exactly SIX people I can offer this deal to, so here goes:&lt;/p&gt;

&lt;p&gt;-You get the GOLD kit for the price of the SILVER kit.&lt;/p&gt;

&lt;p&gt;What’s in the GOLD kit? Check out&lt;br /&gt;
http://dev.gpanswers.com/training/online-training-faq.html&lt;br /&gt;
and read item #10 for what, exactly, is in the box.&lt;/p&gt;

&lt;p&gt;Oh, and you get FIVE “mentoring credits” to use with me — for your own personal course troubleshooting.&lt;/p&gt;

&lt;p&gt;And, longer view times, extra perks, yada yada yada…&lt;/p&gt;

&lt;p&gt;So, if you’ve always wanted the killer GOLD kit,&lt;br /&gt;
but wish it was at a discount,&lt;br /&gt;
I have exactly SIX gold kits I can do this for.&lt;/p&gt;

&lt;p&gt;So, head over to&lt;br /&gt;
http://dev.gpanswers.com/training/online-class-signup.html&lt;br /&gt;
click the GOLD kit.&lt;/p&gt;

&lt;p&gt;Then, at checkout time, use coupon code&lt;br /&gt;
GOLD4SILVER&lt;br /&gt;
for your “Gold for the price of Silver” kit.&lt;/p&gt;

&lt;p&gt;Note the discount taken off means you’ll still have to pay for shipping ($50); the deal is good, but hey, I’m not crazy.&lt;/p&gt;

&lt;p&gt;Again, six kits only at this price. When they’re gone, they’re gone. Don’t delay if you’ve always wanted one !&lt;/p&gt;

&lt;p&gt;This just in from someone who finished the GPU online courses:&lt;/p&gt;

&lt;p&gt;“&lt;br /&gt;
Jeremy is absolutely the best presenter and instructor I have seen. I really would like to get the same type of instruction for other IT courses. He has a wonderful way of sharing his knowledge in a simple, effective way that leaves you thinking “Wow! That makes so much sense. ” After taking his “Group Policy Online University” courses and reading his books I feel like a pro — truly understanding Group Policy. And whenever I have a question, Jeremy is always there to help. I really liked the fact you can review the online course TWICE. It’s almost like getting TWO courses in one. Add in his weekly tips and simply you can’t go wrong. Thanks Jeremy — and your staff for creating a great learning experience that I benefit from every day.&lt;br /&gt;
“&lt;br /&gt;
— Glen Morris, Network Administrator, Mondial Assistance&lt;/p&gt;

&lt;p&gt;Thanks Glen ! Glad you’ve got that “GP stuff” handled at this point and ready to make your company more productive!&lt;/p&gt;

&lt;p&gt;Who’s ready to learn and be like Glen ? Is it you?&lt;/p&gt;

&lt;p&gt;Click:&lt;br /&gt;
http://dev.gpanswers.com/training/online-class-signup.html&lt;/p&gt;

&lt;p&gt;Use:&lt;br /&gt;
GOLD4SILVER at checkout time.&lt;/p&gt;

&lt;p&gt;I’m practically handing you over the keys to car. Get smarter starting today.&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
GPanswers.com (Group Policy Community)&lt;br /&gt;
PolicyPak.com    (PolicyPak Software)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Windows 7: Yada, Yada Yada </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/windows-7-yada-yada-yada</link>
        <pubDate>2009-10-22T17:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Today&amp;rsquo;s the day where you&amp;rsquo;re going to start to be bombarded with bajillions of messages about&amp;nbsp; how Windows 7 is the best operating system ever produced.

Look, that&amp;rsquo;s not for me to say &amp;mdash; history will shake out and tell us all over time. It&amp;nbsp; might end up being the best selling operating system ever produced; and it might have&amp;nbsp; already even hit that mark for all I know, but that&amp;rsquo;s another topic.

Here&amp;rsquo;s my 2&amp;cent; of Jeremy wisdom (if there is ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Today’s the day where you’re going to start to be bombarded with bajillions of messages about  how Windows 7 is the best operating system ever produced.&lt;/p&gt;

&lt;p&gt;Look, that’s not for me to say — history will shake out and tell us all over time. It  might end up being the best selling operating system ever produced; and it might have  already even hit that mark for all I know, but that’s another topic.&lt;/p&gt;

&lt;p&gt;Here’s my 2¢ of Jeremy wisdom (if there is such a thing)..&lt;/p&gt;

&lt;p&gt;In the coming days, weeks, and possibly months, you’re going to hear about every  possible Windows 7 feature under the sun to “make your life better” and “more  wonderful” and “Oh, look! Shiny shiny shiny.”&lt;/p&gt;

&lt;p&gt;I don’t have any beef with features like Multi-Touch, or Aeropeek or Aeroshake.&lt;/p&gt;

&lt;p&gt;(Okay, well, maybe &lt;a href=&quot;http://www.istartedsomething.com/20081103/shake-up-your-windows-7-with-aero-shake/&quot;&gt;Aeroshake&lt;/a&gt;…  I’ve turned it off.)&lt;/p&gt;

&lt;p&gt;But as IT Pros and managers, we need to be focused and ready to understand what’s  important to US and our businesses, versus all the gook from TV advertisements, Twitter tweets, and fancy-pants demos.&lt;/p&gt;

&lt;p&gt;Indeed, Microsoft’s pseudo-tagline for Windows 7 is “A billion options.”&lt;/p&gt;

&lt;p&gt;Ow. That kind of hurts my brain.&lt;/p&gt;

&lt;p&gt;I guess what I’m trying to say is: It’s ALL good stuff. But, in the words of the late &lt;a href=&quot;http://i29.photobucket.com/albums/c290/trebor007/beef.jpg&quot;&gt;Clara Peller&lt;/a&gt;, “Where’s the beef?&lt;/p&gt;

&lt;p&gt;And here’s the good news: there IS beef there. It’s just that we, as IT geeks, need to be conscientious and thoughtful about discerning and filtering out the incoming “shiny, shiny, shiny” messages from the “what really matters” of Windows 7.&lt;/p&gt;

&lt;p&gt;So, in the days and weeks to come, with all the hubbub about Windows 7, we should try to focus in on key points where Windows 7’s new technologies can help our business grow,and be prosperous.&lt;/p&gt;

&lt;p&gt;If I had to pick three areas to focus on initially (to get the most bang for the buck)  I would focus on…&lt;/p&gt;

&lt;p&gt;Management: Group Policy improvements, GP Prefs improvements&lt;/p&gt;

&lt;p&gt;Efficiency: GP + Powershell, Powershell for other non-GP tasks, DirectAccess&lt;/p&gt;

&lt;p&gt;Security: AppLocker for system protection, Bitlocker for whole drive encryption&lt;/p&gt;

&lt;p&gt;That’s not to say there aren’t OTHER areas to possibly focus on; these are just my opinions.&lt;/p&gt;

&lt;p&gt;So, welcome Windows 7. It’s shiny. It’s beefy.&lt;/p&gt;

&lt;p&gt;Let’s eat !&lt;/p&gt;

&lt;p&gt;PS: This blog entry is on the home page of GPanswers.com. Re-Tweet if you like!&lt;/p&gt;

&lt;p&gt;PS: Tip… Online Group Policy Training at www.GPanswers.com/training gets you a jump on Windows 7 today.&lt;/p&gt;

&lt;p&gt;PPS: Note… I have one seat left for the live Orlando class next week. If you think you can make a miracle happen and join us, you HAVE TO CALL us at 302-351-4903. No more seats available thru the website&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> The Case of the Missing Group Policy Settings </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-case-of-the-missing-group-policy-settings</link>
        <pubDate>2009-10-07T15:53:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team:

Check this out.

Let&amp;rsquo;s say you had a Windows 7 management machine and also a Windows Server 2008 (or 2008 R2) as your management machine.(In &amp;ldquo;Jeremy-parlance&amp;rdquo; a &amp;ldquo;management machine&amp;rdquo; is where you run the GPMC from.)

Turns out that on Windows Server 2008 and 2008 / R2, there&amp;rsquo;s a gaggle of &amp;ldquo;extra&amp;rdquo; policy settings !

Seriously, this is weird, so stick with me.

Click here:
&amp;hellip;and you&amp;rsquo;ll see the Windows 7 management machine ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team:&lt;/p&gt;

&lt;p&gt;Check this out.&lt;/p&gt;

&lt;p&gt;Let’s say you had a Windows 7 management machine and also a Windows Server 2008 (or 2008 R2) as your management machine.(In “Jeremy-parlance” a “management machine” is where you run the GPMC from.)&lt;/p&gt;

&lt;p&gt;Turns out that on Windows Server 2008 and 2008 / R2, there’s a gaggle of “extra” policy settings !&lt;/p&gt;

&lt;p&gt;Seriously, this is weird, so stick with me.&lt;/p&gt;

&lt;p&gt;Click &lt;a href=&quot;http://s360.photobucket.com/albums/oo47/jeremym302/Missing%20Policy%20Settings/?action=view&amp;current=win7ps.png&quot;&gt;here&lt;/a&gt;:&lt;br /&gt;
…and you’ll see the Windows 7 management machine view of the Computer Configuration | Policies | Administrative Templates | System | Group Policy node.&lt;/p&gt;

&lt;p&gt;Click &lt;a href=&quot;http://s360.photobucket.com/albums/oo47/jeremym302/Missing%20Policy%20Settings/?action=view&amp;current=2008ps.png&quot;&gt;here&lt;/a&gt;:&lt;br /&gt;
…and you’ll see shows the same thing, except seen from a Windows Server 2008 management machine.&lt;/p&gt;

&lt;p&gt;So, what are these “missing” definitions?&lt;/p&gt;

&lt;p&gt;These are the settings used to control, manage and monitor the Group Policy Preferences settings. The very “way” GP Prefs “operates.” You’ll see specific Group Policy Preferences items like “Printers Policy Processing”, “Shortcuts Policy Processing”, “Start Menu Policy Processing” and all sorts of other Group Policy Preferences-specific settings.&lt;/p&gt;

&lt;p&gt;And my favorite strangeness in this area is “Registry Policy Processing” (with an upper case P in Policy) right next to its cousin “Registy policy processing” (with a lower case P in policy.) The lower case P policy (Registry policy Processing) is about how we handle the stuff inside the “Administrative Templates” node; ya know – “normal” Group Policy settings like “Prevent Access to the Control Panel.” The upper case P policy setting (Registry Policy Processing) is about the “Registry node” in the Group Policy Preferences (Chapter 10 in the Green book)&lt;/p&gt;

&lt;p&gt;Bizzaro, but now at least it’s understandable.&lt;/p&gt;

&lt;p&gt;Look closely, and you’ll also see another whole node within the Group Policy node called “Logging and tracing.”&lt;/p&gt;

&lt;p&gt;Okay, so what gives?&lt;/p&gt;

&lt;p&gt;I’ll go more into this at another time, but since you can’t wait that long, here’s the abbreviated version. In short the “definitions” of what’s possible in Group Policy-land are stored in ADMX files Turns out, though that Windows 7’s RSAT and Windows Server 2008 don’t ship with the exact same definitions.&lt;/p&gt;

&lt;p&gt;Kooky. The “missing” Group Policy settings are only available in Windows Server 2008’s “set” of definitions. And, yes, that set is downloadable if you don’t want to rip it out of an existing Windows Server 2008 machine.&lt;/p&gt;

&lt;p&gt;To catch-up your “Windows 7 management machine” download and utilize the files here http://tinyurl.com/mb6x5v (though there are sure to be updates for Windows Server 2008 R2, so, I would try to track those down when available.)&lt;/p&gt;

&lt;p&gt;Don’t be caught off guard if a GP Prefs problem occurs… now you’re in the know!&lt;/p&gt;

&lt;p&gt;Some discount seats left for the Group Policy Master Class training in Orlando.&lt;/p&gt;

&lt;p&gt;Sign up at https://www.gpanswers.com/training/live-courses.html&lt;/p&gt;

&lt;p&gt;Use Coupon code NEXTSIXORLANDO to get $200 off the whole week !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Group Policy Settings Spreadsheets </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/group-policy-settings-spreadsheets</link>
        <pubDate>2009-09-23T23:51:48+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Great News!  The Windows 7 and Windows Server 2008 R2 Group Policy spreadsheets have been released!  Microsoft has also placed all of the spreadsheets into one download page for easier access.Click here to access the download page. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Great News!  The Windows 7 and Windows Server 2008 R2 Group Policy spreadsheets have been released!  &lt;br /&gt;&lt;br /&gt;Microsoft has also placed all of the spreadsheets into one download page for easier access.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://go.microsoft.com/fwlink/?LinkID=131389&quot;&gt;Click here&lt;/a&gt; to access the download page.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> My First Days with Windows 7 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/my-first-days-with-windows-7</link>
        <pubDate>2009-08-14T00:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Let&amp;#39;s go right to the punchline: Overall; positive.

Okay, now let&amp;#39;s get to what&amp;#39;s great, what&amp;#39;s not and what&amp;#39;s just weird.

Actually, before we do that, let&amp;#39;s start off with my new hardware. If you know me, you know I love to do demos. I do demos left and right in my training courses, at WinConnections and TechEd, and other sundry events.

And, of course, I need to use a laptop lug around and do that. My laptop of choice has always been Dell. I&amp;#39;ve been a Dell m ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Let&#039;s go right to the punchline: Overall; positive.&lt;/p&gt;

&lt;p&gt;Okay, now let&#039;s get to what&#039;s great, what&#039;s not and what&#039;s just weird.&lt;/p&gt;

&lt;p&gt;Actually, before we do that, let&#039;s start off with my new hardware. If you know me, you know I love to do demos. I do demos left and right in my training courses, at WinConnections and TechEd, and other sundry events.&lt;/p&gt;

&lt;p&gt;And, of course, I need to use a laptop lug around and do that. My laptop of choice has always been Dell. I&#039;ve been a Dell man, since, well, Dell Laptops had TRACKBALLS in them, and not touchpads.&lt;/p&gt;

&lt;p&gt;Yes, _that_ long.&lt;/p&gt;

&lt;p&gt;Now, for the first time ever I went Lenovo. Honestly, the new Dell E series just seemed too &quot;humongo&quot; for me. The whole package, including the power supply just looked too.. Bulky.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Yep, that was my &quot;very technical reason&quot; for not getting another Dell. I&#039;m sure they&#039;re great inside, but their aesthetics (at least compared to my Dell D620) was not an improvement (to me, anyway.) So, I got a Lenovo T500. The name alone makes me feel like I&#039;m perpetually the star in my own personal Terminator film. I bought it cheap from the &quot;Lenovo outlet store.&quot; It has a T9600 Core2Duo processor on board, and I fitted it myself with (oh drool!) 8GB RAM and 500GB hard drive @ 7200RPM (killer!)&lt;/p&gt;

&lt;p&gt;Then I waited to get my hot little hands on Windows 7. I was in the beta program, so I got a &quot;free key&quot; to use when the beta ended.&lt;/p&gt;

&lt;p&gt;Last Thursday night, I installed Windows 7, 64-Bit edition on my new monster laptop.&lt;/p&gt;

&lt;p&gt;Before that, I had previously went to Lenovo&#039;s website and downloaded ANYTHING associated with the T500 + Vista. That is to say, since all Vista drivers are &quot;upward&quot; compatbile to Windows 7, having them &quot;at the ready&quot; seemed to be a good idea. I put them on an external USB disk.&lt;/p&gt;

&lt;p&gt;My first 24 hours wasn&#039;t great. I installed Windows 7. I took all the updates. Then I installed all the T500 / Vista drivers. I rebooted when necessary. Finally, when I installed the video driver software, Windows 7 just hung and hung and hung and hung at the &quot;Please wait&quot; page.&lt;/p&gt;

&lt;p&gt;Arrrgh. And this was AFTER I had already activated Windows 7 (Stupid, Stupid, Moskowitz.)&lt;/p&gt;

&lt;p&gt;Well, I knew I could boot to Safe Mode and hack and slash my way out of this. But the more I thought about it.. why was I installing drivers for something that was, well, working already?&lt;/p&gt;

&lt;p&gt;So I didn&#039;t.&lt;/p&gt;

&lt;p&gt;I re-formatted and re-installed Windows 7. In my experience, more manufacturer software equals slower and more unstable machine. Said another way, if I can &quot;get away with&quot; the drivers that are included as part of Windows 7, I should have a faster and more stable system overall ... instead of having to know exactly WHICH drivers and in WHAT ORDER I should be installing them.&lt;/p&gt;

&lt;p&gt;So that&#039;s what I did. I loaded Windows 7, I took all of Windows&#039; updates (it had several driver updates for my system.) There were two devices Windows didn&#039;t have &quot;built in drivers&quot; for, and I did, indeed, install those from the Lenovo website. And that was it. I was done.&lt;/p&gt;

&lt;p&gt;That being said, it wasn&#039;t totally a bed of roses.&lt;/p&gt;

&lt;p&gt;This T500 system has this newfangled idea of having TWO video chips instead of just one. Let&#039;s call these two chips the &quot;Good one&quot; and the &quot;Awesome one.&quot; Honestly, I don&#039;t ever, ever need the &quot;Awesome one.&quot; I don&#039;t play games, so I don&#039;t need &quot;awesomeness.&quot; &quot;Awesome graphics&quot; don&#039;t make my demos any faster, and honestly, that&#039;s all I care about for this machine.&lt;/p&gt;

&lt;p&gt;This newfangled idea of two chips sounds great, but for me it just wasn&#039;t working perfectly with my total re-install. Every time I closed the lid and re-opened it, it thought my laptop display was &quot;Display 2.&quot; All the stuff I was working on just disappeared.&lt;/p&gt;

&lt;p&gt;You could say: &quot;Well, Moskowitz, if you installed the drivers from Lenovo, you wouldn&#039;t be having this problem.&quot; Except, remember .. when I did install the drivers, that&#039;s exactly when the machine went into &quot;mega hang&quot; mode.&lt;/p&gt;

&lt;p&gt;So, I needed a Plan B.&lt;/p&gt;

&lt;p&gt;To fix this, I adjusted the T500&#039;s bios to say &quot;Kill the Awesome chip. Only let me use the Good chip.&quot; And magically, all my troubles went away.&lt;/p&gt;

&lt;p&gt;I&#039;m sure, really, really sure, this is because I didn&#039;t choose to install Lenovo&#039;s &quot;mega video driver&quot; or something for the secondary video driver chips.&lt;/p&gt;

&lt;p&gt;But I&#039;m okay with that. I honestly need my laptop to do EXACTLY two things: display on the panel when I want to, and display outward on the VGA port for projecting when I want to.&lt;/p&gt;

&lt;p&gt;Nothing fancy. So, no &quot;awesome chip settings with crazy drivers&quot; for me, thank you very much.&lt;/p&gt;

&lt;p&gt;So, how is my overall experience with Windows 7 compared to Windows Vista? Well, my biggest problem with Windows Vista was that it was slow. Yes, lots of people complained about it being slow, but I tried to take an empirical approach and learn WHY my experience with Vista was slow.&lt;/p&gt;

&lt;p&gt;For me, personally, I learned the &quot;slow culprit&quot; was the &quot;Windows Search&quot; service. On my previous laptop, the D620, where I tried to run Vista, every time I ran Filemon / Procmon, I could see it. Spinning it&#039;s wheels, doing it&#039;s thing -- ALL THE TIME and slowing me down.&lt;/p&gt;

&lt;p&gt;As for Windows 7, I&#039;m sad to say, that my initial experience is the same in this particular regard. Windows 7 still appears to (at least with my files) churn and churn and churn.&lt;/p&gt;

&lt;p&gt;Maybe I haven&#039;t given it a fair shake. It&#039;s true, I didn&#039;t let it &quot;settle in for three days&quot; before getting frustrated and turning it off. I do have 60GB of &quot;data&quot; for it to pour over. So, in fairness, I&#039;m going away next weekend, and I&#039;m planning on turning ON the search service BEFORE I LEAVE, and see what happens when I return.&lt;/p&gt;

&lt;p&gt;But for now, I have uninstalled the Windows 7 search feature, and you also (oddly) seem to need&lt;br /&gt;
to DISABLE the search service to really kill it (according to my Procmon traces.)&lt;/p&gt;

&lt;p&gt;Here&#039;s the payoff though: Man, is this lappy fast! Right now, I&#039;m really happy with the speed. Applications pop. Demos snap. Everything is like a crisp clean spring morning. Between a new processor, new OS, the 64-bits, 8GB of RAM and a 7200 RPM HD, darn tootin&#039; this thing better fly.&lt;/p&gt;

&lt;p&gt;Here are some miscellaneous notes about my first 7 days, in no particular order:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;I have a wacky wacky &quot;Cannon&quot; all-in-one printer, fax, scanner thing. And that driver was included in Windows 7. And, it even shows me the &quot;ink levels&quot; while printing; just like the driver I previously needed to download from Cannon then hand-install on XP. Neat.&lt;/li&gt;
	&lt;li&gt;I&#039;m pretty &quot;keyboard centric.&quot; So about 1000 times a day, I type the following key sequence when working on XP: Ctl-Esc, R, cmd, enter. In XP, this would open the Start menu, R would hit the Run command, and CMD would get me to a command prompt. Now on Win 7, the same sequence makes NOTHING happen, because (even though I&#039;ve put RUN back on the Start menu) there&#039;s no keyboard shortcut for &#039;R&#039;un. gRRRR.  PS: My lappy has a WIN key, so Win+R work, but my external keyboard doesn&#039;t, so I&#039;m stuck.&lt;/li&gt;
	&lt;li&gt;I have ONE piece of hardware that, darn it, I cannot use, and man, I&#039;m disappointed. It&#039;s a USB-connected phone system that&#039;s voice activated and hooks into Outlook. It just crashes every time it runs. Just flat out crashes. Can&#039;t really get to the bottom of this. If anyone else has this device, it&#039;s called ArialPhone, and I&#039;d love to hear if it&#039;s working for anyone out there on Win 7 or even Vista. (PS: Even &quot;XP compatibility mode&quot; likely won&#039;t get me out of this one; unless I want to run a copy of Outlook *INSIDE* that fake XP machine, which I don&#039;t.)&lt;/li&gt;
	&lt;li&gt;I have two other Outlook plug-ins which worked great on XP, but won&#039;t do their magic on Windows 7. Oddly, two *OTHER* Outlook plug-ins are working swimmingly. So, I don&#039;t know where the problem is. Still hacking on this one.&lt;/li&gt;
	&lt;li&gt;The Beta for the App-V client 4.6 is out, and includes 64-bit support. Honestly, the thing seems ROCK SOLID to me, but my understanding is that it&#039;s planned to be Beta for a while before it goes gold. AppV Applications in cache seem to run WAY WAY faster than they did in AppV 4.5. It took me about an hour to convert all my existing 4.5 sequenced apps to 4.6.&lt;/li&gt;
	&lt;li&gt;My wife walked behind me to see what I was working on. And it was my Windows 7 desktop. She saw the huge, huge icons that Windows 7 defaults with and asked &quot;Are you in safe mode?&quot; I can totally see her confusion, as Windows 7, in my opinion, looks totally bizzare with those big honkin&#039; icons. The fix? While on the desktop, hold down Control and use the scroll wheel of your mouse to adjust. Kooky.&lt;/li&gt;
	&lt;li&gt;Lots of people seem to be all &quot;gaga&quot; about the new taskbar. Honestly, I don&#039;t love the &quot;mixed metaphor&quot; of applications running and applications&#039; icons all jumbled together. I&#039;ve reset it act a little more like XP did, and I&#039;m a little saner now.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But, all around, 95% of my applications are working. Everything that&#039;s &quot;broken&quot; seems to be revolved around Outlook in some way. Everything else is working great. So, I&#039;m not sure if I can blame Windows or what here. Regardless, I&#039;ll get to the bottom of these and shake out my final bugs.&lt;/p&gt;

&lt;p&gt;But in short, my first week -- pretty solid after getting thru the bumps. I do have that &quot;last mile&quot; to push through, and I&#039;ll keep you posted as things progress.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> My First 7 Days with Windows 7 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/my-first-7-days-with-windows-7</link>
        <pubDate>2009-08-13T14:04:27+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Let&#039;s go right to the punchline: Overall; positive.Okay, now let&#039;s get to what&#039;s great, what&#039;s not and what&#039;s just weird.Actually, before we do that, let&#039;s start off with my new hardware. If you know me, you know I love to do demos. I do demos left and right in my training courses, at WinConnections and TechEd, and other sundry events.And, of course, I need to use a laptop lug around and do that. My laptop of choice has always been Dell. I&#039;ve been a Dell man, since, well, Dell Laptops had TRACKB ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;br /&gt;Let&#039;s go right to the punchline: Overall; positive.&lt;br /&gt;&lt;br /&gt;Okay, now let&#039;s get to what&#039;s great, what&#039;s not and what&#039;s just weird.&lt;br /&gt;&lt;br /&gt;Actually, before we do that, let&#039;s start off with my new hardware. If you know me, you know I love to do demos. I do demos left and right in my training courses, at WinConnections and TechEd, and other sundry events.&lt;br /&gt;&lt;br /&gt;And, of course, I need to use a laptop lug around and do that. My laptop of choice has always been Dell. I&#039;ve been a Dell man, since, well, Dell Laptops had TRACKBALLS in them, and not touchpads.&lt;br /&gt;&lt;br /&gt;Yes, _that_ long.&lt;br /&gt;&lt;br /&gt;Now, for the first time ever I went Lenovo. Honestly, the new Dell E series just seemed too &quot;humongo&quot; for me. The whole package, including the power supply just looked too.. Bulky.&lt;br /&gt;&lt;br /&gt;Yep, that was my &quot;very technical reason&quot; for not getting another Dell. I&#039;m sure they&#039;re great inside, but their asthetics (at least compared to my Dell D620) was not an improvement (to me, anyway.) So, I got a Lenovo T500. The name alone makes me feel like I&#039;m perpetually the star in my own personal Terminator film.  I bought it cheap from the &quot;Lenovo outlet store.&quot; It has a T9600 Core2Duo processor on board, and I fitted it myself with (oh drool!) 8GB RAM and 500GB hard  drive @ 7200RPM (killer!)&lt;br /&gt;&lt;br /&gt;Then I waited to get my hot little hands on Windows 7. I was in the beta program, so I got a &quot;free key&quot; to use when the beta ended.&lt;br /&gt;&lt;br /&gt;Last Thursday night, I installed Windows 7, 64-Bit edition on my new monster laptop.&lt;br /&gt;&lt;br /&gt;Before that, I had previously went to Lenovo&#039;s website and downloaded ANYTHING associated with the T500 + Vista. That is to say, since all Vista drivers are &quot;upward&quot; compatbile to Windows 7, having them &quot;at the ready&quot; seemed to be a good idea. I put them on an external USB disk.&lt;br /&gt;&lt;br /&gt;My first 24 hours wasn&#039;t great. I installed Windows 7. I took all the updates. Then I installed all the T500 / Vista drivers. I rebooted when necessary. Finally, when I installed the video driver software, Windows 7 just hung and hung and hung and hung at the &quot;Please wait&quot; page.&lt;br /&gt;&lt;br /&gt;Arrrgh. And this was AFTER I had already activated Windows 7 (Stupid, Stupid, Moskowitz.)&lt;br /&gt;&lt;br /&gt;Well, I knew I could boot to Safe Mode and hack and slash my way out of this. But the more I thought about it.. why was I installing drivers for something that was, well, working already?&lt;br /&gt;&lt;br /&gt;So I didn&#039;t.&lt;br /&gt;&lt;br /&gt;I re-formatted and re-installed Windows 7. In my experience, more manufacturer software equals slower and more unstable machine. Said another way, if I can &quot;get away with&quot; the drivers that are included as part of Windows 7, I should have a faster and more stable system overall ... instead of having to know exactly WHICH drivers and in WHAT ORDER I should be installing them.&lt;br /&gt;&lt;br /&gt;So that&#039;s what I did. I loaded Windows 7, I took all of Windows&#039; updates (it had several driver updates for my system.) There were two devices Windows didn&#039;t have &quot;built in drivers&quot; for, and I did, indeed, install those from the Lenovo website.  And that was it. I was done.&lt;br /&gt;&lt;br /&gt;That being said, it wasn&#039;t totally a bed of roses.&lt;br /&gt;&lt;br /&gt;This T500 system has this newfangled idea of having TWO video chips instead of just one. Let&#039;s call these two chips the &quot;Good one&quot; and the  &quot;Awesome one.&quot; Honestly, I don&#039;t ever, ever need the &quot;Awesome one.&quot; I don&#039;t play games, so I don&#039;t need &quot;awesomeness.&quot; &quot;Awesome graphics&quot; don&#039;t make my demos any faster, and honestly, that&#039;s all I care about for this machine.&lt;br /&gt;&lt;br /&gt;This newfangled idea of two chips sounds great, but for me it just wasn&#039;t working perfectly with my total re-install. Every time I closed the lid and re-opened it, it thought my laptop display was &quot;Display 2.&quot; All the stuff I was working on just disappeared.&lt;br /&gt;&lt;br /&gt;You could say: &quot;Well, Moskowitz, if you installed the drivers from Lenovo, you wouldn&#039;t be having this problem.&quot; Except, remember .. when I did install the drivers, that&#039;s exactly when the machine went into &quot;mega hang&quot; mode.&lt;br /&gt;&lt;br /&gt;So, I needed a Plan B.&lt;br /&gt;&lt;br /&gt;To fix this, I adjusted the T500&#039;s bios to say &quot;Kill the Awesome chip. Only let me use the Good  chip.&quot; And magically, all my troubles went away.&lt;br /&gt;&lt;br /&gt;I&#039;m sure, really, really sure, this is because I didn&#039;t choose to install Lenovo&#039;s &quot;mega driver&quot; or something for the secondary video driver chips.&lt;br /&gt;&lt;br /&gt;But I&#039;m okay with that. I honestly need my laptop to do EXACTLY two things: display on the panel when I want to, and display outward on the VGA port for projecting when I want to.&lt;br /&gt;&lt;br /&gt;Nothing fancy. So, no &quot;awesome chip settings with crazy drivers&quot; for me, thank you very much.&lt;br /&gt;&lt;br /&gt;So, how is my overall experience with Windows 7 compared to Windows Vista? Well, my biggest problem with Windows Vista was that it was slow. Yes, lots of people complained about it being slow, but I tried to take an empirical approach and learn WHY my experience with Vista was slow.&lt;br /&gt;&lt;br /&gt;For me, personally, I learned the &quot;slow culprit&quot; was the &quot;Windows Search&quot; service. On my previous laptop, the D620, where I tried to run Vista, every time I ran Filemon / Procmon, I could see it. Spinning it&#039;s wheels, doing it&#039;s thing -- ALL THE TIME and slowing me down.&lt;br /&gt;&lt;br /&gt;As for Windows 7, I&#039;m sad to say, that my initial experience is the same in this particular regard. Windows 7 still appears to (at least with my files) churn and churn and churn.&lt;br /&gt;&lt;br /&gt;Maybe I haven&#039;t given it a fair shake. It&#039;s true, I didn&#039;t let it &quot;settle in for three days&quot; before getting frustrated and turning it off. I do have 60GB of &quot;data&quot; for it to pour over. So, in fairness, I&#039;m going away for the next weekend, and I&#039;m planning on turning ON the search service BEFORE I LEAVE, and see what happens when I return.&lt;br /&gt;&lt;br /&gt;But for now, I have uninstalled the Windows 7 search feature, and you also (oddly) seem to need&lt;br /&gt;to DISABLE the search service to really kill it (according to my Procmon traces.)&lt;br /&gt;&lt;br /&gt;Here&#039;s the payoff though: Man, is this lappy fast! Right now, I&#039;m really happy with the speed. Applications pop. Demos snap. Everything is like a crisp clean spring morning. Between a new processor, new OS, the 64-bits, 8GB of RAM and a 7200 RPM HD, darn tootin&#039; this thing better fly.&lt;br /&gt;&lt;br /&gt;Here are some miscellaneous notes about my first 7 days, in no particular order:&lt;br /&gt;&lt;br /&gt;- I have a wacky wacky &quot;Cannon&quot; all-in-one printer, fax, scanner thing. And that driver was included in Windows 7. And, it even shows me the &quot;ink levels&quot; while printing; just like the driver I previously needed to download from Cannon then hand-install on XP. Neat.&lt;br /&gt;&lt;br /&gt;- I&#039;m pretty &quot;keyboard centric.&quot; So about 1000 times a day, I type the following key sequence when working on XP: Ctl-Esc, R, cmd, enter. In XP, this would open the Start menu, R would hit the Run command, and CMD would get me to a command prompt. Now on Win 7, the same sequence makes NOTHING happen, because (even though I&#039;ve put RUN back on the Start menu) there&#039;s no keyboard shortcut for &#039;R&#039;un. gRRRR.&lt;br /&gt;&lt;br /&gt;- I have ONE piece of hardware that, darn it, I cannot use, and man, I&#039;m disappointed. It&#039;s a phone system that&#039;s voice activated and hooks into Outlook. It just crashes every time it runs. Can&#039;t really get to the bottom of this. If anyone else has this device, it&#039;s called ArialPhone, and I&#039;d love to hear if it&#039;s working for anyone out there on Win 7 or even Vista.&lt;br /&gt;&lt;br /&gt;- I have two other Outlook plug-ins which worked great on XP, but won&#039;t do their magic on Windows 7. Oddly, two *OTHER* Outlook plug-ins are working swimmingly. So, I don&#039;t know where the problem is. Still hacking on this one.&lt;br /&gt;&lt;br /&gt;- The Beta for the App-V client 4.6 is out, and includes 64-bit support. Honestly, the thing seems ROCK SOLID to me, but my understanding is that it&#039;s planned to be Beta for a while before it goes gold. AppV Applications in cache seem to run WAY WAY faster than they did in AppV 4.5. It took me about an hour to convert all my existing 4.5 sequenced apps to 4.6.&lt;br /&gt;&lt;br /&gt;- My wife walked behind me to see what I was working on. And it was my Windows 7 desktop. She saw the huge, huge icons that Windows 7 defaults with and asked &quot;Are you in safe mode?&quot; I can totally see her confusion, as Windows 7, in my opinion, looks totally bizzare with those big honkin&#039; icons. The fix? While on the desktop, hold down Control and use the scroll wheel of your mouse to adjust. Kooky.&lt;br /&gt;&lt;br /&gt;- Lots of people seem to be all &quot;gaga&quot; about the new taskbar. Honestly, I don&#039;t love the &quot;mixed metaphor&quot; of applications running and applications&#039; icons all jumbled together. I&#039;ve reset it act a little more like XP did, and I&#039;m a little saner now.&lt;br /&gt;&lt;br /&gt;But, all around, 95% of my applications are working. Everything that&#039;s &quot;broken&quot; seems to be revolved around Outlook in some way. Everything else is working great. So, I&#039;m not sure if I can blame Windows or what here. Regardless, I&#039;ll get to the bottom of these and shake out my final bugs.&lt;br /&gt;&lt;br /&gt;But in short, my first week -- pretty solid after getting thru the bumps.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> First Look at Windows 7 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/first-look-at-windows-7</link>
        <pubDate>2009-08-13T00:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Part 1: My First 7 days with Windows 7
------------------------------------------------------

Let&amp;#39;s go right to the punchline: Overall; positive.

Okay, now let&amp;#39;s get to what&amp;#39;s great, what&amp;#39;s not and what&amp;#39;s just weird.

Actually, before we do that, let&amp;#39;s start off with my new hardware. If you know me, you know I love to do demos. I do demos left and right in my training courses, at WinConnections and TechEd, and other sundry events.

And, of course, I need to use ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Part 1: My First 7 days with Windows 7&lt;br /&gt;
------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Let&#039;s go right to the punchline: Overall; positive.&lt;br /&gt;
&lt;br /&gt;
Okay, now let&#039;s get to what&#039;s great, what&#039;s not and what&#039;s just weird.&lt;br /&gt;
&lt;br /&gt;
Actually, before we do that, let&#039;s start off with my new hardware. If you know me, you know I love to do demos. I do demos left and right in my training courses, at WinConnections and TechEd, and other sundry events.&lt;br /&gt;
&lt;br /&gt;
And, of course, I need to use a laptop lug around and do that. My laptop of choice has always been Dell. I&#039;ve been a Dell man, since, well, Dell Laptops had TRACKBALLS in them, and not touchpads.&lt;/p&gt;

&lt;p&gt;Yes, _that_ long.&lt;br /&gt;
&lt;br /&gt;
Now, for the first time ever I went Lenovo. Honestly, the new Dell E series just seemed too &quot;humongo&quot; for me. The whole package, including the power supply just looked too.. Bulky.&lt;br /&gt;
&lt;br /&gt;
Yep, that was my &quot;very technical reason&quot; for not getting another Dell. I&#039;m sure they&#039;re great inside, but their aesthetics (at least compared to my Dell D620) was not an improvement (to me, anyway.) So, I got a Lenovo T500. The name alone makes me feel like I&#039;m perpetually the star in my own personal Terminator film. I bought it cheap from the &quot;Lenovo outlet store.&quot; It has a T9600 Core2Duo processor on board, and I fitted it myself with (oh drool!) 8GB RAM and 500GB hard drive @ 7200RPM (killer!)&lt;br /&gt;
&lt;br /&gt;
Then I waited to get my hot little hands on Windows 7. I was in the beta program, so I got a &quot;free key&quot; to use when the beta ended.&lt;br /&gt;
&lt;br /&gt;
Last Thursday night, I installed Windows 7, 64-Bit edition on my new monster laptop.&lt;br /&gt;
&lt;br /&gt;
Before that, I had previously went to Lenovo&#039;s website and downloaded ANYTHING associated with the T500 + Vista. That is to say, since all Vista drivers are &quot;upward&quot; compatbile to Windows 7, having them &quot;at the ready&quot; seemed to be a good idea. I put them on an external USB disk.&lt;br /&gt;
&lt;br /&gt;
My first 24 hours wasn&#039;t great. I installed Windows 7. I took all the updates. Then I installed all the T500 / Vista drivers. I rebooted when necessary. Finally, when I installed the video driver software, Windows 7 just hung and hung and hung and hung at the &quot;Please wait&quot; page.&lt;br /&gt;
&lt;br /&gt;
Arrrgh. And this was AFTER I had already activated Windows 7 (Stupid, Stupid, Moskowitz.)&lt;br /&gt;
&lt;br /&gt;
Well, I knew I could boot to Safe Mode and hack and slash my way out of this. But the more I thought about it.. why was I installing drivers for something that was, well, working already?&lt;br /&gt;
&lt;br /&gt;
So I didn&#039;t.&lt;br /&gt;
&lt;br /&gt;
I re-formatted and re-installed Windows 7. In my experience, more manufacturer software equals slower and more unstable machine. Said another way, if I can &quot;get away with&quot; the drivers that are included as part of Windows 7, I should have a faster and more stable system overall ... instead of having to know exactly WHICH drivers and in WHAT ORDER I should be installing them.&lt;br /&gt;
&lt;br /&gt;
So that&#039;s what I did. I loaded Windows 7, I took all of Windows&#039; updates (it had several driver updates for my system.) There were two devices Windows didn&#039;t have &quot;built in drivers&quot; for, and I did, indeed, install those from the Lenovo website. And that was it. I was done.&lt;br /&gt;
&lt;br /&gt;
That being said, it wasn&#039;t totally a bed of roses.&lt;br /&gt;
&lt;br /&gt;
This T500 system has this newfangled idea of having TWO video chips instead of just one. Let&#039;s call these two chips the &quot;Good one&quot; and the &quot;Awesome one.&quot; Honestly, I don&#039;t ever, ever need the &quot;Awesome one.&quot; I don&#039;t play games, so I don&#039;t need &quot;awesomeness.&quot; &quot;Awesome graphics&quot; don&#039;t make my demos any faster, and honestly, that&#039;s all I care about for this machine.&lt;br /&gt;
&lt;br /&gt;
This newfangled idea of two chips sounds great, but for me it just wasn&#039;t working perfectly with my total re-install. Every time I closed the lid and re-opened it, it thought my laptop display was &quot;Display 2.&quot; All the stuff I was working on just disappeared.&lt;br /&gt;
&lt;br /&gt;
You could say: &quot;Well, Moskowitz, if you installed the drivers from Lenovo, you wouldn&#039;t be having this problem.&quot; Except, remember .. when I did install the drivers, that&#039;s exactly when the machine went into &quot;mega hang&quot; mode.&lt;br /&gt;
&lt;br /&gt;
So, I needed a Plan B.&lt;br /&gt;
&lt;br /&gt;
To fix this, I adjusted the T500&#039;s bios to say &quot;Kill the Awesome chip. Only let me use the Good chip.&quot; And magically, all my troubles went away.&lt;br /&gt;
&lt;br /&gt;
I&#039;m sure, really, really sure, this is because I didn&#039;t choose to install Lenovo&#039;s &quot;mega video driver&quot; or something for the secondary video driver chips.&lt;br /&gt;
&lt;br /&gt;
But I&#039;m okay with that. I honestly need my laptop to do EXACTLY two things: display on the panel when I want to, and display outward on the VGA port for projecting when I want to.&lt;br /&gt;
&lt;br /&gt;
Nothing fancy. So, no &quot;awesome chip settings with crazy drivers&quot; for me, thank you very much.&lt;br /&gt;
&lt;br /&gt;
So, how is my overall experience with Windows 7 compared to Windows Vista? Well, my biggest problem with Windows Vista was that it was slow. Yes, lots of people complained about it being slow, but I tried to take an empirical approach and learn WHY my experience with Vista was slow.&lt;br /&gt;
&lt;br /&gt;
For me, personally, I learned the &quot;slow culprit&quot; was the &quot;Windows Search&quot; service. On my previous laptop, the D620, where I tried to run Vista, every time I ran Filemon / Procmon, I could see it. Spinning it&#039;s wheels, doing it&#039;s thing -- ALL THE TIME and slowing me down.&lt;br /&gt;
&lt;br /&gt;
As for Windows 7, I&#039;m sad to say, that my initial experience is the same in this particular regard. Windows 7 still appears to (at least with my files) churn and churn and churn.&lt;br /&gt;
&lt;br /&gt;
Maybe I haven&#039;t given it a fair shake. It&#039;s true, I didn&#039;t let it &quot;settle in for three days&quot; before getting frustrated and turning it off. I do have 60GB of &quot;data&quot; for it to pour over. So, in fairness, I&#039;m going away next weekend, and I&#039;m planning on turning ON the search service BEFORE I LEAVE, and see what happens when I return.&lt;br /&gt;
&lt;br /&gt;
But for now, I have uninstalled the Windows 7 search feature, and you also (oddly) seem to need&lt;br /&gt;
to DISABLE the search service to really kill it (according to my Procmon traces.)&lt;br /&gt;
&lt;br /&gt;
Here&#039;s the payoff though: Man, is this lappy fast! Right now, I&#039;m really happy with the speed. Applications pop. Demos snap. Everything is like a crisp clean spring morning. Between a new processor, new OS, the 64-bits, 8GB of RAM and a 7200 RPM HD, darn tootin&#039; this thing better fly.&lt;br /&gt;
&lt;br /&gt;
Here are some miscellaneous notes about my first 7 days, in no particular order:&lt;br /&gt;
&lt;br /&gt;
- I have a wacky wacky &quot;Cannon&quot; all-in-one printer, fax, scanner thing. And that driver was included in Windows 7. And, it even shows me the &quot;ink levels&quot; while printing; just like the driver I previously needed to download from Cannon then hand-install on XP. Neat.&lt;br /&gt;
&lt;br /&gt;
- I&#039;m pretty &quot;keyboard centric.&quot; So about 1000 times a day, I type the following key sequence when working on XP: Ctl-Esc, R, cmd, enter. In XP, this would open the Start menu, R would hit the Run command, and CMD would get me to a command prompt. Now on Win 7, the same sequence makes NOTHING happen, because (even though I&#039;ve put RUN back on the Start menu) there&#039;s no keyboard shortcut for &#039;R&#039;un. gRRRR.&lt;br /&gt;
&lt;br /&gt;
- I have ONE piece of hardware that, darn it, I cannot use, and man, I&#039;m disappointed. It&#039;s a USB-connected phone system that&#039;s voice activated and hooks into Outlook. It just crashes every time it runs. Just flat out crashes. Can&#039;t really get to the bottom of this. If anyone else has this device, it&#039;s called ArialPhone, and I&#039;d love to hear if it&#039;s working for anyone out there on Win 7 or even Vista. (PS: Even &quot;XP compatibility mode&quot; likely won&#039;t get me out of this one; unless I want to run a copy of Outlook *INSIDE* that fake XP machine, which I don&#039;t.)&lt;br /&gt;
&lt;br /&gt;
- I have two other Outlook plug-ins which worked great on XP, but won&#039;t do their magic on Windows 7. Oddly, two *OTHER* Outlook plug-ins are working swimmingly. So, I don&#039;t know where the problem is. Still hacking on this one.&lt;br /&gt;
&lt;br /&gt;
- The Beta for the App-V client 4.6 is out, and includes 64-bit support. Honestly, the thing seems ROCK SOLID to me, but my understanding is that it&#039;s planned to be Beta for a while before it goes gold. AppV Applications in cache seem to run WAY WAY faster than they did in AppV 4.5. It took me about an hour to convert all my existing 4.5 sequenced apps to 4.6.&lt;br /&gt;
&lt;br /&gt;
- My wife walked behind me to see what I was working on. And it was my Windows 7 desktop. She saw the huge, huge icons that Windows 7 defaults with and asked &quot;Are you in safe mode?&quot; I can totally see her confusion, as Windows 7, in my opinion, looks totally bizzare with those big honkin&#039; icons. The fix? While on the desktop, hold down Control and use the scroll wheel of your mouse to adjust. Kooky.&lt;br /&gt;
&lt;br /&gt;
- Lots of people seem to be all &quot;gaga&quot; about the new taskbar. Honestly, I don&#039;t love the &quot;mixed metaphor&quot; of applications running and applications&#039; icons all jumbled together. I&#039;ve reset it act a little more like XP did, and I&#039;m a little saner now.&lt;br /&gt;
&lt;br /&gt;
But, all around, 95% of my applications are working. Everything that&#039;s &quot;broken&quot; seems to be revolved around Outlook in some way. Everything else is working great. So, I&#039;m not sure if I can blame Windows or what here. Regardless, I&#039;ll get to the bottom of these and shake out my final bugs.&lt;br /&gt;
&lt;br /&gt;
But in short, my first week -- pretty solid after getting thru the bumps. I do have that &quot;last mile&quot; to push through, and I&#039;ll keep you posted as things progress.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Policy vs Preference </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/policy-vs-preference</link>
        <pubDate>2009-07-30T01:25:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team: I had this email exchange with a friend of mine the other day.

The email title was: &amp;quot;Policy vs. Preference (I don&amp;#39;t get it.)&amp;quot;

I thought you&amp;#39;d like it. Read all the way thru to the end for how to get more information TOMORROW, Friday at 12.00 PM EST.

[Note, we&amp;#39;re having some login issues to the GPanswers.com web accounts. Sorry if you&amp;#39;re affected right now; we&amp;#39;re working to fix it... Thanks.]

--

Jeremy...

OK I&amp;#39;m having serious brain &amp;#39;p ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team: I had this email exchange with a friend of mine the other day.&lt;br /&gt;
&lt;br /&gt;
The email title was: &quot;Policy vs. Preference (I don&#039;t get it.)&quot;&lt;br /&gt;
&lt;br /&gt;
I thought you&#039;d like it. Read all the way thru to the end for how to get more information TOMORROW, Friday at 12.00 PM EST.&lt;br /&gt;
&lt;br /&gt;
[Note, we&#039;re having some login issues to the GPanswers.com web accounts. Sorry if you&#039;re affected right now; we&#039;re working to fix it... Thanks.]&lt;/p&gt;

&lt;p&gt;--&lt;br /&gt;
&lt;br /&gt;
Jeremy...&lt;br /&gt;
&lt;br /&gt;
OK I&#039;m having serious brain &#039;problem.&#039; What, really, is the difference between an unmanaged policy setting and a preference (GPPreferences-style)?&lt;br /&gt;
&lt;br /&gt;
I CAN remember, at this late hour, that managed policy settings are in the Policies key of the registry. Seems to me that unmanaged policy settings (which equate to settings that can tattoo, right?) are elsewhere, yeah? So what makes them different than changes made by Preferences?&lt;br /&gt;
&lt;br /&gt;
I am just trying to hone my use of terminology and make my boss understand &quot;Policy&quot; vs &quot;Preference&quot; vs &quot;PolicyPak&quot;. THANKS!!!!&lt;br /&gt;
&lt;br /&gt;
Okay Frank.. So.. I&#039;m sure there&#039;s some &quot;complete and proper definition&quot; somewhere at Microsoft about what a Policy is vs. a Preference.&lt;br /&gt;
&lt;br /&gt;
But when I talk with people about &quot;Policy&quot; Vs. &quot;Preference&quot; here&#039;s the litmus-test I use to determine &quot;which is which.&quot;&lt;br /&gt;
&lt;br /&gt;
I define policy as &quot;three things&quot;... that is, these three things need to be TRUE for you to be able to call it a &quot;True Policy.&quot; A policy means that the setting:&lt;br /&gt;
&lt;br /&gt;
1. Properly goes to the &quot;Policies&quot; keys in the registry (one of only FOUR sanctioned locations)&lt;br /&gt;
&lt;br /&gt;
and&lt;br /&gt;
&lt;br /&gt;
2. UI lockout occurs such that users cannot scoot around it&lt;br /&gt;
&lt;br /&gt;
and&lt;br /&gt;
&lt;br /&gt;
3. UI lockout / setting reverts when GPO falls &quot;out of scope&quot; (ie: You whack the GPO.)&lt;br /&gt;
&lt;br /&gt;
So, &quot;Prohibit Access to the Control Panel&quot; is a true POLICY. It meets these three criteria.&lt;br /&gt;
&lt;br /&gt;
If you crack open the ADM/X, you&#039;ll see that the registry punch goes to the Policies keys... and once set, users cannot scoot around it.&lt;br /&gt;
&lt;br /&gt;
A Preference is EVERYTHING ELSE.&lt;br /&gt;
&lt;br /&gt;
So.. some criteria to check if it&#039;s a Preference would be:&lt;br /&gt;
&lt;br /&gt;
1. Does it store its keys anywhere in the registry? (ie: OUTSIDE the 4 proper Policies keys?)&lt;br /&gt;
&lt;br /&gt;
and&lt;br /&gt;
&lt;br /&gt;
2. Does it still permit a user to manipulate the UI? (ie: No UI lockout?)&lt;br /&gt;
&lt;br /&gt;
So, 99% of hand-created ADM or ADMX templates and a large percentage of GP Prefs items are just that.. Preferences. (Note that many GP Preferences items have a scope which are NOT the registry. For instance, &quot;Local users and groups&quot; deals with the local SAM and NOT the registry. Others, deal with services. But for the purposes of this discussions, I think you&#039;re asking about REGISTRY items, and many of the GP Preferences items are, indeed, registry focused.)&lt;br /&gt;
&lt;br /&gt;
So, let&#039;s examine the GP Preferences &quot;Internet Explorer Settings.&quot; They&#039;re Preferences.&lt;br /&gt;
&lt;br /&gt;
Why? Because... once a user gets the settings...&lt;br /&gt;
&lt;br /&gt;
Test #1: The keys aren&#039;t contained in the &quot;Policies&quot; keys&lt;br /&gt;
Test #2: Users can scoot around and change the values to whatever they want&lt;br /&gt;
Test #3: If you whack the GPO with a preference, what happens? It &quot;tattoos&quot; or &quot;leaves behind&quot; the settings you set.&lt;br /&gt;
&lt;br /&gt;
Do note, if you whack the GPO with a GP Preference, on some items there is an extra flag which is called &quot;Remove when no longer applies&quot; which will DELETE THE VALUE (not REVERT the value). Which, could be harmful to your application. Ouch.&lt;br /&gt;
&lt;br /&gt;
So, where does PolicyPak fit in?&lt;br /&gt;
&lt;br /&gt;
In contrast.. POLICYPAK will &quot;bridge the gap&quot; when it comes to Registry punches and settings Applications&#039; settings.&lt;br /&gt;
&lt;br /&gt;
The free PolicyPak Community edition is able to:&lt;br /&gt;
&lt;br /&gt;
1. Write keys anywhere in the registry&lt;br /&gt;
&lt;br /&gt;
while&lt;br /&gt;
&lt;br /&gt;
2. Performing UI lockout&lt;br /&gt;
&lt;br /&gt;
and magically&lt;br /&gt;
&lt;br /&gt;
3. Reverting to the value you want when no longer applies (not totally deleting the value!)&lt;br /&gt;
&lt;br /&gt;
PS: There&#039;s a guide which I wrote to help clear up a lot of these questions. Let me know what you think:&lt;br /&gt;
&lt;a href=&quot;https://www.policypak.com/solutions/why-group-policy-admins-need-policypak.html&quot; target=&quot;_blank&quot;&gt;https://www.policypak.com/solutions/why-group-policy-admins-need-policypak.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Backing up (even quicker) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/backing-up-even-quicker</link>
        <pubDate>2009-07-16T01:21:47+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Quick update #1: About the &quot;backing up GPOs&quot; stuff we talked about this week... ------------------------------------------------------------------------------------------------------------------- I forgot all about Darren Mar-Elia&#039;s PowerShell cmd-lets (free!) If you don&#039;t want to wait for Win 7 but want to use Powershell to manage GPOs now, head on over to http://www.sdmsoftware.com/freeware and get their free Powershell GPMC cmdlets. To backup up all GPOs in a domain using the SDM Powershell c ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Quick update #1: About the &quot;backing up GPOs&quot; stuff we talked about this week... &lt;br /&gt;------------------------------------------------------------------------------------------------------------------- &lt;br /&gt;&lt;br /&gt;I forgot all about Darren Mar-Elia&#039;s PowerShell cmd-lets (free!) &lt;br /&gt;&lt;br /&gt;If you don&#039;t want to wait for Win 7 but want to use Powershell to manage GPOs now, head on over to &lt;a href=&quot;http://www.sdmsoftware.com/freeware&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;span style=&quot;color: #0000ff;&quot;&gt;http://www.sdmsoftware.com/freeware&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; and get their free Powershell GPMC cmdlets. &lt;br /&gt;&lt;br /&gt;To backup up all GPOs in a domain using the SDM Powershell cmdlets, just use: &lt;br /&gt;&lt;br /&gt;Get-sdmgpo * | export-sdmgpo -location c:gpbackups &lt;br /&gt;&lt;br /&gt;Neat !&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Automating your backups.... </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/automating-your-backups</link>
        <pubDate>2009-07-13T01:20:41+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Team: Last week, we talked about backing up your GPOs, and how you should be, ya know, &quot;just doing it.&quot; Then I got some emails asking me about &quot;automating that backup.&quot; Turns out.. that&#039;s easy too! Here&#039;s two ways (I&#039;m sure there are more.) Way #1: VB-scripts via the GPMC scripts The older GPMC had built-in scripts. The newer GPMCs require that you download the sample scripts. These are great and super helpful and can be found here: http://tinyurl.com/gpscripts You can see examples of using the  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Team: &lt;br /&gt;&lt;br /&gt;Last week, we talked about backing up your GPOs, and how you should be, ya know, &quot;just doing it.&quot; &lt;br /&gt;&lt;br /&gt;Then I got some emails asking me about &quot;automating that backup.&quot; &lt;br /&gt;&lt;br /&gt;Turns out.. that&#039;s easy too! Here&#039;s two ways (I&#039;m sure there are more.) &lt;br /&gt;&lt;br /&gt;Way #1: VB-scripts via the GPMC scripts &lt;br /&gt;The older GPMC had built-in scripts. The newer GPMCs require that you download the sample scripts. These are great and super helpful and can be found here: &lt;a href=&quot;http://tinyurl.com/gpscripts&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;span style=&quot;color: #0000ff;&quot;&gt;http://tinyurl.com/gpscripts &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;You can see examples of using the scripts if you head over here: &lt;br /&gt;&lt;a href=&quot;http://msdn.microsoft.com/en-us/library/aa814151(VS.85).aspx&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;span style=&quot;color: #0000ff;&quot;&gt;http://msdn.microsoft.com/en-us/library/aa814151(VS.85).aspx &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The script you want to play with is called &quot;BackupAllGPOs.vbs.&quot; &lt;br /&gt;&lt;br /&gt;It&#039;s easy as pie. Or punch. Or something that&#039;s easy. &lt;br /&gt;&lt;br /&gt;Way #2: If you&#039;re a Powershell geek / geekette &lt;br /&gt;The newest GPMC with Win7 and WS08/R2 supports lots of SIMILAR constructs (create GPOs, backup, restore, etc), but now you can ALSO use PowerShell. So, to &quot;get&quot; the GP-related commands into Powershell, I typed &lt;br /&gt;&lt;br /&gt;&quot;Import-Module grouppolicy -verbose&quot; &lt;br /&gt;&lt;br /&gt;then I was able to run this quick command &lt;br /&gt;&lt;br /&gt;&quot;backup-gpo -all -path c:SavedGPOs&quot; &lt;br /&gt;&lt;br /&gt;And, blammo. Instant backup of my GP-world. &lt;br /&gt;&lt;br /&gt;There&#039;s more to the command, of course; but that&#039;s its simplest use. &lt;br /&gt;&lt;br /&gt;Again, easy as falling off a log... if you know the secrets.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> What to do if someone in your company is downsized... </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-to-do-if-someone-in-your-company-is-downsized</link>
        <pubDate>2008-12-02T03:42:18+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I helped give some advice recently to SearchWinIT about what to do if someone is downsized. In other words, YOU&#039;RE in IT, and you need to act to help keep the company going. Read about it here. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I helped give some advice recently to SearchWinIT about what to do if someone is downsized. In other words, YOU&#039;RE in IT, and you need to act to help keep the company going. Read about it &lt;a href=&quot;http://searchwinit.techtarget.com/news/article/0,289142,sid1_gci1340200,00.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> DNS is LIFE </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/dns-is-life</link>
        <pubDate>2008-12-02T02:00:59+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Why isn&#039;t Group Policy Working on this client? Did You Check the DNS Configuration of the Client? --------------------------------------------------- One of the most frequently encountered problems with Windows 2000 and above is that things just &#039;stop working&#039; when DNS gets out of whack. Specifically, if you&#039;re not seeing Group Policy apply to your client machines, make sure their DNS client is pointing to a Domain Controller or other authoritative source for the domain. If it&#039;s pointing to the  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Why isn&#039;t Group Policy Working on this client? &lt;br /&gt;Did You Check the DNS Configuration of the Client? &lt;br /&gt;--------------------------------------------------- &lt;br /&gt;&lt;br /&gt;One of the most frequently encountered problems with Windows 2000 and above is that things just &#039;stop working&#039; when DNS gets out of whack. Specifically, if you&#039;re not seeing Group Policy apply to your client machines, make sure their DNS client is pointing to a Domain Controller or other authoritative source for the domain. If it&#039;s pointing to the wrong place or not pointing anywhere, Group Policy will simply not be downloaded. &lt;br /&gt;&lt;br /&gt;As a colleague of mine likes to say, &#039;Healthy DNS equals a healthy Active Directory.&#039; &lt;br /&gt;&lt;br /&gt;Moreover, in the age of Windows 2003/2008 with its multiple forests with cross-forest trusts, Group Policy could be applying from just about anywhere and everywhere. It&#039;s more important than ever to verify that all DNS server pointers are designed properly and working as they should. For instance, if clients cannot access their &#039;home&#039; Domain Controllers while leveraging a cross-forest trust, they won&#039;t get Group Policy. &lt;br /&gt;&lt;br /&gt;Finally, to put a fine point on it, DNS leverages only the fully qualified name. It&#039;s not enough to verify that you can resolve a computer named xppro1 as opposed to xppro1.corp.com. The first is actually the NetBIOS name and not the fully qualified domain name. The second is the fully qualified domain name. If you find yourself in a DNS resolution situation where resolving the NetBIOS name will work, but the fully qualified name will not work, then you have a DNS problem that needs to be addressed.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> IE 8? Meet GP. </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/ie-8-meet-gp</link>
        <pubDate>2008-10-07T18:06:46+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Oh my.
http://blogs.technet.com/askds/archive/2008/10/06/ie8-group-policy.aspx  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Oh my.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://blogs.technet.com/askds/archive/2008/10/06/ie8-group-policy.aspx &quot;&gt;http://blogs.technet.com/askds/archive/2008/10/06/ie8-group-policy.aspx &lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> More freeness awesomeness -- WinInstall LE </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/more-freeness-awesomeness-wininstall-le</link>
        <pubDate>2008-08-05T15:09:43+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Remember the good ol&#039; days? When right on the Windows CD-ROM was a great little free MSI repackaging tool called WinInstall LE?
Well, then it just went away.
A lot happened since then. WinInstall broke free, and became their own company. Then they were bought out by Attachmate. Then finally sold to Scalable software.
And look what happened? It&#039;s free again! So, if you&#039;re looking for a great little MSI repackaging tool (totally free) check it out here.
Oh yeah, and they mention me in the pres ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Remember the good ol&#039; days? When right on the Windows CD-ROM was a great little free MSI repackaging tool called WinInstall LE?&lt;/p&gt;
&lt;p&gt;Well, then it just went away.&lt;/p&gt;
&lt;p&gt;A lot happened since then. WinInstall broke free, and became their own company. Then they were bought out by Attachmate. Then finally sold to Scalable software.&lt;/p&gt;
&lt;p&gt;And look what happened? It&#039;s free again! So, if you&#039;re looking for a great little MSI repackaging tool (totally free) check it out &lt;a href=&quot;http://www.itbcomputing.com/pr/21561&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Oh yeah, and they mention me in the press quote. Because, you know I like free stuff!&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> The Best things in life are Free ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-best-things-in-life-are-free</link>
        <pubDate>2008-07-21T17:44:08+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ It&#039;s true. And this article has my opinion all about it. Thanks GP team, for making the best things in life -- all free! Check it out here.
  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;It&#039;s true. And this article has my opinion all about it. Thanks GP team, for making the best things in life -- all free! &lt;a href=&quot;http://www.csoonline.com/article/437739/Cheap_IT_Security_The_Tools_Were_There_All_Along?page=1 &quot;&gt;Check it out here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#28 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue28</link>
        <pubDate>2008-05-14T23:23:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ 
	Policy or Preference: Who wins the smackdown?
	Announcing: Downloadable eChapters of Jeremy&amp;#39;s two new upcoming books!
	Kansas City Class: ON! Will you be there?


Welcome to Newsletter #28.

One of the questions I get all the time is: &amp;quot;Which one &amp;#39;wins&amp;#39; if a Policy and a Preference overlap?&amp;quot;

Think you know the answer? I thought I did too; so let&amp;#39;s see how that shakes out. Next,

I&amp;#39;m happy to announce my two new upcoming books on Group Policy.


	Gro ]]>
        </description>
        <content:encoded>
            &lt;ul&gt;
	&lt;li&gt;Policy or Preference: Who wins the smackdown?&lt;/li&gt;
	&lt;li&gt;Announcing: Downloadable eChapters of Jeremy&#039;s two new upcoming books!&lt;/li&gt;
	&lt;li&gt;Kansas City Class: ON! Will you be there?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Welcome to Newsletter #28.&lt;/p&gt;

&lt;p&gt;One of the questions I get all the time is: &quot;Which one &#039;wins&#039; if a Policy and a Preference overlap?&quot;&lt;/p&gt;

&lt;p&gt;Think you know the answer? I thought I did too; so let&#039;s see how that shakes out. Next,&lt;/p&gt;

&lt;p&gt;I&#039;m happy to announce my two new upcoming books on Group Policy.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Group Policy Fundamentals, Security, and Troubleshooting&lt;/li&gt;
	&lt;li&gt;Creating the Secure Managed Desktop: Group Policy, SoftGrid, and Microsoft Deployment and Management Tools&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Right now, you can zip on over to www.GPanswers.com/books and learn about them, or a little later in the newsletter I&#039;ll give you the full rundown of the two books, what&#039;s new, and tell you why I had to expand it into two books!&lt;/p&gt;

&lt;p&gt;I&#039;m also super excited to announce our new Partner/Affiliate. Sign up, and everyone you recommend for a GPanswers.com training (or newsletter signup) means some extra dough in your pocket. More, later in the newsletter.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;This Month&#039;s Newsletter Sponsored by: NetIQ&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Are you stepping on other administrator&#039;s toes when managing Group Policy? It happens a lot, but there are some strategies to help you address that. In this new whitepaper, &quot;Group Policy Management Challenges&quot; authored by Group Policy guru Jeremy Moskowitz and NetIQ you&#039;ll learn some immediate techniques to get working better today.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.netiq.com/f/form/form.asp?id=3204&amp;origin=NS_GPAnswers_040308&quot;&gt;Download it now&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Getting Down to Business: Policy vs. Preferences&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft has a Group Policy blog entry called &quot;GP Policy vs. Preference vs. GP preferences&quot; which you should all stop and read right now. Really. I&#039;ll wait. I know you&#039;ll come back, because there&#039;s a lot more to learn on this subject. Check it out here. &lt;a href=&quot;http://tinyurl.com/339wgx&quot;&gt;http://tinyurl.com/339wgx&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And while I really dug that blog entry, and it was really well written and smart, there are some other angles to that Policy vs. Preferences story. And that&#039;s what I want to cover here.&lt;/p&gt;

&lt;p&gt;How, exactly does the Group Policy engine deal with overlaps between policies and preferences? Well, theres the short answer, the middle-length answer, and the long answer. Lets go over all of them. (Were old friends nowyou knew I would anyway, right?)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Short Answer: Policy Wins over Preferences&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The short answer is that if theres a conflict between a policy setting and a preference setting, the policy setting will win. (So, for instance, items in Computer and User Configuration | Policies should always win over Computer or User Configuration | Preferences.)&lt;/p&gt;

&lt;p&gt;Why?&lt;/p&gt;

&lt;p&gt;Because only policies actually lock out the user interface of the application they manage (Explorer, Office 2003, etc.).&lt;/p&gt;

&lt;p&gt;Preferences don&#039;t.&lt;/p&gt;

&lt;p&gt;Remember, preferences are suggestions that you can give to the users application, but the user can usually just wipe them out if they want. (Although, GPPEs will re-apply again at policy refresh time by default.)&lt;/p&gt;

&lt;p&gt;Here&#039;s a quick example to prove the point. In the example in Figure 1, Im clicking Help to ensure that the Help menu is on the Start Menu for all Windows Vista machines using GPPEs. True, this is the default anyway, but by selecting it here, Im laying down a preference that is always put on the machine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Figure 1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n28-1.jpg&quot; style=&quot;height:545px; width:415px&quot; /&gt; However, if I use the policy setting User Configuration | Policies | Administrative Templates | Start Menu and Taskbar | Remove Help menu from Start Menu, as seen in Figure 2, the Help option disappears in the Windows Vista Start Menu.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Figure 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n28-2.jpg&quot; style=&quot;height:293px; width:406px&quot; /&gt; But the general case here is that policies always beat preferences. Rock always beats scissors. Or does it? Can the rock crumble when its hit by the scissors? Lets continue onward to see at least one interesting case where it doesnt work that way.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Middle-Length Answer: Sometimes Preferences Win over Policy&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You need to be careful to assume that policy always wins over preference. In fact, thats not always true. Heres an example we can use to prove it:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Create a single GPO and link it to a Windows Vista or Windows Server 2008 machine that uses the Internet Settings preference extension to set the Internet Explorer 7 proxy server to 10.1.1.1 with port 8080. You can see a shot of this in
	&lt;p&gt;&lt;strong&gt;Figure 3&lt;/strong&gt;&lt;/p&gt;
	&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n28-3.jpg&quot; style=&quot;height:494px; width:420px&quot; /&gt;&lt;/li&gt;
	&lt;li&gt;Then, use Group Policys Internet Explorer Maintenance to set the proxy to 10.2.2.2 with a port of 8282. You can see a shot of this in
	&lt;p&gt;&lt;strong&gt;Figure 4&lt;/strong&gt;&lt;/p&gt;
	&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n28-4.jpg&quot; style=&quot;width:425px&quot; /&gt; &lt;em&gt; Click on image for larger view &lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;Then, refresh your client via GPupdate and fire up Internet Explorer 7.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Uh oh. This seems to break the laws of nature! How can preferences win over policy? Because Internet Explorer Maintenance policy isnt really policy. Indeed, by setting the IE Home page using Internet Explorer Maintenance, the value goes to HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings in a value called ProxyServer, as seen in Figure 5. And since this is not a place for a true policy, it must actually be a preference.&lt;/p&gt;

&lt;p&gt;Figure 5&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n28-5.jpg&quot; style=&quot;width:451px&quot; /&gt; Click on image for larger view&lt;/p&gt;

&lt;p&gt;Indeed, the value thats being set is exactly the same for both the IE Group Policy Preference and Internet Explorer Maintenance.&lt;/p&gt;

&lt;p&gt;Why does one win over the other? Ill show you the nuances of why in the next section.&lt;/p&gt;

&lt;p&gt;But for now, it turns out there is a clever way to attain our goal; which is to force an IE proxy server and lock it down so users cannot change it.&lt;/p&gt;

&lt;p&gt;Check out an obscure Administrative Templates policy setting named Disable changing proxy settings (located in User Configuration | Policies | Administrative Templates | Windows Components | Internet Explorer). A-ha! Thats true policy, so hopefully that will perform some kind of lockdown, as shown in Figure 6!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Figure 6&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n28-6.jpg&quot; style=&quot;height:435px; width:389px&quot; /&gt;But why then does that Administrative Templates setting named Disable changing proxy server settings work in a way the other guys dont? Because IE 7.0 (and 6.0 and 5.0) are all coded to look in the proper policies keys. And if theres a value there that IE recognizes, then IE makes sure to honor that.&lt;/p&gt;

&lt;p&gt;And it does.&lt;/p&gt;

&lt;p&gt;The end result is that true policy wins. You can see this in Figure 7 where the proxy server entrys values are taken from the preferences, but its locked down via the policy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Figure 7&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n28-7.jpg&quot; style=&quot;height:519px; width:418px&quot; /&gt; For most people, the medium-length answer will be good-enough. But youre not most people. Youre looking for the most detailed knowledge you can get. So if youre curious to know why the Internet Explorer GPPE won against the Internet Explorer Maintenance Group Policy settings, read on for The Longer Answer.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Longer Answer: Understanding CSE Timing and Overlap&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To get to the bottom of this mystery, we need to understand when Group Policy applies. Recall that the Group Policy system is a last-written-wins technology. So, if you have an overlap between, say, the domain level and the OU level, the default is that the OU level will win because it was written last.&lt;/p&gt;

&lt;p&gt;But now things become markedly more confusing. Not only is there overlap between Active Directory levels (site, domain, OU) for some of the features above, theres overlap at the feature level, where two or three CSEs compete to write their data last.&lt;/p&gt;

&lt;p&gt;Ow.&lt;/p&gt;

&lt;p&gt;There is some order in this chaos. But to understand it youll need an intimate understanding of what happens when the CSEs process (in the foreground and in the background). In short, the CSEs process in the order seen in Figure 8. This is a script you can download from &lt;a href=&quot;http://tinyurl.com/23xfz3&quot;&gt;http://tinyurl.com/23xfz3&lt;/a&gt; called FindGPOsByPolicyExtension.wsf.&lt;/p&gt;

&lt;p&gt;This exposes the same information as if you went to the following Registry key on a machine with the GPPE extensions loaded: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions.&lt;/p&gt;

&lt;p&gt;There, youll see the registrations for all CSEs. The GUID of each CSE dictates the order in which things will process. Theyll process alphabetically, by GUID. So, Wireless Group Policy fires off first (thats a classic Group Policy setting), then Group Policy Environment (thats a new GPPE CSE), then Group Policy Local Users and Groups (another new GPPE CSE), then Folder Redirection (a classic Group Policy CSE), and so on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Figure 8&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n28-8a.GIF&quot; style=&quot;width:451px&quot; /&gt; Click on image for larger view&lt;/p&gt;

&lt;p&gt;So on the surface, it appears that if you had a conflict with both classic Group Policy settings and newer GPPE settings, you could just see which one ran last and bank on that setting always winning.&lt;/p&gt;

&lt;p&gt;But thats only true if the two CSEs end up writing to the exact same places. While this is precisely what we encountered with the Internet Proxy server setting, usually two technologies dont write to exactly the same place. The tie will be broken when an application is coded to look in the proper policies keys. And, if theres a policy setting in those keys, the target application will honor the policy, not the preference.&lt;/p&gt;

&lt;p&gt;In our mystery, its now easy to understand why the Internet Explorer GPPEs (listed as Group Policy Internet Settings) in Figure 8 won over the IE Maintenance settings (listed as Internet Explorer Zonemapping and Internet Explorer Branding). The new Internet Explorer GPPE CSE (Group Policy Internet Settings) applies after the original Internet Explorer CSEs.&lt;/p&gt;

&lt;p&gt;But in neither case are we actually applying policy. Were really just applying preferencesusing two different kinds of technology. We finally got it to work the way we wanted when a true policy was applied, and Internet Explorer saw the policy in the policies keys and acted accordingly.&lt;/p&gt;

&lt;p&gt;Whew. All this stuff can give you a headache. This who will win stuff is really confusing, and I havent tested every case. Be sure to test all interactions in a test lab before you roll out settings into production.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Other Items That Can Affect Group Policy and GPPE Processing&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you download &lt;a href=&quot;https://www.gpanswers.com/books/&quot;&gt;Chapter 4 of Book 1&lt;/a&gt; , you will learn about various policy settings found at Computer Configuration | Policies | Administrative Templates | System | Group Policy that have the configuration option to Process Even If the Group Policy Objects Have Not Changed. (It&#039;s in the section called Using Group Policy to Affect Group Policy.)&lt;/p&gt;

&lt;p&gt;If this option is turned on for a particular CSE, then that CSE will always try to rewrite its configuration dataupon every single refresh. Again, thats not the default for classic Group Policy, but it is an option on a CSE-by-CSE basis.&lt;/p&gt;

&lt;p&gt;However, this same always try to rewrite configuration data mantra is held by the GPPE CSEs &lt;em&gt;by default&lt;/em&gt;, but it can also be set such that the data is laid down once and never rewritten.&lt;/p&gt;

&lt;p&gt;So knowing this information, you might have to do a little mental math to figure out which one is going to win if you have conflicting policies &lt;em&gt;plus&lt;/em&gt; the wildcard settings.&lt;/p&gt;

&lt;p&gt;The Group Policy Results reports, which is discussed in &lt;a href=&quot;https://www.gpanswers.com/books/&quot;&gt;Chapter 2 of Book 1&lt;/a&gt;, are going to be helpful in figuring out &lt;em&gt;which&lt;/em&gt; settings ultimately applied, but theyre not going to be helpful in your understanding of &lt;em&gt;why&lt;/em&gt; the setting ultimately applied.&lt;/p&gt;

&lt;p&gt;Hopefully, this newsletter helps you out. This section is lightly lifted from &lt;a href=&quot;https://www.gpanswers.com/books/&quot;&gt;Chapter 10 of Book 1&lt;/a&gt; where I discuss this topic in even more depth.&lt;/p&gt;

&lt;p&gt;If you want to conquer Group Policy Preference Extensions, consider taking my Group Policy 2.0 Training at &lt;a href=&quot;https://www.gpanswers.com/workshop&quot;&gt;www.GPanswers.com/workshop&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OMG: Now Jeremy has Two Books on Group Policy!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;ve been in deep, deep quarantine the last 9 months or so. I spent three quarters of a year to get the most awesome tips, tricks, how-tos, and deep-dive information on Group Policy to you. And it took two books to do it. So, let me explain how the two books work.&lt;/p&gt;

&lt;p&gt;The books are Companion Books to each other. Not exactly &quot;Volume I/Volume II.&quot; But, they do go together like peanut butter and jelly.&lt;/p&gt;

&lt;p&gt;Lucy and Desi. Group and Policy.&lt;/p&gt;

&lt;p&gt;You get the idea.&lt;/p&gt;

&lt;p&gt;Start out with Book 1, which is really called &lt;em&gt;Group Policy Fundamentals, Security, and Troubleshooting&lt;/em&gt;. You already know this book, but its been revd for 2008 with the following new superpowers:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;How to create a modern management station with RSAT and the GPMC 2.0&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;GPMC 2.0 Features: Filters, Comments, and Starter GPOs&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;Microsofts Advanced Group Policy Management Tool (AGPM)&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;Powershell with Group Policy (ooohhhh yeahhh!)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And the crown jewels...&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The Group Policy Preference Extensions: 21 new features you positively must have&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But to make room for all that stuff, I moved some Group Policy Friends of the Family from Book 1 to Book 2. Book 2 is really called&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Creating the Secure Managed Desktop: Group Policy, SoftGrid, and Microsoft Deployment and Management Tools.&lt;/em&gt; But now Book 2 is fortified with EVEN MORE AWESOMENESS. Re-read the title of Book 2 again. Lets break it down:&lt;/p&gt;

&lt;p&gt;The main title is:&lt;br /&gt;
Creating the Secure Managed Desktop&lt;/p&gt;

&lt;p&gt;And you do that by first knowing Group Policy Fundamentals (thats Book 1). Youll take your Group Policy knowledge and put it to PRACTICAL use here in Book 2. Start out by using Microsoft new Microsoft Deployment Toolkit.&lt;/p&gt;

&lt;p&gt;Then move on to create the managed desktop with Roaming Profiles, Offline Files, the Sync Manager and more.&lt;/p&gt;

&lt;p&gt;Deploy software to your machines using Group Policy and Microsofts newest tool: SoftGrid. Yep, to my knowledge this is the only book that has any real, meaty SoftGrid coverage. We have three MEGA chapters on SoftGrid. Youll learn how to deploy your first servers, learn all about the architecture, and learn how to sequence applications like a pro. Truly a one-of-a-kind resource. I had help from GPanswers.com Shortstop Eric Johnson with two SoftGrid chapters. Way to hit one (well, two) out of the park!&lt;/p&gt;

&lt;p&gt;Continue on and learn how to lock down machines. Use WSUS to protect and patch your machines (thanks to Greg Shields for that awesome chapter), use Network Access Protection (NAP) to keep unhealthy machines off the network, and learn to use Windows SteadyState to put the full smackdown on your most critical machines.&lt;/p&gt;

&lt;p&gt;Wrap up the book with a little printer magic and finishing touches, and Im totally confident youre going to love this newest member of the Group Policy book family.&lt;/p&gt;

&lt;p&gt;Heres the best part: you can pre-order copies at &lt;a href=&quot;https://www.gpanswers.com/books&quot;&gt;www.GPanswers.com/books&lt;/a&gt;. Or, better yet (and this is going to blow your mind)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;you can download just specific chapters you might want, today, as eChapters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Thats right. Ive worked it out so you can buy just the chapters you need. Some people will want BOTH the eChapters and the actual books. Some may want one medium. Its up to you. Your choice.&lt;/p&gt;

&lt;p&gt;Just head over to &lt;a href=&quot;https://www.gpanswers.com/books&quot;&gt;www.GPanswers.com/books&lt;/a&gt; and explore the books contents then select Download eChapters now. When you do, youll be able to select the chapters from each book. Go ahead and mix and match. Just put checkmarks next to the chapters you want to download and select Buy Selected eChapters Now as seen here.   &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter28-fig00.jpg&quot; style=&quot;width:451px&quot; /&gt; We have a FAQ on the same page you should read before you buy. But by all accounts, people are very happy with their PDF purchasing experience.&lt;/p&gt;

&lt;p&gt;If you want signed copies, select Pre-Order Your Signed Hard Copy Now. Then once we get the books in stock, well send them to you right away.&lt;/p&gt;

&lt;p&gt;Were expecting the first one at the end of April, and the second one at the end of May.&lt;/p&gt;

&lt;p&gt;So, not far off. Pre-order your hard copy now and you&#039;ll be the first kid on the block when the books come in. &lt;a href=&quot;https://www.gpanswers.com/books&quot;&gt;www.GPanswers.com/books&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;Let me know what you think of the chapters as you download them!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;About GPanswers.com Training&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I hate the word &quot;bootcamp,&quot; but I guess that&#039;s what it is. So, if you want your butt kicked in Group Policy (in a kind, gentle way), then join me for the full week of Group Policy awesomeness:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Two Day Essentials Group Policy Training and Workshop&lt;/li&gt;
	&lt;li&gt;Two Day &quot;Group Policy 2.0&quot; Training for Vista, Server 2008 and the Group Policy Preference Extensions and&lt;/li&gt;
	&lt;li&gt;One-Day Advanced Group Policy Training&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;em&gt;&quot;I finally figured out how we would block out USB ports, games and lockdown users. This alone made the entire class an extremely valuable and fun learning experience. I learned how to use Vista&#039;s event viewer to track a single event in group policy - so easy but powerful!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I learned how to set up various restrictions on a PC for different users. A tremendously valuable feature! I cannot wait to get back to the office and implement what I have learned.&lt;/p&gt;

&lt;p&gt;I highly recommend the whole week to anyone who has anything to do with Group Policy. Nothing beats these classes, nothing.&quot; -- Mark Latham, PC Support Specialist, Mercy Regional Medical Center&lt;/p&gt;

&lt;p&gt;Learn more about each course here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/workshop/courses/&quot;&gt;https://www.gpanswers.com/workshop/courses/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can take the full week, or join us for just the classes you need.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Announced Classes: &lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;May 5 - 9: Kansas City, MO (Lenexa, KS, really)
	&lt;ul&gt;
		&lt;li&gt;Class is declared ON. If you sign up now, you&#039;ll be guaranteed a seat.&lt;/li&gt;
		&lt;li&gt;It&#039;s the full week: Group Policy Essentials Course, Group Policy 2.0 Catch-up and Advanced One Day Course&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;No other cities are announced yet. Maybe more coming soon, but I suggest if you want to get GP 2.0 with Group Policy Preferences training, then come to Kansas City!&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For any public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/workshop&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What about OTHER CITIES in 2008?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We have a new &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;Even if you&#039;ve used this before, please re-suggest your cities, as we have a new back-end tracking system. Thanks !&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Private courses&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I have limited dates remaining in 2008 for private classes. But call me soon, and we might be able to work it out. If you think you might want your own private in-house training (with all the personalized attention that affords), don&#039;t keep it a secret.&lt;/p&gt;

&lt;p&gt;Call me.&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training (about 68), the course pays for itself (since you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, Japanor wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Join the thousands of administrators (and managers!) who have gotten smarter using the technology they already have.&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/workshop&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;.&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Become a GPanswers.com Partner/Affiliate &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Amazon had a great idea. Put up some links on your web site for stuff you love, and when people buy stuff you recommend, you get some extra dough. We now have a similar program. It&#039;s super easy to sign up and get started. We provide you with your own tracking links and you get credit each time someone signs up for a class or signs up to be on our Newsletter/Tips.&lt;/p&gt;

&lt;p&gt;It&#039;s that easy. Learn more about the program and start making some extra dough today by checking out &lt;a href=&quot;https://www.gpanswers.com/newsletter/283.html&quot;&gt;www.GPanswers.com/partners&lt;/a&gt;. &lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Don&#039;t forget our Sponsors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I can&#039;t tell you how often I hear that people LOVE the Solutions Guide we have at GPanswers.com/solutions. Inside, you&#039;ll find both free and third-party products which extend the reach of Group Policy, or let you do something you haven&#039;t discovered before!&lt;/p&gt;

&lt;p&gt;So, head on over to the &lt;a href=&quot;https://www.gpanswers.com/solutions&quot;&gt;Solutions Guide&lt;/a&gt; and see what other goodies are available!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Be a GPanswers.com &quot;Booster&quot; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Do you feel you get value out of GPanswers.com and want to see us grow? Well, I&#039;m a Group Policy guy, not a web guy, so I need to pay for my web services somehow and enhance the site and bring you more stuff (both features and content).&lt;/p&gt;

&lt;p&gt;If you&#039;d like to help out, please consider making a one-time donation, or become a monthly GPanswers.com Booster for just $5 a month. If you and just 500 other people do it, I&#039;ll be able to pay for all the web bills each month and really take the site up a notch.&lt;/p&gt;

&lt;p&gt;To help GPanswers.com and donate, here&#039;s how:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href=&quot;https://moskowitzinc.infusionsoft.com/cart/?product_id=47&quot;&gt;Click here for a one-time donation (update quantity in cart) &lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;https://moskowitzinc.infusionsoft.com/cart/?cprogram_id=5&quot;&gt;Click here to help with a $5 a month GPanswers.com Booster &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Thank you for your support!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information &lt;/strong&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can &lt;a href=&quot;https://www.gpanswers.com/newsletter/&quot; target=&quot;_blank&quot;&gt;sign up for your own newsletter subscription&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/newsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please FORWARD THE ENTIRE email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention regarding subscriptions and unsubscriptions, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Please POST your technical question on the &lt;a href=&quot;https://www.gpanswers.com/community&quot;&gt;GPanswers.com/community&lt;/a&gt; forum whenever possible.&lt;/p&gt;

&lt;p&gt;If you have questions about ordering a book or signing up for a public class, contact my assistant Margot at: &lt;a href=&quot;mailto:assistant@moskowitz-inc.com&quot;&gt;assistant@moskowitz-inc.com&lt;/a&gt; . I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;strong&gt;Thanks for reading!&lt;/strong&gt; &lt;/strong&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#27 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue27</link>
        <pubDate>2008-05-14T11:54:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ 
	Installing the GPPEs: Could they make it any harder?
	Another newsletter coming soon !
	Public GP Training Schedule Update
	
		Cities that are scheduled for public courses
	
	
	Subscribe, Unsubscribe, and Usage Information


Welcome to Newsletter #27.

As some of you know, the GPPEs, or Group Policy Preference Extensions are finally released.

They&amp;#39;re here: they&amp;#39;re real, and they&amp;#39;re spectacular.

Apologies to Seinfeld fans everywhere.

But, even though theyre h ]]>
        </description>
        <content:encoded>
            &lt;ul&gt;
	&lt;li&gt;Installing the GPPEs: Could they make it any harder?&lt;/li&gt;
	&lt;li&gt;Another newsletter coming soon !&lt;/li&gt;
	&lt;li&gt;Public GP Training Schedule Update
	&lt;ul&gt;
		&lt;li&gt;Cities that are scheduled for public courses&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Welcome to Newsletter #27.&lt;/p&gt;

&lt;p&gt;As some of you know, the GPPEs, or Group Policy Preference Extensions are finally released.&lt;/p&gt;

&lt;p&gt;They&#039;re here: they&#039;re real, and they&#039;re spectacular.&lt;/p&gt;

&lt;p&gt;Apologies to Seinfeld fans everywhere.&lt;/p&gt;

&lt;p&gt;But, even though theyre here, its going to take a little negotiating to make sure we dont install them, then, right away blow ourselves in the foot. This is a the first in a multi-part newsletter series.&lt;/p&gt;

&lt;p&gt;First, we&#039;ll talk about installing the GPPEs. A little later, I&#039;ll have updates for automatically installing the GPPEs, then another newsletter on how to deal with the &quot;overlaps&quot; that are now created in the various categories.&lt;/p&gt;

&lt;p&gt;Additionally inside this newsletter -- where I&#039;m having public training courses and more.&lt;/p&gt;

&lt;p&gt;PS: I know my graphics have the word &quot;width&quot; in them. Working on fixing that, but I wanted to get the newsletter out ASAP and fix it later.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Getting Down to Business: Installing the GPPEs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft likes to call them the Group Policy Preferences. But I like GPPEs, so Im going to keep calling them that.&lt;/p&gt;

&lt;p&gt;The Group Policy Preference Extensions (GPPEs) look different than the rest of the Group Policy universe. Thats because they &lt;em&gt;are&lt;/em&gt; different. They were born at Desktop Standard and integrated into Microsoft technology.&lt;/p&gt;

&lt;p&gt;In all, it&#039;s a cool, cool brave new (or rather &lt;em&gt;updated&lt;/em&gt; ) world. You can see the new Preferences node underneath User Configuration | Preferences and Computer Configuration | Preferences as seen here. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news27-fig1.jpg&quot; style=&quot;height:479px; width:254px&quot; /&gt; &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news27-fig2.jpg&quot; style=&quot;height:539px; width:251px&quot; /&gt; You might be asking yourself: why don&#039;t *I* see these in my GP editor? Because you&#039;re not using Windows Server 2008 as your editor or the download update (which isn&#039;t yet released) called RSAT which contains the updates.&lt;/p&gt;

&lt;p&gt;This is going to be a two-part newsletter. In this first part, we&#039;ll tackle installing the GPPEs. In the next part, we&#039;ll tackle one of the most misunderstood aspects of the technology. That s, why they are called Preferences in the first place and how they work differently than its Policy cousins.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Now that the GPPEs are available. How do you install them?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Well, it&#039;s different depending on the operating system. We&#039;ll explore that now.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The CSEs for Windows Server 2008&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Everything you need to take advantage of the Group Policy Preference Extensions is already installed here. Both the management station pieces (where you define what you want to control) and the CSE piece (the .DLLs that process the GPOs).&lt;/p&gt;

&lt;p&gt;So, if you wanted to get started using Group Policy Preference Extensions, you can do so immediately with very little effort by using a Windows Server 2008 machine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The CSEs for Windows Server 2003, Windows XP, and Windows Vista&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Again, for Windows Server 2003, Windows XP, and Windows Vista you need to download pieces to make the magic happen. Lets examine each operating system, where to get the downloads, and how to install the pieces by hand.&lt;/p&gt;

&lt;p&gt;The Group Policy Preference Extensions can be downloaded from &lt;a href=&quot;http://tinyurl.com/2za5zz&quot;&gt;http://tinyurl.com/2za5zz.&lt;/a&gt; You can also track them down by heading over to &lt;a href=&quot;http://www.microsoft.com/downloads&quot;&gt;http://www.microsoft.com/downloads&lt;/a&gt; and searching for the word &quot;Preference.&quot;&lt;/p&gt;

&lt;p&gt;Windows XP and Windows Server 2003 machines also need a prerequisite called XMLlite, and it can be found at &lt;a href=&quot;http://support.microsoft.com/default.aspx/kb/914783&quot;&gt;http://support.microsoft.com/default.aspx/kb/914783&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;Here&#039;s the trick. Neither the XMLlite prerequisite nor the GPPEs themselves are MSIs.&lt;/p&gt;

&lt;p&gt;Nope, they&#039;re &lt;em&gt;patches. &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;So, for Windows XP and Windows Server 2003, they&#039;re .EXE patches, and for Windows Vista they&#039;re a newfangled format called .MSU for Microsoft Update patch.&lt;/p&gt;

&lt;p&gt;And, if you&#039;ll recall, Group Policy Software Installation cannot install patches. You need a &quot;big tool&quot; like an SCCM 2007 or WSUS which expressly handles patch management. Or, you&#039;ll need a script to install it en-mass for your systems.&lt;/p&gt;

&lt;p&gt;Ugh, what a nightmare!&lt;/p&gt;

&lt;p&gt;You&#039;ll always be able to install each piece &quot;by hand&quot; (which we&#039;ll explore first), but you&#039;ll also want a mass-deployment recipe to start really rolling this out. I&#039;ll provide a script which helps you roll this out to your machines, so you&#039;re not running around from machine to machine doing all the dirty work. I don&#039;t have this ready yet, but along with my pal Jakob Heidelberg, I hope to have something for you in the next several days.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Installing the Prerequisites and CSEs for Windows Server 2003, Windows XP by hand&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If youre installing the CSEs on Windows Server 2003, youll likely do each one by hand. This makes sense, as mass deploying and mass rebooting live servers can be, well, not good for your users. However, if you wanted to mass-rollout the CSEs, check out the section Installing the Prerequisites and CSEs for all operating systems automatically.&lt;/p&gt;

&lt;p&gt;Again, both Windows XP and Windows Server 2003 have the prerequisite of XMLlite, a Microsoft middleware component. You can see the available command line switches in Figure X, if you want to do something fancy, or you can just double-click on the downloaded .EXE and kick off the installation. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news27-fig3.jpg&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Figure: The XMLLite component&#039;s command-line switches&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;In my testing, the XMLlite components didn&#039;t require a reboot (but your mileage may vary.) Knowing this fact will come in handy when we try to automate the whole thing using a script. Next, in my testing, I simply double-clicked the .EXE which contained the CSE.&lt;/p&gt;

&lt;p&gt;Once again, it didn&#039;t even require a reboot and it appeared ready to go. You might want to reboot once one the safe side for good measure.&lt;/p&gt;

&lt;p&gt;You can verify the Group Policy Preference Extensions installed on Windows Server 2003 or Windows XP in Add or Remove Programs and clicking on &quot;Show updates&quot; as seen here. When you do, you&#039;ll see the hotfixes, like GPPE installation. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news27-fig4.jpg&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Figure: You can verify that the Group Policy Preference Extensions were installed on Windows XP and Windows Server 2003 by selecting Show updates.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Installing the CSEs for Windows Vista by hand&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The Windows Vista CSE ships as an MSU a Microsoft Update package as seen in Figure X. Just double-click on it and click OK to install, and youre off to the races. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news27-fig5.jpg&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Figure: Installing the Windows Vista MSU file is like installing an executable&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Again, in my testing there was no need to reboot after completion, but it certainly couldnt hurt. You can verify that the Group Policy Preference Extensions were properly installed by looking at Control Panel | Programs | Uninstall a program and then clicking Turn Windows features on or off as seen in Figure X.&lt;/p&gt;

&lt;p&gt;Note the Group Policy Preference Extensions are on by default, and its not such a hot idea to turn them off. Note you can also see the MS KB update number as an installed update. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news27-fig6.jpg&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Figure: You can verify that the Group Policy Preference Extensions were properly installed&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Installing the Prerequisites and CSEs for all operating systems automatically&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Again, at this point, were still working on a fully-automating script to install the prerequisites and the GPPE CSEs.&lt;/p&gt;

&lt;p&gt;Hang tight.&lt;/p&gt;

&lt;p&gt;That&#039;ll appear in a tip or newsletter or something else soon.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thing we&#039;re going to tackle #2 (in a newsletter coming soon): How Does the Group Policy Engine Deal with Overlaps?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is something thats really, really confusing for a lot of people. And with good reason. There are lot of similar and shared areas in both Group Policy and the Group Policy Preference Extensions.&lt;/p&gt;

&lt;p&gt;So to answer this question, there&#039;s the short answer, the middle-length answer and the long answer.&lt;/p&gt;

&lt;p&gt;That&#039;ll be the next newsletter, which shouldn&#039;t be too far behind.&lt;/p&gt;

&lt;p&gt;Hang tight, we&#039;ll explore this stuff at that point.  &lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;About GPanswers.com Training&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I teach three courses on Group Policy now .. usually in the same week:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Two Day Essentials Group Policy Training and Workshop&lt;/li&gt;
	&lt;li&gt;Two Day &quot;Group Policy 2.0&quot; Training for Vista, Server 2008 and the Group Policy Preference Extensions and&lt;/li&gt;
	&lt;li&gt;One-Day Advanced Group Policy Training&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Learn more about each course here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/workshop/courses/&quot;&gt;https://www.gpanswers.com/workshop/courses/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can take the full week, or join us for just the classes you need.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Announced Classes: &lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;March 17 - 21: Portland, OR:
	&lt;ul&gt;
		&lt;li&gt;This Class is ON. We have a really great group coming.&lt;/li&gt;
		&lt;li&gt;It&#039;s the full week: Group Policy Essentials Course, Group Policy 2.0 Catch-up and Advanced One Day Course&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;May 5 - 9: Kansas City, MO (Lenexa, KS, really)
	&lt;ul&gt;
		&lt;li&gt;Class is ALMOST ON. If you sign up now, you&#039;ll be guaranteed a seat.&lt;/li&gt;
		&lt;li&gt;It&#039;s the full week: Group Policy Essentials Course, Group Policy 2.0 Catch-up and Advanced One Day Course&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;No other cities are announced yet. Maybe more coming soon, but I suggest if you want to get GP 2.0 training to come to one of these cities.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For any public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/workshop&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What about OTHER CITIES in 2008?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We have a new &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;Even if you&#039;ve used this before, please re-suggest your cities, as we have a new back-end tracking system. Thanks !&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Private courses&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you think you might want your own private in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training (about 68), the course pays for itself (since you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, Japanor wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does have the distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, Security, and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/workshop&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt; .&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Don&#039;t forget our Sponsors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I can&#039;t tell you how often I hear that people LOVE the Solutions Guide we have at GPanswers.com/solutions. Inside, you&#039;ll find both free and third-party products which extend the reach of Group Policy, or let you do something you haven&#039;t discovered before!&lt;/p&gt;

&lt;p&gt;So, head on over to the &lt;a href=&quot;https://www.gpanswers.com/solutions&quot;&gt;Solutions Guide&lt;/a&gt; and see what other goodies are available!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Be a GPanswers.com &quot;Booster.&quot; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Do you feel you get value out of GPanswers.com and want to see us grow? Well, I&#039;m a Group Policy guy, not a web guy, so I need to pay for my web services somehow and enhance the site and bring you more stuff.. (both features and content.)&lt;/p&gt;

&lt;p&gt;If you&#039;d like to help out, please consider making a one-time donation, or become a monthly GPanswers.com Booster for just $5 a month. If you and just 500 other people do it, I&#039;ll be able to pay for all the web bills each month and really take the site up a notch.&lt;/p&gt;

&lt;p&gt;To help GPanswers.com and donate, here&#039;s how:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href=&quot;https://moskowitzinc.infusionsoft.com/cart/?product_id=47&quot;&gt;Click here for a one-time donation (update quantity in cart) &lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;https://moskowitzinc.infusionsoft.com/cart/?cprogram_id=5&quot;&gt;Click here to help with a $5 a month GPanswers.com Booster &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Thank you for your support!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information &lt;/strong&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can &lt;a href=&quot;https://www.gpanswers.com/newsletter/&quot; target=&quot;_blank&quot;&gt;sign up for your own newsletter subscription&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/newsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please FORWARD THE ENTIRE email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention regarding subscriptions and unsubscriptions, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Please POST your technical question on the &lt;a href=&quot;https://www.gpanswers.com/community&quot;&gt;GPanswers.com/community&lt;/a&gt; forum whenever possible.&lt;/p&gt;

&lt;p&gt;If you have questions about ordering a book or signing up for a public class, contact my assistant Margot at: &lt;a href=&quot;mailto:assistant@moskowitz-inc.com&quot;&gt;assistant@moskowitz-inc.com&lt;/a&gt; . I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;strong&gt;Thanks for reading!&lt;/strong&gt; &lt;/strong&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue #26 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue-26</link>
        <pubDate>2008-05-12T17:54:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Issue #26


	The fate of DesktopStandard&amp;#39;s PolicyMaker tools
	Inside Specops GPupdatea free way to &amp;quot;push&amp;quot; updates to GP clients
	Public GP Training Schedule Update
	
		Cities that are scheduled for public courses
	
	
	Subscribe, Unsubscribe, and Usage Information


It was so great to see each of you at WinConnections last month. Holy moly, that was awesome! You really rocked my world with your support of my sessions and the book signing. You guys make it worth gettin ]]>
        </description>
        <content:encoded>
            &lt;h2&gt;Issue #26&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;The fate of DesktopStandard&#039;s PolicyMaker tools&lt;/li&gt;
	&lt;li&gt;Inside Specops GPupdatea free way to &quot;push&quot; updates to GP clients&lt;/li&gt;
	&lt;li&gt;Public GP Training Schedule Update
	&lt;ul&gt;
		&lt;li&gt;Cities that are scheduled for public courses&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It was so great to see each of you at WinConnections last month. Holy moly, that was awesome! You really rocked my world with your support of my sessions and the book signing. You guys make it worth getting out of bed in the morning.&lt;/p&gt;

&lt;p&gt;Here&#039;s some great new stuff for you to take with you this week and into Thanksgiving. Something to be thankful forfree tools!&lt;/p&gt;

&lt;p&gt;In this issue we&#039;ll talk about two new free things for you to add to your GP arsenal.&lt;/p&gt;

&lt;p&gt;Thanks for coming out to see my talks and say hello. Looking forward to having you an upcoming Group Policy training class this year. If ever there was a year to get smarter in GP, this is it!&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Group Policy News&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;The Fate of the DesktopStandard PolicyMaker Tools&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The big news is finally here: Have you been wondering what Microsoft is doing with the &quot;crown jewels&quot; of the DesktopStandard acquisition? We&#039;ll explore that first before we move on to other stuff. And we&#039;ll do that in Good, Bad, and Ugly fashion.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Good: Policymaker Technology is going to be free&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The PolicyMaker technologies will officially be called &lt;strong&gt;Group Policy Preferences. &lt;/strong&gt;I&#039;ll call them GPP for short. GPP can do 20-some-odd big things with Group Policy that you couldn&#039;t do before. Here&#039;s a list of some things that are now possible, which weren&#039;t possible before (without scripts, or a whole lot of work).&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Map network drives&lt;/li&gt;
	&lt;li&gt;Set environment variable&lt;/li&gt;
	&lt;li&gt;Copy files to client&lt;/li&gt;
	&lt;li&gt;Create and update INI file&lt;/li&gt;
	&lt;li&gt;Modify Registry settings on the clients (REG_SZ, REG_DWORD, REG_BINARY,REG_MULTI_SZ, and REG_EXPAND_SZ)&lt;/li&gt;
	&lt;li&gt;Create shortcuts (URL/File/Shell)&lt;/li&gt;
	&lt;li&gt;Open Database Connectivity (ODBC)&lt;/li&gt;
	&lt;li&gt;Control devices&lt;/li&gt;
	&lt;li&gt;Set folder options&lt;/li&gt;
	&lt;li&gt;Define file associations&lt;/li&gt;
	&lt;li&gt;Tweak internet settings&lt;/li&gt;
	&lt;li&gt;Handle local users and groups (change passwords, add/remove from groups, disable users, etc.)&lt;/li&gt;
	&lt;li&gt;Set network options (like VPN or dial-up connections)&lt;/li&gt;
	&lt;li&gt;Configure power options (Windows XP)&lt;/li&gt;
	&lt;li&gt;Map printers (even TCP/IP printers)&lt;/li&gt;
	&lt;li&gt;Set regional options&lt;/li&gt;
	&lt;li&gt;Create scheduled tasks&lt;/li&gt;
	&lt;li&gt;Set properties on services&lt;/li&gt;
	&lt;li&gt;Tweak the Start Menu&lt;/li&gt;
	&lt;li&gt;Dictate shares and share permissions on servers (mostly)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Thanks to Jakob Heidelberg for compiling this list for me. So, more is good right? Well, no. More can sometimes be bad. Which leads us to...&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Bad: There&#039;s overlap and you have to install something&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Okay, this stuff isn&#039;t really &lt;em&gt;bad&lt;/em&gt; but it could be at least &lt;em&gt;confusing&lt;/em&gt; .&lt;/p&gt;

&lt;p&gt;It appears that you&#039;ll be able to do some items in two places in GP land. For instance, it appears like you&#039;ll be able to set power management options in two places. Only one way was available &lt;em&gt;before&lt;/em&gt; integrating GPP into the mix. Now, another way is available &lt;em&gt;after&lt;/em&gt;integrating GPP into the mix.&lt;/p&gt;

&lt;p&gt;Same thing with printers. You could already zap printers down (to Vista clients) &lt;em&gt;before&lt;/em&gt; integrating GPP into the mix. Now, there&#039;s &lt;em&gt;another&lt;/em&gt;way to zap down printers.&lt;/p&gt;

&lt;p&gt;This can get confusing to inexperienced administrators.&lt;/p&gt;

&lt;p&gt;Additionally, all these new settings require a CSE (Client Side Extension), as do all GP extensions. So, this isn&#039;t bad, it just means you have a liiiiittle bit of work to do on your client machines in order for the new magic to be available. Here&#039;s the breakdown of where the new technology will run and what it needs to run:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The CSE will ship in the box for Windows Server 2008.&lt;/li&gt;
	&lt;li&gt;The CSE will be an extra download for XP, 2003 and Vista.&lt;/li&gt;
	&lt;li&gt;The CSE will not work for 2000.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you know how to use GP Software Installation, you can deploy the GPP client lickety-split to your machines.(What? You don&#039;t know how to use Group Policy Software Installation? Check out &lt;a href=&quot;https://www.gpanswers.com/book&quot;&gt;www.GPanswers.com/book&lt;/a&gt; and flip to Chapter 11  stat!)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Ugly: Why is it Preferences and not Policies? (And why hasn&#039;t it debuted yet?)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So, why are they called the Group Policy Preferences and not something more...&quot;Policy-ish?&quot;&lt;/p&gt;

&lt;p&gt;Well, that&#039;s an interesting point. Let&#039;s take a moment to review the difference between a policy and a preference.&lt;/p&gt;

&lt;p&gt;A policy is generally how we expect GP to work. That is, when you use Group Policy to, say, prevent access to the Control Panel, GP will generally send the signal down to the system, and the program (Explorer, in this case) will pick up the message and lock our access to Control Panel.&lt;/p&gt;

&lt;p&gt;Simple.&lt;/p&gt;

&lt;p&gt;And, if you delete the GPO, what&#039;s the expected behavior? The expected behavior is that the settings will revert back and allow access to the Control Panel.&lt;/p&gt;

&lt;p&gt;Pretty much every setting contained within Administrative Templates works in this way. This is probably one of the top three reasons you&#039;ve come to love Group Policy. This area is controlled by the Registry or Admin Templates Client Side Extension (CSE). That CSE is smart enough to know what to set the value to, and even better, smart enough to know what to set the value back to when the policy no longer applies.&lt;/p&gt;

&lt;p&gt;But other areas of Group Policy don&#039;t work in this way; for instance, Security settings. Take something simple like an Internet Explorer setting which changes the Proxy server, like you see here in Figure 1. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news26ieproxy.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;br /&gt;
&lt;strong&gt;Figure 1: The IE Maintenance CSE has a history of not &quot;acting like you would think.&quot;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Sure, Group Policy will deliver your changes, but the real challenge is what happens when that setting no longer applies. If the CSE is smart it knows how to put back the original value. But, if the CSE isn&#039;t smart, it doesn&#039;t have a value to put back. And, in short, what you plunk down with Group Policy could end up tattooing the Registry.&lt;/p&gt;

&lt;p&gt;That&#039;s precisely the problem with the Internet Explorer 6 settings. The CSE isn&#039;t too smart. It doesn&#039;t know precisely what to do when the value is taken away, so it just freaks out and leaves it in place, even though the expected behavior (as far as the Administrator is concerned) is to change the policy setting back to the default. But it doesn&#039;t do that.&lt;/p&gt;

&lt;p&gt;Unfortunately, that&#039;s precisely one of the challenges with the PolicyMaker, er, GPP Extensions. They&#039;re called Preferences because they do tend to tattoo the computer with the wish you lay down using GP.&lt;/p&gt;

&lt;p&gt;I know this stuff isn&#039;t even &lt;em&gt;out&lt;/em&gt; yet, but here&#039;s a Group Policy Preference tip, for future reference. This tip will get you out of some jams, but could get you into other jams, so be careful.&lt;/p&gt;

&lt;p&gt;Whenever you create a new wish you can optionally check &quot;Remove this setting when it is no longer applied,&quot; as shown in Figure 2. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news26pm1.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;br /&gt;
&lt;strong&gt;Figure 2: The GPP Common tab&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;(Note this screenshot is using PolicyMaker and not actually the Group Policy Preference extensions.) &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Buuut, you need to be exceptionally careful. In some cases, this will work the way you think, but in some cases it won&#039;t.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Good Example: &lt;/strong&gt;Let&#039;s say you wanted to use the new GPP Extensions to map a drive letter S: to all of the Sales guys. And when Fred moves from Sales to Marketing you want to delete the mapping. This setting works great for that, and will work as you expect it to.&lt;/p&gt;

&lt;p&gt;But, here&#039;s an example where you need to use this with extreme caution.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Use with Caution Example&lt;/strong&gt; : Let&#039;s say you wanted to use the new GPP Extensions to push the Registry value 100 to your Sales application. The GPP Registry Extension will do the job. But if you chose to &quot;Remove this policy when it is no longer applies&quot;WATCH OUT! The entire Registry key will be deleted. Ow, ow, ow, ow, ow!&lt;/p&gt;

&lt;p&gt;My team working on PolicyPak Software is very aware of this interesting GPP nuance. And our PolicyPak CSE is a great alternative which &lt;em&gt;is&lt;/em&gt;smart and does know how to precisely put down a value and take it away when it no longer applies. In short, PolicyPak (from&lt;a href=&quot;https://www.policypak.com/&quot;&gt;PolicyPak.com&lt;/a&gt; ) is true-blue, full Group Policy, and will never tattoo your computer&#039;s Registry.&lt;/p&gt;

&lt;p&gt;The other Ugly thing is, well, where is it? Now that Microsoft has announced that it will be part of Windows Server 2008 (in the box) and then an available update for XP and 2003, when can we get our hands on it? I&#039;m sure the answer is &quot;soon,&quot; but that&#039;s not really my question. My question is, if it&#039;s going to ship in the box for Windows Server 2008, how stable is it going to be? Hopefully, very. But I&#039;m concerned that it&#039;s RC1 (that&#039;s Release Candidate 1) and we&#039;re JUST NOW able to give our feedback and bug reports. That means this puppy could ship with unfixed bugs, but that&#039;s the facts of life in software sometimes.&lt;/p&gt;

&lt;p&gt;In short though.. I&#039;m psyched. It&#039;s a Whole New World for GP goodness we&#039;re getting our hands on, and it&#039;s free. And I love free stuff. So, congrats to the GP team for a real win here. Let&#039;s hope those bugs are few and far between.&lt;/p&gt;

&lt;p&gt;That&#039;s all the time we have for the GPP Extensions. More when they officially make their debut. However, Microsoft has a whitepaper that details the major new categories of features and describes some other odds and ends including the distinction between a policy and a preference.&lt;/p&gt;

&lt;p&gt;That paper is found &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=42e30e3f-6f01-4610-9d6e-f6e0fb7a0790&amp;DisplayLang=en&quot;&gt;here&lt;/a&gt; and every GP admin should read it.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;This&lt;/strong&gt;&lt;strong&gt; Month&#039;s Newsletter Sponsored by: NetIQ&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Are you using Group Policy optimally? Ever wonder if you can do more with it? Learn the best practices you need in order to leverage Group Policy on your servers in this new whitepaper, &quot;Why Group Policy Matters for Servers,&quot; authored by Group Policy guru Jeremy Moskowitz an NetIQ. &lt;a href=&quot;http://www.netiq.com/f/form/form.asp%7Cid=3163%7C%7Corigin=NS_GPAnswers_111907%27%27&quot;&gt;Download it now&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;This Issue&#039;s Big Tech Tip...Technology Takeaway ®, a Service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;All about the Free Specops Gpupdate Tool&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A quick note from Jeremy Moskowitz: This tech tip was written by friend, and guest contributor, Claus Jensen of www.chinchilladata.dk. Periodically, at GPanswers.com, we explore the free tools in the Group Policy world so you can be a more effective administrator. You can inspect both free and for-a-fee tools in our Solutions Guide at &lt;a href=&quot;https://www.gpanswers.com/solutions&quot;&gt;GPanswers.com/solutions&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;Let&#039;s say that you have just deployed some strict, new security settings to all the computers in the Danish branch office via Group Policy. But you want them to be effective immediately.&lt;/p&gt;

&lt;p&gt;Of course, you could wait for the ordinary background processing of Group Policy, which happens every 5 minutes for domain controllers and takes between 90 and 120 minutes for workstations, member servers, and users. Alternatively, you could call all your users and ask them to run Gpupdate, which might be a bit much to ask. And waiting up to two hours doesnt sound too appealing either.&lt;/p&gt;

&lt;p&gt;What if you had machines that required a reboot to get some Group Policy settings updated; for instance, a server that needed an updated disk quota assignment? Are you going to run around to each machine and reboot it?&lt;/p&gt;

&lt;p&gt;You&#039;re impatient (let&#039;s call it security conscious). So why wait? Specops is a Swedish company specializing in tools for Active Directory. They have a free tool available that allows you to run Gpupdate, and to shutdown, restart, and start the computers in your Active Directory domain. The tool is called Specops Gpupdate. This newsletter will describe installation and use of this magnificent tool that will ease the burden of administering and forcefully applying Group Policy&#039;s power in the enterprise.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Before You Get StarteD&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You&#039;ll start out by downloading Specops Gpupdate here ( &lt;a href=&quot;http://www.specopssoft.com/products/specopsgpupdate/&quot;&gt;http://www.specopssoft.com/products/specopsgpupdate/&lt;/a&gt; ). Then, youll install it on your Windows XP SP2, Windows Vista, or Windows Server 2003 machine, which should also already be running Active Directory Users and Computers (ADUC). (Note that if youre running Windows Vista, you may encounter some problems if you install the tool in a different directory than the default one.) Youll also need to make sure .NET Framework 2.0 is installed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Installation of Specops Gpupdate&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Installing Specops Gpudate is easy! Youll first need to run the Specops Gpupdate installer (SpecopsGpupdate.msi) inside the download.&lt;/p&gt;

&lt;p&gt;Then, from the %CommonProgramFiles%SpecopssoftSpecops ADUC Extension directory, run SpecopsAducMenuExtensionInstaller.exe with the /add parameter as seen in Figure 1 (top). This will add the Display Specifiers for Specops Gpupdate into Active Directory (note that this is different than a schema update). Once the display identifiers are in Active Directory, only Administrators with the Specops GPupdate tool installed will be able to see them. Other users using ADUC will not be able to see the new menu items, which you can see in Figure 3 (bottom). &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter26fig1.jpg&quot; style=&quot;width:451px&quot; /&gt; &lt;br /&gt;
&lt;strong&gt;Figure 3: The Domain DisplayIdentifiers aren&#039;t like Schema Updates. They can be removed. &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The information about the Display Specifiers is saved in the Configuration container in Active Directory. So, adding the display identifiers is something that only needs to happen once per Active Directory forest. Because of this, you will need to be a Domain Admin or Enterprise Admin in order to make this happen. The good news is that its also easy to later remove them (unlike a schema change). If you ever tire of using Specops GPupdate and you want to erase the changes it made to the Active Directory Display Specifiers, you just run SpecopsAducMenuExtensionInstaller.exe with the /remove parameter.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Using Specops Gpupdate&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When Specops Gpupdate is installed and the Display Specifiers are added, youre ready to start using it! The commands it brings to the table are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;GPupdate&lt;/li&gt;
	&lt;li&gt;Restart Computers&lt;/li&gt;
	&lt;li&gt;Shut Down Computers, and&lt;/li&gt;
	&lt;li&gt;Start Computers&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can see these new Specops Gpupdate commands by selecting the Action menu, or right-clicking over certain common entities in ADUC. Specifically, you can right-click over the following types of objects in ADUC to start using your new superpowers:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Domain-LevelBy selecting one or more domains, you execute the command on all computer accounts in the selected domain or domains.&lt;/li&gt;
	&lt;li&gt;Specific OUBy selecting one or more OUs, you will execute the command on all computer accounts in the OU and all nested OUs.&lt;/li&gt;
	&lt;li&gt;Specific Computer account or accountsYou can select one or more computer accounts and execute the command on these accounts.&lt;/li&gt;
	&lt;li&gt;Security groupsThe command will be executed on all computer accounts in the selected and nested groups. Be aware that group nesting depends on you having a domain functional level of at least Windows 2000 native.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In Figure , you can see that weve right-clicked over an OU to expose the new commands Specops GPupdate provides: GPupdate, Restart Computers, Shut Down Computers, and Start Computers. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter26fig2.jpg&quot; style=&quot;height:500px; width:258px&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Figure 4: Action menu in ADUC&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let&#039;s examine the four different commands you can select:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;GpupdateThis is why Specops Gpupdate is so cool. You can do a remote Gpupdate for both the computer and the currently logged-in user. There is an optional parameter equivalent to /force on the command-line version of Specops Gpupdate.&lt;/li&gt;
	&lt;li&gt;Restart ComputersThis is useful if you have changed Group Policy settings that can only be applied after a reboot.&lt;/li&gt;
	&lt;li&gt;Shut Down ComputersSimilar to the Restart Computers command, but the computers will not turn back on after they have been shut down.&lt;/li&gt;
	&lt;li&gt;Start ComputersThis selection allows you to send a Start command to the computers using Wake-On-LAN. This means that, remotely, you can have a computer start up (and in doing so, of course, reapply Group Policy) and then have the computer ready for the user.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;One of the best parts about Specops GPupdate is that it provides real-time reporting of its actions with a nifty bar graph that literally moves as it makes contact with each machine. As you can see in Figure 5, five computers have been asked to run the Gpupdate command. Four of the computers have successfully updated the Group Policy settings, but one of the computers could not be reached, either due to not being online, or due to a firewall blocking the WMI commands. Don&#039;t worry, Windows Vista works just as well with Specops Gpupdate as Windows XP. The error here is simply that the machine was not turned on. &lt;strong&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter26fig3.jpg&quot; style=&quot;width:451px&quot; /&gt;  &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuration&lt;/strong&gt;&lt;strong&gt; of Permissions on the Target Computers&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The commands contained within Specops GPupdate arent special, though it is really nice that theyre wrapped up in one place with a cool bar graph thingie. What I mean is that the different commands require you to have the relevant permissions on the target computers in order to work. Lets take a look at the commands again, but this time, lets see what security access rights we need in order to execute them on the target machine:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;GpupdateFor this command, you need permissions to run WMI and to start processes on the remote computers. Beware of any firewalls that block WMI. This one is tricky, so Ill explain how to adjust for this potential problem in just a bit.&lt;/li&gt;
	&lt;li&gt;Restart Computers and Shut Down ComputersThese require you to have the permission to shut down the computer remotely. Again, beware of firewalls that block RPC (more on this later).&lt;/li&gt;
	&lt;li&gt;Start ComputersOf course Wake-On LAN needs to be implemented at the hardware level on the remote computers, but you will also need permission to read the computers IP address in the DHCP database. If youre a member of the group DHCP Users youll have the required permissions. Also, note that the Start Computers command is only guaranteed to be compatible with Microsoft DHCP servers.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;What if you have the firewall turned on at your target computer? This can be resolved by configuring the Allow Remote Administration Exception policy setting. You will find it at Administrative Templates | Network | Network Connections | Windows Firewall | Domain Profile in the Computer part of the Group Policy Object Editor. Here you can specify which computers are allowed to perform remote administration. The Explaintext for this policy setting is a must-read. Please be aware that this policy setting only works with Windows XP/SP2 or later. Don&#039;t forget: If youre not using Microsofts built-in XP (or Vista) firewall, youll need to do the same thing that this policy setting is meant to do, that is, youll need to open ports 135 and 445.&lt;/p&gt;

&lt;p&gt;There were a lot of changes to DCOM functionality in Windows Server 2003/SP1, one of which was that, by default, only Administrators can start WMI remotely. We need to change this so we can run Specops Gpupdate against our target computers. You need to make the account that you use to run Specops Gpupdate a member of the built-in Distributed COM Users group. To make sure that this group has the correct permissions, perform the following steps:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Start the program dcomcnfg.exe on a sample target computer.&lt;/li&gt;
	&lt;li&gt;Expand Component Services and then expand Computers.&lt;/li&gt;
	&lt;li&gt;Select My Computer and click the computer or properties icon in the toolbar.&lt;/li&gt;
	&lt;li&gt; &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter26fig4.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;strong&gt;Figure 6: GPO with the needed settings for using Specops Gpupdate&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Common Problems with Specops Gpupdate and How to Avoid Them&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Even if you configure the remote computers correctly, you may run into some problems when using Specops Gpupdate. Here are some things to keep in mind to avoid potential problems&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;If youre using the Start Computers command, you need to ensure that the computer&#039;s Wake-On LAN is enabled in the hardware/BIOS. Similarly, Wake-On-LAN might fail if your computers BIOS is old and crusty. So make sure that you are running the latest version of BIOS and the latest drivers for the NIC.&lt;/li&gt;
	&lt;li&gt;If the computer running Specops Gpupdate is on a different subnet or VLAN than the computer you are trying to start, you may need to enable directed broadcasts on any routers and switches between the two computers.&lt;/li&gt;
	&lt;li&gt;Because Specops Gpupdate is using DHCP to find the IP and MAC addresses for the target computers, you need to be using Microsoft DHCP to store the IP addresses for the computers that you want to start. The servers also need to have undergone the DHCP authorized procedure which prevents rogue DHCP servers from spitting out IP addresses to anyone who asks.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If, despite your best efforts, you cannot resolve the problem, you can enable Specops Gpupdate debugging, which will generate a log file that will help you further troubleshoot the problem. You enable debugging by going to HKEY_LOCAL_MACHINE | SOFTWARE | SpecopsSoft | Specops Gpupdate and setting the debug Registry key to 1. When you have run the Specops Gpupdate commands you can see the result of your actions in the logs contained within: C:Documents and Settingslogged on userLocal SettingsApplication DataSpecopsSoftSpecopsGpupdate.log.&lt;/p&gt;

&lt;p&gt;Heres an example log where I ran Specops Gpupdate against a computer named xp1.knowhow.local, but the computer isnt taking my commands. Hopefully, by reading the log, I can determine what Specops GPupdate thinks is going on, fix the problem, and move on to some other issue.&lt;br /&gt;
SpecopsGpupdate: Starting Tracing for Specops Gpupdate, the time is &#039;5/26/2007 11:07:26 AM&#039;, assembly name is &#039;SpecopsGpupdate, Version=1.0.2.13, Culture=neutral, PublicKeyToken=null&#039;.&lt;br /&gt;
SpecopsGpupdate: ---&gt; Program.Main&lt;br /&gt;
SpecopsGpupdate: Command to execute is &#039;gpupdate&#039;.&lt;br /&gt;
SpecopsGpupdate: The selection is of a type that do not need expansion, only remove the command.&lt;br /&gt;
SpecopsGpupdate: Number of computers selected is &#039;1&#039;&lt;br /&gt;
SpecopsGpupdate: Group Policy refresh selected.&lt;br /&gt;
SpecopsGpupdate: ---&gt; Program.GetNumberOfThreads&lt;br /&gt;
SpecopsGpupdate: &lt;--- Program.GetNumberOfThreads&lt;br /&gt;
SpecopsGpupdate: ---&gt; SpecopsGpupdate.UpdateGroupPolicies&lt;br /&gt;
SpecopsGpupdate: Main form initialized.&lt;br /&gt;
SpecopsGpupdate: Main form shown.&lt;br /&gt;
SpecopsGpupdate: The WOL starter is running.&lt;br /&gt;
SpecopsGpupdate: &lt;--- SpecopsGpupdate.UpdateGroupPolicies&lt;br /&gt;
SpecopsGpupdate: &lt;--- Program.Main&lt;br /&gt;
SpecopsGpupdate: Processing computer &#039;LDAP://DC1.knowhow.local/CN=XP1,OU=Denmark,OU=Clients, DC=knowhow,DC=local&#039;.&lt;br /&gt;
SpecopsGpupdate: Operating System version is &#039;5.1 (2600)&#039;&lt;br /&gt;
SpecopsGpupdate: Hostname &#039;XP1.knowhow.local&#039;, force update &#039;False&#039;, Windows 2000 &#039;False&#039;.&lt;br /&gt;
SpecopsGpupdate: This is a non-Windows 2000 box that is updated.&lt;br /&gt;
SpecopsGpupdate: The command is &#039;gpupdate /wait:0&#039;.&lt;br /&gt;
SpecopsGpupdate: An exception occurred when calling the WMI method, exception is &#039;The RPC server is unavailable. (Exception from HRESULT: 0x800706BA)&#039;.&lt;/p&gt;

&lt;p&gt;As you can see from the log, Specops Gpupdate is able to easily determine the location of the computer object, the version of the operating system, and the hostname. Then at the end, we see The RPC server is unavailable. This usually means the computer is off, or the firewall on the machine is preventing us from dictating an update. Now we have things narrowed down, and a quick check of the computer and its firewall should give us the answer pretty quickly.&lt;/p&gt;

&lt;p&gt;If you run into a problem that isnt described here, or have questions about Specops Gpupdate, you can visit the Specops forum specifically geared for Specops GPupdate located here: &lt;a href=&quot;http://www.specopssoft.com/forum/forum.asp?FORUM_ID=15&quot;&gt;http://www.specopssoft.com/forum/forum.asp?FORUM_ID=15&lt;/a&gt; . Specops personnel monitor the forum and are quick to answer any questions relating to Specops products.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Future of Specops Gpupdate&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The latest version of Specops Gpupdate is version 1.0.1.13, which was released in October 2006, and there havent been any additional updates to this free product. But in the Specops Gpupdate forum, several new features have been discussed by current users and the Specops staff. Stay tuned, and maybe well get some new features soon, like the ability to schedule commands or a command-line interface.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final comments&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I hope that this has given you some insight into the free Specops Gpupdate software tool. Considering the added functionality that you get from this tool, it should be in every Domain and Group PolicyAdministrators tool belt. Since it works with OUs, groups, and single-computer accounts, you have total control over your PCs and serversno more waiting for the background processing of Group Policy to occur. The possibilities are endless!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;About Claus Jensen&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Contact info: claus@chinchilladata.dk&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Website: www.chinchilladata.dk&lt;/p&gt;

&lt;p&gt;Claus is currently the only trainer outside the USA who is certified to teach Jeremys GPanswers.com training. Claus works for a Danish consulting firm who works with several large businesses in Denmark. Claus has been an MCT for 5 years and a great friend to the GPanswers.com community.&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;About GPanswers.com Training&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Choosing the Right Course for You&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Of course you want GP training. And we know you&#039;d prefer to use GPanswers.com as your go-to source for GP training. We try to make it as easy for you as possible.&lt;/p&gt;

&lt;p&gt;We have GP courses that fit what you need.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Are you dealing with mostly XP machines? We have an XP-focused course.&lt;/li&gt;
	&lt;li&gt;Are you warming up to Vista? We have a Vista-focused course.&lt;/li&gt;
	&lt;li&gt;Do you want to learn in an intensive format? Learn it in TWO DAYS.&lt;/li&gt;
	&lt;li&gt;Less intensive? Learn it in THREE days.&lt;/li&gt;
	&lt;li&gt;Want even more Advanced material? We&#039;ve got that too.&lt;/li&gt;
	&lt;li&gt;Already know XP GPOs pretty well? How about our XP-to-Vista Catch-Up course?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can find out more about the different public and private courses available from the &lt;a href=&quot;https://www.gpanswers.com/workshop/&quot; target=&quot;_blank&quot;&gt;workshops section of GPanswers.com&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;We also have a &lt;a href=&quot;https://www.gpanswers.com/workshop/rightsize/&quot; target=&quot;_blank&quot;&gt;Group Policy &quot;Rightsize&quot; Tool&lt;/a&gt; which guides you step by step in choosing the best course to take based on your situation. Read the course details for the dates you have in mind to make sure you get the skills that match your needs. We have both private (on site) and public classes. Use the Rightsize tool to get a complete understanding of your options.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Public coursesBeginning of 2008 scheduled&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I have limited classes for the beginning of 2008:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Jan 15, 16, 17, 18: Portland, OR: Group Policy Essentials Course, Advanced One Day Course and XP-to-Vista Catch-Up Course. We really need you to sign up now if we want to make this class happen.&lt;/li&gt;
	&lt;li&gt;Jan 29, 30, Feb 1, 2: Orlando, FL: (Yes, I spun up this course so that you, yes you, can get approval to go to Orlando in the dead of winter time.) Group Policy Essentials course, Advanced One Day Course and XP-to-Vista Catch-Up course&lt;/li&gt;
	&lt;li&gt;Feb 4, 5, 6, 7: Washington, DC: Group Policy Essentials course, Advanced One Day Course and XP-to-Vista Catch-Up course&lt;/li&gt;
	&lt;li&gt;March 4, 5, 6, 7: Nashville, TN: Group Essentials course, Advanced One Day Course and XP-to-Vista Catch-Up Course.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For any public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/workshop&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What about OTHER CITIES in 2008?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and told me where you would like me to go for 2007.&lt;/p&gt;

&lt;p&gt;Now tell me where you want me to go for 2008. The cities with the most votes get classes in their city. Bigger cities are a better bet, so you might want to vote for your closest &quot;major airport&quot; city.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here&#039;s a deal you can&#039;t pass up!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Okay, let&#039;s assume I&#039;ll be in your city teaching a public class. How would you like to get a FREE student in the class? Easy: Be the &quot;host&quot; of the class. Allow me and our GPanswers.com students to use your conference room for the two, three, or four days, and you get a free student attendee!&lt;/p&gt;

&lt;p&gt;Such a deal!&lt;/p&gt;

&lt;p&gt;Lots of companies have been the hosts for public classes, and they&#039;ve gotten free training for one of their folks! So, if you&#039;re interested in free training for one of your teammates (maybe even you!) &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com?subject=Hosting%20a%20public%20class%20in%20my%20city%20in%20my%20conference%20room&quot;&gt;contact me&lt;/a&gt; if you&#039;re in one of the above cities, and we&#039;ll see about working out the details to have you host the class.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Private courses&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you think you might want your own private in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training (about 68), the course pays for itself (since you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, Japanor wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does have the distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, Security, and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/workshop&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt; .&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Group Policy: Management, Troubleshooting, and Security&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;For Windows Vista, Windows 2003, Windows XP, and Windows 2000&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands-on Solutions for a Mixed Environment&lt;/em&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If youre in the continental USA, you can order the Fourth Edition of &lt;em&gt;Group Policy: Management, Troubleshooting, and Security&lt;/em&gt; directly from me for $45 (including shipping).&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If you order the book from me, Ill sign the book for you, free! Ive had many requests for this service, and Im honored that you&#039;d ask!&lt;/li&gt;
	&lt;li&gt;If you order it from me, the shipping is included! Usually, I try to ship out the orders the SAME DAY. But if you positively need a guaranteed shipping date, then Amazon might be a better choice.&lt;/li&gt;
	&lt;li&gt;The slight extra cost goes toward the shipping from Sybex to me, then me to you (not for the signature). Again, note that shipping is included.&lt;/li&gt;
	&lt;li&gt;We take all kinds of credit cards. No PO orders for books, please, unless it&#039;s an order for 10 or more.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This book is in stock! We can ship it out today!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note, that I can only take orders from and ship to those in the continental United States. Thanks for your understanding.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/book&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;Also available is &lt;em&gt;Windows &amp; Linux Integration: Hands-on Solutions for a Mixed Environment&lt;/em&gt; from &lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0470106425&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0470106425&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Free Stuff&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;I just did a radio interview at RunAs radio. &lt;a href=&quot;http://www.runasradio.com/default.aspx?showNum=32&quot;&gt;Check it out here.&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;I&#039;ll be doing a GP Webinar for Centrify on Windows/Linux/Mac + GP Integration sometime in January or February. Stay tuned for that !&lt;strong&gt; &lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Don&#039;t forget our Sponsors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I can&#039;t tell you how often I hear that people LOVE the Solutions Guide we have at GPanswers.com/solutions. Inside, you&#039;ll find both free and third-party products which extend the reach of Group Policy, or let you do something you haven&#039;t discovered before!&lt;/p&gt;

&lt;p&gt;So, head on over to the &lt;a href=&quot;https://www.gpanswers.com/solutions&quot;&gt;Solutions Guide&lt;/a&gt; and see what other goodies are available!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can &lt;a href=&quot;https://www.gpanswers.com/newsletter/&quot; target=&quot;_blank&quot;&gt;sign up for your own newsletter subscription&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address:&lt;a href=&quot;https://www.gpanswers.com/newsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please FORWARD THE ENTIRE email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention regarding subscriptions and unsubscriptions, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Please POST your technical question on the &lt;a href=&quot;https://www.gpanswers.com/community&quot;&gt;GPanswers.com/community&lt;/a&gt; forum whenever possible.&lt;/p&gt;

&lt;p&gt;If you have questions about ordering a book, contact my assistant Margot at: &lt;a href=&quot;mailto:assistant@moskowitz-inc.com&quot;&gt;assistant@moskowitz-inc.com&lt;/a&gt; . I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;strong&gt;Thanks for reading!&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Congrats to Jakob Heidelberg .. new MVP </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/congrats-to-jakob-heidelberg-new-mvp</link>
        <pubDate>2008-04-05T00:00:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ It&#039;s no surprise that Jakob got the MVP award. What *IS* a surprise  is that he didn&#039;t get it for Group Policy, as expected. But, he&#039;s an  honorary GP MVP, since he does so much awesome work here ! If you don&#039;t  currently read his blog, you should. It&#039;s here:
http://heidelbergit.blogspot.com/ ]]>
        </description>
        <content:encoded>
            &lt;p&gt;It&#039;s no surprise that Jakob got the MVP award. What *IS* a surprise  is that he didn&#039;t get it for Group Policy, as expected. But, he&#039;s an  honorary GP MVP, since he does so much awesome work here ! If you don&#039;t  currently read his blog, you should. It&#039;s here:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://heidelbergit.blogspot.com/&quot;&gt;http://heidelbergit.blogspot.com/&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Congrats on new GP book for Derek </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/congrats-on-new-gp-book-for-derek</link>
        <pubDate>2008-04-02T00:03:54+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Derek Melber has a new GP book by Microsoft Press. I&#039;m holding my copy  in my hand, and it&#039;s a great book for anyone looking to get more  rounded on Group Policy. It&#039;s a short read, about 500 pages, and has  some good information on 3rd party tools and solutions. (Which I&#039;m a  big fan of.) Derek&#039;s book also cracks open ADMX files (if you&#039;re into  that kind of thing) as well as details sample output of many of the  Group Policy GPMC scripts (available online at Microsoft.com.) So check  it out. I ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Derek Melber has a new GP book by Microsoft Press. I&#039;m holding my copy  in my hand, and it&#039;s a great book for anyone looking to get more  rounded on Group Policy. It&#039;s a short read, about 500 pages, and has  some good information on 3rd party tools and solutions. (Which I&#039;m a  big fan of.) Derek&#039;s book also cracks open ADMX files (if you&#039;re into  that kind of thing) as well as details sample output of many of the  Group Policy GPMC scripts (available online at Microsoft.com.) So check  it out. It&#039;s part of the larger Microsoft Server 2008 Resource kit. You  can learn more about his book &lt;a href=&quot;http://www.microsoft.com/MSPress/books/9556.aspx&quot;&gt;here&lt;/a&gt;. Congrats Derek !&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> RSAT Tools are out (and GPPEs available as &quot;Optional Software&quot;) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/rsat-tools-are-out-and-gppes-available-as-optional-software</link>
        <pubDate>2008-04-01T23:55:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This blog entry is two tips in one. Click to find out why. Inside you&amp;#39;ll learn about the RSAT tools and also where the GPPEs can be downloaded using Microsoft Update.

Remember the ADMINPAK? It&amp;#39;s not available on Vista, but the all-new released-today RSAT tools are. RSAT stands for &amp;quot;Remote Server Administration Tools.&amp;quot; It contains the GPMC, ADUC, and all the greatest hits.

&amp;nbsp;

Download the Vista + SP1 + x86 version here: ttp://tinyurl.com/3xs2o6

Download the Vista ]]>
        </description>
        <content:encoded>
            &lt;p&gt;This blog entry is two tips in one. Click to find out why. Inside you&#039;ll learn about the RSAT tools and also where the GPPEs can be downloaded using Microsoft Update.&lt;/p&gt;

&lt;p&gt;Remember the ADMINPAK? It&#039;s not available on Vista, but the all-new released-today RSAT tools are. RSAT stands for &quot;Remote Server Administration Tools.&quot; It contains the GPMC, ADUC, and all the greatest hits.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Download the Vista + SP1 + x86 version here: ttp://tinyurl.com/3xs2o6&lt;/p&gt;

&lt;p&gt;Download the Vista + SP1 + x64 version here: http://tinyurl.com/337gfj&lt;/p&gt;

&lt;p&gt;PS: I&#039;m seeing the links going up and down all day today. It&#039;s weird.&lt;/p&gt;

&lt;p&gt;In other news, the GPPEs are available as &quot;Optional Software updates&quot; using Microsoft Update as seen here. Thanks to Scott Bailey for this tip !&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;/images/blog-GPPEs.jpg&quot; style=&quot;width:470px&quot; /&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Least User Privs </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/least-user-privs</link>
        <pubDate>2008-04-01T23:53:34+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ One of the hardest jobs is figuring out which users need Admin rights,  because our stinkin&#039; applications require admin rights. Well, that&#039;s  the business of BeyondTrust. And today, they came out with a (free)  tool to help you determine which applications require what admin rights  to run. Sure, the idea is that you&#039;ll have an &quot;A-ha&quot; moment and realize  that their (pay) tool (which is quite good) is the best way to keep the  user&#039;s rights LOW, but elevate the rights of the application. To check ]]>
        </description>
        <content:encoded>
            &lt;p&gt;One of the hardest jobs is figuring out which users need Admin rights,  because our stinkin&#039; applications require admin rights. Well, that&#039;s  the business of BeyondTrust. And today, they came out with a (free)  tool to help you determine which applications require what admin rights  to run. Sure, the idea is that you&#039;ll have an &quot;A-ha&quot; moment and realize  that their (pay) tool (which is quite good) is the best way to keep the  user&#039;s rights LOW, but elevate the rights of the application. To check  out the free auditor tool they came out with today, &lt;a href=&quot;http://www.beyondtrust.com/products/ApplicationRightsAuditor.aspx&quot;&gt;head on over here&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> The GPPEs are out! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/the-gppes-are-out</link>
        <pubDate>2008-04-01T23:48:21+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ New newsletter to user in their announcment coming soon. But, if you  want to start playing with them TODAY...here&#039;s where to find them  (thanks to my pal Jakob Heidelberg for making it easy for me to get.)  The &quot;real&quot; links are, gah, all over the place.
GPP CSEs for Windows Vista (KB943729)  GPP CSEs for Windows Vista x64 Edition (KB943729)  GPP CSEs for Windows Server 2003 (KB943729)  GPP CSEs for Windows Server 2003 x64 Edition (KB943729)  GPP CSEs for Windows XP (KB943729)  GPP CSEs for Win ]]>
        </description>
        <content:encoded>
            &lt;p&gt;New newsletter to user in their announcment coming soon. But, if you  want to start playing with them TODAY...here&#039;s where to find them  (thanks to my pal Jakob Heidelberg for making it easy for me to get.)  The &quot;real&quot; links are, gah, all over the place.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=ab60dc87-884c-46d5-82cd-f3c299dac7cc&amp;DisplayLang=en&quot; target=&quot;_blank&quot;&gt;GPP CSEs for Windows Vista (KB943729)&lt;/a&gt; &lt;br /&gt; &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=b10a7af4-8bee-4adc-8bbe-9949df77a3cf&amp;DisplayLang=en&quot; target=&quot;_blank&quot;&gt;GPP CSEs for Windows Vista x64 Edition (KB943729)&lt;/a&gt; &lt;br /&gt; &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=bfe775f9-5c34-44d0-8a94-44e47db35add&amp;DisplayLang=en&quot; target=&quot;_blank&quot;&gt;GPP CSEs for Windows Server 2003 (KB943729)&lt;/a&gt; &lt;br /&gt; &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=29e83503-7686-49f3-b42d-8e5ed23d5d79&amp;DisplayLang=en&quot; target=&quot;_blank&quot;&gt;GPP CSEs for Windows Server 2003 x64 Edition (KB943729)&lt;/a&gt; &lt;br /&gt; &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=e60b5c8f-d7dc-4b27-a261-247ce3f6c4f8&amp;DisplayLang=en&quot; target=&quot;_blank&quot;&gt;GPP CSEs for Windows XP (KB943729)&lt;/a&gt; &lt;br /&gt; &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=249c1aed-c1f1-4a0b-872e-ef0a32170625&amp;DisplayLang=en&quot; target=&quot;_blank&quot;&gt;GPP CSEs for Windows XP x64 Edition (KB943729)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;If you want a quick tutorial in them, I suggest getting Chapter 10  of my new book (which is available for immediate download.) Click the  &quot;About the book&quot; section and follow along until you get Chapter 10.  Thanks!&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> New GP Spreadsheet Updated for 2008 ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/new-gp-spreadsheet-updated-for-2008</link>
        <pubDate>2008-04-01T23:41:15+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Check it out ! It&#039;s here. Fully updated for all the new WS08 policy settings. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Check it out ! It&#039;s &lt;a href=&quot;http://tinyurl.com/32qpc7&quot;&gt;here&lt;/a&gt;. Fully updated for all the new WS08 policy settings.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Good morning! Now you can&#039;t open your files! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/good-morning-now-you-cant-open-your-files</link>
        <pubDate>2008-04-01T23:37:07+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Microsoft Office 2003&#039;s SP3 has an interesting twist. They&#039;re silently  changing which file types are valid. In short, old and crusty files  your users have been able to open for years, suddenly... aren&#039;t. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Microsoft Office 2003&#039;s SP3 has an interesting twist. They&#039;re silently  changing which file types are valid. In short, old and crusty files  your users have been able to open for years, suddenly... aren&#039;t.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> More information on the &quot;I can&#039;t open my files&quot; issue </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/more-information-on-the-i-cant-open-my-files-issue</link>
        <pubDate>2008-04-01T23:36:02+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Good article. A recommended read with interesting .REG files to re-enable functionality.

http://tinyurl.com/325r4q ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Good article. A recommended read with interesting .REG files to re-enable functionality.&lt;/p&gt;

&lt;p&gt;http://tinyurl.com/325r4q&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Softgrid Client Update </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/softgrid-client-update</link>
        <pubDate>2008-04-01T23:34:57+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So the other day I posted about a Softgrid to MSI  repackaging tool. Great! Except it doesn&#039;t work with the existing  Softgrid client. (Boo.) But the new client is now out! (Yay!) http://support.microsoft.com/kb/941408 Why they didn&#039;t come out at the same time is a bit  of a mystery. But.. That&#039;s the breaks sometimes. Anyway.. Enjoy  Softgrid geeks ! (PS: I&#039;m one of you!) ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So the other day I posted about a Softgrid to MSI  repackaging tool. Great! Except it doesn&#039;t work with the existing  Softgrid client. (Boo.) But the new client is now out! (Yay!)&lt;/p&gt; &lt;p&gt;http://support.microsoft.com/kb/941408&lt;/p&gt; &lt;p&gt;Why they didn&#039;t come out at the same time is a bit  of a mystery. But.. That&#039;s the breaks sometimes. Anyway.. Enjoy  Softgrid geeks ! (PS: I&#039;m one of you!)&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> New Tool for Softgrid + GPSI marriage </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/new-tool-for-softgrid-gpsi-marriage</link>
        <pubDate>2008-04-01T23:33:42+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So, I can confess it. I love Microsoft Softgrid. I really do. For  the uninitiated, Softgrid (newly renamed Microsoft Application  Virtualization) can take an application and &quot;stream&quot; it from a server  to your desktop. Keen-o-rific. This means you&#039;re not actually  INSTALLING anything; but rather, just running it streamed. Except there  was no way to &quot;deploy&quot; that application using GP. Until now. Enter in  the Softgrid MSI &quot;wrapper&quot; utility (found here.) The idea is simple: if you can wrap an exi ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So, I can confess it. I love Microsoft Softgrid. I really do. For  the uninitiated, Softgrid (newly renamed Microsoft Application  Virtualization) can take an application and &quot;stream&quot; it from a server  to your desktop. Keen-o-rific. This means you&#039;re not actually  INSTALLING anything; but rather, just running it streamed. Except there  was no way to &quot;deploy&quot; that application using GP. Until now. Enter in  the Softgrid MSI &quot;wrapper&quot; utility (&lt;a href=&quot;http://tinyurl.com/2zlpyq&quot;&gt;found here&lt;/a&gt;.)&lt;/p&gt; &lt;p&gt;The idea is simple: if you can wrap an existing Softgrid package  into an MSI, then you can use GP (or SMS, or Landesk or anything) to  maintain your deployment practices.&lt;/p&gt; &lt;p&gt;I haven&#039;t had a chance to try this out yet.. So, if you do, and  you&#039;re a Softgrid + GP head, then shoot me an email and let me know how  it went! Thanks !&lt;/p&gt; &lt;p&gt;PS: Thanks to GPanswers.com Shortstop Eric Johnson for bringing to my attention that this tool was FINALLY available.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Need to block those service packs? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/need-to-block-those-service-packs</link>
        <pubDate>2008-04-01T23:30:54+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So, Vista SP1 and XP SP3 will both be required downloaded using Windows update. What? Don&#039;t like the way that sounds? Then use these ADM templates.  But the &quot;breaks&quot; don&#039;t last forever. If I&#039;m reading it right, the  updates will eventually be forced down 12 months after the service  packs are released. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So, Vista SP1 and XP SP3 will both be required downloaded using Windows update. What? Don&#039;t like the way that sounds? Then use &lt;a href=&quot;http://tinyurl.com/2uryvq&quot;&gt;these ADM templates&lt;/a&gt;.  But the &quot;breaks&quot; don&#039;t last forever. If I&#039;m reading it right, the  updates will eventually be forced down 12 months after the service  packs are released.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Vista slower than XP? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/vista-slower-than-xp</link>
        <pubDate>2008-04-01T23:26:41+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ So my good friend Mark Minasi and I have this running debate about  Vista. It&#039;s not about if Vista is BETTER than XP or not. It&#039;s about if  Vista is SLOWER than XP. Mark is awesome, but he must have some killer  hardware. I upgraded my laptop to a Dell D620 (you see me present on  this puppy in my classes and at conferences.) It has 4GB RAM, 160GB  7200 RPM hard disk and all the bells and whistles. And Vista on it just  runs like crud. So I went back to XP. But on my DESKTOPS, I find that  I&#039;m h ]]>
        </description>
        <content:encoded>
            &lt;p&gt;So my good friend Mark Minasi and I have this running debate about  Vista. It&#039;s not about if Vista is BETTER than XP or not. It&#039;s about if  Vista is SLOWER than XP. Mark is awesome, but he must have some killer  hardware. I upgraded my laptop to a Dell D620 (you see me present on  this puppy in my classes and at conferences.) It has 4GB RAM, 160GB  7200 RPM hard disk and all the bells and whistles. And Vista on it just  runs like crud. So I went back to XP. But on my DESKTOPS, I find that  I&#039;m happier with Vista. Things are a lot punchier. I&#039;m wondering if  it&#039;s the disk (2.5 for laptop vs 3.5 for desktop) that makes the  difference. Or a speedier Front Side Bus. Or something. But anyway.. &lt;a href=&quot;http://tinyurl.com/27zbjw&quot;&gt;this report&lt;/a&gt; just came out about how ON THE SAME HARDWARE that XP is FASTER than  Vista. And I could have told you that already. I&#039;m not bashing  Microsoft. I&#039;m just reporting my experience.. And I wish my experience  was faster, not slower on the same hardware, is all.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Interview on RunAs Radio </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/interview-on-runas-radio</link>
        <pubDate>2008-04-01T23:25:45+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I was recently interviewed by RunAsRadio.com. Really great guys.. Thanks for having me on your show. Everyone can click Here to hear the interview! ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I was recently interviewed by RunAsRadio.com. Really great guys.. Thanks for having me on your show. Everyone can click &lt;a href=&quot;http://www.runasradio.com/default.aspx?showNum=32&quot;&gt;Here &lt;/a&gt;to hear the interview!&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> BIG NEWS DAY </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/big-news-day</link>
        <pubDate>2008-04-01T23:24:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The big news is finally here: What is Microsoft doing with the  &quot;crown jewels&quot; of the DesktopStandard acquisition? In short: It&#039;s gonna  be free. Here&#039;s the breakdown of the announcement:    The PolicyMaker technologies will officially be called Group Policy Preferences.   There are 20-some-odd &quot;big&quot; things you can do, like zap down drive mapping and shortcuts and a whole lot more.   PolicyMaker Share Manager (which helps you set up and dictate share permissions) will also be part of the set.    ]]>
        </description>
        <content:encoded>
            &lt;p&gt;The big news is finally here: What is Microsoft doing with the  &quot;crown jewels&quot; of the DesktopStandard acquisition? In short: It&#039;s gonna  be free. Here&#039;s the breakdown of the announcement:&lt;/p&gt; &lt;ul&gt;   &lt;li&gt;The PolicyMaker technologies will officially be called Group Policy Preferences.&lt;/li&gt;   &lt;li&gt;There are 20-some-odd &quot;big&quot; things you can do, like zap down drive mapping and shortcuts and a whole lot more.&lt;/li&gt;   &lt;li&gt;PolicyMaker Share Manager (which helps you set up and dictate share permissions) will also be part of the set.&lt;/li&gt;   &lt;li&gt;They require a CSE (Client Side Extension) as do all GP extensions.&lt;ul&gt;     &lt;li&gt;The CSE will ship in the box for Windows Server 2008.&lt;/li&gt;     &lt;li&gt;The CSE will be an extra download for XP, 2003 and Vista&lt;/li&gt;     &lt;li&gt;The CSE will not work for 2000&lt;/li&gt;   &lt;/ul&gt;&lt;/li&gt;    &lt;/ul&gt; &lt;p&gt;So, why are they called the &quot;Group Policy Preferences&quot; and not more  something.. &quot;Policy-ish?&quot; I&#039;ll explain that in an upcoming newsletter.  However, Microsoft has a whitepaper which details the major new  categories of features and describes some other odds and ends including  the distinction between a Policy and a Preference. &lt;/p&gt; &lt;p&gt;That paper is &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyID=42e30e3f-6f01-4610-9d6e-f6e0fb7a0790&amp;DisplayLang=en&quot;&gt;here &lt;/a&gt;which every GP admin should read.&lt;/p&gt; &lt;p&gt;I will be covering this in an upcoming newsletter soon as well as have FULL coverage in the next book; I promise !!&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> ADMX Migrator tool gets a makeover </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/admx-migrator-tool-gets-a-makeover</link>
        <pubDate>2008-04-01T23:22:39+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ The ADMX migrator tool JUST got a makeover. I put it through the appropriate paces (I was the guy who filed most of  the bugs when things didn&#039;t convert correctly..) And, well, they&#039;re all  fixed, and it works the way it should have. So, check it out. ADMX Migrator tool 1.2. Link here. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;The ADMX migrator tool JUST got a makeover.&lt;/p&gt; &lt;p&gt;I put it through the appropriate paces (I was the guy who filed most of  the bugs when things didn&#039;t convert correctly..) And, well, they&#039;re all  fixed, and it works the way it should have.&lt;/p&gt; &lt;p&gt;So, check it out. ADMX Migrator tool 1.2. &lt;a href=&quot;http://go.microsoft.com/fwlink/?LinkId=77409%20&quot;&gt;Link here&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Check out Greg&#039;s correction </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/check-out-gregs-correction</link>
        <pubDate>2008-04-01T23:20:21+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Greg from MCPmag almost got it right. So I set him straight about ADM and ADMX files. Check out his correction in MCPmag.com here. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Greg from MCPmag almost got it right. So I set him straight about ADM and ADMX files. Check out his correction in MCPmag.com &lt;a href=&quot;http://mcpmag.com/columns/article.asp?EditorialsID=2288&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> ADMX files for Office 2007 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/admx-files-for-office-2007</link>
        <pubDate>2008-04-01T23:19:17+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ It&#039;s only 11 months after RTM, so these files are right on time! :-)  Just kidding, I&#039;m sure it was a lot of work. These ADMX files for  Office 2007 localize the GP settings into 8 languages, so that&#039;s pretty  impressive. Just pop &#039;em in your central store, and get a beer. Don&#039;t  know what ADMX files are? Then read the last two newsletters. Don&#039;t  know what a central store is? Then read my free Chapter 5 in the &quot;Book  Resources&quot; section here on this site. That&#039;s what we do here at  GPanswers.com ]]>
        </description>
        <content:encoded>
            &lt;p&gt;It&#039;s only 11 months after RTM, so these files are right on time! :-)  Just kidding, I&#039;m sure it was a lot of work. These ADMX files for  Office 2007 localize the GP settings into 8 languages, so that&#039;s pretty  impressive. Just pop &#039;em in your central store, and get a beer. Don&#039;t  know what ADMX files are? Then read the last two newsletters. Don&#039;t  know what a central store is? Then read my free Chapter 5 in the &quot;Book  Resources&quot; section here on this site. That&#039;s what we do here at  GPanswers.com -- giving you the building blocks to get smarter in Group  Policy. Since 2003 ! Check out the ADM and ADMX files &lt;a href=&quot;http://tinyurl.com/2rr8c2&quot;&gt;here &lt;/a&gt;(one download.)&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Greg Shields&#039; new book </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/greg-shields-new-book</link>
        <pubDate>2008-04-01T23:16:57+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I like this idea a lot. It&#039;s a book on JUST the WS208 changes. But  wait! Here&#039;s their cool deal. You can get the eBook today (it&#039;s a  little rough around the edge) and any other edited eBook versions for  free AND they&#039;ll also send you the printed book when it&#039;s ready. Wow.  Check it out. Good job Greg (and Don.. Jones that is.) Click here. PS: Greg calls me a nice name in the book. It&#039;s fun.. check it out. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I like this idea a lot. It&#039;s a book on JUST the WS208 changes. But  wait! Here&#039;s their cool deal. You can get the eBook today (it&#039;s a  little rough around the edge) and any other edited eBook versions for  free AND they&#039;ll also send you the printed book when it&#039;s ready. Wow.  Check it out. Good job Greg (and Don.. Jones that is.) &lt;a href=&quot;http://tinyurl.com/34p8ru&quot;&gt;Click here&lt;/a&gt;. PS: Greg calls me a nice name in the book. It&#039;s fun.. check it out.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Mark Minasi Classes </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/mark-minasi-classes</link>
        <pubDate>2008-04-01T23:15:51+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ If you&#039;ve never had a chance to see Mark Minasi speak, you should. He&#039;s  a great friend of mine, so take it from someone who really knows him:  He cares about you learning your stuff. I&#039;ve just sat through his one  day Windows Server 2008 &quot;Upgrade&quot; training. He nails 8 or 9 huge &quot;all  purpose&quot; topics, including all the AD changes, TS changes, and IIS  changes. Even some light GP changes! More stuff than should humanly be  allowed to be learned in a day. A killer overview with 323 slides,  which  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;If you&#039;ve never had a chance to see Mark Minasi speak, you should. He&#039;s  a great friend of mine, so take it from someone who really knows him:  He cares about you learning your stuff. I&#039;ve just sat through his one  day Windows Server 2008 &quot;Upgrade&quot; training. He nails 8 or 9 huge &quot;all  purpose&quot; topics, including all the AD changes, TS changes, and IIS  changes. Even some light GP changes! More stuff than should humanly be  allowed to be learned in a day. A killer overview with 323 slides,  which he really did a great job. In short, check out &lt;a href=&quot;http://www.Minasi.com&quot;&gt;www.Minasi.com&lt;/a&gt; for his public and private training classes. Then take one. (But for  specialized GP training, well, don&#039;t forget who your friends are!)&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Busy busy busy </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/busy-busy-busy</link>
        <pubDate>2008-04-01T23:14:26+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Administrative  Templates (.admx) for Windows Vista If you want to dump every language under the sun  into the Central Store, the GP team released ALL the ADMX files in one  big fat download. Pour into your Central Store. Click here.     Here. Group  Policy Management Console Sample Scripts Vista ships with the GPMC built in. (Though adding  Vista + Sp1 when it&#039;s released will remove the GPMC... see another blog  post for more on that. ) Meanwhile, people have asked me about a  billion times --  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;strong&gt;Administrative  Templates (.admx) for Windows Vista&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;If you want to dump every language under the sun  into the Central Store, the GP team released ALL the ADMX files in one  big fat download. Pour into your Central Store. Click here.&lt;br /&gt;     &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyId=05D0598B-95F9-4BDD-AF36-B365D68EC5F6&amp;displaylang=en&quot;&gt;Here&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Group  Policy Management Console Sample Scripts&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Vista ships with the GPMC built in. (Though adding  Vista + Sp1 when it&#039;s released will remove the GPMC... see another blog  post for more on that. ) Meanwhile, people have asked me about a  billion times -- where are the GPMC scripts that used to be installed  with the GPMC? Finally, finally.. they&#039;re &lt;a href=&quot;http://www.microsoft.com/downloads/details.aspx?FamilyId=38C1A89B-A6D2-4F2A-A944-9236999AEE65&amp;displaylang=en&quot;&gt;here.&lt;/a&gt; &lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> GP Health Model </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/gp-health-model</link>
        <pubDate>2008-04-01T23:13:14+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I get questions all the time like &quot;Why isn&#039;t GP working?&quot; Well, that&#039;s  not often the easiest question to answer because there&#039;s a lot of  moving parts to GP. With that in mind, Microsoft has some new  documentation called the &quot;GP Health Model&quot; / GP Infrastructure. It&#039;s  really an &quot;Anatomy of GP&quot; so you can say &quot;Doctor, when I move my arm it  hurts!&quot; and see that it&#039;s really your shoulder and not your arm.  Anyway, check out the doc. Very interesting stuff. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I get questions all the time like &quot;Why isn&#039;t GP working?&quot; Well, that&#039;s  not often the easiest question to answer because there&#039;s a lot of  moving parts to GP. With that in mind, Microsoft has some new  documentation called the &quot;GP Health Model&quot; / GP Infrastructure. It&#039;s  really an &quot;Anatomy of GP&quot; so you can say &quot;Doctor, when I move my arm it  hurts!&quot; and see that it&#039;s really your shoulder and not your arm.  Anyway, check out the doc. &lt;a href=&quot;http://tinyurl.com/2na47j&quot;&gt;Very interesting stuff&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Learn about AGPM from Kevin Sullivan from Microsoft </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/learn-about-agpm-from-kevin-sullivan-from-microsoft</link>
        <pubDate>2008-04-01T23:08:12+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ AGPM helps you edit and manager GPOs offline before going &quot;live.&quot; If  you&#039;ve never seen AGPM in action hear it from The Chief, Kevin Sullivan  from Microsoft. Great video with awesome production values Click Here ]]>
        </description>
        <content:encoded>
            &lt;p&gt;AGPM helps you edit and manager GPOs offline before going &quot;live.&quot; If  you&#039;ve never seen AGPM in action hear it from The Chief, Kevin Sullivan  from Microsoft. Great video with awesome production values &lt;a href=&quot;http://www.microsoft.com/windows/products/windowsvista/editions/enterprise/videos/agpm.asx&quot; title=&quot;Click here&quot;&gt;Click Here&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Help out the GP Team! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/help-out-the-gp-team</link>
        <pubDate>2008-04-01T23:06:56+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Want to help out the GP team at Microsoft directly?     The  Microsoft Group Policy team would like to hear from you!  Please take a  few minutes and complete the survey on how you use Group Policy to help  Microsoft enhance the manageability Group Policy provides to your  organization.  The survey can be found here and is completely anonymous.  The survey will remain open through  Friday, September 28, 2007.  Thank you in advance for your time and  input! ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Want to help out the GP team at Microsoft directly?&lt;br /&gt;    &lt;/p&gt; &lt;p&gt;The  Microsoft Group Policy team would like to hear from you!  Please take a  few minutes and complete the survey on how you use Group Policy to help  Microsoft enhance the manageability Group Policy provides to your  organization.  The survey can be found &lt;a href=&quot;http://www.surveymonkey.com/s.aspx?sm=mosdF9Z6WNKIJ76gL_2bxv4w_3d_3d&quot;&gt;here &lt;/a&gt;and is completely anonymous.  The survey will remain open through  Friday, September 28, 2007.  Thank you in advance for your time and  input!&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Vista + SP1 = Gbye GPMC </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/vista-sp1-gbye-gpmc</link>
        <pubDate>2008-04-01T23:05:20+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Right. So, here&#039;s the deal. Let&#039;s talk about yesterday, today and tomorrow.
Today, the GPMC is part of Vista. That&#039;s great. One less thing to load.
But what&#039;s also (now) true is that if you install SP1 for Vista (not yet available) the GPMC will be uninstalled. Why?
Because this allows for something that I&#039;ve personally advocated  for. That is, when new goodies are ready to be launched in Group Policy  land, let&#039;s GET IT OUT THE DOOR. And it used to be this way. The GPMC  was a simple downloa ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Right. So, here&#039;s the deal. Let&#039;s talk about yesterday, today and tomorrow.&lt;/p&gt;
&lt;p&gt;Today, the GPMC is part of Vista. That&#039;s great. One less thing to load.&lt;/p&gt;
&lt;p&gt;But what&#039;s also (now) true is that if you install SP1 for Vista (not yet available) the GPMC will be uninstalled. Why?&lt;/p&gt;
&lt;p&gt;Because this allows for something that I&#039;ve personally advocated  for. That is, when new goodies are ready to be launched in Group Policy  land, let&#039;s GET IT OUT THE DOOR. And it used to be this way. The GPMC  was a simple download and simple install. When bugs were found in the  GPMC, that meant it was a quick fix to jam the fixes in, and re-upload  the file for the masses.&lt;/p&gt;
&lt;p&gt;But now (today) the GPMC is part of the Longhorn and Vista operating  systems. Is this good? Not really, in this one dude&#039;s opinion. Because  what if some new whiz bang feature is suddenly available? Then you&#039;ll  have to wait until MAYBE an operating system service pack, or at worst  a full operating system revision until it&#039;s updated.&lt;/p&gt;
&lt;p&gt;But it seems going forward the team has made a decision. That is,  the GPMC will &quot;break free&quot; from the operating system. This is good and  bad. Good because bug fixes and updates will most certainly happen  quicker. It&#039;s bad because, dang, the GPMC is so great it just feels  like it SHOULD be part of the OS. Also bad because the poor GP team has  the wrap up their own changes (called Out of Band) changes, where they  could rely on different Microsoft build teams to keep it updated inside  the operating system.&lt;/p&gt;
&lt;p&gt;So, it&#039;s a little more work for the GP team, but in my opinion, a  really good change. So, Vista + SP1 = no more GPMC. Until you download  it (which will have more features anyway.)&lt;/p&gt;
&lt;p&gt;So, are you freaked out? Or are you okay with it?&lt;/p&gt;
&lt;p&gt;Send me an email. Would love to hear your opinion. (Note I may not  be able to respond to all opinions, though I promise I will read it.)  Thanks!&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;index.php?option=com_content&amp;view=article&amp;id=509&amp;Itemid=177&quot;&gt;Click here for a link to my email.&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> ADMX Converter and NetIQ Whitepaper and SEARCH ! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/admx-converter-and-netiq-whitepaper-and-search</link>
        <pubDate>2008-04-01T23:02:34+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Two quick notes: Note #1:  In my testing of FullArmor/Microsoft&#039;s ADM to ADMX migrator tool, I  encountered a bunch of issues. Namely, all sorts of ADM files I had  hanging around wouldn&#039;t properly convert to ADMX. Actually, they WOULD  convert, but then in the GPOE editor they would bomb out. So, after I  reported these errors to FullArmor/Microsoft, I&#039;m happy to say I got a  great response for others in the same boat: &quot;We&#039;ve been working on a  new release of ADMX Migrator and have resolved mos ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Two quick notes:&lt;/p&gt; &lt;p&gt;Note #1: &lt;/p&gt; &lt;p&gt;In my testing of FullArmor/Microsoft&#039;s ADM to ADMX migrator tool, I  encountered a bunch of issues. Namely, all sorts of ADM files I had  hanging around wouldn&#039;t properly convert to ADMX. Actually, they WOULD  convert, but then in the GPOE editor they would bomb out. So, after I  reported these errors to FullArmor/Microsoft, I&#039;m happy to say I got a  great response for others in the same boat: &quot;We&#039;ve been working on a  new release of ADMX Migrator and have resolved most of the issues  including all of the issues raised by Jeremy.  We will be feature  complete in the next week and a half and expect to release beginning of  October 2007. &quot;&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Note #2:&lt;/p&gt; &lt;p&gt;I have a new NetIQ sponsored whitepaper out called &quot;Why GP Matters -- For Servers&quot;. &lt;a href=&quot;http://www.netiq.com/f/form/form.asp?id=3163&amp;origin=gpans&quot;&gt;Click here for that paper&lt;/a&gt;.&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;Note #3:&lt;/p&gt; &lt;p&gt;GPanswers.com now has a search engine. Check it out on the main page !&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> WMI Provider for Offline FIles </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/wmi-provider-for-offline-files</link>
        <pubDate>2008-04-01T22:56:52+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Before, I posted about the COM provider for Offline Files. Here&#039;s the spec for the WMI provider. Click here. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Before, I posted about the COM provider for Offline Files. Here&#039;s the spec for the WMI provider.&lt;/p&gt; &lt;p&gt;Click &lt;a href=&quot;http://msdn2.microsoft.com/en-us/library/bb309196.aspx&quot; title=&quot;WMI provider for OfflineFiles&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Windows SteadyState now Available </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/windows-steadystate-now-available</link>
        <pubDate>2008-04-01T22:55:57+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ First there was the Shared Computer Toolkit.. Now there&#039;s Microsoft  SteadyState. The goal? Put the full smackdown on your target machine so  nothing can ever change (unless you want it to !) Check it out here: http://tinyurl.com/37lfo4 Also .. they have a nice community forum here: http://tinyurl.com/3c5jel ]]>
        </description>
        <content:encoded>
            &lt;p&gt;First there was the Shared Computer Toolkit.. Now there&#039;s Microsoft  SteadyState. The goal? Put the full smackdown on your target machine so  nothing can ever change (unless you want it to !)&lt;/p&gt; &lt;p&gt;Check it out here:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://tinyurl.com/37lfo4&quot;&gt;http://tinyurl.com/37lfo4&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Also .. they have a nice community forum here:&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://tinyurl.com/3c5jel&quot;&gt;http://tinyurl.com/3c5jel&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Script from 4th Edition Book now online! </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/script-from-4th-edition-book-now-online</link>
        <pubDate>2008-04-01T22:54:50+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ This took a little while to get up there.. Sorry about that. Here they are ! ]]>
        </description>
        <content:encoded>
            &lt;p&gt;This took a little while to get up there.. Sorry about that. Here they are !&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Loss in the GP world </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/loss-in-the-gp-world</link>
        <pubDate>2008-04-01T22:35:32+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ I am profoundly saddened to report that Ron Hrehirchuk, our original  &quot;Guy Friday&quot; here at GPanswers.com has passed away. Ron was  instrumental in getting GPanswers.com where it is today. He was hugely  dedicated to his family, his job, and made an enormous effort here at  GPanswers.com. We will miss him immensely.  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;I am profoundly saddened to report that Ron Hrehirchuk, our original  &quot;Guy Friday&quot; here at GPanswers.com has passed away. Ron was  instrumental in getting GPanswers.com where it is today. He was hugely  dedicated to his family, his job, and made an enormous effort here at  GPanswers.com. We will miss him immensely. &lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Service Pack 2 for WS03 is coming... </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/service-pack-2-for-ws03-is-coming</link>
        <pubDate>2008-04-01T22:28:55+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ FYI.. W2K3 SP2 has been been made a &quot;high priority&quot; update through the Windows Update site. However, there is a Toolkit to Temporarily Block Delivery of Windows Server 2003 Service Pack 2 http://tinyurl.com/2smeyl  Hope that&#039;s helpful. Thanks for Ron Montomery for the tip! ]]>
        </description>
        <content:encoded>
            &lt;p&gt;FYI..&lt;/p&gt; &lt;p&gt;W2K3 SP2 has been been made a &quot;high priority&quot; update through the Windows Update site.&lt;/p&gt; &lt;p&gt;However, there is a Toolkit to Temporarily Block Delivery of Windows Server 2003 Service Pack 2&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://tinyurl.com/2smeyl&quot;&gt;http://tinyurl.com/2smeyl&lt;/a&gt; &lt;/p&gt; &lt;p&gt;Hope that&#039;s helpful. Thanks for Ron Montomery for the tip!&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Interview with Outgoing GP Team Lead -- Michael Dennis </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/interview-with-outgoing-gp-team-lead-michael-dennis</link>
        <pubDate>2008-04-01T22:12:53+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Hello GPanswers.com blog readers. There are some big changes in the  world of Group Policy. The Lead Program Manager, Michael Dennis is  shifting roles within Microsoft after 9 years and 9 months on the job  (to the day!).         In this GPanswers.com exclusive, I was able to interview Michael Dennis  for an &quot;Exit Interview&quot; to find out some inside scoop about his tenure  on the Group Policy team, and where he&#039;s going inside Microsoft.      Note to other websites and news sources: because this  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Hello GPanswers.com blog readers. There are some big changes in the  world of Group Policy. The Lead Program Manager, Michael Dennis is  shifting roles within Microsoft after 9 years and 9 months on the job  (to the day!). &lt;br /&gt;     &lt;br /&gt;   In this GPanswers.com exclusive, I was able to interview Michael Dennis  for an &quot;Exit Interview&quot; to find out some inside scoop about his tenure  on the Group Policy team, and where he&#039;s going inside Microsoft.&lt;br /&gt;   &lt;br /&gt;   Note to other websites and news sources: because this content is  exclusive to GPanswers.com, you may site and source GPanswers.com. But  please do not copy it wholesale to other websites.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;&lt;p&gt; &lt;/p&gt; &lt;p&gt;---&lt;/p&gt; &lt;p&gt; &lt;/p&gt; &lt;p&gt;&lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]: Michael, thanks for this  interview. I think lots of people would want to know what you would  consider your best achievements during your time running the Group  Policy team.&lt;/strong&gt;&lt;br /&gt;   [Michael Dennis, Microsoft]: The biggest achievements go back some time  ago, where we concentrated on developing what was to be known as &quot;Group  Policy&quot;. We had System Policy in NT 4.0, looked at that and it&#039;s  problems. And, since this was in the middle of Active Directory&#039;s  development, we looked at where we needed to better address the  manageability of clients and servers.&lt;/p&gt; &lt;p&gt;The idea that Group Policy was to be built in a hierarchy and that this  idea had never been done before was a big deal to us. So, we  concentrated on core infrastructure: client processes, integration with  Active Directory.&lt;/p&gt; &lt;p&gt;The byproduct of our &quot;best achievement&quot; was also our worst achievement.  That&#039;s because the GUI that we shipped in Windows 2000 was problematic.  People needed a &quot;PhD&quot; in Group Policy to use it effectively because  administrators needed to know how &quot;the whole thing worked.&quot; I wished we  could have created the GPMC and RSOP and delivered it back then (it was  in the specs.) &lt;/p&gt; &lt;p&gt;The other big achievement, I would say, is that you can pretty much  &quot;count on it [Group Policy] working.&quot; And we&#039;re honored that people can  just count on Group Policy doing it&#039;s job. Because of that, our team  has been even more focused on keeping that idea [of it &quot;just working&quot;]  in the forefront. We have a very strong test team to make sure Group  Policy does continue to &quot;just work.&quot;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]:  How did &quot;Group Policy&quot; get its name?&lt;/strong&gt;&lt;br /&gt;   [Michael Dennis, Microsoft]: (Laughs). We were talking about this thing called &quot;policy&quot;.&lt;br /&gt;   My thought at the time was that the word by itself was too broad. It means too many things to too many people.&lt;/p&gt; &lt;p&gt;   So, when we took a step back and tried to figure out where we managed  things, we saw &quot;groups&quot; of places that we targeted. Active Directory is  used for containment [of Group Policy Objects] and also for the  targeting of GPOs. So, right there that&#039;s three &quot;groups&quot; of things.  Site, Domains and OUs can be &quot;groups&quot; of things in the logical sense.  Then we also deal with Users and Computers: that&#039;s another two &quot;groups&quot;  of things. And, while Group Policy objects don&#039;t link directly to  security groups, we do leverage them for filtering. So, there&#039;s  &quot;groups&quot; again.&lt;/p&gt; &lt;p&gt;So, &quot;Group Policy&quot; became the name, and I&#039;ve been questioned about it ever since.&lt;/p&gt; &lt;p&gt;Could there be a better name? Perhaps, but in all the years that have  passed nothing better has been suggested. And, regardless, &quot;Group  Policy&quot; now has a life of it&#039;s own, both as a solution and as a  technology.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]:  What items do you wish could have made it into the Group Policy experience? &lt;/strong&gt;&lt;br /&gt;   [Michael Dennis, Microsoft]: The good news is that the things I have  been wishing for all along have been seen the light of day. Along the  way, my wishes, my vision, the things I&#039;ve wanted since Windows 2000&#039;s  release are here now in Vista. Things like RSoP, the GPMC, the  increased settings, etc make me feel very good about where Group Policy  is today! I do wish we could have done those things a whole lot sooner. &lt;/p&gt; &lt;p&gt;Additionally, I wish that the Group Policy infrastructure was a more  extensible system by partners. Our server side / client side extension  model is heavy handed and requires  a good deal of work by developers. Though it could be argued that our  ADM/ADMX template structure does provide an easily extensible  methodolgy. But, it would be even better if that part of the system  enabled people to extend even more types of settings.&lt;/p&gt; &lt;p&gt;Lastly, I wish that the GPMC was more extensible from a reporting  perspective to [3rd party tools.] That&#039;s an area which 3rd party tool  vendors have been pretty vocal.&lt;/p&gt; &lt;p&gt;     &lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]:  What are some things people don&#039;t know about the Group Policy team? &lt;/strong&gt;&lt;br /&gt;   [Michael Dennis, Microsoft]: Sometimes, it&#039;s not clear to people where  the Group Policy team &quot;fits in&quot; to the overall picture. The idea is  that we build the infrastructure, we build the transport, and we build  the server and client side pieces. But in Vista alone we partnered with  about 120 different teams at Microsoft to get the new settings in place  for this release. We&#039;re the &quot;middleman.&quot; So, if you see a Group Policy  setting who&#039;s behavior seems odd, or has &quot;Explain text&quot; [the text  within policy settings] that could be clearer, that&#039;s not specifically  the Group Policy team&#039;s doing. &lt;/p&gt; &lt;p&gt;Another thing is that Group Policy is not to blame for system  &quot;slowdown&quot; issues at boot or logon. It&#039;s the Group Policy payload  that&#039;s to blame if things are slow. If you tell Group Policy to do  something that&#039;s heavyweight, it&#039;s going to just &quot;do it.&quot; For instance,  if you tell it to install Microsoft Office on a per-machine basis,  great.  But just know that it will do what you asked for, it will  install all of Office before you get a logon prompt.  Is that a  slowdown? You betcha, but as an admin that deployed it, it&#039;s exactly  what you wanted the system to do.&lt;/p&gt; &lt;p&gt;The good news is that Group Policy will do these things, then, once  it&#039;s done it, it doesn&#039;t have to do it again, and doesn&#039;t get in your  way &quot;the second time&quot; because we check to see what it&#039;s already done.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]:  What&#039;s your favorite thing to &quot;show off&quot; using Group Policy ? &lt;/strong&gt;&lt;br /&gt;   [Michael Dennis, Microsoft]:  These days, I like to show off some of  the new settings that made it into Vista. The removable devices  settings [to restrict things like USB sticks, etc]; those settings  people had been clamoring for.  There are about 2400 settings in Vista,  which brings a significantly larger level of control to the admins, so  I like asking customers &quot;What do you want to control?&quot; and then show  them how.&lt;/p&gt; &lt;p&gt;   &lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]:  Why did you change from ADM to ADMX files?  &lt;/strong&gt;&lt;br /&gt;   [Michael Dennis, Microsoft]:   Technically, we didn&#039;t have to get to  ADMX to get to the new central store feature with Windows Vista. The  big push for converting to ADMX was to allow us to support multiple  languages appropriately.&lt;/p&gt; &lt;p&gt;   In the old way, in Multilanguage environments, you would often run into  a situation where the contents of the ADM files inside a GPO would be  inadvertently written by another language. Historically, we borrowed  the ADM format from NT 4.0 which had borrowed it from 98 which had  borrowed it from 95. If XML had been around then, it would have been a  good candidate for our file format. &lt;/p&gt; &lt;p&gt;But, now that we have XML, it became easier to support multiple  languages, and it presents us future opportunities to make registry and  settings enhancements with our now schematized language.&lt;/p&gt; &lt;p&gt;   &lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]:  What was the biggest internal challenge you had to overcome while working at the GP team? &lt;/strong&gt; &lt;br /&gt;   [Michael Dennis, Microsoft]:   The most ongoing problem that our team  faces is when we try to get other components of Windows to policy  enable their feature.&lt;/p&gt; &lt;p&gt;Team X might respond &quot;We just built this great new feature... why would  anyone want to turn it off?&quot; And we can understand that. But, for the  most part, we worked through a lot of those issues.&lt;/p&gt; &lt;p&gt;   Other challenges are the technicality of policy enabling some things.  For instance, the new Windows Firewall with Advanced Security (WFAS).  WFAS was tough to do. It&#039;s not easy or straightforward to policy-enable  it right. The interface that the WFAS team did for Vista is superb, but  doing it right has been tough.&lt;/p&gt; &lt;p&gt;The removable device policy settings, enabling these was a technical  challenge, because three OTHER teams (plus the Group Policy team) had  to come together to enable that in the system.&lt;/p&gt; &lt;p&gt;Over time, (since Windows 2000 and every release since) we&#039;ve spent a  fair amount of energy to put forth the right set of policy settings  enabled in the system.&lt;/p&gt; &lt;p&gt;In versions of Windows before Vista, the product teams themselves  didn&#039;t always think about policy-enabling their components. But, during  Vista&#039;s development, a fair amount of teams, proactively recognized  that they needed to policy enable their sections of the world, to be  more manageable. They would come to us and ask &quot;Please tell us how.&quot;&lt;/p&gt; &lt;p&gt;That was huge!&lt;/p&gt; &lt;p&gt;&lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]:  What&#039;s next for you?  &lt;/strong&gt;&lt;br /&gt;   [Michael Dennis, Microsoft]: I&#039;m moving to the &quot;Mobile Information  Worker&quot; team which is responsible for Smart Phones, PocketPCs, etc. My  role will be to extend some of the management technologies in Windows  Server System to Windows Mobile devices.&lt;/p&gt; &lt;p&gt;I will try to take my same vision and passion for manageability and  apply it in this new space. Meanwhile, I&#039;m leaving the Group Policy  team in an outstanding position to move things forward without me.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]:  Who is your successor?  &lt;br /&gt;   &lt;/strong&gt;[Michael Dennis, Microsoft]: That announcement will probably  be made in another week or two. We&#039;re working on how things need to be  organized, who&#039;s the right person, and how that be done. There&#039;s no  rush to make an announcement. It might be a few more weeks (or maybe  just a few days.)&lt;/p&gt; &lt;p&gt;I&#039;ll leave it to the Group Policy team to let you know so you can tell your folks on GPanswers.com.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]:  Anything else you&#039;d like to tell the GPanswers.com audience?  &lt;/strong&gt;&lt;br /&gt;   [Michael Dennis, Microsoft]: All thru the development of Group Policy,  one key focus was to &quot;get in front of customers&quot; and understand what  they&#039;re trying to do (from a scenarios perspective). This idea, of  &quot;scenarios that solve problems&quot; is now imbedded in the team.&lt;/p&gt; &lt;p&gt;If a customer, has a well structured opinion about scenarios they&#039;d  like to see Group Policy cover, and they have a business case for doing  something, they need to find a way to communicate that back to us. &lt;/p&gt; &lt;p&gt;We have a good feedback mechanism that&#039;s available to anyone at any time&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.WindowsServerFeedback.com&quot;&gt;Http://www.WindowsServerFeedback.com&lt;/a&gt;&lt;/p&gt; &lt;p&gt;There, you&#039;ll find a Group Policy button.&lt;/p&gt; &lt;p&gt;If your folks can say &quot;here&#039;s my problem, here&#039;s my business case, and  I need the system to be able to do this and here&#039;s why&quot; that kind of  information is very, very valuable to us. Those who make decisions  about Group Policy going forward read every entry that comes thru that  source.&lt;/p&gt; &lt;p&gt;Again, if you want to have an impact in Group Policy moving forward,  tell us about what you need. But please don&#039;t just tell us &quot;We need a  policy setting that does X&quot; without telling us &quot;why.&quot;&lt;/p&gt; &lt;p&gt;The &quot;how&quot; is our job to figure out. What the Group Policy team really needs to know is the &quot;why.&quot;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;[Jeremy Moskowitz, GPanswers.com]:  Thanks for taking the time  to tell us about your experiences on the Group Policy team at  Microsoft. All the best !&lt;/strong&gt;&lt;br /&gt;   [Michael Dennis, Microsoft]: Thank you Jeremy, and thank you, members of GPanswers.com&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Yay and boo </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/yay-and-boo</link>
        <pubDate>2008-04-01T22:11:54+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Yay: I&#039;ve been accepted as a Enterprise Mobility MVP for my third time. Thank you for all who helped me acheive that! Boo! I found _another_ Vista bug {sigh}. Here&#039;s the lashup...  If Vista recognizes that your hardware has changed enoughthat you  must re-validate.. you are prompted to do so when your next user logs  on. After validating, I found the following to be true:  1. Delegated permissions required to see your own GPresults are not available 2. Computer-side policy fails to execute  3. R ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Yay: I&#039;ve been accepted as a Enterprise Mobility MVP for my third time. Thank you for all who helped me acheive that!&lt;/p&gt; &lt;p&gt;Boo! I found _another_ Vista bug {sigh}.&lt;/p&gt; &lt;p&gt;Here&#039;s the lashup... &lt;/p&gt; &lt;p&gt;If Vista recognizes that your hardware has changed enoughthat you  must re-validate.. you are prompted to do so when your next user logs  on. After validating, I found the following to be true: &lt;/p&gt; &lt;p&gt;1. Delegated permissions required to see your own GPresults are not available&lt;/p&gt; &lt;p&gt;2. Computer-side policy fails to execute &lt;/p&gt; &lt;p&gt;3. Remote Desktop into the machine becomes impossible&lt;br /&gt;     &lt;br /&gt;   All is cleared up with a reboot of the affected machine after validation.&lt;br /&gt;   &lt;br /&gt;   In short... After validation, you simply must reboot to get a normal experience. &lt;/p&gt; &lt;p&gt;But Vista doesn&#039;t make you reboot.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Takeown </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/takeown</link>
        <pubDate>2008-04-01T22:11:03+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Did you know Vista has a take ownership command right in the box? I used to have to do this with a command called &quot;Chown&quot; which I had  to download seperately. Now, &quot;takeown.exe&quot; is right there for me. Also, my favorite unix command of all time (whoami) also ships in  the box. With whoami /all you can figure out what groups you&#039;re in and  what privileges you&#039;ve got. What&#039;s neat is that because Vista has  &quot;split token&quot; SIDs, you won&#039;t actually see all your Privileges -- even  if you log in with Do ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Did you know Vista has a take ownership command right in the box?&lt;/p&gt; &lt;p&gt;I used to have to do this with a command called &quot;Chown&quot; which I had  to download seperately. Now, &quot;takeown.exe&quot; is right there for me.&lt;/p&gt; &lt;p&gt;Also, my favorite unix command of all time (whoami) also ships in  the box. With whoami /all you can figure out what groups you&#039;re in and  what privileges you&#039;ve got. What&#039;s neat is that because Vista has  &quot;split token&quot; SIDs, you won&#039;t actually see all your Privileges -- even  if you log in with Domain Administrator credentials. You only get to  USE those privs when you elevate thru UAC (User Account Control.) &lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Bugs in the ointment (one in a series) </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/bugs-in-the-ointment-one-in-a-series</link>
        <pubDate>2008-04-01T22:07:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ There are -lots- of bugs in Vista RTM. Some are in the Group Policy space.

I&amp;#39;m not beating up the GP team in any way by reporting these facts to you. Indeed, it&amp;#39;s my goal to help locate these bugs, and let you and the team know of them (together). That way, YOU can work around these bugs and THEY can whomp &amp;#39;em.

So, stay tuned for lots of little things here and there which need a little spackle.

Bug #1: GP Filtering

The final policy settings appear not have been scrubbed s ]]>
        </description>
        <content:encoded>
            &lt;p&gt;There are -lots- of bugs in Vista RTM. Some are in the Group Policy space.&lt;/p&gt;

&lt;p&gt;I&#039;m not beating up the GP team in any way by reporting these facts to you. Indeed, it&#039;s my goal to help locate these bugs, and let you and the team know of them (together). That way, YOU can work around these bugs and THEY can whomp &#039;em.&lt;/p&gt;

&lt;p&gt;So, stay tuned for lots of little things here and there which need a little spackle.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bug #1: GP Filtering&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The final policy settings appear not have been scrubbed such that there was one &quot;At least&quot; requirements for Vista.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;There are two main sets of Vista-specific policy settings, each with their own &quot;Requirements.&quot;&lt;/p&gt;

&lt;p&gt;One set is: &quot;At least Windows Vista&quot;&lt;br /&gt;
The other set is: &quot;At least Microsoft Windows Vista&quot;&lt;/p&gt;

&lt;p&gt;Most are in the later set. However, the FIRST set is first when you click in the &quot;Fillter by Requirements information&quot; so, most people (like me) will likely click that puppy and be &quot;surprised&quot; when most vista-specific policy settings aren&#039;t showing up.&lt;/p&gt;

&lt;p&gt;Took me two weeks to figure out why I wasn&#039;t seeing it.&lt;br /&gt;
(I guess I&#039;m slow.)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Folder Redirection woes? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/folder-redirection-woes</link>
        <pubDate>2008-04-01T22:05:09+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Has anyone ever tried to change the underlying GPO used to force  folder redirection? Have you ever had it blow up on you? And you&#039;ve got  clients with lots of &quot;My Documents&quot; files and they&#039;re NOT sitting on  the new server?  Send me an email and tell me your story. Thanks. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Has anyone ever tried to change the underlying GPO used to force  folder redirection? Have you ever had it blow up on you? And you&#039;ve got  clients with lots of &quot;My Documents&quot; files and they&#039;re NOT sitting on  the new server? &lt;/p&gt; &lt;p&gt;Send me an email and tell me your story. Thanks.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> GPLogview tool </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/gplogview-tool</link>
        <pubDate>2008-04-01T22:02:58+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Vista has a whole new event log with a zillion GP events in it. Of  course, details in some upcoming newsletter. For those trailblaizers  though, there is a tool to help you parse those Vista logs. The GPLogview tool was published on the Microsoft  Download Center the other day:      http://go.microsoft.com/fwlink/?LinkId=75004 . Send me an email with how it works for you. ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Vista has a whole new event log with a zillion GP events in it. Of  course, details in some upcoming newsletter. For those trailblaizers  though, there is a tool to help you parse those Vista logs.&lt;/p&gt; &lt;p&gt;The GPLogview tool was published on the Microsoft  Download Center the other day: &lt;br /&gt;     &lt;a href=&quot;http://go.microsoft.com/fwlink/?LinkId=75004&quot; title=&quot;http://go.microsoft.com/fwlink/?LinkId=75004&quot;&gt;&lt;u&gt;http://go.microsoft.com/fwlink/?LinkId=75004&lt;/u&gt;&lt;/a&gt; .&lt;/p&gt; &lt;p&gt;Send me an email with how it works for you.&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> What?? No MSI for ForeFront Security from Microsoft? </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/what-no-msi-for-forefront-security-from-microsoft</link>
        <pubDate>2008-04-01T22:00:37+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ &quot;Microsoft has released the public beta of Forefront Client Security  - their new malware product.  Currently deployment of the client via  GPSI is not supported (there&#039;s not a single MSI file). This is due to  the complexity of the install process.  Which means creating your own  might be unlikely as well.  Deployment via script is the only remote  deployment option.         This issue has been brought up on the beta test newsgroups and Microsoft has asked for feedback.A product suggestion has  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&quot;Microsoft has released the public beta of Forefront Client Security  - their new malware product.  Currently deployment of the client via  GPSI is not supported (there&#039;s not a single MSI file). This is due to  the complexity of the install process.  Which means creating your own  might be unlikely as well.  Deployment via script is the only remote  deployment option. &lt;br /&gt;     &lt;br /&gt;   This issue has been brought up on the beta test newsgroups and Microsoft has asked for feedback.&lt;/p&gt;&lt;p&gt;A product suggestion has been submitted - Feedback on this suggestion  can now be submitted by voting on its priority (1 lowest - 5 highest). If the lack of GPSI integration would influence your decision to use  this product you can vote on the suggestion priority at &lt;a href=&quot;https://connect.microsoft.com/feedback/default.aspx?SiteID=27&quot;&gt;https://connect.microsoft.com/feedback/default.aspx?SiteID=27&lt;/a&gt; &lt;br /&gt; &lt;/p&gt; &lt;p&gt;Thanks to John Richardson for this alert !&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> About BeyondTrust and DesktopStandard </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/about-beyondtrust-and-desktopstandard</link>
        <pubDate>2008-04-01T21:55:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Today I had a nice chat with CEO of BeyondTrust John Moyer. We talked about the Microsoft acquisition of his previous company, DesktopStandard and where he&amp;#39;s going with BeyondTrust.

The Old
--------
On the subject of the acquisition, former DesktopStandard CEO, Moyer said, &amp;Atilde;&amp;cent;&amp;acirc;&amp;not;&amp;Aring;we had a great run with DesktopStandard and greatly appreciate all the support from our customer base and thought leaders like you, Jeremy. The acquisition validated not only the c ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Today I had a nice chat with CEO of BeyondTrust John Moyer. We talked about the Microsoft acquisition of his previous company, DesktopStandard and where he&#039;s going with BeyondTrust.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Old&lt;/strong&gt;&lt;br /&gt;
--------&lt;br /&gt;
On the subject of the acquisition, former DesktopStandard CEO, Moyer said, Ã¢â¬Åwe had a great run with DesktopStandard and greatly appreciate all the support from our customer base and thought leaders like you, Jeremy. The acquisition validated not only the capabilities of the DesktopStandard team, but also MicrosoftÃ¢â¬â¢s commitment to Group Policy. I am very happy that Microsoft will distribute DesktopStandard products to an even broader base of potential customers to help them manage their desktops and leverage their investments in Active Directory.Ã¢â¬Â&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;The New&lt;/strong&gt;&lt;br /&gt;
--------&lt;br /&gt;
Moyer has transitioned to a new role as CEO of BeyondTrust Corp. BeyondTrust was spun out of DesktopStandard to focus on enterprise security products. When I asked Moyer about BeyondTrust and why DesktopStandardÃ¢â¬â¢s PolicyMaker Application Security Product was not part of the Microsoft transaction he had the following to say,&lt;br /&gt;
&lt;br /&gt;
Ã¢â¬ÅSimply put, we didnÃ¢â¬â¢t want to sell PolicyMaker Application Security. It was DesktopStandardÃ¢â¬â¢s fastest growing product. We recognized that the market for this product was just starting to take off. And we already had a successful and experienced team in place so this just made good sense.&lt;br /&gt;
&lt;br /&gt;
PolicyMaker Application Security, which we have renamed to Privilege Manager, will form the backbone of BeyondTrust Corp. BeyondTrust is a new type of security company focused on helping customers to move beyond the need to place trust in users.&lt;br /&gt;
&lt;br /&gt;
BeyondTrustÃ¢â¬â¢s flagship product, Privilege Manager, enables customers to implement the security best practice of Least Privilege. With it end-users can run all required applications and perform all required system tasks without administrative privileges. Currently, there is too much trust in IT security. Users must often be given admin privileges in order to do their jobs, forcing IT to Ã¢â¬ËtrustÃ¢â¬â¢ those users. The result is that these same users are often overrun by malware and can expose the network to serious threats through malicious activity.&lt;br /&gt;
&lt;br /&gt;
BeyondTrust will continue to leverage Group Policy. Privilege Manager policy is applied by rule creation in the Group Policy Object Editor.Ã¢â¬Â&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> ADM to ADMX Converter tool </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/adm-to-admx-converter-tool</link>
        <pubDate>2008-04-01T21:36:36+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ You&#039;re not using Vista yet, but FullArmor and Microsoft are thinking of  you. That is, with Vista the new ADMX file format will supplant the ADM  file format. But what if you&#039;ve already got a bunch of ADM files out  there? Are you going to learn the ADMX format for a one time  conversion? Not anymore. Microsoft and FullArmor are releasing a free  tool, found here to help automatically transition ADM to ADMX files. Thanks, guys !! (Are you reading this blog? If so, send me a short email,  and jus ]]>
        </description>
        <content:encoded>
            &lt;p&gt;You&#039;re not using Vista yet, but FullArmor and Microsoft are thinking of  you. That is, with Vista the new ADMX file format will supplant the ADM  file format. But what if you&#039;ve already got a bunch of ADM files out  there? Are you going to learn the ADMX format for a one time  conversion? Not anymore. Microsoft and FullArmor are releasing a free  tool, &lt;a href=&quot;http://go.microsoft.com/fwlink/?LinkID=77409&quot;&gt;found here&lt;/a&gt; to help automatically transition ADM to ADMX files. Thanks, guys !! (Are you reading this blog? If so, send me a short &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com?subject=Yes,%20I%27m%20reading%20your%20blog&quot;&gt;email&lt;/a&gt;,  and just tell me. Trying to figure out if this blog thing is useful for  you guys or not. And tell me if you&#039;re reading it from the web page, or  via RSS or another way. Thanks !)&lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> EA vs. DA </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/ea-vs-da</link>
        <pubDate>2008-02-01T06:36:51+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Here&#039;s an interesting tidbit I didn&#039;t know until today: Enterprise admins, by default, do not have local administrator  rights on individual client machines. Domain Admins, but not Enterprise  admins have rights to LGPOs.  We now return you to your regularly scheduled Sunday.  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Here&#039;s an interesting tidbit I didn&#039;t know until today:&lt;/p&gt; &lt;p&gt;Enterprise admins, by default, do not have local administrator  rights on individual client machines. Domain Admins, but not Enterprise  admins have rights to LGPOs. &lt;/p&gt; &lt;p&gt;We now return you to your regularly scheduled Sunday. &lt;/p&gt;&lt;br /&gt;&lt;!--more--&gt;&lt;br /&gt;
        </content:encoded>
    </item>
        <item>
        <title> Welcoming new products to the Solutions Guide </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/welcoming-new-products-to-the-solutions-guide</link>
        <pubDate>2008-02-01T06:34:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ We&amp;#39;ve got three new additions to our 3rd party tools section. Check &amp;#39;em out!

SpecialOperations Software has added two products you should check out in the Third Party Solutions guide. One product lets you manipulate passwords over OUs and over specific people. The other tool does a complete hardware and software inventory via Group Policy. Neat !

&amp;nbsp;

Additionally, we&amp;#39;ve added SecureVantage Technologies&amp;#39; Group Policy Product -- PCMP. If you&amp;#39;ve already got MOM, and  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;We&#039;ve got three new additions to our 3rd party tools section. Check &#039;em out!&lt;/p&gt;

&lt;p&gt;SpecialOperations Software has added two products you should check out in the Third Party Solutions guide. One product lets you manipulate passwords over OUs and over specific people. The other tool does a complete hardware and software inventory via Group Policy. Neat !&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Additionally, we&#039;ve added SecureVantage Technologies&#039; Group Policy Product -- PCMP. If you&#039;ve already got MOM, and want to really manage your Group Policy world, check this tool out.&lt;/p&gt;

&lt;p&gt;See all the products at &lt;a href=&quot;index.php?option=com_content&amp;view=section&amp;layout=blogcompany&amp;id=5&amp;Itemid=53&quot;&gt;www.GPanswers.com/solutions&lt;/a&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> DesktopStandard purchased by Microsoft </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/desktopstandard-purchased-by-microsoft</link>
        <pubDate>2008-02-01T06:25:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Is it good or bad that DesktopStandard was purchased by Microsoft?

Now, before we go into the ANALYSIS of what&amp;#39;s happened, I encourage you to read this, which does a pretty good job explaining WHAT happened.

http://www.networkworld.com/article/2307686/software/microsoft-acquires-policy-based-management-vendor-desktopstandard.html



Well, I picked one heck of a day to start my blog. Today&amp;#39;s topic: Microsoft&amp;#39;s purchase of DesktopStandard. Now, before we go into the ANALYSIS  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Is it good or bad that DesktopStandard was purchased by Microsoft?&lt;/p&gt;

&lt;p&gt;Now, before we go into the ANALYSIS of what&#039;s happened, I encourage you to read this, which does a pretty good job explaining WHAT happened.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.networkworld.com/article/2307686/software/microsoft-acquires-policy-based-management-vendor-desktopstandard.html&quot; target=&quot;_blank&quot;&gt;http://www.networkworld.com/article/2307686/software/microsoft-acquires-policy-based-management-vendor-desktopstandard.html&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&lt;!--more--&gt;&lt;br /&gt;
Well, I picked one heck of a day to start my blog. Today&#039;s topic: Microsoft&#039;s purchase of DesktopStandard. Now, before we go into the ANALYSIS of what&#039;s happened, I encourage you to read this, which does a pretty good job explaining WHAT happened. http://www.networkworld.com/news/2006/100206-ms-desktopstandard.html?page=1 Okay. Now that that&#039;s out of the way, let&#039;s analyze WHAT we&#039;re going to get: The Good -------- - 21 new Client Side Extensions: You want to zap Outlook configuration down? Zaaap. You want to zap shortcuts on the desktop? Zaaap. You want to zap Printer settings? Zaaap. In all, 21 new things to Zap. -GPOVault: This is a &quot;Check-in / Check-out&quot; GP management system which is built right into the GPMC. I like this tool because, well, it&#039;s just built right in to the GPMC, which means I don&#039;t have to load ANOTHER console to do the dirty work. So, the idea is the Sally creates the GPO, Fred makes sure it&#039;s Kosher and Kirk puts it in play. All around a welcome addition. The unknown ----------- -PolicyMaker Registry Extension: This was a great free CSE which could be used to zap down registry changes. Who knows what the status will be of this great free tool. -Share Manager: Another CSE available for purchase which managed shares on servers. Honestly, I don&#039;t know if this tool sold well or not. The ugly -------- -PolicyManger Software Update: Imagine WSUS that actually worked with GPOs and that understood Active Directory. Now imagine it dead. Yep, this very cool product will likely not see the light of day as a Microsoft product. Microsoft already has a free patch strategy system, WSUS (again, even though it has no tie ins to AD and very little tie ins to GPOs) and SMS for industrial-strength patch management. This product kind of fit in the middle, and well, now it&#039;s dead. Analysis -------- In the end analysis -- it&#039;s great. More stuff for GPO admins to know and love. And more power to do what they love to do. Stay tuned for more info as it comes up. You bet I&#039;ll be all over this when I have more to share.&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#25 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue25</link>
        <pubDate>2007-08-09T11:56:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ 
	Let&amp;#39;s get an understanding of ADMs and ADMXs (PART TWO)
	New Public Classes and upcoming events
	Some more goodies about PolicyPak Software
	Public GP Training Schedule Update
	
		Cities that are scheduled for public courses
	
	
	Subscribe, Unsubscribe, and Usage Information


In our last issue, we tackled what ADM files are, where they live, and what they look like in the interface. Here, we

GPanswers.com News and Updates

Update #1:

Search We have SEARCH! That&amp;#39;s r ]]>
        </description>
        <content:encoded>
            &lt;ul&gt;
	&lt;li&gt;Let&#039;s get an understanding of ADMs and ADMXs (PART TWO)&lt;/li&gt;
	&lt;li&gt;New Public Classes and upcoming events&lt;/li&gt;
	&lt;li&gt;Some more goodies about PolicyPak Software&lt;/li&gt;
	&lt;li&gt;Public GP Training Schedule Update
	&lt;ul&gt;
		&lt;li&gt;Cities that are scheduled for public courses&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In our last issue, we tackled what ADM files are, where they live, and what they look like in the interface. Here, we&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GPanswers.com News and Updates&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Update #1:&lt;/p&gt;

&lt;p&gt;Search We have SEARCH! That&#039;s right, it took us, like way too long .. but we have a new search capability right on the GPanswers.com home page. Just type in what you&#039;re looking for and.. whamo !&lt;/p&gt;

&lt;p&gt;Update #2:&lt;/p&gt;

&lt;p&gt;FAQs Our FAQs are now more FAQ&#039;n organized than ever. (Did I really just go there!?) Anyway, they are. Thanks to Eric Johnson, who really went the extra mile to make this happen. Each FAQ now has it&#039;s own unique URL, so, if someone in the forums asks &quot;How do I enable GP for Windows 95&quot; we can just say.. &quot;Please read this: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/15.html?layout=blog&quot;&gt;faq/5&lt;/a&gt; &quot; Okay, that one doesn&#039;t come up all that often, but you get the idea.&lt;/p&gt;

&lt;p&gt;Update #3:&lt;/p&gt;

&lt;p&gt;One more public class for the rest of 2007 and two new ones for 2008&lt;/p&gt;

&lt;p&gt;I have new dates in Portland (Jan 15-18) Orlando (Jan 29- Feb 1), Washington DC (Feb 4 - 7) and Nashville (March 4-7). More on this topic later.  &lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;This Month&#039;s Newsletter Sponsored by: NetIQ&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Are you using Group Policy optimally? Ever wonder if you can do more with it? Get the best practices you need to leverage Group Policy on your servers in this new white paper, &quot;Why Group Policy Matters for Servers,&quot; authored by Group Policy guru Jeremy Moskowitz &amp; NetIQ. &lt;a href=&quot;http://www.netiq.com/f/form/form.asp%7Cid=3163%7C%7Corigin=NS_GPAnswers_082707&quot;&gt;Download it now&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This issue&#039;s big tech tip...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Whatâs All the Hubbub about ADMX? (Part II)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the last issue, you learned all about ADM files. But what&#039;s this you keep hearing about ADMX files ?&lt;/p&gt;

&lt;p&gt;Windows Vista ships with a built-in GPMC. And with that GPMC comes a new ability to shake off the use of old ADM files in lieu of newer ADMX files if you want to. Why would we want to shake off the ADM format?&lt;/p&gt;

&lt;p&gt;Recall that the ADM file itself is placed up inside the GPT part of the GPO (the part that lives in SYSVOL). When that happens, you burn about 4MB on every Domain Controllerâevery time you create a GPO. Also recall that the ADM file itself is placed in the GPT of the GPO because itâs necessary when you want to re-edit the GPO on another management station. Without that ADM file, you canât edit the custom setting contained within the GPO.&lt;/p&gt;

&lt;p&gt;So, the ADMX format helps us break away from these issues. You no longer need to store anything inside the GPO, so you donât get whatâs known as âSYSVOL Bloat.â That is, a fat SYSVOL which has the heavy duty to store GPOs full of ADM files. To work around this, the new ADMX standard can take advantage of whatâs known as the &lt;em&gt;Central Store&lt;/em&gt;. The job of the Central Store is to have one place which can store the new ADMX files so they donât need to get copied into each and every GPO. So, goodbye SYSVOL bloat. The other big deal about the Central Store is that if an ADMX file has an updated definition, then all Vista management stations will immediately use that updated ADMX file.&lt;/p&gt;

&lt;p&gt;If you want to learn about the format of ADMX files, the creation and use of the Central Store in detail, Iâve got two resources for you. Darren Mar-Elia has an informative, yet succinct, article on ADMX file format internals and a brief explanation of the Central Store in his Technet Article here (&lt;a href=&quot;http://tinyurl.com/2musnh&quot;&gt;http://tinyurl.com/2musnh&lt;/a&gt;). I also have an entire, downloadable chapter from my new book, &lt;em&gt;Group Policy: Management, Troubleshooting, and Security&lt;/em&gt; on GPanswers.com available &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;As weâve seen, ADM templates are still supported when you use a Vista management station; but ADM files are not supported within the Central Store. This can be a little confusing, so letâs walk through an example.&lt;/p&gt;

&lt;p&gt;Let&#039;s assume the following:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;I created a GPO from a Vista management station.&lt;/li&gt;
	&lt;li&gt;I tweaked some in-the-box settings (like Prohibiting Access to the Control Panel).&lt;/li&gt;
	&lt;li&gt;I wanted to add a custom ADM template.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After we do this final step, weâll then peek into the GPOâs GPT and see what has happened to get some clarity.&lt;/p&gt;

&lt;p&gt;To add the ADM template, weâll repeat some steps we performed earlier. Just open up the Group Policy Object Editor, right-click âAdministrative Templatesâ which is contained within both the Users or Computers node and select âAdd/Remove Template.â You can see the added template in Figure 1.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter25_Figure_1.png&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Figure 1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Note that in order to actually see the settings contained within this ADM template, click on View | Filtering. Finally, uncheck âOnly show policy settings that can be fully managedâ.&lt;/p&gt;

&lt;p&gt;Then, close the Group Policy Object Editor and return to the GPMC. Figure 2 shows the Details tab of the GPO I just created from my Vista management station. (Note the catchy name of the GPO.) By looking in the âDetailsâ tab, I can determine the GUID for the GPO, which will make it easier when I go fishing around in SYSVOL to sleuth around for that particular GPO.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter25_Figure_2.png&quot; style=&quot;height:409px; width:405px&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Figure 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once I track down the GPT of the GPO (by using the GPOâs GUID), I can crack open that GPOâs ADM directory and see that thereâs exactly one ADM template hereâthe one which I manually imported, seen in Figure 3. This is because Vista machines donât rely on ADMs anymore. Since they donât natively use them, they donât natively push anything up into the GPO itself. However, if you manually import an ADM (as we just did) it will continue to honor the ADM it in the same fashion it always did.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter25_Figure_3.png&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Figure 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is in contrast with, say, the GPO in Figure 4, which was created on an XP or Windows Server 2003 machine. When GPOs are created using pre-Vista management stations, the original ADM files are pushed up into the GPO as previously described. This GPO was created on a Windows XP management station. You can tell, because itâs jam packed with ADM files that Vista doesnât need or use.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter25_Figure_4.png&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Figure 4&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Converting ADM to ADMX Using the ADMX Migrator Tool&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We just learned that Windows XP uses ADM files and Vista uses ADMX files. We also learned that Vista will continue to utilize ADM files if thatâs what we have available. But, we cannot stick an ADM file into the Central Store and expect our Windows Vista management stations to all be able to utilize the file.&lt;/p&gt;

&lt;p&gt;In order to utilize the settings contained within the ADM in the Central Store, you need to convert the ADM file to ADMX, or re-create the ADM files as ADMX files by hand. Luckily, thereâs only one download that performs both of these functions.The ADMX Migrator tool (which is really composed of an ADM-to-ADMX converter tool and an ADMX creation tool) can be downloaded from Microsoftâs website here: &lt;a href=&quot;http://tinyurl.com/yjnptj&quot;&gt;http://tinyurl.com/yjnptj&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;You can install the ADMX Migrator Tool .msi file on Windows Server 2003, Windows XP, or Windows Vista. Once installed, the applications go to C:Program FilesFullArmorADMX Migrator. The command-line application weâll be running is called âfaAdmxConv.exeâ. But since the directory isnât in the path, you would need to be in that directory in order to run the app. Therefore, when Iâm using the tool, I opt to add this directory to my Windows Path. Click here for more information on how to set the path in Windows (&lt;a href=&quot;http://tinyurl.com/3n4zy&quot;&gt;http://tinyurl.com/3n4zy&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;I usually create a temp directory, like C:ADMtemp and copy my source ADM files into it. There are a lot of possible parameters for faAdmxConv.exe, but the simplest way to convert an ADM file is to specify the name of the ADM file and the output directory. If youâve already put the source ADM file in ADMtemp and added faAdmxConv.exe to the path, you can just run âfaAdmxConv nopassport.adm .â (with the dot to signify the current directory as output). If you donât specify the dot (for this directory) or another explicit path, the output goes somewhere you likely donât want it to: the installation directory of the ADMX Migrator tool. Doh! In Figure 5, you can see three commands:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A âdirâ command to see the ADM file&lt;/li&gt;
	&lt;li&gt;The âfaAdmxConvâ command with the name of the ADM and the . (dot) to represent the current directory and&lt;/li&gt;
	&lt;li&gt;A âdirâ to see the outputted files: nopassport.admx and nopassport.adml&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter25_Figure_5.png&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Figure 5&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before you go plunking this into your Central Store, you might want to test this on a machine which isnât leveraging the Central Store (like a Windows Vista machine thatâs offline). After you take the machine offline, copy the ADMX file to the C:WindowsPolicyDefinitions directory, and the ADML file to the language-specific directory. In the US, that directory is C:WindowsPolicyDefinitionsen-us. An example of the copy procedure can be seen in Figure 6.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter25_Figure_6.png&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Figure 6&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The ADM to ADMX converter tool doesnât always generate ADMX files which are âready to goâ inside the Group Policy Object Editor. That is, the conversion process appears to be 100% successful. But then loading the resulting ADMX and ADML files into the Central Store and seeing the results using your Vista management station could demonstrate errors. This could manifest itself when the Group Policy Object Editor starts, with various error messages appearing about the resulting ADMX file. To remedy this, there will be another update of the ADMX Migrator tool that should produce more useful output at conversion time to help you adjust your ADM file before it makes its way through the conversion process.&lt;/p&gt;

&lt;p&gt;This is a known issue, and one that the FullArmor and Microsoft teams are aware of and are working hard to fix. The updated tools will likely be available by the time this article goes to press. Be sure to check in at &lt;a href=&quot;https://www.gpanswers.com/component/content/section/15.html?layout=blog&quot;&gt;www.GPanswers.com/blog&lt;/a&gt; for the latest info. The official timetable for this updated tool is âsoon,â but stay tuned to GPanswers.com and the ADMX Migrator tool download page for more details.&lt;/p&gt;

&lt;p&gt;Finally, the now-converted ADM file is really now two files: an ADMX (language neutral file) and an ADML (language specific file). At this point, you can put inside the Central Store or test on a local machine. However, once again, in order to actually see the policy settings contained within this ADMX template, youâre still going to need to do what we did earlier as seen in Figure 4. That is, youâll still need to click on View | Filtering, then uncheck the âOnly show policy settings that can be fully managedâ safety. Thatâs because the settings contained within this ADMX file does not write to one of the âproperâ Policies keys, as previously discussed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cleaning Up Shop&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The ideal state is clearly to use only ADMX files, and to utilize the Central Store. But in order to do that you need to:  &lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Convert all your current ADM files to ADMX&lt;/li&gt;
	&lt;li&gt;Convert all management stations to Vista (or Windows Server 2008)&lt;/li&gt;
	&lt;li&gt;Commit to stop editing GPOs on pre-Vista machines&lt;strong&gt; &lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If youâve done these three steps, you have ostensibly banished ADM files from your world. At this point, the ADM files within your GPOs are just taking up space within your Domain Controllerâs SYSVOL. Once youâre achieved ADMX nirvana, you could, if you wanted, simply delete the ADMs contained within the GPOâs GPT within SYSVOL. Thatâs right: like your bodyâs appendix, theyâre vestigial. They did serve a purpose at one point; but their purpose is done. You can do this manually, or do it with a script. Before you do, though, note that this would be a serious mistake if the above steps havenât been completed. So be sure to do this only if youâre sure you can leave ADM files behind.&lt;/p&gt;

&lt;p&gt;For more about ADM, ADMX, and ADML files be sure to sign up for the GPanswers.com newsletter (the thing you&#039;re reading right now) at &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;www.GPanswers.com/newsletter&lt;/a&gt; and intermediary notices via blog at &lt;a href=&quot;https://www.gpanswers.com/component/content/section/15.html?layout=blog&quot;&gt;www.GPanswers.com/blog&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Test some PolicyPaks for a test drive&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Some of you have downloaded the software at PolicyPak to start making your admin life a little easier. We have our own Group Policy CSE, a Client-Side-Extension. This isn&#039;t an &quot;agent&quot;, it&#039;s an organic extension to Group Policy. Installation is super-easy. You run a component which extends the Group Policy Object editor on your administrative machine (where you create your GPOs). Then you deploy the CSE using Group Policy Software Installation to your target machines, and you&#039;re ready to control your applications using Group Policy.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Wanna control Adobe Acrobat Reader using Group Policy? Try PolicyPak for Adobe Acrobat Reader.&lt;/li&gt;
	&lt;li&gt;Wanna control Microsoft Windows Live Messenger using Group Policy? Use PolicyPak for Windows Live Messenger.&lt;/li&gt;
	&lt;li&gt;Wanna control WinZip using Group Policy? We&#039;re working on PolicyPak for WinZip (and lots of others...)&lt;/li&gt;
	&lt;li&gt;Wanna control something we don&#039;t support yet? Suggest an application at &lt;a href=&quot;https://www.policypak.com/suggest&quot;&gt;www.PolicyPak.com/suggest&lt;/a&gt; !&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/policypak-screenshot-reverse.png&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;So, how can you check them out? We&#039;re ready for you to check us out and it for a test drive. Just mosey over to www.PolicyPak.com, register for an account and give our two PolicyPaks a whirl. We&#039;ve made the download process even easier. So, if you &quot;gave up&quot; before because we asked for too much information, I think you&#039;ll be a lot happier now.  &lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;About GPanswers.com Training&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Choosing the Right Course for You&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Of course you want GP training. And we know you&#039;d prefer to use GPanswers.com as your GO TO source for GP training. We try to make it as easy as possible for you. We have GP courses that fit what you need.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Are you dealing with mostly XP machines? We have an XP-focused course.&lt;/li&gt;
	&lt;li&gt;Are you warming up to Vista? We have a Vista-focused course.&lt;/li&gt;
	&lt;li&gt;Do you want to learn in an intensive format? Learn it in TWO DAYS.&lt;/li&gt;
	&lt;li&gt;Less intensive? Learn it in THREE days.&lt;/li&gt;
	&lt;li&gt;Want even more Advanced material? We&#039;ve got that too.&lt;/li&gt;
	&lt;li&gt;Already know XP GPOs pretty well? How about our XP-to-Vista Catch-Up course?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can find out more about the different public and private courses available from the &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;workshops section of GPanswers.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We also have a &lt;a href=&quot;https://www.gpanswers.com/workshop/rightsize/&quot; target=&quot;_blank&quot;&gt;Group Policy &quot;Rightsize&quot; Tool&lt;/a&gt; which guides you step by step in choosing the best course to take for your situation. Read the course details for the dates you have in mind to make sure you get the skills that match your needs. We have both private (on site) and public classes. Use the Rightsize tool to get a complete understanding of your options.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Public coursesâ2007 scheduled &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I have limited classes for the rest of 2007 and beginning of 2008:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Oct 23, 24 and 25: Netherlands: Three-Day Group Policy Essentials Course (XP Focused). &lt;a href=&quot;http://www.bluebirdcourses.nl/index.php?page=aanmelden&quot;&gt;Sign up here.&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Jan 15, 16, 17, 18: Portland OR: Group Policy Essentials Course, Advanced One Day Course and XP to Vista Catchup Course.&lt;/li&gt;
	&lt;li&gt;Jan 29, 30, Feb 1, 2: Orlando, FL: (Yes, I spun up this course so that you, yes you, can get approval to go to Orlando in the dead of winter time.) Group Policy Essentials course, Advanced One Day Course and XP to Vista Catchup course&lt;/li&gt;
	&lt;li&gt;Feb 4, 5, 6, 7: Wash, DC: Group Policy Essentials course, Advanced One Day Course and XP to Vista Catchup course&lt;/li&gt;
	&lt;li&gt;March 4, 5, 6, 7: Nashville: Group Essentials course, Advanced One Day Course and XP to Vista Catchup Course.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For any public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What about OTHER CITIES in 2008?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and told me where you would like me to go for 2007.&lt;/p&gt;

&lt;p&gt;Now tell me where you want me to go for 2008. The cities with the most &quot;votes&quot; get classes in their city. Bigger cities are a better bet, so you might want to vote for your closest &quot;major airport&quot; city.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here&#039;s a deal you can&#039;t pass up!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Okay, let&#039;s assume I&#039;ll be in your city teaching a public class. But how would you like to get a FREE student in the class? Easy: Be the &quot;host&quot; of the class. Allow me and our GPanswers.com students to use your conference room for the two, three or four days, and you get a free student attendee !&lt;/p&gt;

&lt;p&gt;Such a deal!&lt;/p&gt;

&lt;p&gt;Lots of companies have been the hosts for public classes, and they&#039;ve gotten free training for one of their folks! So, if you&#039;re interested in free training for one of your teammates (maybe even you!) &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com?subject=Hosting%20a%20public%20class%20in%20my%20city%20in%20my%20conference%20room&quot;&gt;contact me&lt;/a&gt; if you&#039;re in one of the above cities, and we&#039;ll see about working out the details to have you host the class.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Private courses&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you think you might want your own private in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training (about 6â8), the course pays for itself (since you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japanâor wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does have the distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, the Security Team and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;.&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Places&lt;/strong&gt;&lt;strong&gt; I&#039;ll be...&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;WinConnections 2007 Fall in Vegas: www.WinConnections.com
	&lt;ul&gt;
		&lt;li&gt;I&#039;ll be speaking on Group Policy Essentials&lt;/li&gt;
		&lt;li&gt;Group Policy Troubleshooting&lt;/li&gt;
		&lt;li&gt;Microsoft Softgrid and other Application Virtualization technologies&lt;/li&gt;
		&lt;li&gt;Maybe more !&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Group Policy: Management, Troubleshooting, and Security&lt;/strong&gt; &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;For Windows Vista, Windows 2003, Windows XP, and Windows 2000&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands-on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;  If youâre in the continental USA, you can order the Fourth Edition of &lt;em&gt;Group Policy: Management, Troubleshooting, and Security&lt;/em&gt; directly from me for $45 (including shipping).&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If you order the book from me, Iâll sign the book for you, free! Iâve had many requests for this service, and Iâm honored that you&#039;d ask!&lt;/li&gt;
	&lt;li&gt;If you order it from me, the shipping is included! Usually, I try to ship out the orders the SAME DAY. But if you positively need a guaranteed shipping date, then Amazon might be a better choice.&lt;/li&gt;
	&lt;li&gt;The slight extra cost goes toward the shipping from Sybex to me, then me to you (not for the signature). Again, note that shipping is included.&lt;/li&gt;
	&lt;li&gt;We take all kinds of credit cards. No PO orders for books, please, unless it&#039;s an order for 10 or more.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This book is in stock! We can ship it out today!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note, that I can only take orders from and ship to those in the continental United States. Thanks for your understanding.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Also available is &lt;em&gt;Windows &amp; Linux Integration: Hands-on Solutions for a Mixed Environment&lt;/em&gt; from &lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
 &lt;a href=&quot;http://www.amazon.com/gp/product/0470106425&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0470106425&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Don&#039;t forget our Sponsors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I can&#039;t tell you how often I hear that people LOVE the Solutions Guide we have at GPanswers.com/solutions. Inside, you&#039;ll find both free and third-party products which extend the reach of Group Policy, or let you do something you haven&#039;t discovered before! So, head on over to the &lt;a href=&quot;https://www.gpanswers.com/component/content/section/5.html?layout=blogcompany&quot;&gt;Solutions Guide&lt;/a&gt; and see what other goodies are available! Our newest sponsors at the Solutions Guide:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;AdventNet with their ADManager Plus&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot; target=&quot;_blank&quot;&gt;sign up for your own newsletter subscription&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please FORWARD THE ENTIRE email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention regarding subscriptions and unsubscriptions, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Please POST your technical question on the &lt;a href=&quot;https://www.gpanswers.com/community&quot;&gt;GPanswers.com/community&lt;/a&gt; forum whenever possible.&lt;/p&gt;

&lt;p&gt;If you have questions about ordering a book, contact my assistant Margot at: &lt;a href=&quot;mailto:assistant@moskowitz-inc.com&quot;&gt;assistant@moskowitz-inc.com&lt;/a&gt;. I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thanks for reading!&lt;/strong&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue #24 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue-24</link>
        <pubDate>2007-07-17T23:23:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Issue #24




	Let&amp;#39;s get an understanding of ADMs and ADMXs, finally !
	Did you miss the Fourth ? (Edition, that is...)
	Some more goodies about PolicyPak Software
	Public GP Training Schedule Update
	
		Different course levels
		XP and Vista coverage
		Cities that are scheduled for public courses
	
	
	Subscribe, Unsubscribe, and Usage Information


GPanswers.com News and Updates

GPanswers.com is a free service, as you know. And we try try try to keep it as up-to-date as ]]>
        </description>
        <content:encoded>
            &lt;h2&gt;Issue #24&lt;/h2&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/newsletter/143-issue-24.html?task=edit&amp;ret=aHR0cDovL2dwYW5zd2Vycy5jb20vbmV3c2xldHRlci80Ni1uZXdzbGV0dGVyLzE0My1pc3N1ZS0yNC5odG1s&quot;&gt;&lt;img alt=&quot;edit&quot; src=&quot;https://www.gpanswers.com/images/M_images/edit.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Let&#039;s get an understanding of ADMs and ADMXs, finally !&lt;/li&gt;
	&lt;li&gt;Did you miss the Fourth ? (Edition, that is...)&lt;/li&gt;
	&lt;li&gt;Some more goodies about PolicyPak Software&lt;/li&gt;
	&lt;li&gt;Public GP Training Schedule Update
	&lt;ul&gt;
		&lt;li&gt;Different course levels&lt;/li&gt;
		&lt;li&gt;XP and Vista coverage&lt;/li&gt;
		&lt;li&gt;Cities that are scheduled for public courses&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;GPanswers.com News and Updates&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;GPanswers.com is a free service, as you know. And we try try try to keep it as up-to-date as possible. But we&#039;re a limited full time staff (that&#039;s me!) so every once in a while, I ask for some part time helpers to help give us a &quot;boost.&quot;&lt;/p&gt;

&lt;p&gt;These just aren&#039;t &quot;any ol&#039; people&quot; .. they need to be READY and WILLING to help the cause of GP everywhere ! (Okay.. maybe that&#039;s a little much, but you get the idea.) We&#039;ve added three super helpful folks to our GPanswers.com staff.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Staff Changes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the office, I&#039;ve changed my office assistant to Margot Cullen. Margot is just awesome. So, if you need receipts, want to call in to sign up for a public class, or ask her personal and revealing questions about what I do on the weekends, she&#039;s your gal. She can be reached at&lt;a href=&quot;https://www.gpanswers.com/newsletters/assistant@moskowitz-inc.com&quot;&gt;assistant@moskowitz-inc.com&lt;/a&gt;. Please do not send technical questions to Margot. Please use the Community Forum (GPanswers.com/community) for that. Thanks !&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GPanswers.com Helper Additions&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;After a long search, I&#039;m proud to announce two helpers to GPanswers.com: Jakob Heidelberg and Eric Johnson. Jakob is a Danish Windows Expert, and well known blogger. If you read my blog, you&#039;ll be sure to love his as well. &lt;a href=&quot;http://www.windowsecurity.com/Jakob_H_Heidelberg&quot;&gt;Click here for information about Jakob !&lt;/a&gt;and Be sure to &lt;a href=&quot;http://heidelbergit.blogspot.com/&quot;&gt;read his blog&lt;/a&gt; !&lt;/p&gt;

&lt;p&gt;Eric Johnson who works at a private healthcare firm will also be helping out at GPanswers.com. No blog from Eric yet, but maybe soon!&lt;/p&gt;

&lt;p&gt;These two guys are going to help answer questions in the forums, and help with the Tips and Tricks section at GPanswers.com. In fact, if you look at some (most!) of the Tips and FAQ questions, you&#039;ll see Eric already hard at work. Many tips and such at the bottom will say:&lt;/p&gt;

&lt;p&gt;&quot; Verified by: Eric Johnson&lt;br /&gt;
Edited by: Eric Johnson&lt;br /&gt;
Last Edit date: June 30th, 2007&lt;br /&gt;
This question originally posted on August 7th 2004. &quot;&lt;/p&gt;

&lt;p&gt;That way, you get a good idea that we double-checked the accuracy of our tips and also the last time we touched them for a checkup. Hope you like that new GPanswers.com feature. If you want to submit a Tip / Trick / FAQ question .. there&#039;s only one place!&lt;/p&gt;

&lt;p&gt;That&#039;s at the GPanswers.com/community forum, specifically in the &quot;Submit a Tip / Trick&quot; section &lt;a href=&quot;https://www.gpanswers.com/community/viewforum.php?f=34&quot;&gt;here.&lt;/a&gt; You will need to register for a community forum account before submitting.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Thi&lt;/strong&gt;&lt;strong&gt;s Month&#039;s Newsletter Sponsored &lt;/strong&gt;&lt;strong&gt;by:&lt;/strong&gt;&lt;strong&gt; NetIQ&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Download our new white paper, &quot;Best Practices for Managing AD &amp; Group Policy&quot;, to understand how your organization can improve its control over changes to Active Directory and Group Policy. You&#039;ll get the answers you need to assure changes are identified, tracked, and safely made across Active Directory and Group Policy.  &lt;/p&gt;

&lt;p&gt;Click the link to learn more: &lt;a href=&quot;http://www.netiq.com/f/form/form.asp%7Cid=3126%7C%7Corigin=NS_Mosk_071707&quot;&gt;NetIQ&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Inside ADM and ADMX Templates&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;ADM files. You either love &#039;em or your hate &#039;em. Maybe both.&lt;/p&gt;

&lt;p&gt;And that&#039;s because they&#039;re both necessary, but also confusing. And to add to the mix, Microsoft now has ADMX files which can only seemingly add to the confusion.&lt;/p&gt;

&lt;p&gt;In this issue we&#039;ll tackle ADM files. Next issue -- ADMX files.&lt;/p&gt;

&lt;p&gt;So, let&#039;s begin with the &quot;unconfusion.&quot;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why do we need ADM files?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Group Policy is made up of multiple areas. If you dive down into the Group Policy Object Editor (GPOE), you&#039;ll find lots of &quot;stuff&quot; you can do with Group Policy. For instance, Software Restriction Policy, Group Policy Software Installation, Folder Redirection. And yes, the one we play with most: &quot;Administrative Templates&quot; as seen here. The Administrative Templates node is on both the User and Computers sides. As suspected users can only embrace User side policy settings and Computers can only embrace Computer side policy settings.&lt;/p&gt;

&lt;p&gt;But how do these magical settings get &quot;born?&quot;&lt;/p&gt;

&lt;p&gt;It all starts when the stork brings us a new application. Really!&lt;/p&gt;

&lt;p&gt;Okay, not really. But when new applications are &quot;born&quot; there&#039;s potentially some settings we can manipulate. That&#039;s where ADM files come into play. They describe the areas of the application that&#039;s ready to accept settings. ADM files are limited, right away, unfortunately, because they can only address registry settings within an application. But, an application might save it&#039;s settings in various places: .ini files, .js files, .XML files and other areas. ADM files can only address registry-based settings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In the box ADM files&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So how do all those policy settings in the box for Computer Configuration | Administrative Templates and User Configuration | Administrative Templates get there in the first place? If you right-click over the words &quot;Administrative Templates&quot; and select &quot;Add/Remove Templates&quot; in either the User or Computer side, you&#039;ll see the default templates which make up the standard configuration. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news24-adm1.gif&quot; style=&quot;width:451px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The breakdown of these files is:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Conf.adm -- NetMeeting settings.&lt;/li&gt;
	&lt;li&gt;Inetres.adm -- Internet Explorer settings, including connections, toolbars, and toolbar settings. It is equivalent to the options that are available when using the Internet Options menu inside Internet Explorer.&lt;/li&gt;
	&lt;li&gt;System.adm -- Operating system changes and settings. Most of the Computer and User Administrative Template settings are in this ADM template.&lt;/li&gt;
	&lt;li&gt;Wmplayer.adm --Windows Media Player 9 settings.&lt;/li&gt;
	&lt;li&gt;Wuau.adm -- Controls client&#039;s access to Windows Software Update Services servers&#039; clients.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Adding your own ADM Template Files&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Well, that&#039;s easy. First, just get the ADM template you want to use. Maybe you&#039;ve downloaded one from GPanswers.com. (We have about a dozen interesting ones.) Or maybe you want to utilize the ADM files for Office 2003 or Office 2007. That&#039;s great.&lt;/p&gt;

&lt;p&gt;Just click Add as seen in Figure 1 and add in the template. By default, templates are looked for in the Windowsinf directory, but there&#039;s no reason you cannot store them anywhere else. Here&#039;s something you may not know: once the ADM template is added, that ADM template gets added to the GPO itself.&lt;/p&gt;

&lt;p&gt;For instance, in this example, I&#039;ve added &quot;nopassport.adm&quot; which will let us squelch the &quot;Do you want to add your passport?&quot; message the first time a user logs into an XP machine. And also Word11.ADM (from the Office 2003 ADM template download.) You can see these additions in the &quot;Add/Remove Templates&quot; window.&lt;/p&gt;

&lt;p&gt;Then, inside the GPO itself, specifically, the GPT, in the ADM directory, you can see the nopassport.adm and Word11.ADM file added. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news24-adm2.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Why is it added to the GPO? Because if you then try to edit this GPO on another management station, you&#039;ll be able to see the settings contained within the ADM files.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Can&#039;t I see the ADM file additions?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Well, maybe you can, or maybe you can&#039;t see your ADM file additions. And this is causing a lot of confusion for a lot of administrators. Indeed, this is a top 5 FAQ at GPanswers.com, so I hope to put it to rest right here.&lt;/p&gt;

&lt;p&gt;You should at least be able to see the results of adding the two templates as seen here. Two new nodes will appear. Computer Configuration | Nuisances (because of nopassport.adm) and User Configuration | Microsoft Office Word 2003 (because of Word11.ADM). If you dive down into the Word 2003 settings, you&#039;ll see a huge array of configurables, as seen here. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news24-adm4%28resized%29.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;But, you cannot see the settings within the new Nuisances node. Why not? To understand that, you need to understand the idea of &quot;proper&quot; vs. &quot;improper&quot; policies keys that an ADM template might affect.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Proper vs. Improper Policies Keys&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft documentation states that four Registry areas are considered the approved places to create policies out of Registry hacks:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;HKLM|Software|Policies (computer settings, the preferred location)&lt;/li&gt;
	&lt;li&gt;HKLM|Software|Microsoft|Windows|CurrentVersion|Policies (computer settings, an alternative location)&lt;/li&gt;
	&lt;li&gt;HKCU|Software|Policies (user settings, the preferred location)&lt;/li&gt;
	&lt;li&gt;HKCU|Software|Microsoft|Windows|CurrentVersion|Policies (user settings, an alternative location)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The settings contained within Word 2003&#039;s ADM writes to these &quot;proper&quot; locations. But the nopassport.adm file doesn&#039;t. Indeed, nopassport.adm writes to HKLM | Software | Microsoft | MessengerService | PassportBalloon&lt;/p&gt;

&lt;p&gt;So, Microsoft puts up a little safety gate before it allows you to see these settings. The idea is that any of the settings that don&#039;t write to the proper Policies keys (listed above) will tattoo the registry. So, even if you whack the GPO, there&#039;s no way the setting will &quot;revert&quot; back. For example, let&#039;s say you added the nopassport.adm file, and chose squelch the &quot;Do you want to add a passport?&quot; pop-up balloon to every machine in your domain. Then, later, the boss said he really liked that setting. You&#039;ve got a long road ahead of you because all computers now will embrace the setting - basically forever - until you expressly put that setting back.&lt;/p&gt;

&lt;p&gt;In contract, regular policy settings have a &quot;default&quot; value. And if you whack the GPO, those settings will revert back to something. For instance, if you choose to prohibit access to the Control Panel using the built-in ADM templates. Then later, change your mind, all you need to do is whack the GPO and voila! The Control Panel comes back.&lt;/p&gt;

&lt;p&gt;Again - not so with the Passport message - because the policy setting isn&#039;t in a place that will ever revert. So Microsoft protects you by (initially) not showing the policy settings at all - so you don&#039;t shoot yourself in the foot !&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Seeing ADM templates&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So, seeing the ADM templates isn&#039;t all that hard. The editor, by default, doesn&#039;t show you the settings. But it&#039;s easy. Click on the word &quot;Administrative Templates&quot; (either User or Computer half). Then select View | Filtering. Finally, uncheck (yes, uncheck) &quot;Only show policy settings that can be fully managed.&quot; When you do, you&#039;ll see &quot;Passport Solicitation&quot; as a policy setting show up under the Setting column as seen here. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news24-adm5.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;XP vs. Vista in the editor&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Did you notice a subtle difference in the policy setting that just popped up? Look at the icons of policy settings that ship in the box. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news24-adm6b.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Now, look at the icon for a policy setting from an ADM template where the settings don&#039;t write to the proper Policies registry keys. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news24-adm6a.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This blue vs. red icon differential helps you know which settings will tattoo, and which won&#039;t. But again, it&#039;s all based upon where the setting actually targets its settings. In Vista, by the way, the situation changes a bit when you use ADM files in your management station. ADM files show up in their own node called the &quot;Classic Administrative Templates (ADM)&quot; node, as seen below. What was red-dot settings now show up as a scroll icon with a downarrow (but while editing the setting itself, it has a little &quot;No Enter&quot; sign) all seen below.   &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news24-adm7a%28resized%29.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The settings that were blue-dot (those that write to the proper Policies keys) show up as little scroll icons, as seen here.&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news24-adm7b%28resized%29.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next time..&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This newsletter is about to get to be &quot;too long.&quot; So, what we&#039;ll do is cut it off here, and talk more about ADM vs. ADMX files a little more in the next issue.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;How PolicyPak Software Changes Things&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Before I even jump to the good parts, let me just say that PolicyPak software is now ready for you to download and check out today! So, if you decide halfway through reading this, &quot;I just gotta start playing !&quot; ... well, you can! Just go to PolicyPak.com, register for an account, validate the account, and download the software you put in your download cart! As we&#039;ve just learned, ADM templates are great, but, they&#039;re not the best solution to settings management. You still need to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Figure out all the ways the target application needs to be controlled&lt;/li&gt;
	&lt;li&gt;Create the ADM files by hand&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Then, those ADM files ...&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&quot;Tattoo&quot; the Registry (boo!)&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;Can&#039;t even get to some areas of the Registry with ADM files &lt;em&gt;at all&lt;/em&gt;! (Think reg_binary values or HKEY_Classes_Root.)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And finally,&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The ADM language doesn&#039;t let you &quot;craft&quot; a look and feel similar to the application you&#039;re actually trying to control.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Not to mention that ADM files only manipulate the Registry. If your application has tweaks in .ini files, or custom configuration files or databases, ADM files just won&#039;t be able to get in there to adjust the settings you need them to.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enter PolicyPak.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;PolicyPak Software is a new venture of mine that offers software that lets you naturally control your existing applications with Group Policy.&lt;/p&gt;

&lt;p&gt;How do we do it?&lt;/p&gt;

&lt;p&gt;We have our own Group Policy CSE, a Client-Side-Extension. This isn&#039;t an &quot;agent&quot;, it&#039;s an organic extension to Group Policy. Installation is super-easy. You run a component which extends the Group Policy Object editor on your administrative machine (where you create your GPOs). Then you deploy the CSE using Group Policy Software Installation to your target machines, and you&#039;re ready to control your applications using Group Policy.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Wanna control Adobe Acrobat Reader using Group Policy? Try PolicyPak for Adobe Acrobat Reader.&lt;/li&gt;
	&lt;li&gt;Wanna control Microsoft Windows Live Messenger using Group Policy? Use PolicyPak for Windows Live Messenger.&lt;/li&gt;
	&lt;li&gt;Wanna control WinZip using Group Policy? We&#039;re working on PolicyPak for WinZip (and lots of others...)&lt;/li&gt;
	&lt;li&gt;Wanna control something we don&#039;t support yet? Suggest an application at &lt;a href=&quot;https://www.policypak.com/suggest&quot;&gt;www.PolicyPak.com/suggest&lt;/a&gt; !&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/policypak-screenshot-front800.png&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Our goal is to have lots of PolicyPaks to control the applications you already have.&lt;/p&gt;

&lt;p&gt;You&#039;ll purchase them a la carte, so you&#039;ll get only the PolicyPaks you need.&lt;/p&gt;

&lt;p&gt;Not only have we already &quot;done the research for you&quot;, the interface looks almost exactly like the target application. No learning curve! You&#039;re gonna love them! In this example, we&#039;re changing the color of the Highlight Color in the Forms tab. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news24-ppacro1.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Try doing THAT with an ADM template ! Or this trick.. Setting where files should be saved when users utilize Windows Live Messenger. &lt;img alt=&quot;&quot; src=&quot;https://www.gpanswers.com/images/newsletter/news24-ppwlm1.gif&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;Click for larger graphic...&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;So, how can you check them out?&lt;/p&gt;

&lt;p&gt;We&#039;re ready for you to check us out and it for a test drive. Just mosey over to www.PolicyPak.com, register for an account and give our two PolicyPaks a whirl.&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;About&lt;/strong&gt;&lt;strong&gt; GPanswers.com Training&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Choosing the Right Course for You&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Did you know that here at GPanswers.com, we have GP courses that fit what YOU need?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Are you dealing with mostly XP machines? We have an XP-focused course.&lt;/li&gt;
	&lt;li&gt;Are you warming up to Vista? We have a Vista-focused course.&lt;/li&gt;
	&lt;li&gt;Do you want to learn in an intensive format? Learn it in TWO DAYS.&lt;/li&gt;
	&lt;li&gt;Less intensive? Learn it in THREE days.&lt;/li&gt;
	&lt;li&gt;Want even more Advanced material? We&#039;ve got that too.&lt;/li&gt;
	&lt;li&gt;Already know XP GPOs pretty well? How about our XP-to-Vista Catch-Up course?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can find out more about the different public and private courses available from the &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;workshops section of GPanswers.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We also have a &lt;a href=&quot;https://www.gpanswers.com/workshop/rightsize/&quot; target=&quot;_blank&quot;&gt;Group Policy &quot;Rightsize&quot; Tool&lt;/a&gt; which guides you step by step in choosing the best course to take for your situation. Read the course details for the dates you have in mind to make sure you get the skills that match your needs. We have both private and public classes. Use the Rightsize tool to get a complete understanding of your options.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Public coursesâ2007 scheduled&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So, here&#039;s the 2007 (first half) line-up:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;August 8â9: &lt;strong&gt;Chicago, IL&lt;/strong&gt;: Two-Day Group Policy Intensive Course (XP Focused)&lt;/li&gt;
	&lt;li&gt;August 10: &lt;strong&gt;Chicago, IL&lt;/strong&gt;: One-Day Group Policy Advanced Course (XP/Vista Focused)&lt;/li&gt;
	&lt;li&gt;Oct 23, 24 and 25: Netherlands: Three-Day Group Policy Less-Intensive Course (XP Focused). &lt;a href=&quot;http://www.bluebirdcourses.nl/index.php?page=aanmelden&quot;&gt;Sign up here.&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For any public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What about the SECOND HALF of 2007?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and told me where you would like me to go for the first half!&lt;/p&gt;

&lt;p&gt;Now tell me where you want me to go for the second half. The cities with the most &quot;votes&quot; get classes in their city.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Here&#039;s a deal you can&#039;t pass up!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Okay, let&#039;s assume I&#039;ll be in your city teaching a public class. But how would you like to get a FREE student in the class? Easy: Be the &quot;host&quot; of the class. Allow me and our GPanswers.com students to use your conference room for the two or three days, and you get a free student attendee!&lt;/p&gt;

&lt;p&gt;Such a deal!&lt;/p&gt;

&lt;p&gt;Lots of companies have been the hosts for public classes, and they&#039;ve gotten free training for one of their folks! So, if you&#039;re interested in free training for one of your teammates (maybe even you!) &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com?subject=Hosting%20a%20public%20class%20in%20my%20city%20in%20my%20conference%20room&quot;&gt;contact me&lt;/a&gt; if you&#039;re in one of the above cities, and we&#039;ll see about working out the details to have you host the class.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Private courses&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you think you might want your own private in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training (about 6â8), the course pays for itself (since you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japanâor wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does have the distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, the Security Team and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;.&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;LIMITED TIME Private Course Special Offer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you book three-days of private class training which completes before Sep 7, 2007, &lt;em&gt;&lt;strong&gt;I&#039;ll include all travel expenses. &lt;/strong&gt;&lt;/em&gt;So, maybe you&#039;d like the Two-Day XP Training with the One-Day XP-To-Vista Catchup day. Or, maybe the Vista Two-Day and One-Day Advanced training.&lt;/p&gt;

&lt;p&gt;Any three training days qualifies for this special offer.&lt;/p&gt;

&lt;p&gt;I have some free time in the summer I want to fill, and want to give you an incentive to help me book that unused time. So, you pay no travel expenses if the class completes before Sep 7, 2007!&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Group Policy: Management, Troubleshooting, and Security&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;For Windows Vista, Windows 2003, Windows XP, and Windows 2000&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands-on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;  If youâre in the continental USA, you can order the Fourth Edition of &lt;em&gt;Group Policy: Management, Troubleshooting, and Security&lt;/em&gt;directly from me for $45 (including shipping).&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If you order the book from me, Iâll sign the book for you, free! Iâve had many requests for this service, and Iâm honored that you&#039;d ask!&lt;/li&gt;
	&lt;li&gt;If you order it from me, the shipping is included! Usually, I try to ship out the orders the SAME DAY. But if you positively need a guaranteed shipping date, then Amazon might be a better choice.&lt;/li&gt;
	&lt;li&gt;The slight extra cost goes toward the shipping from Sybex to me, then me to you (not for the signature). Again, note that shipping is included.&lt;/li&gt;
	&lt;li&gt;We take all kinds of credit cards. No PO orders for books, please, unless it&#039;s an order for 10 or more.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This book is in stock! We can ship it out today!&lt;br /&gt;
&lt;strong&gt;Note, that I can only take orders from and ship to those in the continental United States. Thanks for your understanding.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Also available is &lt;em&gt;Windows &amp; Linux Integration: Hands-on Solutions for a Mixed Environment&lt;/em&gt; from &lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0470106425&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0470106425&lt;/a&gt; (GPO book)&lt;br /&gt;
 &lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Don&#039;t forget our Sponsors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I can&#039;t tell you how often I hear that people LOVE the Solutions Guide we have at GPanswers.com/solutions. Inside, you&#039;ll find both free and third-party products which extend the reach of Group Policy, or let you do something you haven&#039;t discovered before! So, head on over to the &lt;a href=&quot;https://www.gpanswers.com/component/content/section/5.html?layout=blogcompany&quot;&gt;Solutions Guide&lt;/a&gt; and see what other goodies are available! Our newest sponsors at the Solutions Guide:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;FullArmor corp, with their Endpoint Policy Manager&lt;/li&gt;
	&lt;li&gt;PolicyPak Software, with their PolicyPak family of tools&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot; target=&quot;_blank&quot;&gt;sign up for your own newsletter subscription&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;.For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address:&lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please FORWARD THE ENTIRE email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention regarding subscriptions and unsubscriptions, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; Please POST your technical question on the &lt;a href=&quot;https://www.gpanswers.com/community&quot;&gt;GPanswers.com/community&lt;/a&gt; forum whenever possible.&lt;/p&gt;

&lt;p&gt;If you have questions about ordering a book, contact my assistant Margot at: &lt;a href=&quot;mailto:assistant@moskowitz-inc.com&quot;&gt;assistant@moskowitz-inc.com&lt;/a&gt;. I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thanks for reading!&lt;/strong&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue #23 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue-23</link>
        <pubDate>2007-05-31T23:23:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ GPanswers.com Special Mid-Newsletter Update

Are you going to be at Microsoft&amp;#39;s TechEd next week?
I am, and I hope you&amp;#39;ll come by and say Hi!
In fact, I&amp;#39;ve got some really big news, so I&amp;#39;m breaking it down in three bites to make it easier to digest.
I&amp;#39;m speaking at TechEd, and so are some other speakers you&amp;#39;ll be interested in.
It&amp;#39;s here: PolicyPak Software! Group Policy&amp;acirc;Enable Your World!
More ways to connect at TechEd (free book signing and more!)
 ]]>
        </description>
        <content:encoded>
            &lt;p&gt;GPanswers.com Special Mid-Newsletter Update&lt;/p&gt;

&lt;p&gt;Are you going to be at Microsoft&#039;s TechEd next week?&lt;br /&gt;
I am, and I hope you&#039;ll come by and say Hi!&lt;br /&gt;
In fact, I&#039;ve got some really big news, so I&#039;m breaking it down in three bites to make it easier to digest.&lt;br /&gt;
I&#039;m speaking at TechEd, and so are some other speakers you&#039;ll be interested in.&lt;br /&gt;
It&#039;s here: PolicyPak Software! Group PolicyâEnable Your World!&lt;br /&gt;
More ways to connect at TechEd (free book signing and more!)&lt;br /&gt;
SPEAKING TIMES AT TechED&lt;br /&gt;
I&#039;ll be speaking twiceâsame talk (just repeated). Come to one, or both!&lt;br /&gt;
Topic: Deep Dive into Windows Vista Group Policy Changes and Troubleshooting&lt;/p&gt;

&lt;p&gt;Session ID: CLI408&lt;br /&gt;
Time #1: Tuesday 8.45 Room S330&lt;br /&gt;
Time #2: Thursday 9.45 Room: N320 A&lt;/p&gt;

&lt;p&gt;The beauty of Group Policy changes is not skin deep. There are some basic and detailed changes lying under the hood. And Jeremy Moskowitz of GPanswers.com and author of &quot;Group Policy: Management, Troubleshooting, and Security&quot; is just the guy to bring them to you. In this session, learn why you can&#039;t just run gpresult.exe anymore and get the results you want. Discover what happens if you reconnect to the network after a long absence. Learn how to crack open the new Vista event log and trace Group Policy flow to figure out what might be going on. Learn how other areas, like Offline Files and Group Policy Software Installation can be tweaked to give you just the information you need to fix what ails you. If you&#039;re looking for Group Policy answers to your troubleshooting questions, this is the session for you.&lt;/p&gt;

&lt;p&gt;OTHER Group Policy Speakers and Speeches&lt;/p&gt;

&lt;p&gt;Actually, there&#039;s so much Group Policy stuff going on I can&#039;t list it all! But here&#039;s a sampling. CLI331 - Using Group Policy with Windows and Windows Server 2008&lt;br /&gt;
Wednesday, June 6 10:15 AM - 11:30 AM, S330&lt;br /&gt;
And&lt;br /&gt;
Thursday, June 7 1:00 PM - 2:15 PM, S320 A&lt;br /&gt;
Speaker(s): Mark Williams and Jason Leznek&lt;/p&gt;

&lt;p&gt;This scenario-based walkthrough uses a series of demonstrations to offer an in-depth understanding of new and enhanced Group Policy functions in Windows Vista, and plans for the Windows Server 2008 timeframe. This session showcases Windows Vista as a Windows Vista Group Policy administrative workstation. Learn about new Group Policy features in Windows Vista, including the new format and functionality of Administrative Template (ADMX) files (and interop with legacy ADM files), the ADMX central store, improved awareness of changing network conditions, using multiple local Group Policy Objects (MLGPOs), and Group Policy Management Console (GPMC) integration into the operating system. Demos include using the new event viewer (&quot;Crimson&quot;), and showcase a selection of the hundreds of new policy settings delivered with Windows Vista. Finally, we provide an introduction to the products acquired from DesktopStandard and discuss their future availability and roadmap.&lt;/p&gt;

&lt;p&gt;CLI316 - Microsoft Desktop Optimization Pack: Advanced Group Policy Management (AGPM)&lt;br /&gt;
Tuesday, June 5 4:30 PM - 5:45 PM, N320 A&lt;br /&gt;
Speaker(s): Derek Melber, Winni Verhoef&lt;/p&gt;

&lt;p&gt;Advanced Group Policy Management, a Microsoft Desktop Optimization Pack technology, adds an important level of control to Group Policy management. By adding delegation and workflow for Group Policy management, the enterprise administrator gains granular control over Group Policy deployment. This session explores the AGPM product and how it can help the Enterprise regain control over Group Policy management.&lt;/p&gt;

&lt;p&gt;CLI03-TLC - ADMX File Creation and Management&lt;br /&gt;
Wednesday, June 6 3:45 PM - 5:00 PM, Yellow Theater 1&lt;br /&gt;
Speaker: Judith Herman&lt;/p&gt;

&lt;p&gt;Microsoft Windows Vista introduced ADMX files to define Group Policy settings. This session describes how to create, edit, and manage ADMX files (and their associated ADML files for multi-lingual support). The discussion covers the syntax of these files and how they are used with the ADMX Central Store.&lt;/p&gt;

&lt;p&gt;OkayâHere&#039;s the Big News: PolicyPak Software&lt;br /&gt;
Two TechEds ago, I had a flash of realization about Group Policy. Group Policy does some amazing stuff. It controls Windows itself really, really well. But what it doesn&#039;t control really, really well are third-party applications.&lt;br /&gt;
Sure, there&#039;s ADM templates. But ADMs are just NOT the ideal solution. With ADM templates you have to: Figure out all the ways the target application needs to be controlled Create the ADM files by hand Then, those ADM files &quot;tattoo&quot; the Registry All the while, you can&#039;t even get to some areas of the Registry with ADM files at all! (Think reg_binary.)&lt;/p&gt;

&lt;p&gt;And finally, The ADM language doesn&#039;t let you &quot;craft&quot; a look and feel similar to the application you&#039;re actually trying to control. Not to mention that ADM files only manipulate the Registry. If your application has tweaks in .ini files, or custom configuration files or databases, ADM files just won&#039;t be able to get in there to adjust the settings you need them to.&lt;br /&gt;
Enter PolicyPak.&lt;br /&gt;
PolicyPak Software is a new venture of mine that offers software that lets you naturally control your existing applications with Group Policy.&lt;/p&gt;

&lt;p&gt;How do we do it?&lt;br /&gt;
We have our own Group Policy CSE, a Client-Side-Extension. This isn&#039;t an &quot;agent&quot;, it&#039;s an organic extension to Group Policy. Installation is super-easy. You run a component which extends the Group Policy Object editor on your administrative machine (where you create your GPOs). Then you deploy the CSE using Group Policy Software Installation to your target machines, and you&#039;re ready to control your applications using Group Policy. Wanna control Adobe Acrobat Reader using Group Policy? Try PolicyPak for Adobe Acrobat Reader. Wanna control Microsoft Windows Live Messenger using Group Policy? Use PolicyPak for Windows Live Messenger. Wanna control WinZip using Group Policy? We offer PolicyPak for WinZip.&lt;/p&gt;

&lt;p&gt;Our goal is to have lots of PolicyPaks to control the applications you already have.&lt;br /&gt;
You&#039;ll purchase them a la carte, so you&#039;ll get only the PolicyPaks you need. And the interface looks almost exactly like the target application. No learning curve.&lt;br /&gt;
And PolicyPaks act a lot more like Group Policy than ADM templates do.&lt;br /&gt;
You&#039;re gonna love them!&lt;/p&gt;

&lt;p&gt;So, how can you check them out?&lt;br /&gt;
Two ways:&lt;br /&gt;
Way #1: We&#039;re still in &quot;private beta&quot;, but you can get on board if you send me an email letting me know that you&#039;re interested, and telling me how you plan to test our software out. This can be a simple test lab or a pilot group.&lt;br /&gt;
Way #2: Come to Booth #914 at TechEd and meet the Specops Group Policy Gurus. That&#039;s me, Darren Mar-Elia of GPOGuy.com, and SDM Software and the Specops Guys who make some awesome Group Policy software (www.specopssoft.com)! We&#039;ll be there most of the conference to show off our stuff and answer your tough Group Policy questions! And I&#039;ll have live demos of my new software and we can talk about what you think! We have a website, www.PolicyPak.com, with more information and images of the PolicyPak interface that you can check out, too. But right now there is no way to download the beta software. It is a PRIVATE BETA open only to people who email me directly. If you think you can get me some feedback before TechEd starts, I especially want to hear from you!&lt;/p&gt;

&lt;p&gt;Book Signing at NetIQ&#039;s Booth At NetIQ&#039;s booth, I&#039;ll be giving away 100 free signed copies of my new book. All you need is one of my famous &quot;Group Policy Book/Training Postcards&quot; and then just be one of the first 100 people in line to get your free, signed copy. Come to NetIQ&#039;s booth before the free book signing on Wednesday from 1:00 to 2:00 for all the details!&lt;/p&gt;

&lt;p&gt;More at TechEd to Love&lt;br /&gt;
There is likely going to be more news and stuff to love at TechEd this year, and when I find out about it, the quickest way I can tell you about it is via my blog at www.GPanswers.com/blog. Keep checking it for updates as they happen! See you at TechEd 2007 (booth #914!, mostly!)&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#22 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue22</link>
        <pubDate>2007-05-09T23:25:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Newsletter 22. In this issue:


	Jeremy Talks About Vista and Group Policy, and Other News from GPanswers.com
	May the Fourth (Edition) Be With You . . .
	Moskowitz, inc. Technology Takeaway&amp;Acirc;&amp;reg;
	
		Some tips about using GP to manage Office 2007
	
	
	Public GP Training Schedule Update
	
		Different course levels
		XP and Vista coverage
		Cities that are scheduled for public courses
	
	
	Subscribe, Unsubscribe, and Usage Information


There&amp;#39;s lots to tell you in th ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Newsletter 22. In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Jeremy Talks About Vista and Group Policy, and Other News from GPanswers.com&lt;/li&gt;
	&lt;li&gt;May the Fourth (Edition) Be With You . . .&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology TakeawayÂ®
	&lt;ul&gt;
		&lt;li&gt;Some tips about using GP to manage Office 2007&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Public GP Training Schedule Update
	&lt;ul&gt;
		&lt;li&gt;Different course levels&lt;/li&gt;
		&lt;li&gt;XP and Vista coverage&lt;/li&gt;
		&lt;li&gt;Cities that are scheduled for public courses&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There&#039;s lots to tell you in this issue! There was so much, in fact, that I held some back for the next edition, which will be out much sooner than normal.&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;This Month&#039;s Newsletter Sponsored by: BeyondTrust Corporation&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Enable users who don&#039;t have administrative privileges to run all applications!&lt;/p&gt;

&lt;p&gt;BeyondTrust Privilege Manager was the first product to enable the security best practice of Least Privilege in Windows environments by allowing administrators to assign end users permissions to required or selected applications. Built for Windows 2000, XP, and Vista, and applied through Group Policy.&lt;/p&gt;

&lt;p&gt;Click the link to learn more:&lt;a href=&quot;https://www.gpanswers.com/solutions/%7Cid=52%27&quot;&gt;BeyondTrust&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;GPanswers.com News&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Holy cowâit&#039;s here! 786 pages!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You wanted it, and now you can get it. The biggest GP book of all time, and it&#039;s available RIGHT NOW. That&#039;s right, I&#039;ve got an updated version of my popular Group Policy book. It&#039;s not&lt;em&gt; called&lt;/em&gt; &quot;4th edition&quot;, but that&#039;s really what it is.&lt;/p&gt;

&lt;p&gt;Learn more at www.GPanswers.com/book (and in the note below).&lt;/p&gt;

&lt;p&gt;In short, it&#039;s long. Fully updated for Vista, XP/SP2, and Server 2003.&lt;/p&gt;

&lt;p&gt;200 new pages. You&#039;re gonna love it. Get a signed copy at &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;www.GPanswers.com/book&lt;/a&gt;!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Jeremy talks about Group Policy and Vista&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In case you missed it, here&#039;s a link to an interview conducted by Greg Shields of Redmond Magazine where he and I chatted about some of the new customizations in Group Policy that come with Windows Vista and why you should start implementing them now to prepare for what&#039;s to come in Windows Server Longhorn.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.realtime-windowsserver.com/podcast/2007/04/group_policy_chat_with_jeremy.htm&quot; target=&quot;_blank&quot;&gt;Download the podcast from here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Updated GPanswers.com/community forum&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We&#039;ve moved and shaken a little bit in the forums, and now things are more streamlined. If you have a question about something in the book, or something about the material that the same chapter in the book would cover, you can just post to one place. (Trust me, this makes sense when you check it out.) So, join the &lt;a href=&quot;https://www.gpanswers.com/community&quot; target=&quot;_blank&quot;&gt;community forum&lt;/a&gt; today!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;don&#039;t forget the blog&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Some people have asked why they don&#039;t see as many newsletters anymore.&lt;/p&gt;

&lt;p&gt;Because now I have my little blog, so that when I have a neat little nugget to share, I can do it immediately.&lt;/p&gt;

&lt;p&gt;I don&#039;t have to compile all those little tips into a big newsletter.&lt;/p&gt;

&lt;p&gt;So, I&#039;m saving the newsletter for longer tips that I think tell a bigger story.&lt;/p&gt;

&lt;p&gt;Getting to the blog is easy. Just shuffle over to &lt;a href=&quot;https://www.gpanswers.com/component/content/section/15.html?layout=blog&quot;&gt;www.GPanswers.com/blog&lt;/a&gt; and you can use the RSS link on that page to get updated whenever there are goodies to be had!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Welcome to Cynthia&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I have a new right-hand here in the offices of Moskowitz, inc. Her name is Cynthia Talmage, and she can help you order a case of books, sign up for Public class, or help you get that Private class you always wanted. You can also ping her just to say Hi. You can say Hi by emailing &lt;a href=&quot;mailto:cynthiat@moskowitz-inc.com?subject=Hi%20Cyntha%21&quot;&gt;cynthiat@moskowitz-inc.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Welcome to Eric&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Eric has joined Adam to help out with the GPanswers.com community forum. As a long-standing member, he has already provided countless tips and nuggets of advice to other visitors, and now he is also helping to keep the forum in order to make it even easier to get the best quality information about Group Policy from your peers. A warm welcome to Eric. Why not join him and our other regulars in the &lt;a href=&quot;https://www.gpanswers.com/community/&quot; target=&quot;_blank&quot;&gt;GPanswers forum&lt;/a&gt; today?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Spread the Word&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you enjoy this newsletter and are anxious to read the material we had to leave out for next time, why not share the GPanswers love?&lt;/p&gt;

&lt;p&gt;Spread the word! How?&lt;/p&gt;

&lt;p&gt;Simply forward the newsletter email that you received to a colleague or friend and they can decide if they like the content, and if so, they can &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot; target=&quot;_blank&quot;&gt;sign up here&lt;/a&gt; to make sure they don&#039;t miss out on future releases.&lt;/p&gt;

&lt;p&gt;Or maybe you can mention the newsletter in your blog or just shout &quot;I love GPanswers.com&quot; to the guy next to you in traffic. However you do itâlet people know why you think GPanswers is THE place to go for Group Policy information.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Fourth&lt;/strong&gt;&lt;strong&gt; Edition of Jeremy&#039;s Group Policy Book... renamed:&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Group Policy: Management, Troubleshooting, and Security&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Every single chapter has gotten an update for Vista, but I still make sure you have all the information you need for both Windows XP and Windows 2000. Here are some of the highlights of the new edition:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;A real lab guide makes it easier to follow along with all of the hundreds of examples. So, you can walk through everything &lt;em&gt;with &lt;/em&gt;me if you want to.&lt;/li&gt;
	&lt;li&gt;Multiple Local GPOs for Vista with walk-through examples.&lt;/li&gt;
	&lt;li&gt;Understanding and troubleshooting Vista&#039;s method for determining if you&#039;re online or offline, and what that means for GP processing.&lt;/li&gt;
	&lt;li&gt;Troubleshooting in a Vista world.&lt;/li&gt;
	&lt;li&gt;Find out what happens with ADM and ADMX files when you create a GPO. Or what happens if you edit a GPO from Vista or XP. And back again!&lt;/li&gt;
	&lt;li&gt;Software Restriction Policies secrets.&lt;/li&gt;
	&lt;li&gt;Tricking Restricted Groups so itâs not ârip and replaceâ.&lt;/li&gt;
	&lt;li&gt;Controlling User Account Control, and tweaking it for specific scenarios.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There&#039;s so much more ...&lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot; target=&quot;_blank&quot;&gt; read more detail and some reviewers&#039; comments here&lt;/a&gt;. You can order the book from &lt;a href=&quot;http://www.amazon.com/gp/product/0470106425&quot; target=&quot;_blank&quot;&gt;popular online retailers&lt;/a&gt;, or get it SIGNED if you order it directly from me. &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;Just click here&lt;/a&gt; !&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Technology&lt;/strong&gt;&lt;strong&gt; Takeaway®, a Service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;A quick look at Group Policy for Office 2007 &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Many of you will be facing the challenge of planning a deployment of Office 2007, or you may already have some early adopters in your organization. So in this edition, we&#039;ll take a look at how to implement some of the useful Group Policy controls for this new version of Office.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First things firstâthe ADM templates&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft has released a collection of ADM files (yes, ADM files) so you can manage these policies from an XP or 2003 machine just as easily as from Vista/Longhorn. These can be downloaded as a single extractable file here: &lt;a href=&quot;http://go.microsoft.com/fwlink?linkid=75729&quot; target=&quot;_blank&quot;&gt;http://go.microsoft.com/fwlink?linkid=75729&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A little side note: What&#039;s strange is that ADMX files for when you use Vista management stations are STILL missing in action. I&#039;ve seen pre-beta versions, but they never seem to materialize.&lt;/p&gt;

&lt;p&gt;Anyway, once you have downloaded and extracted them, add them to your GPMC by editing or creating a policy, then right-clicking Administrative Templates | Add/Remove templates | Add. Browse to the extracted files and add the ones you need.&lt;/p&gt;

&lt;p&gt;There are settings available for the machines side or the user side but the vast majority target user settings.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Help your users save things properly&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;One gripe system admins often have is that their users simply don&#039;t follow corporate guidelines, ignore all their training, and save things where they should notâparticularly in places such as My Documents. This is a little unfairâmany users would argue that if you want them to save somewhere, you should make it an easy place to find. You might also consider just preventing them from saving anywhere else but the place you designate. Let&#039;s look at helping your users find the right place first.&lt;/p&gt;

&lt;p&gt;On XP/2003/2000, you would look under User Configuration | Administrative Templates; with Vista go down one more level to &quot;Classic administrative templates&quot; (which indicates their ADM file format). There you will find Microsoft Office 2007 System | File open/Save dialog box.&lt;/p&gt;

&lt;p&gt;The first section in there deals with the Places Barâthe &quot;favorites&quot; area of the Open and Save dialog boxes. You can add up to 10 locations which will appear in the order you enter them, and you can give them meaningful namesâno more &quot;X: (fileshare on SRV27)&quot;, but &quot;Your shared work files&quot;. You can use UNCs and combine environment variables for profile locations, and so on.&lt;/p&gt;

&lt;p&gt;So, we&#039;ve made it easy to find the right place, how about blocking the &quot;wrong&quot; places? This requires a combination of two settings, both of them under the section &quot;Restricted browsing&quot;. Enabling &quot;Activate Restricted Browsing&quot; will mean that in the Save As dialog, users will not be able to navigate to any folder which is not explicitly allowed by the second (multi-value) setting, &quot;Approve locations&quot;. Note that if you set the first one, you MUST provide a list in the second one.&lt;/p&gt;

&lt;p&gt;Notice that these settings restrict where users can save, but do not limit where they can browse to open files (which they might have previously put in the wrong place).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Using Corporate standard templates&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Anyone working for a large company will likely be familiar with the idea that they should stick to certain corporate guidelines for their documents; in other words, layout, styles, fonts, etc. should be consistent between documents and between authors.&lt;/p&gt;

&lt;p&gt;In order to facilitate this process, marketing departments (usually aided by IT, of course) often create standard templates for users to use for their letters, faxes, presentations, and so on.&lt;/p&gt;

&lt;p&gt;When the process is implemented badly, users will save their own copies of these templates which become out-of-date once the originals are updated, and all their future documents then deviate from company standards. Here&#039;s some simple rules of thumb if your business has gone to the effort of making these standard documents:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Save them once in a central fileshare to which all users have read access and only a limited number of individuals have any modify permissions.&lt;/li&gt;
	&lt;li&gt;Tell users to use these and only these.&lt;/li&gt;
	&lt;li&gt;Better still, configure their Office apps to know where to find the templates, so when they create a new document, the application automatically gives them the right choices.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now in Office 2000/2003, this was easy to do through the UI. In the always-connected world of Office 2007, however, it is just as likely for the app to try and find a jazzy-looking resume from the internet as it is to deliver the corporate memo template.&lt;/p&gt;

&lt;p&gt;So, under Office 2007 System | Shared Paths | Workgroup Templates, set the UNC or the drive and folder where the templates are stored. (You can also do this for previous versions using the matching ADM files.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Managing file types during your migration&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There are lots of good reasons why the underlying file type has been changed after all these years, and many admins are thanking the development team for making all the files sitting on their fileservers and in their email systems so much smaller. But there is the potential problem of compatibility if your network is too big to upgrade everyone all at once.&lt;/p&gt;

&lt;p&gt;You could download and install the &lt;a href=&quot;http://tinyurl.com/y5a879&quot; target=&quot;_blank&quot;&gt;Office 2007 compatibility pack&lt;/a&gt; on all your machines that have older versions, but this could be quite time consuming. As a short-term measure you might want to simply change the default for your Office 2007 applications to save in the older format.&lt;/p&gt;

&lt;p&gt;Using Excel as our example, you need to look under User Configuration | Administrative Templates | [Classic Administrative Templates(ADM)] | Microsoft Excel 2007 | Excel Options | Save. The setting for &quot;Save Excel Files as&quot;, once enabled, has a drop-down list of choices. The most likely option you would want is &quot;Excel 97-2003 workbook&quot;.&lt;/p&gt;

&lt;p&gt;Note that the application will use this as the default file format when saving, but does not prevent the user from making a different choice. It also does not prevent the user from changing the default in the UI by graying out the choice under the Office button | Excel options | Save. However, when they restart Excel it resets the policy setting, even before a GP refresh.&lt;/p&gt;

&lt;p&gt;That&#039;s all the time we have for tips in this issue! Next time there&#039;ll be more about the way the GP engine works, and some information about the improved troubleshooting tools available under Vista. Please continue to submit your own tips or links to useful information in the &lt;a href=&quot;https://www.gpanswers.com/community&quot; target=&quot;_blank&quot;&gt;GPanswers.com forums&lt;/a&gt;.&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Choose&lt;/strong&gt;&lt;strong&gt; the Right Active Directory and Group Policy Course for You&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Did you know that here at GPanswers.com, we have GP courses that fit what YOU need?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Are you dealing with mostly XP machines? We have an XP-focused course.&lt;/li&gt;
	&lt;li&gt;Are you warming up to Vista? We have a Vista-focused course.&lt;/li&gt;
	&lt;li&gt;Do you want to learn in an intensive format? Learn it in TWO DAYS.&lt;/li&gt;
	&lt;li&gt;Less intensive? Learn it in THREE days.&lt;/li&gt;
	&lt;li&gt;Want even more Advanced material? We&#039;ve got that too.&lt;/li&gt;
	&lt;li&gt;Already know XP GPOs pretty well? How about our XP-to-Vista Catch-Up course?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can find out more about the different public and private courses available from the &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;workshops section of GPanswers.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We also have a &lt;a href=&quot;https://www.gpanswers.com/workshop/rightsize/&quot; target=&quot;_blank&quot;&gt;Group Policy &quot;Rightsize&quot; Tool&lt;/a&gt; which guides you step by step in choosing the best course to take for your situation. Read the course details for the dates you have in mind to make sure you get the skills that match your needs. We have both private and public classes. Use the Rightsize tool to get a complete understanding of your options.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;public coursesâ2007 (First Half) scheduled &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and told me where you would like me to go! So, here&#039;s the 2007 (first half) line-up:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;May 21â22, &lt;strong&gt;Washington, DC&lt;/strong&gt;: Two-Day Group Policy Intensive Course (XP Focused)

	&lt;ul&gt;
		&lt;li&gt;We almost have enough people to run this class. Sign up TODAY to secure your seat! We need you to sign up ASAP (or we might have to cancel!)&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;May 23â24, &lt;strong&gt;New York, NY&lt;/strong&gt;: Two-Day Group Policy Intensive Course (XP Focused)
	&lt;ul&gt;
		&lt;li&gt;We almost have enough people to run this class. Sign up TODAY to secure your seat!&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;May 25, &lt;strong&gt;New York, NY&lt;/strong&gt;: One-Day Group Policy Advanced Course (XP/Vista Focused)&lt;/li&gt;
	&lt;li&gt;June 18â19, &lt;strong&gt;Phoenix, AZ&lt;/strong&gt;: Two-Day Group Policy Intensive Course (XP Focused)
	&lt;ul&gt;
		&lt;li&gt;We almost have enough people to run this class. Sign up TODAY to secure your seat!&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;June 20, &lt;strong&gt;Phoenix, AZ&lt;/strong&gt;: One-Day Group Policy Advanced Course (XP/Vista Focused)&lt;/li&gt;
	&lt;li&gt;June 21, &lt;strong&gt;Phoenix, AZ&lt;/strong&gt;: One-Day Group Policy XP-to-Vista Catch-Up Course&lt;/li&gt;
	&lt;li&gt;July 16â17, &lt;strong&gt;San Francisco, CA&lt;/strong&gt;: Two-Day Group Policy Intensive Course (XP Focused)&lt;/li&gt;
	&lt;li&gt;July 18: &lt;strong&gt;San Francisco, CA&lt;/strong&gt;: One-Day Group Policy Advanced Course (XP/Vista Focused)&lt;/li&gt;
	&lt;li&gt;August 8â9: &lt;strong&gt;Chicago, IL&lt;/strong&gt;: Two-Day Group Policy Intensive Course (XP Focused)&lt;/li&gt;
	&lt;li&gt;August 10: &lt;strong&gt;Chicago, IL&lt;/strong&gt;: One-Day Group Policy Advanced Course (XP/Vista Focused)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For any public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt; Some notes:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;This is the first time the Advanced Group Policy course has been made available to the public. If you&#039;ve taken the Two-Day or Three-Day course, check it out. If you sign up for the Two-Day Intensive and One-Day Advanced at the same time, you&#039;ll get $100 off the third day.&lt;/li&gt;
	&lt;li&gt;Phoenix is the only place you can take the One-Day XP-to-Vista Catch-Up course right now.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Here&#039;s a deal you can&#039;t pass up!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Okay, so I&#039;ll be in your city teaching a public class. But how would you like to get a FREE student in the class? Easy: Be the &quot;host&quot; of the class. Allow me and our GPanswers.com students to use your conference room for the two or three days, and you get a free student attendee!&lt;/p&gt;

&lt;p&gt;Such a deal!&lt;/p&gt;

&lt;p&gt;Lots of companies have been the hosts for public classes, and they&#039;ve gotten free training for one of their folks! So, if you&#039;re interested in free training for one of your teammates (maybe even you!) &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com?subject=Hosting%20a%20public%20class%20in%20my%20city%20in%20my%20conference%20room&quot;&gt;contact me&lt;/a&gt; if you&#039;re in one of the above cities, and we&#039;ll see about working out the details to have you host the class.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Private courses&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you think you might want your own private in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training (about 6â8), the course pays for itself (since you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japanâor wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does have the distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;.&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Private Course Special Offer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you book a private class which completes before August 31, 2007, I&#039;ll include all travel expenses. I have some free time in the summer I want to fill, and want to give you an incentive to help me book that unused time. So, you pay no travel expenses if the class completes before Aug 31, 2007!&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Group Policy: Management, Troubleshooting, and Security&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;For Windows Vista, Windows 2003, Windows XP, and Windows 2000&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands-on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;  If youâre in the continental USA, you can order the Fourth Edition of &lt;em&gt;Group Policy: Management, Troubleshooting, and Security&lt;/em&gt;directly from me for $45 (including shipping).&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If you order the book from me, Iâll sign the book for you, free! Iâve had many requests for this service, and Iâm honored that you&#039;d ask!&lt;/li&gt;
	&lt;li&gt;If you order it from me, the shipping is included! Usually, I try to ship out the orders the SAME DAY. But if you positively need a guaranteed shipping date, then Amazon might be a better choice.&lt;/li&gt;
	&lt;li&gt;The slight extra cost goes toward the shipping from Sybex to me, then me to you (not for the signature). Again, note that shipping is included.&lt;/li&gt;
	&lt;li&gt;We take all kinds of credit cards. No PO orders for books, please, unless it&#039;s an order for 10 or more.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This book is in stock! We can ship it out today!&lt;br /&gt;
&lt;strong&gt;Note, that I can only take orders from and ship to those in the continental United States. Thanks for your understanding.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Also available is &lt;em&gt;Windows &amp; Linux Integration: Hands-on Solutions for a Mixed Environment&lt;/em&gt; from &lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0470106425&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0470106425&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Don&#039;t forget our Sponsors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I can&#039;t tell you how often I hear that people LOVE the Solutions Guide we have at GPanswers.com/solutions. Inside, you&#039;ll find both free and third-party products which extend the reach of Group Policy, or let you do something you haven&#039;t discovered before! So, head on over to the &lt;a href=&quot;https://www.gpanswers.com/component/content/section/5.html?layout=blogcompany&quot;&gt;Solutions Guide&lt;/a&gt; and see what other goodies are available! Our newest sponsors at the Solutions Guide:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Biscom Corp with their FaxCom Suite for Windows&lt;/li&gt;
	&lt;li&gt;BeyondTrust Corporation with their BeyondTrust Privilege Manager product&lt;/li&gt;
	&lt;li&gt;NetIQ with their GP Guardian product&lt;/li&gt;
	&lt;li&gt;SDM software with their GP Health Reporter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot; target=&quot;_blank&quot;&gt;sign up for your own newsletter subscription&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address:&lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please FORWARD THE ENTIRE email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention regarding subscriptions and unsubscriptions, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Please POST your technical question on the &lt;a href=&quot;https://www.gpanswers.com/community&quot;&gt;GPanswers.com/community&lt;/a&gt; forum whenever possible.&lt;/p&gt;

&lt;p&gt;If you have questions about ordering a book, contact my assistant Cynthia at: &lt;a href=&quot;mailto:cynthiat@moskowitz-inc.com&quot;&gt;cynthiat@moskowitz-inc.com&lt;/a&gt;. I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thanks for reading!&lt;/strong&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#21 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue21</link>
        <pubDate>2007-01-12T23:26:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Newsletter 21: Rounding off 2006 and looking ahead to 2007 In this issue:


	It&amp;#39;s Issue 21
	Jeremy&amp;#39;s joined the bloggers
	Moskowitz, inc. Technology Takeaway (r)
	
		The questions on everyone&amp;#39;s lips about the next generation of MS software
		A tip for protecting some accounts from the wrong GPOs
	
	
	Public GP Training Schedule Released (first several months)
	Subscribe, unsubscribe, and usage information


In this issue, I&amp;#39;m happy to say, we&amp;#39;ve got a full plat ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Newsletter 21: Rounding off 2006 and looking ahead to 2007 In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 21&lt;/li&gt;
	&lt;li&gt;Jeremy&#039;s joined the bloggers&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r)
	&lt;ul&gt;
		&lt;li&gt;The questions on everyone&#039;s lips about the next generation of MS software&lt;/li&gt;
		&lt;li&gt;A tip for protecting some accounts from the wrong GPOs&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Public GP Training Schedule Released (first several months)&lt;/li&gt;
	&lt;li&gt;Subscribe, unsubscribe, and usage information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In this issue, I&#039;m happy to say, we&#039;ve got a full plate. We&#039;ve got a link to my interview with Michael Dennis (who is leaving the Group Policy team after 9 years!), a bunch of tips and tricks, and my 2007 public training schedule (for the next few months.) So, let&#039;s get started!&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;This Month&#039;s Newsletter Sponsored by: NetIQ&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;As an IT professional, NetIQ is interested in your thoughts and opinions on managing group policy. We know these responsibilities are critical in today&#039;s enterprise, and we value your feedback. Please take a few minutes and complete our brief Group Policy Survey, co-authored by Jeremy Moskowitz. Respond by February 15, and you will be entered for a chance to win a $300 Amazon.com gift certificate.&lt;a href=&quot;http://www.surveymonkey.com/s.asp?u=968023032938&quot;&gt;Take the survey today.&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;GPanswers.com News&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Jeremy&#039;s GP blog keeps you right up to date&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you just can&#039;t get enough information about Group Policy, then my blog would be a good place to go to get the latest and most important stuff you need. Take a look at the &lt;a href=&quot;https://www.gpanswers.com/component/content/section/15.html?layout=blog&quot; target=&quot;_blank&quot;&gt;GPanswers.com blog&lt;/a&gt; to make sure you don&#039;t miss out on any updates.&lt;/p&gt;

&lt;p&gt;GPanswers.com excluSIve -- &quot;Exit Interview with Michael dennis, Outgoing team lead for Group Policy&quot;&lt;/p&gt;

&lt;p&gt;Speaking of the blog, I got an exclusive opportunity to interview the outgoing Team Lead for Group Policy, Michael Dennis. Michael has been the lead Program Manager for 9 years and 9 months to the day before changing posts (this Monday.) Learn about where Michael feels Group Policy is going, what he feels is his top achievements are so far at Microsoft, and what&#039;s next for the King of Control. Again, this is on the &lt;a href=&quot;https://www.gpanswers.com/component/content/89-jeremys-gp-blog/225-interview-with-outgoing-gp-team-lead-michael-dennis.html&quot; target=&quot;_blank&quot;&gt;GPanswers.com blog&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;how can i best help GPanswers.com ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve ever asked yourself, &quot;How can I help GPanswers.com&quot; out? Well, here&#039;s your chance.&lt;/p&gt;

&lt;p&gt;Sure, we take tips and tricks to help others. But today, I&#039;m asking for something more.&lt;/p&gt;

&lt;p&gt;Indeed, you&#039;re not helping me out, you&#039;re really helping out Ron Hrehirchuk, our original GPanswers.com Guy Friday.&lt;/p&gt;

&lt;p&gt;I don&#039;t want to get into too many details here, but Ron is gravely sick and is unable to care for his family. Ron has done more for GPanswers.com than I can remember, and he did it for you, our loyal fans for several years.&lt;/p&gt;

&lt;p&gt;Now, it&#039;s Ron and Ron&#039;s family&#039;s time of need.&lt;/p&gt;

&lt;p&gt;In short, I (Jeremy) am personally asking you to donate to Ron&#039;s family&#039;s fund.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://tinyurl.com/yfdth9&quot;&gt;Click here.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It&#039;s via PayPal and it&#039;s quick and easy to do. The link is here. And it would meen a lot to me, personally, to know that the GPanswers.com folks have made a difference in someone&#039;s life who tried to help make a difference in yours.&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Technology&lt;/strong&gt;&lt;strong&gt; Takeaway (r), a Service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;FAQs about Group Policy for the latest MS products&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Can I install the Group Policy Management Console (GPMC) on Vista?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The GPMC for Windows 2000, XP and 2003 is still available, the latest version is &quot;GPMC with service pack 1.&quot; You can &lt;a href=&quot;http://tinyurl.com/yulof&quot; target=&quot;_blank&quot;&gt;download GPMC with sp1 from MS&lt;/a&gt; here. However, Vista will ship with GPMC v2 already built-in, so there&#039;s no need to download anything, just start using it! Note that the old version won&#039;t work in Vista, so don&#039;t try to install it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What about converting my old custom ADM files to ADMX format?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before we get too far along in this topic... who is making custom ADM files and what are you making them for? &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com?subject=I%27ve%20got%20ADM%20files&quot;&gt;Drop me a line &lt;/a&gt;and let me know.&lt;/p&gt;

&lt;p&gt;As you know by now, the method for storing available group policy settings for Vista is an XML-based file format known as ADMX. This is the format your new custom policy definitions need to use if you want to include them in GPOs you will create on a Vista machine, although the policies themselves can be applied to earlier OS versions.&lt;/p&gt;

&lt;p&gt;So, the problem is how do you get your current ADM files to the brand new ADMX file version?&lt;/p&gt;

&lt;p&gt;At first, Microsoft did not give any indication that they would provide anything to help update existing ADM files, but thankfully they must have been listening to the GP community and (in conjunction with FullArmor corp) have released a free &lt;a href=&quot;http://tinyurl.com/ydb6ub&quot; target=&quot;_blank&quot;&gt;ADMX migrator tool to convert ADM files&lt;/a&gt;. This tool also provides a GUI environment for creating and editing ADMX files. You might also want to look at the &lt;a href=&quot;http://tinyurl.com/kd2uu&quot; target=&quot;_blank&quot;&gt;free XML Notepad 2007&lt;/a&gt; editor which would also allow you to do this and includes useful tools like find and replace and the ability to compare two XML files to find the differences (maybe an old and new version of your custom policy file).&lt;/p&gt;

&lt;p&gt;Here&#039;s the trick: I&#039;ve used the tool, and it works as advertised, but can be a little hard to get the policy settings you&#039;re creating to come out &quot;just right.&quot; So, be patient with the tool, and take some &quot;time off&quot; if you get a litle frustrated. (And, don&#039;t forget -- it&#039;s free!)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How do I know what GP settings are available in each WIndows version?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Whenever a new service pack or operating system is released, MS issues a complete spreadsheet of all the Group Policy settings, along with the Explaintext and which OS version the policy setting will affect.&lt;/p&gt;

&lt;p&gt;The latest version of the &lt;a href=&quot;http://tinyurl.com/zulc6&quot; target=&quot;_blank&quot;&gt;Group Policy Settings file&lt;/a&gt; is up to date to Vista build 6000 - the RTM version of Vista.&lt;/p&gt;

&lt;p&gt;The new file layout also includes columns to let you know if the policy requires a reboot or logoff in order for the policy to take effect. (Note, it&#039;s not 100% accurate .. it&#039;s missing some , but it&#039;s a darn good start.)&lt;/p&gt;

&lt;p&gt;You can filter the list easily on these columns, and use the usual Find feature (CTRL-F) to search for particular text. The older file for versions of &lt;a href=&quot;http://tinyurl.com/fmxvo&quot; target=&quot;_blank&quot;&gt;Windows up to 2003 sp1 / XP sp2&lt;/a&gt; is still useful if you are not moving to Vista just yet, as it shows which ADM files you will find the settings in when working with these older systems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;I&#039;m not using Vista but I want to manage my IE7 deployment, what can I do?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the last newsletter we talked about how you can use the &lt;a href=&quot;http://tinyurl.com/kwkgt&quot; target=&quot;_blank&quot;&gt;blocker toolkit&lt;/a&gt; which you can use to prevent the installation of Internet Explorer 7 if you / your users / some applications you need are not ready for it just yet. If you are ready and want to roll out, though, you might like to &lt;a href=&quot;http://tinyurl.com/y6suap&quot; target=&quot;_blank&quot;&gt;download the ADM files for IE7&lt;/a&gt; which will let you create GPOs which manage IE7 on XP sp2 and 2003 sp1 (the supported OS for IE7). Why didn&#039;t these ship as ADMX files? No idea. I wish they did.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Notes from the field: Protecting your users and computers from an &quot;&lt;/strong&gt;&lt;strong&gt;inadvertant&lt;/strong&gt;&lt;strong&gt;&quot; link of GPOs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Imagine this: You&#039;ve got an OU full of users or computers. But corporate policy says &quot;Don&#039;t link any GPOs to them.&quot; Maybe these are lab machines, or your machines or some other type of machine or user accounts which just shouldn&#039;t get GPOs. Okay, super.&lt;/p&gt;

&lt;p&gt;All well and good until someone doesn&#039;t get the memo and still links a GPO to this OU.&lt;/p&gt;

&lt;p&gt;Oops.&lt;/p&gt;

&lt;p&gt;Now you have a problem.&lt;/p&gt;

&lt;p&gt;Turns out, there IS a way to guarantee that no one can link a GPO to the OU.&lt;/p&gt;

&lt;p&gt;Here&#039;s the trick (and stay with me here): don&#039;t make it an OU.&lt;/p&gt;

&lt;p&gt;That&#039;s right -- don&#039;t use an OU for these accounts, use a &quot;container.&quot; Just as the default containers for Users and Computers prevent you linking policies to them, so do any other containers you create. The accounts in here will still get domain and site policies, of course (subject to security filtering), but you can guarantee that they won&#039;t get any additional policy settings.&lt;/p&gt;

&lt;p&gt;How do you create a container? Bad news -- it&#039;s not something you can do within Active Directory Users and Comptuers. But it is easy enough to do: use ADSIEdit.&lt;/p&gt;

&lt;p&gt;On an admin workstation which has the &quot;Ssupport Tools&quot; installed (or directly on a server) fire up Start &gt; Run and type ADSIedit.msc. (Note: if you are logged on without domain admin rights you need to use runas and provide an admin account for this procedure to work). You should see something like the screenshot below.&lt;/p&gt;

&lt;p&gt;Choose the relevant domain and right click, select New &gt; Object as shown here:&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/ADSIedit2.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Choose to create a new container object class, provide a useful meaningful name for the new object and finally click finish.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/ADSIedit_comp.png&quot; style=&quot;width:451px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;So now you have a new container which will show up in AD users and computers for example, but simply will not appear in the GPMC or any other GP editing tool since you can&#039;t link any policies to it.&lt;/p&gt;

&lt;p&gt;Simple yet effective.&lt;/p&gt;

&lt;p&gt;That&#039;s all the time we have for tips in this issue. please continue to submit your own tips or links to useful information in the&lt;a href=&quot;https://www.gpanswers.com/community&quot; target=&quot;_blank&quot;&gt;GPanswers.com forums&lt;/a&gt;.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Choose&lt;/strong&gt;&lt;strong&gt; the right Active Directory and Group Policy Course for you&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Did you know that here at GPanswers.com, we have three courses, including an ADVANCED course? You can find out more about the different public and private courses available from the &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;workshops section of GPanswers.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We also have a &quot;&lt;a href=&quot;https://www.gpanswers.com/workshop/rightsize/&quot; target=&quot;_blank&quot;&gt;Group Policy &quot;Rightsize&quot; Tool&lt;/a&gt;&quot; which helps you decide the best course to take for your situation. We have both private and public classes, so use the Righsize tool to get a total understanding of your options.&lt;/p&gt;

&lt;p&gt;For the first time ever, we&#039;re making the &quot;Less Intensive Three-day&quot; course as well as the &quot;One Day Advanced&quot; course available to the public.&lt;/p&gt;

&lt;p&gt;As Vista becomes more popular, we&#039;ll make our Vista classes more available. Right now, Vista classes are only available as Private classes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;public courses -- 2007 (First Half) scheduled &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and told me where you would like me to go! So, here&#039;s the 2007 (first half) lineup:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Feb 1, 2: &lt;strong&gt;Seattle&lt;/strong&gt;, WA: Two day Group Policy Intensive Course (XP Focused)&lt;/li&gt;
	&lt;li&gt;Feb 27, 28: &lt;strong&gt;Chicago&lt;/strong&gt;, IL: Two day Group Policy Intensive Course (XP Focused)&lt;/li&gt;
	&lt;li&gt;Mar 1: &lt;strong&gt;Chicago&lt;/strong&gt;, IL: One-Day Group Policy Advanced Course (XP/Vista Focused)&lt;/li&gt;
	&lt;li&gt;Mar 5, 6: &lt;strong&gt;Atlanta&lt;/strong&gt;, GA: Two day Group Policy Intensive Course (XP Focused)&lt;/li&gt;
	&lt;li&gt;Mar 7: &lt;strong&gt;Atlanta&lt;/strong&gt;, GA: One-Day Group Policy Advanced Course (XP/Vista Focused)&lt;/li&gt;
	&lt;li&gt;Mar 13, 14, 15: &lt;strong&gt;Portland&lt;/strong&gt;, OR: Three-day Group Policy Less-Intensive Course (XP Focused) -- Taught by James Conrad&lt;/li&gt;
	&lt;li&gt;Apl 17, 18, 19: &lt;strong&gt;Cleveland&lt;/strong&gt;, OH: Three-day Group Policy Less-Intensive Course (XP Focused) -- Taught by James Conrad&lt;/li&gt;
	&lt;li&gt;May 9, 10: &lt;strong&gt;San Fran&lt;/strong&gt;, CA: Two day Group Policy Intensive Course (XP Focused)&lt;/li&gt;
	&lt;li&gt;May 11: &lt;strong&gt;San Fran, CA:&lt;/strong&gt; One-Day Group Policy Advanced Course (XP/Vista Focused)&lt;/li&gt;
	&lt;li&gt;May 21, 22: &lt;strong&gt;Wash, DC&lt;/strong&gt;: Two day Group Policy Intensive Course (XP Focused)&lt;/li&gt;
	&lt;li&gt;May 23, 24: &lt;strong&gt;New York, NY&lt;/strong&gt;: Two day Group Policy Intensive Course (XP Focused)&lt;/li&gt;
	&lt;li&gt;May 25: &lt;strong&gt;New York, NY&lt;/strong&gt;: One-day Group Policy Advanced Course (XP/Vista Focused)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For any public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt; Some notes:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;This is the first time the Advanced Group Policy course has been made available to the public. If you&#039;ve taken the two-day or three-day course, check it out. If you sign up for the &quot;Two-Day Intensive&quot; and &quot;One-Day Advanced&quot; at the same time, you&#039;ll get $100 of the third day.&lt;/li&gt;
	&lt;li&gt;I&#039;m working on updating the Two-Day and Three-Day classes for Vista and hope to make them an available course offering by March - April.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Here&#039;s a deal you can&#039;t pass up!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Okay, so I&#039;ll be in the above cities teaching the private classes. But how would you like to get a FREE student in the class? Easy: be the &quot;host&quot; of the class. Allow me and our GPanswers.com students to use your conference room for the two or three days, and you get a free student attendee! Such a deal! Lots of companies have been the hosts for public classes, and they&#039;ve gotten free training. So, if you&#039;re interested in free training for one of your treammates (maybe even you!) &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com?subject=Hosting%20a%20public%20class%20in%20my%20city%20in%20my%20conference%20room&quot;&gt;contact me&lt;/a&gt; if you&#039;re in one of the above cities, and we&#039;ll see about working out the details to have you host the class.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Private courses&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you think you might want your own private in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training (about 6 - 8), the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan - or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does have the distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000 (THIRD EDITION&lt;/em&gt;)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Do you have the new THIRD EDITION of the Group Policy book? It&#039;s got 50 new pages, fully covers XP/SP2 and Windows Server 2003/SP1, an armload of new tidbits here and there, and whole new section on the Security Configuration Wizard.&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Additionally available is my new title Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment from&lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144470&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0782144470&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Don&#039;t forget our Sponsors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I can&#039;t tell you how often I hear that people LOVE the Solutions Guide we have at GPanswers.com/solutions. Inside, you&#039;ll find both free and 3rd party products which extend the reach of Group Policy or let you do something you haven&#039;t discovered before!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;So, h&lt;/strong&gt;ead on over to the &lt;a href=&quot;https://www.gpanswers.com/component/content/section/5.html?layout=blogcompany&quot;&gt;Solutions Guide&lt;/a&gt; and see what other goodies are available! New sponsors this time:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;BeyondTrust Corporation with their BeyondTrust&#039;s Privilege Manager product.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address:&lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please FORWARD THE ENTIRE email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention regarding subscriptions and unsubscriptions, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; Please POST your technical question on the &lt;a href=&quot;https://www.gpanswers.com/community&quot;&gt;GPanswers.com/community&lt;/a&gt; forum whenever possible. If you have questions about ordering a book, contact my assistantMark at: &lt;a href=&quot;mailto:markm@moskowitz-inc.com&quot;&gt;markm@moskowitz-inc.com&lt;/a&gt;. I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thanks for reading!&lt;/strong&gt;&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#20 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue20</link>
        <pubDate>2006-09-25T23:26:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Newsletter 20: Looking ahead to Vista, IE7 and other upcoming software releases In this issue:


	It&amp;#39;s Issue 20
	Industry Update
	GPanswers.com updates
	Moskowitz, inc. Technology Takeaway (r)
	
		IE7 is on the horizon, how do I control my rollout?
		What do I need to know about GP in Vista?
		What about Exchange 2007, Office 2007 etc.?
		How do I know what settings are available in each OS version?
	
	
	Get a signed copy of Group Policy, Profiles and IntelliMirror
	Upcoming c ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Newsletter 20: Looking ahead to Vista, IE7 and other upcoming software releases In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 20&lt;/li&gt;
	&lt;li&gt;Industry Update&lt;/li&gt;
	&lt;li&gt;GPanswers.com updates&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r)
	&lt;ul&gt;
		&lt;li&gt;IE7 is on the horizon, how do I control my rollout?&lt;/li&gt;
		&lt;li&gt;What do I need to know about GP in Vista?&lt;/li&gt;
		&lt;li&gt;What about Exchange 2007, Office 2007 etc.?&lt;/li&gt;
		&lt;li&gt;How do I know what settings are available in each OS version?&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Upcoming conferences, appearances, and classes&lt;/li&gt;
	&lt;li&gt;Welcome new sponsors&lt;/li&gt;
	&lt;li&gt;Free Education!&lt;/li&gt;
	&lt;li&gt;Subscribe, unsubscribe, and usage information&lt;/li&gt;
&lt;/ul&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;This Month&#039;s Newsletter Sponsored by NetIQ&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Download &quot;Why Group Policy Matters,&quot; the informative whitepaper co-authored by Jeremy Moskowitz and NetIQ. This paper discusses the power of Microsoft&#039;s Group Policy and how organizations can better leverage the technology to address key business issues and help your organization attain its efficiency goals. &lt;a href=&quot;http://www.netiq.com/f/form/form.asp%7Cid=3091%7C%7Corigin=gpanswers%27&quot;&gt;Download the paper today.&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;GPanswers.com News&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;New assistant for the GPanswers.com community forum&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;While Ron takes a break, Adam Vero has stepped up to the plate to help keep GPanswers.com the best web resource for all things relating to Group Policy. Our thanks go to Ron for all his help in the past.&lt;/p&gt;

&lt;p&gt;Adam has over 13 years of IT experience in a variety of fields including programming, teaching, systems management and now runs his own consultancy business, &lt;a href=&quot;http://www.meteorit.co.uk/&quot; target=&quot;_blank&quot;&gt;Meteor IT Ltd.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you have not already joined in the discussions, why not come on in to the &lt;a href=&quot;https://www.gpanswers.com/community/&quot; target=&quot;_blank&quot;&gt;GPanswers.com forums&lt;/a&gt; and share your questions, answers, experiences and hot tips with other GP fanatics.  &lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Industry News: Microsoft Buys DesktopStandard&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;This, my friends, is a whopper.&lt;/p&gt;

&lt;p&gt;If you haven&#039;t read the news, do so &lt;a href=&quot;http://www.networkworld.com/news/2006/100206-ms-desktopstandard.html?page=2&quot;&gt;here&lt;/a&gt;. Now that you&#039;ve done that, what exactly does this all mean?&lt;/p&gt;

&lt;p&gt;Well, Group Policy (the engine) has a lot of moving parts called CSEs, or Client Side Extensions. There are 18 in XP and 21 in Vista. And DesktopStandard&#039;s PolicyMaker produc adds &lt;em&gt;another&lt;/em&gt; 21 CSEs. So, if none get &quot;cut&quot;, eventually we&#039;ll have 42 CSEs. (I predict several will be cut, like Powermanagement, because Vista already has a similar one.)&lt;/p&gt;

&lt;p&gt;DesktopStandard also has (had?) a product called GPOVault: This is a &quot;Check-in / Check-out&quot; GP management system which is built right into the GPMC. I like this tool because, well, it&#039;s just built right in to the GPMC, which means I don&#039;t have to load ANOTHER console to do the dirty work. So, the idea is the Sally creates the GPO, Fred makes sure it&#039;s Kosher and Kirk puts it in play. All around a welcome addition.&lt;/p&gt;

&lt;p&gt;The last &quot;big&quot; product DesktopStandard had was PolicyMaker Software Update. Imagine WSUS that actually worked with GPOs and that understood Active Directory. And, instead of using an SMS for the &quot;really big guys&quot;, we could just deploy patches using GPOs! Wouldn&#039;t that be a great product? Well, that&#039;s what this was. However, I&#039;m 99% sure this product won&#039;t see the light of day at Microsoft. Microsoft already uses WSUS for the &quot;small&quot; customers and SMS&#039;s patching technology for the big customers. This product kind of fit in the middle, and well, I bet that&#039;s about it for this product.&lt;/p&gt;

&lt;p&gt;In the end analysis -- it&#039;s great. More stuff for GPO admins to know and love. And more power to do what they love to do.&lt;/p&gt;

&lt;p&gt;Stay tuned for more info as it comes up. You bet I&#039;ll be all over this when I have more to share.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Technology Takeaway (r), a Service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Looking ahead to Vista, IE7 and other upcoming software releases&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IE7 is now at Release Candidate 1, so it&#039;s only a matter of time...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Maybe you have already tested IE7 and are happy that it interacts with your systems properly. Or perhaps you have some intranet application that either won&#039;t accept it (some look for a user-string of IE5 or IE6 specifically so they spit it out as being unacceptable) or don&#039;t work in some way (blocked popups causing issues for example). Or maybe you just haven&#039;t had a chance to test it yet. Either way, like all good system admins, you probably want to be sure that your users can get the most out of the new features and continue to work efficiently&lt;/p&gt;

&lt;p&gt;You can &lt;a href=&quot;http://www.microsoft.com/windows/ie/downloads/default.mspx&quot; target=&quot;_blank&quot;&gt;download IE7 RC1&lt;/a&gt; here if you have not already done so, and take a look at the new additions such as tabbed browsing and the phishing filter that mean Microsoft is closing the feature-gap on other browsers such as Firefox and Opera. Once IE7 is finally released it will be made available via Windows Update as a high-priority update. There has been much speculation that this means a high proportion of users will get the new browser before they know what to do with it, and before system administrators have been able to thoroughly test with intranets and other internal systems. Have no fear, it&#039;s a lot more controlled than that!&lt;/p&gt;

&lt;p&gt;For starters, if you are using SMS, WSUS or SUS to manage all of your updates anyway, then read no further, you have it all under control (although if you are still using SUS 1.0 you should be aware that support ends on December 6th so you really ought to be upgrading to WSUS fairly soon).&lt;/p&gt;

&lt;p&gt;So, if you&#039;re not using SMS or (W)SUS, what happens? Well, if your users are not local admins, then - nothing. They don&#039;t get prompted to install the update and it won&#039;t be pushed on them or automatically installed, period. If they are local admins then they will still get a choice to install or not - and we know how good some users are at making uninformed choices. For this scenario, Microsoft have kindly provided the &lt;a href=&quot;http://tinyurl.com/kwkgt&quot; target=&quot;_blank&quot;&gt;IE7 Blocker Toolkit&lt;/a&gt; which will make sure that these less-managed machines won&#039;t get the new browser through Windows Update. In a nutshell, this blocking is done by creation of a registry key. The toolkit provides a script which can be run to create or remove this, and better still an ADM template to apply this via Group Policy. Here&#039;s a quick step-by-step on how to do this:&lt;/p&gt;

&lt;p&gt;1) Download and run the &lt;a href=&quot;http://tinyurl.com/kwkgt&quot; target=&quot;_blank&quot;&gt;IE7 Blocker Toolkit&lt;/a&gt; which will prompt for a location to extract the files, including the ADM file we will need in a moment.&lt;/p&gt;

&lt;p&gt;2) Run the GPMC and create a new policy or edit an existing one which is linked to a location containing the computers which you wish to block from receiving IE7 via Automatic Updates&lt;/p&gt;

&lt;p&gt;3) Navigate to Computer Configuration &gt; Administrative Templates and right click &gt; Add/Remove Templates. Click &quot;Add&quot; and Browse to where you extracted the files (see below)&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/IEBlocker_1.png&quot; style=&quot;width:451px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;4) Now that the ADM template is added, browse down to Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows UpdateAutomatic Updates Blockers. If you see &quot;There are no items to show in this view&quot; as shown below, then go to Step 5, otherwise skip to step 6&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/IEBlocker_3.png&quot; style=&quot;width:451px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;5) If you can&#039;t see the settings from the ADM file, you need to change the Filtering you have on. Go to View &gt; Filtering and then CLEAR the box &quot;Only show policy settings which can be fully managed&quot; which is ticked by default as shown below.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/IEBlocker_4.png&quot; style=&quot;height:378px; width:384px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;6) Now you can see the setting to block the delivery of IE7 set it to &quot;enabled&quot; as shown below, and users will not get prompted by Automatic Updates to install this and if they do use the &quot;Custom&quot; feature of Windows Update they will be prevented from installing it.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/IEBlocker_5.png&quot; style=&quot;width:451px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Unfortunately this won&#039;t prevent users with local admin rights from downloading and installing the browser as an MSI for themselves, but that&#039;s the reason to only let those who know what they are doing to have those admin rights in the first place, right?  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What do I need to know about Group Policy in Windows Vista?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Not much has changed, really - apart from a total re-write of the format for policy templates, where and how they are stored, and a whole bunch of new settings! The two most important things to understand are that your existing policies will simply continue to work on your existing machines, and that you can only edit policies for Vista and Longhorn on a Vista or Longhorn machine.So, what is happening to ADM files? The short answer is that any custom ADM files you have will continue to work and the new GPMC will be able to use them in creating or amending policies. But the new ADMX format and syntax (which is XML-based) provides a few key benefits.&lt;/p&gt;

&lt;p&gt;The biggest of these is that you can create a single central store for ADMX files which are used by your policies, rather than each policy storing its own copy in the GPT, which can lead to sysvol &quot;bloat&quot; and slow down replication between DCs. The second important point here is the separation between the ADMX file which contains settings and their effects, and an associated ADML file which contains language-specific bits which are exposed through the GUI (the description of the settings and the &quot;Explain&quot; tab for example). So admins can view and manipulate the same policies using a different language interface, rather than all having to share a common language which may not be native to many of them. Of course, for in-house custom files the same is true - but someone has to write the ADML files to go with the ADMX.&lt;/p&gt;

&lt;p&gt;You have probably heard that there are all kinds of new policy settings available to manage aspects of your Vista machines. Some of the most important classes are those for Power Management, Device installation and Removeable Storage. All of these are areas you may want to control centrally to manage costs (by reducing wasted power consumption) and business risk (reducing the ability of Joe from Sales taking the whole customer database with him on a USB thumbdrive when he leaves). Printer management and IE configuration have also both been made easier with GP for Vista. There&#039;s much more information on the MS website about these &lt;a href=&quot;http://tinyurl.com/zhmeg&quot; target=&quot;_blank&quot;&gt;new Group Policy categories&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Other things which have changed in Vista Group Policy processing include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;the fact that the whole process now runs as an independent service&lt;/li&gt;
	&lt;li&gt;you can have multiple Local Group Policies (yes - policy local admins differently form your normal users at last!)&lt;/li&gt;
	&lt;li&gt;much better handling of connection status through &quot;network location awareness&quot; - slow link determination, or updating GP when a VPN is connected or a machine returns from hibernation for example&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you want to know more, get it straight from the horse&#039;s mouth by watching this 42-minute webcast:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Program Manager Mark Lawrence discusses the &lt;a href=&quot;http://tinyurl.com/gwvmz&quot; target=&quot;_blank&quot;&gt;Group Policy improvements in Windows Vista&lt;/a&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;(Live ID / Passport required to register)&lt;/p&gt;

&lt;p&gt;One last thing for this edition while we&#039;re on the subject of Vista - your WSUS server won&#039;t get updates for Vista Beta editions without being configured to do so. Recommendation from MS is to configure a separate WSUS server (which must have WSUS sp1) just for your Vista Beta machines to update from, and configure this to fetch the updates from the MS Beta Update Server&lt;/p&gt;

&lt;p&gt;Configuration is straightforward, simply by running a VBS script which is already on the WSUS server from a command prompt:&lt;/p&gt;

&lt;p&gt;cscript.exe &quot;%programfiles%update servicestoolsToggleMUUrl.vbs&quot; beta&lt;/p&gt;

&lt;p&gt;You can revert to the normal update server by repeating this command without the &#039;beta&#039; on the end, but as already mentioned, you really ought to be doing this on a dedicated box anyway, and remove / reinstall WSUS completely once your Beta phase is over. &lt;a href=&quot;http://tinyurl.com/fdyh9&quot; target=&quot;_blank&quot;&gt;More info here&lt;/a&gt;.    &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What other GP goodies are there out now for upcoming products?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Just a couple of quickies about other upcoming bits of software which you may want to begin testing, and how this impacts on your GP world.&lt;/p&gt;

&lt;p&gt;Firstly, &lt;strong&gt;Office 2007&lt;/strong&gt; brings with it a whole bunch of changes to the way it is deployed and of course more GP settings to control it. Significantly, to deploy from a central administrative install using GPSI you only need to point at the main MSI file and this will detect that this is being called by GP and go off to get all the MSI files it needs from the install point.&lt;/p&gt;

&lt;p&gt;There is no longer on e single huge all-in-one &quot;office.msi&quot;, in other words. Another big change for GP fans is that Outlook 2007 security can now be configured through regular Group Policies rather than having to configure a security template and publish this via the Exchange server. You can still do it the old way if you prefer, but for new installs a pure-GP method makes good sense. &lt;a href=&quot;http://tinyurl.com/kdaue&quot; target=&quot;_blank&quot;&gt;More about configuring security for Outlook 2007&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Of course, to manage Group Policy for Office 2007 you need to get the ADM files which are found in the &lt;a href=&quot;http://tinyurl.com/kfckk&quot; target=&quot;_blank&quot;&gt;Office 2007 Resource Kit here&lt;/a&gt;. (NB: this link only works if you are a registered Office 2007 Beta user, ie you installed the Beta, ran one of the apps and registered the product)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Exchange 2007&lt;/strong&gt; Beta can be run on 32 bit systems, although the final release code will only work on 64 bit and you won&#039;t get support if you put your production environment on the 32-bit version. However - for either platform you need to be running MMC version 3 (which we talked about in &lt;a href=&quot;https://www.gpanswers.com/admin/newsletters.php?id=33&quot;&gt;Newsletter 18&lt;/a&gt;) as well as .Net 2.0. Read &lt;a href=&quot;http://tinyurl.com/kar5p&quot; target=&quot;_blank&quot;&gt;more about MMC 3.0 here&lt;/a&gt; and download the version you need before you try and install the Beta. Click here to view the &lt;a href=&quot;http://tinyurl.com/jqnd6&quot; target=&quot;_blank&quot;&gt;full system requirements for Exchange 2007 Beta 2&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How do I know what settings are available in each WIndows version?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A particularly common question, along with its cousin &quot;where do I find the setting to do &#039;X&#039;?&quot;Periodically, MS issue a complete spreadsheet of all the Group Policy settings, along with the text you see on the explain tab to help work out what it does, and a column showing what the reuirements are (in other words, which OS version and other things are needed to make the setting work). You can filter the list easily on these columns, and use the usual Find feature (CTRL-F) to search for particular text.&lt;/p&gt;

&lt;p&gt;The latest version of the &lt;a href=&quot;http://tinyurl.com/zulc6&quot; target=&quot;_blank&quot;&gt;Group Policy Settings file&lt;/a&gt; is up to date to Vista Release Candidate 1. If you are using Vista Beta 2 some of these settings do not apply, and you should check the &lt;a href=&quot;http://tinyurl.com/kzvhy&quot; target=&quot;_blank&quot;&gt;Vista Beta2 GP settings&lt;/a&gt; instead, although the file is a lot less detailed. The older file for versions of &lt;a href=&quot;http://tinyurl.com/6fpdh&quot; target=&quot;_blank&quot;&gt;Windows up to 2003 sp1 / XP sp2&lt;/a&gt; is still useful if you are not moving to Vista just yet, as it shows which ADM files you will find the settings in.  &lt;/p&gt;

&lt;p&gt;That&#039;s all the space we have for tips in this issue. please continue to submit your own tips or links to useful information in the&lt;a href=&quot;https://www.gpanswers.com/community/&quot; target=&quot;_blank&quot;&gt;GPanswers.com forums&lt;/a&gt;.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000 (THIRD EDITION&lt;/em&gt;)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Do you have the new THIRD EDITION of the Group Policy book? It&#039;s got 50 new pages, fully covers XP/SP2 and Windows Server 2003/SP1, an armload of new tidbits here and there, and whole new section on the Security Configuration Wizard.&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Additionally available is my new title Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment from &lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144470&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0782144470&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot; target=&quot;_blank&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Choose the right Active Directory and Group Policy Course for you&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Did you know that here at GPanswers.com, we have three courses, including an ADVANCED course. (It&#039;s true!) Online, we have a new-ish &quot;&lt;a href=&quot;https://www.gpanswers.com/workshop/rightsize_tool.php&quot;&gt;Group Policy &quot;Rightsize&quot; Tool&lt;/a&gt;&quot; which helps you decide the best course to take for your situation. We have both PRIVATE and PUBLIC classes. Again, use the Righsize tool to get a total understanding of your options.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upcoming Public Classes, Appearances &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; Conferences&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Public Two-Day Workshops for the Remainder of 2006:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Oct 12-13: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Phoenix, AZ&lt;/a&gt; -- FULL ! (Come to Portland, Dallas or Seattle)&lt;/li&gt;
	&lt;li&gt;Oct 23-24: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Portland, OR&lt;/a&gt; -- 11 seats left ! (Special note: No laptop required for this course. Leave your laptop at home if you want!)&lt;/li&gt;
	&lt;li&gt;Oct 30-31: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Dallas, TX&lt;/a&gt;-- Lots of seats left&lt;/li&gt;
	&lt;li&gt;Nov 21-22: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Seattle, WA&lt;/a&gt; -- Lots of seats left&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Why THESE cities? Because people used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and ASKED me to have classes here.&lt;/p&gt;

&lt;p&gt;Here&#039;s hoping you&#039;ll take advantage of the opportunity! Learn more and sign up at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;(Don&#039;t forget to scroll all the way to the bottom of that page and locate your city!)&lt;/p&gt;

&lt;p&gt;Or, if you think you might want your own in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan - or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does have the distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free Education with Moskowitz / Microsoft / Techtarget / Dell Roadshow&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz and TechTarget + Microsoft team up to bring you a 19-city roadshow tour titled: Deployment, Managing, and Monitoring: Getting the Job Done. Here, youâll hear me talk about how to use the tools in the box to deploy your Windows XP, Windows 2003, and Vista systems, how to use Group Policy to manage your systems, and finally how to keep tabs on them with some slick free tools!&lt;/p&gt;

&lt;p&gt;The roadshow is still rolling until November, so thereâs a good chance weâll be near you soon! Check it out and sign up &lt;a href=&quot;http://tinyurl.com/ryvy2&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upcoming Conferences&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;TechMentor: Oct 9-13 in Las Vegas. I&#039;ll be speaking on Win/Lin integration topics. All sorts of other good stuff. Check it out &lt;a href=&quot;http://www.techmentorevents.com/&quot;&gt;here&lt;/a&gt;. Use promotion code &#039;moskowitz&#039; when signing up.&lt;/li&gt;
	&lt;li&gt;WinConnections: Nov 6-9 in Las Vegas. I&#039;ll be doing a pre-con on Group Policy, then some regular sessions on locking down computers, some awesome tips on Group Policy tools, and how to integrate Windows and Linux into Active Directory. Check it out&lt;a href=&quot;http://www.winconnections.com/&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Don&#039;t forget our Sponsors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I can&#039;t tell you how often I hear that people LOVE the Solutions Guide we have at GPanswers.com/solutions. Inside, you&#039;ll find both free and 3rd party products which extend the reach of Group Policy or let you do something you haven&#039;t discovered before!&lt;/p&gt;

&lt;p&gt;So, head on over to the &lt;a href=&quot;https://www.gpanswers.com/component/content/section/5.html?layout=blogcompany&quot;&gt;Solutions Guide&lt;/a&gt; and see what other goodies are available! &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address:&lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please &lt;strong&gt;FORWARD THE ENTIRE&lt;/strong&gt; email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention regarding subscriptions and unsubscriptions, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Please POST your technical question on the &lt;a href=&quot;https://www.gpanswers.com/community&quot;&gt;GPanswers.com/community&lt;/a&gt; forum whenever possible.&lt;/p&gt;

&lt;p&gt;If you have questions about ordering a book, contact my assistantMark at: &lt;a href=&quot;mailto:markm@moskowitz-inc.com&quot;&gt;markm@moskowitz-inc.com&lt;/a&gt;. I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#19 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue19</link>
        <pubDate>2006-07-21T23:27:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Newsletter 19: The File Server Migration Toolkit In this issue:


	It&amp;#39;s Issue 19
	GPanswers.com updates
	Moskowitz, inc. Technology Takeaway (r)
	
		&amp;quot;Deep Dive&amp;quot; into the File Server Migration Toolkit
	
	
	Get a signed copy of Group Policy, Profiles and IntelliMirror
	Upcoming conferences, appearances, and classes
	
		Classes and seminars
	
	
	Welcome new sponsors
	Free Education!
	Subscribe, unsubscribe, and usage information


This issue, we&amp;#39;ve got another ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Newsletter 19: The File Server Migration Toolkit In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 19&lt;/li&gt;
	&lt;li&gt;GPanswers.com updates&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r)
	&lt;ul&gt;
		&lt;li&gt;&quot;Deep Dive&quot; into the File Server Migration Toolkit&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Upcoming conferences, appearances, and classes
	&lt;ul&gt;
		&lt;li&gt;Classes and seminars&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Welcome new sponsors&lt;/li&gt;
	&lt;li&gt;Free Education!&lt;/li&gt;
	&lt;li&gt;Subscribe, unsubscribe, and usage information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This issue, we&#039;ve got another &quot;big article&quot;. It&#039;s about the File Server Migration Toolkit. Why should you care? How is it related to Group Policy? Ah the suspense ! So, without further ado!&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;This Month&#039;s Newsletter Sponsored by NetIQ&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Learn how to leverage Group Policyâs capabilities to secure and manage your desktop. Moderated by Active Directory guru Jeremy Moskowitz, this information-packed Webcast will show you how business objectives can be paired with Group Policy settings for a more secure and managed environment. &lt;a href=&quot;http://w.on24.com/r.htm%7Ce=24650%7C%7Cs=1%7C%7Ck=C964328A053BDB8287A911E25BCADE87%7C%7Cpartnerref=ns_GPAnswers_072106%27&quot;&gt;Sign up&lt;/a&gt; today for the live webcast on July 27th.&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;GPanswers.com News&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Announcing 1-day Advanced Group Policy Course&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Have you already taken the two-day or three-day workshop? Are you looking to get &quot;more&quot; of what you already love? Then check out our one-day Advanced Group Policy course. We cover four big topics:    &lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;How to create a âtotally locked downâ workstation&lt;/li&gt;
	&lt;li&gt;How to use Group Policy tools to increase your troubleshooting ability&lt;/li&gt;
	&lt;li&gt;How to zap registry punches down to your client machines with ADM templates and tools&lt;/li&gt;
	&lt;li&gt;How to leverage a test lab for good Group Policy deployment practices&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It&#039;s a one-day hands-on course. Right now, it&#039;s only available as a private class. So, if you want me on site, you can add this on to you two or three day workshop class -- or just have me come by for the day!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;New &quot;Rightsizing Tool&quot; for GPanswers.com Training&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;ll talk about this a little later in the newsletter. But I haven&#039;t always done a good job making it easy to decide which Group Policy class is ideal for each person or organization. Now, online, I have a new âGroup Policy âRightsizeâ Toolâ which helps you decide the best course to take for your situation. Check it out here.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;New &quot;At a glance view&quot; of newsletter archives...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;People were telling me it was hard to know what was in each previous newsletter. Too much to read to find out. Well, now at www.GPanswers.com/newsletter you&#039;ll see an at-a-glance view of all our old archives. Just find the newsletter you want -- and enjoy!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In case you didn&#039;t get the memo...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Free gift to anyone who has ever taken a GPanswers two-day or three-day Group Policy workshop (where either James or I was the instructor).&lt;/p&gt;

&lt;p&gt;It&#039;s about time I said thanks. So, thanks!&lt;/p&gt;

&lt;p&gt;Here&#039;s the deal: the gift is free, the shipping isn&#039;t. Sorry, I&#039;m a small business, and that&#039;s the breaks.&lt;/p&gt;

&lt;p&gt;Shipping for your free gift is only $5, though.&lt;/p&gt;

&lt;p&gt;And if you hate the gift, Iâll cheerfully refund your $5 and you can keep the gift. Really! (I sound like Ron Popeil, donât I?)&lt;/p&gt;

&lt;p&gt;Here&#039;s the fine print:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Shipping for the gift is a flat $5&lt;/li&gt;
	&lt;li&gt;We can accept Paypal or credit card for shipping&lt;/li&gt;
	&lt;li&gt;US residents only&lt;/li&gt;
	&lt;li&gt;If you can remember, please specify which public class or private class you attended (location and approximate month and year).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Note, that if you like the gift, but have never taken the two-day or three-day class, you can get one for a whole $12 (including shipping). Gifts ship right away.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Technology Takeaway (r), a Service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;. -- All About the File Server Migration Toolkit&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Admit it. You&#039;ve got &#039;em. Windows NT and Windows 2000 file servers that you just can&#039;t seem to shake. You know you want to get your file servers updated to Windows 2003/SP1 or Windows 2003/R2. And, we both know why you&#039;re not there yet: users are using UNC paths to point to shares on these file servers. And you know that if you move the data from the original servers to the new servers, all those users with UNC paths pointing to those shares are going to call the help desk (then the help desk is going to hunt you down, and you&#039;ll have to go into hiding.)&lt;/p&gt;

&lt;p&gt;Or how about this sticky Group Policy problem: you got started using Group Policy Software Installation, and serving your installations using one file server. Now you have 50 GPOs deploying applications to your Windows XP and Windows 2000 machines. But, oops! You&#039;re ready to turn off that original file server.&lt;/p&gt;

&lt;p&gt;But you can&#039;t.&lt;/p&gt;

&lt;p&gt;Those 50 GPOs are depending on it.&lt;/p&gt;

&lt;p&gt;What are you going to do?&lt;/p&gt;

&lt;p&gt;A typical environment where files and software are originally being deployed from a Windows 2000 file server and/or Windows NT files is seen below.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/N19-01.png&quot; style=&quot;width:451px&quot; /&gt; &lt;/strong&gt;&lt;br /&gt;
&lt;em&gt;&lt;strong&gt;Figure 1: You&#039;re currently depending on NT 4 and Windows 2000 file servers (aren&#039;t you?)&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;So just turning off these servers isn&#039;t an option, and just copying the data to new shares on a new server isnât an option. So what are you going to do? The good news is that thereâs an answer [solution?] to these two tales of woe. Microsoft has a cool tool to help you take control of your old file servers and bring the data into the 21st centuryâseamlessly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enter the File Server Migration Toolkit . . .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;    The File Server Migration Toolkit, or FSMT is a free download &lt;a href=&quot;http://www.microsoft.com/windowsserver2003/upgrading/nt4/tooldocs/msfsc.mspx&quot;&gt;available here&lt;/a&gt;. The FSMT consists of three parts:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;DFS Consolidation Root Wizard: This is another GUI tool which works some serious magic. It allows you to maintain the original UNC paths of the servers, even if youâre planning on ultimately turning those servers off.&lt;/li&gt;
	&lt;li&gt;DFSconsolidate.exe: This is a command line tool which is called by the DFS Consolidation Wizard. While itâs possible to use this tool on its own, weâre only going to explore its use in conjunction with the DFS Consolidation Root Wizard.&lt;/li&gt;
	&lt;li&gt;File Server Migration Wizard: This is a GUI tool which helps you plan your migration from the source servers to the target servers. Then, it actually performs the copy of the original files to the target destination. Weâll explore this a bit later.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Understanding Our Goals . . .&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The first thing to know is where to start. You need to pick a source server (where the files are currently stored) and a target server (where you will migrate the files to). Letâs work through an example to help us understand where we are and where weâre going. Our Before Picture: You can see this in Figure 1. We have an NT 4.0 file server (nt04) with three shares containing user data. We have a Windows 2000 server with one share used to deploy software. Letâs take a closer look at whatâs happening in our world. Our Windows XP machine needs access to the following:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;
	&lt;ul&gt;
		&lt;li&gt;nt04ntshare1&lt;/li&gt;
		&lt;li&gt;nt04ntshare3&lt;/li&gt;
		&lt;li&gt;w2ksoftware&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our Windows 2000 machine needs access to these servers and shares:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;
	&lt;ul&gt;
		&lt;li&gt;w2ksoftware&lt;/li&gt;
		&lt;li&gt;nt04ntshare2&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Now, letâs introduce our target file server, fileserver6, whose job it will be to receive these shares and requests.&lt;/p&gt;

&lt;p&gt;Our After Picture: The goal is to consolidate these existing shares onto fileserver6 and turn off the Windows 2000 and NT 4 servers. We need to perform this task in a way which preserves the original paths of each of the aforementioned shares. Yes, you read that right. We want to be able to access the data thatâs currently on the computers weâre turning off as if they were still turned on. Oh, and of course, you want to make sure security is preserved all along the way.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/N19-02.png&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;em&gt;Figure 2: Our goal is to turn off the NT 4 &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;and Windows 2000 file servers but allow access to all data using the original server names (even though those computers are off&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Here, in Figure 3 we can see our Windows XP machine accessing a directory of files on both nt04ntshare1 and nt04ntshare3 shares. The goal is for this Windows XP machine to continue to perform the same commands, using the same UNC paths after we move the files and turn the original file servers off.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/N19-03.png&quot; style=&quot;width:451px&quot; /&gt; &lt;br /&gt;
Figure 3: Here, our Windowx XP machine is viewing files via UNC paths&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To get to our promised land, we&#039;ll leverage a part of Windows that has been around for a while, but still isn&#039;t in widespread use: the Distributed File System, or DFS. DFS&#039;s goal is to accept incoming connections and route them to existing shares (this is sometimes called referrals). You might say it&#039;s like a &quot;share of other shares&quot; because it allows you to basically &quot;hang&quot; existing shares off a new DFS share, or, more technically the &quot;DFS root&quot;. There are two kinds of DFS roots: standard and domain-based (sometimes called an Enterprise root). Standard roots only live on one server. Enterprise roots live at the domain level, which means that they&#039;re fault tolerant. If one server that&#039;s part of the DFS referrals goes down-no problem-referrals just keep on truckin&#039;. Learn more about DFS (which is substantially different in Windows Server 2003 than in Windows Server 2003 / R2) by reading more at the &lt;a href=&quot;http://www.microsoft.com/windowsserver2003/technologies/storage/dfs/default.mspx&quot;&gt;following link&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Here&#039;s the roadmap to get to your destination:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;You&#039;ll determine where you want to stash your new files. In our example we&#039;re going to be using fileserver6.demo.com.&lt;/li&gt;
	&lt;li&gt;You&#039;ll rename any file servers you plan on permanently retiring. Since you&#039;re retiring them anyway, it doesn&#039;t really matter much what the name becomes.&lt;/li&gt;
	&lt;li&gt;We&#039;ll be renaming our nt04 server to nt04-ret to signify that it&#039;s retired. Same goes for w2k to w2k-ret. Then, finally, when we&#039;re all done, we&#039;ll be turning off this server permanently.&lt;/li&gt;
	&lt;li&gt;We&#039;ll use the DFS Root Consolidation Wizard to control basically, &quot;reroute&quot; new incoming requests for the retiring servers (nt04 and w2k) to the new location (fileserver6). Note that I could use two separate servers in my migration example. That is, I could use one server to hold the DFS Roots and another to hold the files. However, to keep things simple, I&#039;ll use fileserver6 for both roles.&lt;/li&gt;
	&lt;li&gt;We&#039;ll actually move the files we need from the shares on our old servers to our new location on fileserver6.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So let&#039;s do it!&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Getting Started with the FSMT and DFS Consolidation Wizard&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;The FSMT comes as a single MSI, but, as we stated has three separate components. The File Server Migration Wizard is meant to be run directly on the target file server. However, the DFS Consolidation Root Wizard and the Dfsconsolidate.exe command-line tool can be run anywhere; you can choose to run these tools on the target server or not.&lt;/p&gt;

&lt;p&gt;Note the FSMT documentation makes special note of MSKB article 829885 which talks about a DFS hotfix. The implication is that this hotfix must be loaded upon the target DFS server. However, this hotfix is built into the Windows Server 2003/SP1, and is not needed when the target server is Windows Server 2003/SP1 (in my case fileserver6.) However, the FSMT documentation doesn&#039;t tell you one critical step: be sure the DFS service is started and set to Automatic for future restarts.&lt;/p&gt;

&lt;p&gt;After the FSMT is loaded, as I mentioned earlier, we must change the name of NT04 server to nt04-ret and the name of w2k to w2k-ret (or something else that&#039;s meaningful to you). The reason why we must change the name is so that when clients try to connect to nt04 or w2k neither actually exists anymore. And, we&#039;ll be able to fool those incoming requests to nt04 or w2k into shimmying over to the new place on fileserver6.&lt;/p&gt;

&lt;p&gt;In my tests, renaming an NT4 server wasn&#039;t as easy as I would have liked. Simply renaming it doesn&#039;t magically change the name in Active Directory (like it would if I renamed a Windows Server 2003 or Windows XP machine). I had to drop the machine into a workgroup, rename the machine, and rejoin the domain (demo.com.) And, of course, along the way several reboots were required. Finally, I had to delete an orphaned computer account for NT4 using Active Directory Users and Computers. In contrast, renaming the Windows 2000 server was a snap. Just rename and reboot -- easy. No muss, no fuss.&lt;/p&gt;

&lt;p&gt;Now that my NT4 server and Windows 2000 servers are renamed, I&#039;m ready to run the DFS Root Consolidation Wizard. The Wizard is pretty straightforward, asking only a minimum of information:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;DFS root server: This is the location where the DFS root will be held. In DFS terms, this will be a &quot;standard root&quot;-which exists solely on the server you specify. Note that the root cannot be on a Domain Controller. In my example, I&#039;m choosing to put the DFS root on the same server where the files will ultimately go-fileserver6. However, you can create the root on a server cluster if you want to increase the redundancy of the stand-alone root.&lt;/li&gt;
	&lt;li&gt;Local path of the folder: This is the top level directory where you want to store each migrated server. If we were migrating 10 servers, you would expect 10 subdirectories underneath this top level directory containing names of each migrated server. For my examples, I&#039;m choosing the name c:migservers&lt;/li&gt;
	&lt;li&gt;Specify which servers to consolidate (as seen in Figure 4): Here, you&#039;ll map the original name to the current name (as seen below.). We&#039;re migrating two servers, (original name nt04, current name nt04-ret and original name w2k, current name w2k-ret) so we&#039;ll have two mappings in the list.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/N19-04.png&quot; style=&quot;width:451px&quot; /&gt; &lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Figure 4: The &quot;DFS Consolidation Root Wizard&quot; helps you map renamed servers to original names&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If the Wizard finishes without errors, you&#039;ve completed the first big step. Now, before you do anything else - take a moment to pause and check something out: Go back to your Windows XP machine (see first figure) and run those exact same dir commands access the servers and shares nt04ntshare1 and nt04ntshare3. Without rebooting the Windows XP machine (or logging off and back on), note those same dir commands just continue to work! This is because the DFS Root Consolidation Wizard has now mapped nt04 to nt04-ret-so all the shares via UNC paths still work.&lt;/p&gt;

&lt;p&gt;And, let&#039;s take a quick second to see what really happened in the c:migservers folder on fileserver6. Below, you can see it created two subdirectories, which are each shared, and which contain another subdirectory of each server&#039;s original share.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/N19-05.png&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Figure 5: The DFS Consolidation Root Wizard created a new share representing the old server&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;However, using Explorer locally and drilling down to one of the directories, say, ntshare1, will get you an error. This is because a DFS link only points to the right (new) location when using a remote referral (not a local one). Also note that each server is now represented by a share, #servername, such as #NT04, seen above. This was created by the DFS Consolidation Wizard.&lt;/p&gt;

&lt;p&gt;It is possible to use the DFS Consolidation Wizard if your shares are on Domain Controllers. However, the same rule applies for Domain Controllers as for regular file servers. That is, the server (Domain Controller) must also be renamed. And unfortunately this can be a pain in the neck. Microsoft does have some Domain Controller renaming guidance:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;For NT 4.0 Domain Controllers, see &lt;a href=&quot;http://support.microsoft.com/default.aspx?scid=KB;en-us;q150298&quot;&gt;MSKB 150298&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;For Windows 2000 Domain Controllers, see &lt;a href=&quot;http://support.microsoft.com/kb/296592/&quot;&gt;MSKB 296592&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;And, even though it&#039;s easier still with Windows Server 2003, there&#039;s some guidance at &lt;a href=&quot;http://support.microsoft.com/kb/325354/&quot;&gt;MSKB 325354&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There is one piece of magic that the DFS Consolidation Wizard cannot directly help with, and that is if you already have hard coded, persistent mappings. Meaning that if someone has used the /persistent flag while using the &lt;strong&gt;net use&lt;/strong&gt; command to map a drive letter (or the corresponding Explorer commands) those mappings will now fail. But if you&#039;re using log in scripts to map the drive letters each and every time a user logs in-no problem! This is because every time a request goes to the old server name, a new lookup to the DFS is generated and routed appropriately.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Actually Migrating the files&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;  To actually migrate the files, you create a project contained within the File Server Migration Wizard (FSMW), which appears as an icon on the start menu. The beginning steps are rather straightforward: create a new project, point the File Server Migration Wizard toward the new DFS consolidation point you created earlier (fileserver6), and watch it recognize the servers, as seen in Figure 6.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/N19-06.png&quot; style=&quot;width:451px&quot; /&gt; &lt;br /&gt;
Figure 6: The File Migration Wizard should recognize your servers after you consolidate them using the DFS Consolidation Wizard&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Then, you can tell the FSMW which directory you want to plunk the new files in. I chose a new directory on fileserver6 called &lt;strong&gt;c:migfiles.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A quick note on what is and is not copied. Of course the files themselves are copied. But the FSMW also copies both NTFS and shared folder permissions. What aren&#039;t copied are references to local groups. If local groups have permissions on the source&#039;s shared folders, you can use the Resource Kit tool SubInACL.exe to adjust the permissions before or after the migration to replace the local groups, or you can use a local group migration tool like the Active Directory Migration Tool (l&lt;a href=&quot;http://tinyurl.com/bk98u&quot;&gt;ocated here&lt;/a&gt; ).&lt;/p&gt;

&lt;p&gt;When the project is formed, you then have the ability to make any micro-adjustments you might need (as seen in the circled area on the right of Figure 7). For instance, you might want to put the contents of ntshare1 in a directory named &quot;Sales stuff&quot; instead of ntshare1. This might boggle the minds of your users, but you may have a valid reason.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/N19-07.png&quot; style=&quot;width:451px&quot; /&gt; &lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;Figure 7: You can change settings for each share if desired, then click Continue to step through the rest of the Migration.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Finally, you can just step through the rest of the process by clicking on the Continue button, circled above at the bottom of Figure 7. The process is painless, but could take a (long) while depending on just how many servers you are consolidating. For lots and lots of servers, consider breaking up the effort into multiple &quot;projects&quot; to allow for some settling-in time and attention to errors. If there are errors during the copying you&#039;ll have the ability to fix the errors and retry. A nice touch is that the target servers are still available during the copying phase. In other words, there&#039;s no server downtime from the copying of files from the source server to the target server. Additionally, because it&#039;s possible to repeat this phase multiple times to fix errors, another nice touch is that only failed copy attempts are retried. You don&#039;t need to copy the whole universe again if you&#039;ve already copied 90% of it.&lt;/p&gt;

&lt;p&gt;The last phase is called Finalize. This phase should really only be done when users won&#039;t be accessing the servers. That&#039;s because in this phase, you&#039;ll disable any original access to the source shares and close any open connections. Additionally, all other project settings are locked.&lt;/p&gt;

&lt;p&gt;At this point, you&#039;re ready for your final test. Unplug the network connections from the original servers. Then, like we did with our Windows XP machine, make sure you can get to the copied servers using the original UNC path names.&lt;/p&gt;

&lt;p&gt;Once you&#039;re satisfied that you can get to the copied data using the original UNC paths, you can turn off your old servers, recycle them, reformat them and redeploy them for another purpose, or make a fish tank out of them (or any another arts and crafts project you&#039;d like).&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;The Future of the File Server Migration TOOLKIT?&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;The FMST is a great tool which gets the job done. However, there are some small nitpicky points that Iâd love to see addressed going forward.&lt;/p&gt;

&lt;p&gt;As stated, the FSMT uses whatâs called âstand-aloneâ DFS roots to do the job. In other words, it puts the DFS root on one specific server. Sure, in my example, I used fileserver6 for both the storage of the standalone DFS root as well as the ultimate storage point for my migrated files. However, I could have also split the duty between file servers. That is, one server could house the DFS root, and another server could have held the data. So, what would happen today if that server holding the DFS root went offline? That would be a major problem, because there would be no way to route to the new file server(s). The ideal solution would be to use the more powerful domain-based roots which are fault-tolerant. Then if the one server holding the DFS roots should fail, the fault-tolerant nature of domain-based DFS would kick in. Today, FSMW doesnât use domain-based, fault-tolerant roots, but I really wish it did. Again, as I mentioned earlier, a workaround would be to put the standalone root on a set of clustered servers. If one server went down, referrals would continue. The FSMT product team tells me that all parts of FSMT are fully cluster aware and compatible: it will create cluster consolidation DFS roots and add cluster names instead of DNS aliases if roots are hosted on cluster. So â nice touch.&lt;/p&gt;

&lt;p&gt;Another problem is that you simply must rename the servers to do any of the redirecting magic. I would love to keep the server, name intact, and just redirect a specific share. This would allow me to keep using the server for whatever &lt;em&gt;else&lt;/em&gt; itâs doing, but just migrate the specific shares I want to. To do this, we would need symbolic links &lt;em&gt;within&lt;/em&gt; the original share that would route us to the new goal. But right now, Windows Server 2003 isnât quite there. Perhaps with Longhorn server.  &lt;/p&gt;

&lt;p&gt;The last note here is that youâre not actually forced to turn off servers youâve migrated from. You can, if you so choose, keep the server online performing other roles. The problem is that it might be a challenge having &lt;em&gt;other&lt;/em&gt; network services and clients find the newly renamed machine. DFS is some pretty strong magic, but itâs only for files; lots of other services wonât be able to magically find the newly renamed server.  &lt;/p&gt;

&lt;p&gt;The FSMT is a cool tool, which works as advertised. And the price is rightâfree. It should be noted that as good as the tool is, itâs not meant to be a permanent solution. The help file notes that these consolidated DFS roots shouldnât be maintained forever. The idea is that over time youâll properly design your DFS, point users toward the new, updated structure, and then phase out the roots you created with the DFS Consolidation Wizard.  &lt;/p&gt;

&lt;p&gt;Hopefully this will get you out of some tough jams, and into your 21st century file servers. Other FSMT resources:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/windowsserver2003/upgrading/nt4/tooldocs/msfsc.mspx&quot;&gt;Download the FSMT&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/windowsserver2003/upgrading/nt4/tooldocs/msfst_overview.mspx&quot;&gt;FSMT Overview whitepaper&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href=&quot;http://www.microsoft.com/windowsserver2003/upgrading/nt4/tooldocs/msfst_faqs.mspx&quot;&gt;FSMT FAQ&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;Newsgroup support
	&lt;ul&gt;
		&lt;li&gt;You can use the microsoft.public.windows.server.migration newsgroup to ask questions about the File Server Migration Toolkit.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;The &lt;a href=&quot;http://tinyurl.com/jfsyv&quot;&gt;FSMT Solutions accelerator&lt;/a&gt; (additional guidance)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000 (THIRD EDITION&lt;/em&gt;)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Do you have the new THIRD EDITION of the Group Policy book? It&#039;s got 50 new pages, fully covers XP/SP2 and Windows Server 2003/SP1, an armload of new tidbits here and there, and whole new section on the Security Configuration Wizard.&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;here&lt;/a&gt;. Additionally available is my new title Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment from&lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144470&quot;&gt;http://www.amazon.com/gp/product/0782144470&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Choose the right Active Directory and Group Policy Course for you&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Did you know that here at GPanswers.com, we have three courses, including an ADVANCED course. (It&#039;s true!)&lt;/p&gt;

&lt;p&gt;And, historically, I havenât done such a hot job in making it obvious what your available options are for public and private training. So, hereâs the executive summary. Online, we have a new â&lt;a href=&quot;https://www.gpanswers.com/workshop/rightsize_tool.php&quot;&gt;Group Policy âRightsizeâ Tool&lt;/a&gt;â which helps you decide the best course to take for your situation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Two-day intensive Group Policy workshop class&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;This course is best for Domain Administrators and qualified OU administrators.&lt;/li&gt;
	&lt;li&gt;This course has âintensiveâ in the name, so be prepared to work and learn!&lt;/li&gt;
	&lt;li&gt;This class is available as a private two-day course.&lt;/li&gt;
	&lt;li&gt;This class is available as a public two-day course.&lt;/li&gt;
	&lt;li&gt;Consider adding the One-Day Advanced course (below) as a third-day (if taking as a private two-day)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Three-day âLess Intensiveâ Active Directory warm-up and Group Policy workshop class&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;This course starts with a half day warm-up of Active Directory, managing users, and delegating permissions.&lt;/li&gt;
	&lt;li&gt;Then, we move on to the Group Policy goodies. This way, those with less Group Policy and day-to-day administration experience can get a bit of the fundamentals before diving into the Group Policy waters.&lt;/li&gt;
	&lt;li&gt;This class caters more to OU administrators (than Domain Administrators)&lt;/li&gt;
	&lt;li&gt;This &quot;Three-day less-intensive&quot; course is ONLY available as a private course.&lt;/li&gt;
	&lt;li&gt;Consider adding the One-Day Advanced course (below) as a fourth day&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;One-day Group Policy âadvancedâ class&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;This class is a great âadd-onâ after your two-day or three-day Group Policy class. We cover four big concepts in this class:
	&lt;ul&gt;
		&lt;li&gt;How to create a âtotally locked downâ workstation&lt;/li&gt;
		&lt;li&gt;How to use Group Policy tools to increase your troubleshooting ability&lt;/li&gt;
		&lt;li&gt;How to zap registry punches down to your client machines with ADM templates and tools&lt;/li&gt;
		&lt;li&gt;How to leverage a test lab for good Group Policy deployment practices&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;This class is only available as a private course. Consider adding it to your two-day or three-day private course as an additional day.&lt;/li&gt;
	&lt;li&gt;It is &lt;em&gt;suggested&lt;/em&gt; (though not required) that students attend either the two-day intensive or three-day less-intensive Group Policy workshop classes before this one.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Upcoming Classes, Appearances and Conferences&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Public Two-Day Workshops for the Remainder of 2006:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Aug 23-24: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Denver, CO&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Aug 24â25: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Phoenix, AZ&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Sep 25â26 (changed dates): &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Seattle, WA&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;Nov 20-21 (new): &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Newtown, PA &lt;/a&gt;(Close to NY, NJ, PA, DE and more)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Why THESE cities? Because people used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and ASKED me to have classes here.&lt;/p&gt;

&lt;p&gt;Here&#039;s hoping you&#039;ll take advantage of the opportunity! Learn more and sign up at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop&lt;/a&gt;&lt;br /&gt;
(Don&#039;t forget to scroll all the way to the bottom of that page and locate your city!)&lt;/p&gt;

&lt;p&gt;Or, if you think you might want your own in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japanâor wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does have the distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Free Education with Moskowitz / Microsoft / &lt;/strong&gt;&lt;strong&gt;Techtarget&lt;/strong&gt;&lt;strong&gt; / Dell Roadshow&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Jeremy Moskowitz and TechTarget + Microsoft team up to bring you a 19-city roadshow tour titled: Deployment, Managing, and Monitoring: Getting the Job Done. Here, youâll hear me talk about how to use the tools in the box to deploy your Windows XP, Windows 2003, and Vista systems, how to use Group Policy to manage your systems, and finally how to keep tabs on them with some slick free tools! Did I mention this is 19 cities?? So, thereâs a good chance weâll be near you soon! Check it out and sign up &lt;a href=&quot;http://tinyurl.com/ryvy2&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upcoming Conferences&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;TechMentor: Sep 25-29 in Las Vegas. I&#039;ll be speaking on Win/Lin integration topics. All sorts of other good stuff. Check it out &lt;a href=&quot;http://www.techmentorevents.com/&quot;&gt;here&lt;/a&gt;. Use promotion code &#039;moskowitz&#039; when signing up.&lt;/li&gt;
	&lt;li&gt;WinConnections: Nov 6-9 in Las Vegas. I&#039;ll be doing a pre-con on Group Policy, then some regular sessions on locking down computers, some awesome tips on Group Policy tools, and how to integrate Windows and Linux into Active Directory. Check it out&lt;a href=&quot;http://www.winconnections.com/&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Welcome New Sponsors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I can&#039;t tell you how often I hear that people LOVE the Solutions Guide we have at GPanswers.com/solutions. Inside, you&#039;ll find both free and 3rd party products which extend the reach of Group Policy or let you do something you haven&#039;t discovered before! Recently we&#039;ve added:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;NetIQ: Group Policy Administrator&lt;/li&gt;
	&lt;li&gt;Smartline: Devicelock&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, head on over to the &lt;a href=&quot;https://www.gpanswers.com/component/content/section/5.html?layout=blogcompany&quot;&gt;Solutions Guide&lt;/a&gt; and see what other goodies are available!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address:&lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please &lt;strong&gt;FORWARD THE ENTIRE&lt;/strong&gt; email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention regarding subscriptions and unsubscriptions, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Please POST your technical question on the &lt;a href=&quot;https://www.gpanswers.com/community&quot;&gt;GPanswers.com/community&lt;/a&gt; forum whenever possible.&lt;/p&gt;

&lt;p&gt;If you have questions about ordering a book, contact my assistantMark at: &lt;a href=&quot;mailto:markm@moskowitz-inc.com&quot;&gt;markm@moskowitz-inc.com&lt;/a&gt;. I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#18 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue18</link>
        <pubDate>2006-06-09T23:28:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Newsletter 18: Grab Bag and Major Announcements In this issue:


	It&amp;#39;s Issue 18
	Free Giveaway!
	Moskowitz, inc. Technology Takeaway (r)
	
		Three juicy tips
	
	
	Get a signed copy of Group Policy, Profiles and IntelliMirror
	Upcoming conferences, appearances, and classes
	
		Classes and seminars
	
	
	Free Education!
	Welcome Mark!
	Subscribe, unsubscribe, and usage information


This month, there&amp;acirc;s a lot of stuff to talk about. (This is where you ask me, &amp;acir ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Newsletter 18: Grab Bag and Major Announcements In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 18&lt;/li&gt;
	&lt;li&gt;Free Giveaway!&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r)
	&lt;ul&gt;
		&lt;li&gt;Three juicy tips&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Upcoming conferences, appearances, and classes
	&lt;ul&gt;
		&lt;li&gt;Classes and seminars&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Free Education!&lt;/li&gt;
	&lt;li&gt;Welcome Mark!&lt;/li&gt;
	&lt;li&gt;Subscribe, unsubscribe, and usage information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This month, thereâs a lot of stuff to talk about. (This is where you ask me, âJeremy, in which month isnât there a lot of stuff to talk about?â) Last month, I asked you which newsletter format you liked most: small tips, one large tip, or a mix. The mix wins it! So, since Iâve had several âone large tipâ emails in the last few newsletters, this one is a gaggle of small tips. Gotta mix it up.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Quick TechEd Notes&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;A quick note for those of you who are going to TechEd: I&#039;ll be speaking on Windows &amp; Linux Integration (session SVR211), Monday 1.30 PM in Room &quot;156 ABC&quot;. Hope to see you there! Even though I&#039;m not speaking on Group Policy stuff, doesn&#039;t mean there aren&#039;t some great talks! Be sure to check out the following GP related talks:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Mark Williams (GP Team @ Microsoft):
	&lt;ul&gt;
		&lt;li&gt;MGT310 Group Policy: What&#039;s New in Windows Vista Wednesday, June 14 2:00 PM - 3:15 PM, 210 ABC&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;MGT310R Group Policy: What&#039;s New in Windows Vista (Repeat Session) Friday, June 16 1:00 PM - 2:15 PM, 259 AB&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Emily Hill, George Roussos
	&lt;ul&gt;
		&lt;li&gt;CLITLC09 Group Policies in Windows Vista to Control Devices and Drivers Friday, June 16 2:45 PM - 4:00 PM, CLI/MGT/SEC/SVR Theater 2&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Derek Melber (DesktopStandard and all-around smart GPO-meister):
	&lt;ul&gt;
		&lt;li&gt;MGT425 Troubleshooting Group Policy Friday, June 16 10:45 AM - 12:00 PM, Grand Ballroom A&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, without further ado!&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;This Month&#039;s Newsletter Sponsored by Centrify&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now you can use Group Policy to manage Mac desktops just as you do Windows.&lt;/p&gt;

&lt;p&gt;Centrify DirectControl not only delivers Active Directory-based single sign-on and access control for Mac OS X, but it is also the only solution that enables IT managers to centrally secure and configure Macs via Group Policy. Use GP to require screensaver password locks, lock down system sharing and firewall preferences, and centrally configure other security settings. &lt;a href=&quot;http://www.centrify.com/request.asp?o=16&amp;c=19&amp;f=3&quot; target=&quot;_blank&quot;&gt;Request an evaluation of DirectControl for Mac OS X today&lt;/a&gt;.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Announcement From the Better Late Than Never/Use Your Manners Department:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Free gift to anyone who has ever taken a GPanswers two-day or three-day Group Policy workshop (where either James or I was the instructor).&lt;/p&gt;

&lt;p&gt;Itâs about time I said thanks. So, thanks!&lt;/p&gt;

&lt;p&gt;Hereâs the deal: the gift is free, the shipping isnât. Sorry, Iâm a small business, and thatâs the breaks.&lt;/p&gt;

&lt;p&gt;Shipping for your free gift is only $5, though.&lt;/p&gt;

&lt;p&gt;And if you hate the gift, Iâll cheerfully refund your $5 and you can keep the gift. Really! (I sound like Ron Popeil, donât I?) Hereâs the fine print:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Shipping for the gift is a flat $5&lt;/li&gt;
	&lt;li&gt;We can accept Paypal or credit card for shipping&lt;/li&gt;
	&lt;li&gt;US residents only&lt;/li&gt;
	&lt;li&gt;If you can remember, please specify which public class or private class you attended (location and approximate month and year).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Note, that if you like the gift, but have never taken the two-day or three-day class, you can get one for a whole $12 (including shipping).&lt;/p&gt;

&lt;p&gt;It may take a little while for you to get the gifts (like a week or two.. but rest assured, they&#039;ll get there.)  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Technology Takeaway (r), a Service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Tip 1: How to troubleshoot a machine that claims it cannot find a Domain Controller.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;(This tip comes to us courtesy of Dan Home from &lt;a href=&quot;http://www.intelliem.com/&quot;&gt;Intelliem.com&lt;/a&gt;.) Two computers out of the 1000+ systems in our central site had these âEvent 1054â errors. Unfortunately, these two systems were mission-critical systems. And, most interesting of all, there were NO OTHER VAGUELY RELATED ERRORS OF ANY KIND, visible or logged, on these systems. They just werenât getting policy [âgetting policyâ ok terminology?] correctly (everything else was fine).&lt;/p&gt;

&lt;p&gt;I said to myself, âSelf, if theyâre having these errors there must be something insidious going on.â&lt;/p&gt;

&lt;p&gt;Here is a screenshot of the 1054 error on the machine:&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n18-01.jpg&quot; style=&quot;height:506px; width:432px&quot; /&gt; After MUCH back-and-forth testing, we discovered the source of the problem: LINK NEGOTIATION! The switch between these systems and the DCs had one tiny little misconfiguration, and these particular systems werenât âdiscoveringâ quickly enough what kind of network link they should have. So, in a final test, I hard-coded the NICs to 100/Full.&lt;/p&gt;

&lt;p&gt;And the errors vanished like . . . well, something that vanishes.&lt;/p&gt;

&lt;p&gt;Thanks again Dan Holme from &lt;a href=&quot;http://www.intelliem.com/&quot;&gt;Intelliem.com&lt;/a&gt; for this cool, simple troubleshooting tip!!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tip 2: How do I get MMC 3.0 functionality on my Windows XP machine?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Last month, you read about how to control printers using GPOs. And we did so using Windows 2003/R2âs new Print Management Console. You might have noticed that it had a different look and feel to it. That new look and feel is the MMC 3.0 (as opposed to MMC 2.0) which can be seen in this screenshot.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n18-02.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
(Click on image for a larger view)&lt;/p&gt;

&lt;p&gt;Since you likely control your Active Directory universe from an Windows XP machine (and not a Windows 2003/R2 machine) you might want to step-up to the MMC 3.0 look and feel on your Windows XP machine. Hereâs how we do it:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Ensure that your Windows XP machine has SP2 installed.&lt;/li&gt;
	&lt;li&gt;Get the MMC 3.0 interface (one for 32-bit Windows XP and one for 64-bit Windows XP)&lt;/li&gt;
	&lt;li&gt;Enable the MMC 3.0&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Weâll assume you already have Windows XP / SP2. Now, to get the 32-bit version of MMC 3.0, click &lt;a href=&quot;http://tinyurl.com/pw5gk&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. To get the 64-bit version of MMC 3.0, click &lt;a href=&quot;http://tinyurl.com/k8xzm&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;: . Note that it seems as if 64-bit Windows XP systems get âsecond class citizenâ status here, as there doesnât seem to be a âfinalâ version of the code, rather, that link for 64-bit Windows XP MMC 3.0 seems only to be Release Candidate 1.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Update:&lt;/strong&gt; You can now download from Microsoft a copy of &lt;a href=&quot;http://tinyurl.com/ga8rq&quot; target=&quot;_blank&quot;&gt;MMC 3.0 for XP x64&lt;/a&gt; and &lt;a href=&quot;http://tinyurl.com/k5net&quot; target=&quot;_blank&quot;&gt;MMC 3.0 for 2003 sp1&lt;/a&gt; as well as 2003 x64 and ia64 Finally, once installed on your Windows XP machine, edit the registry to add a new key.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Navigate to HKEY_LOCAL_MACHINE | SOFTWARE | Microsoft | MMC.&lt;/li&gt;
	&lt;li&gt;From the Edit menu, select New, Key. (Yes, âkeyâ, not value)&lt;/li&gt;
	&lt;li&gt;Enter âUseNewUIâ.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Note that the new Action pane seems to be available regardless of whether the setting is performed or not. However, the new âAdd/Remove Snap-insâ is definitely different once you perform the setting, as seen below. &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n18-03.jpg&quot; style=&quot;width:451px&quot; /&gt; (Click on image for a larger view) You may not see much ânew stuffâ while youâre inside your console (such as when youâre inside the âActionsâ pane.) Thatâs because each snap-in needs to specifically take advantage of MMC 3.0 goodies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tip 3: Ready for Vista?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;  While not specifically a Group Policyârelated tip, I thought yâall would find this interesting. You can do a quick âhealth checkâ on your existing hardware (running Windows XP) and figure out if itâs a good candidate to put Windows Vista on it.&lt;/p&gt;

&lt;p&gt;Just trot on out to the machine in question, and click &lt;a href=&quot;http://www.microsoft.com/windowsvista/getready/upgradeadvisor/default.mspx&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Youâll get asked a handful of questions about what you want to DO with Windows Vista. Then, out pops a suggestion about which version of Vista you should get and which areas need attention. Youâll get an HTML report (IE-readable-only, of course) that tells you which features are A-OK and which might not work. You also get a report about the drivers on your current machine and how theyâll fare with Vista (see second screenshot below).&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n18-04.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n18-05.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
(Click on image for a larger view)&lt;/p&gt;

&lt;p&gt;Note that some items are peripherals (like my Brother MFC-3220C printer), but some are built into the machine (like the SigmaTel C-Major Audio device.) Letâs hope all these drivers are available by Vista showtime.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000 (THIRD EDITION&lt;/em&gt;)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Do you have the new THIRD EDITION of the Group Policy book? It&#039;s got 50 new pages, fully covers XP/SP2 and Windows Server 2003/SP1, an armload of new tidbits here and there, and whole new section on the Security Configuration Wizard.&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Additionally available is my new title Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment from&lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144470&quot;&gt;http://www.amazon.com/gp/product/0782144470&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Now Available: Private GP Course in &quot;Less-Intensive&quot; Format&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Everyone knows the two-day Group Policy course is really three days of material packed into two intensive days. However, some customers have asked for a less intensive format.&lt;/p&gt;

&lt;p&gt;Your wish has been granted!&lt;/p&gt;

&lt;p&gt;This course starts with a half day warm-up of Active Directory, managing users, and delegating permissions. Then, we move on to the Group Policy goodies. This way, those with less Group Policy and day-to-day administration experience can get a bit of the fundamentals before diving into the Group Policy waters.&lt;/p&gt;

&lt;p&gt;This &quot;three-day less-intensive&quot; option is ONLY available as a private course. Note, the &quot;two-day intensive&quot; option is available as either a private or a public course. Learn more about the Group Policy courses here.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Public Group Policy Intensive Training and Workshop Schedule Update&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I&#039;ve basically lost count at this point of how many people have signed up and taken the two-day Group Policy intensive training and workshop. Students LOVE the class, and managers LOVE the results.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;You BOUGHT and IMPLEMENTED Active Directoryânow DO SOMETHING with it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Public Two-Day Workshops for the Remainder of 2006:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Because I got invited to do a 19-city roadshow with TechTarget and Microsoft (see next section) I had to move around some of my class dates.&lt;br /&gt;
July 11â12: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Denver, CO&lt;/a&gt;&lt;br /&gt;
July 25-26 (changed dates): &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Austin, TX &lt;/a&gt;(by popular demand!)&lt;br /&gt;
Aug 23â24: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Phoenix, AZ&lt;/a&gt;&lt;br /&gt;
Sep 25â26 (changed dates): &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Seattle, WA&lt;/a&gt;&lt;br /&gt;
Oct 31âNov 1 (changed dates): &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Portland, OR&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Why THESE cities? Because people used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and ASKED me to have classes here.&lt;/p&gt;

&lt;p&gt;Here&#039;s hoping you&#039;ll take advantage of the opportunity!&lt;/p&gt;

&lt;p&gt;Learn more and sign up at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop&lt;/a&gt;&lt;br /&gt;
(Don&#039;t forget to scroll all the way to the bottom of that page and locate your city!)&lt;/p&gt;

&lt;p&gt;Or, if you think you might want your own in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japanâor wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does have the distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Free Education!&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Iâm honored to announce that Iâm working with two pairs of vendors to get you free stuff in the upcoming year starting in June! (Yâall know how much I love free stuff!)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Announcement #1:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz and NetIQ + FullArmor team up to bring you, over the next year or so, some webinars, whitepapers, and roadshow opportunities. Here, youâll see me outline some of the difficulties that administrators have when working with the native Group Policy toolkit. Then, NetIQ + FullArmor will talk about how their products fill in those gaps ! Iâll keep you posted with mini-updates via âun-newslettersâ when a webinar or roadshow date is approaching.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Announcement #2:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz and TechTarget + Microsoft team up to bring you a 19-city roadshow tour titled: Deployment, Managing, and Monitoring: Getting the Job Done. Here, youâll hear me talk about how to use the tools in the box to deploy your Windows XP, Windows 2003, and Vista systems, how to use Group Policy to manage your systems, and finally how to keep tabs on them with some slick free tools! Did I mention this is 19 cities?? So, thereâs a good chance weâll be near you soon! First two cities are Charlotte, NC (June 27, 2006) and Atlanta, GA (June 28, 2006).&lt;/p&gt;

&lt;p&gt;The best two places to see the city list will be my web site calendar (which runs along the right-hand side), and also &lt;a href=&quot;http://events.techtarget.com/windowssystemsmanagement/index.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;, the official TechTarget/Microsoft web site. Dates will be added when confirmed. Hope to see you there!  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Welcome&lt;/strong&gt;&lt;strong&gt; Mark, my new assistant!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Also, a big welcome to my new assistant. His name is Mark, and he can be reached at &lt;a href=&quot;mailto:markm@moskowitz-inc.com&quot;&gt;markm@moskowitz-inc.com&lt;/a&gt;. He can help you get signed up for a class, get you a case of books, or troubleshoot a gift order. Heâd love to get a welcome email from you! However, please donât send Mark any technical questions. Post those to GPanswers.com/community.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address:&lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please &lt;strong&gt;FORWARD THE ENTIRE&lt;/strong&gt; email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; If you have questions about ordering a book, contact my assistant Mark at: &lt;a href=&quot;mailto:markm@moskowitz-inc.com&quot;&gt;markm@moskowitz-inc.com&lt;/a&gt;. I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#17 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue17</link>
        <pubDate>2006-04-25T23:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	Your opinion please!
	Windows 2003/R2 Printer Magic
	Get a signed copy of...
	
		my GP book: Group Policy, Profiles and IntelliMirror
		my Windows &amp;amp; Linux Integration book
	
	
	Now Available: Private GP Course in &amp;quot;Less Intensive&amp;quot; format
	Public Group Policy Intensive Training and Workshop Schedule Update
	Subscribe, Unsubscribe, and Usage Information



It&amp;#39;s all about more control, baby

This Newsletter&amp;acirc;s &amp;acirc;big topic&amp;acirc ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Your opinion please!&lt;/li&gt;
	&lt;li&gt;Windows 2003/R2 Printer Magic&lt;/li&gt;
	&lt;li&gt;Get a signed copy of...
	&lt;ul&gt;
		&lt;li&gt;my GP book: Group Policy, Profiles and IntelliMirror&lt;/li&gt;
		&lt;li&gt;my Windows &amp; Linux Integration book&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Now Available: Private GP Course in &quot;Less Intensive&quot; format&lt;/li&gt;
	&lt;li&gt;Public Group Policy Intensive Training and Workshop Schedule Update&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;/li&gt;
&lt;/ul&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;It&#039;s all about more control, baby&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;This Newsletterâs âbig topicâ is printers, and deploying them via Group Policy. But, before I talk about that, I have to ask you folks a thing or two.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thing #1:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Do you like these newsletters with one big topic in them?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;or&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Do you like the original format with lots of little questions and lots of little answers?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Send your one word vote of BIG or LITTLE to &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;. Or, if you have more than one word to say, you can do that too.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thing #2: &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Want to be famous? Iâm working on a project which highlights âcreative usesâ for Group Policy. So, if you think youâve got a special implementation using Group PolicyâI want to hear about it. For instance, one company I know uses Group Policy to lock down PCs as cash-registers. Thatâs cool! Another company I know wrote some sweet custom scripts to automate their entire Group Policy universe. Wow! Thatâs the kind of stuff I want to hear! Or, do you have a special âprocessâ behind your Group Policy that goes beyond the âin the boxâ delegation? Anything neat or coolâspecial implementations are what Iâm looking for. And, like I said, you can have your name in lights (if you so choose).&lt;/p&gt;

&lt;p&gt;Give me a paragraph or two on your cool implementation, and what youâre doing that makes your organization unique. Send to&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; with a subject line of SPECIAL.&lt;/p&gt;

&lt;p&gt;Now, on with the show!&lt;/p&gt;

&lt;p&gt;Be sure to read through to the end. Iâve got a gaggle of new dates and cities for the public Group Policy course for the rest of 2006.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Newsletter Sponsored by: DesktopStandard&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Provide all of your Windows 2000, XP and Windows 2003 end-users easy access to the correct printers via Group Policy, today!&lt;/p&gt;

&lt;p&gt;Configuring printers is one of the essential desktop management tasks for which there is no built-in Windows solution. DesktopStandard&#039;s PolicyMaker Standard Edition solves this issue and many others. It includes both Shared Printer policy and TCP/IP Printer policy for managing printer connections. Standard location-based filters allow targeting of print connections so that jobs can automatically print to the most appropriate printer based on where the computer is located.&lt;/p&gt;

&lt;p&gt;Click the link to learn more: &lt;a href=&quot;http://www.desktopstandard.com/base/mosnl042806.aspx&quot;&gt;PolicyMaker Standard Edition&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Windows 2003/R2 Printer Magic&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Let me guess what one of your biggest headaches is.&lt;/p&gt;

&lt;p&gt;Printers.&lt;/p&gt;

&lt;p&gt;Yes, itâs that âlittle thing we donât like talking about much.â But, itâs been on my mind lately, so letâs figure out how we can âDo more with Group Policy!â&lt;/p&gt;

&lt;p&gt;Are you one of Microsoftâs customers who is implementing Windows 2003/R2?&lt;/p&gt;

&lt;p&gt;Or, are you one of Microsoftâs customers who just read the above line and is saying to themselves, âWhat the heck is Windows 2003/R2?â&lt;/p&gt;

&lt;p&gt;Windows 2003/R2 can almost be thought of as âWindows Server 2006.â But thatâs not what itâs called. Itâs Windows 2003/R2. To use âR2â you need to load it upon a Windows 2003 Server with SP1. Then you load the R2 bits, and voila! Youâve got an R2 machine!&lt;/p&gt;

&lt;p&gt;R2 has an armload of neat-o new features. And if youâre interested in reading about all the neat-o features it has, read &lt;a href=&quot;http://www.microsoft.com/windowsserver2003/default.mspx&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;But only one of those features has any Group Policy-related goodness. But, oh friends, it is very good!&lt;/p&gt;

&lt;p&gt;Itâs the Print Management Componentâa new add-in that R2 brings to the table. The Print Management component does a LOT of keen-o-rific stuff, like centrally manage almost all aspects of all of the printers on your Windows network. Whatâs not to like about that? And even better, it brings an extra superpower to the table: the ability to deploy printers to users or computers via Group Policy.&lt;/p&gt;

&lt;p&gt;ZAAAP! You can just âbeamâ printers down to your mere mortals.&lt;/p&gt;

&lt;p&gt;Thatâs right. You can now say âWhenever Sally moves from XPPRO1 to XPPRO12, she keeps her printer mappings.â Or, you can now say: âWhoever sits down at XPPRO5 will get the same printer settings.â&lt;/p&gt;

&lt;p&gt;The god-like power you have using Group Policy is truly compelling!&lt;/p&gt;

&lt;p&gt;Keen readers of my Group Policy book will note I had a tip (on pages 139-140 of the 3rd edition) about using loopback policy to perform the same idea. That is, by sitting down at any given machine you can dictate the printers. Now, finally, itâs part of the operating system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Getting ready to perform the magic&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before we can get started with the Print Management Components, we need to perform several steps:&lt;/p&gt;

&lt;p&gt;1. Update our Windows 2003 schema to Windows 2003/R2 schema&lt;/p&gt;

&lt;p&gt;2a. If we want to use our Windows 2003 server as the place where we perform our printer management, we need to load the Print Management Component on our Windows 2003 machine.&lt;br /&gt;
 -or-&lt;br /&gt;
2b. If we want to use an Windows XP machine as the place where we perform our printer management, we need to load the Adminpak for R2 tools on our management station.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;&lt;em&gt;Updating the schema and installing R2&lt;/em&gt;&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Updating the schema is likely the hardest part of the job, because youâll need approval from your Active Directory big-wigs that this is an OK procedure to do. Once you have approval, this operation is best performed directly upon the Schema Master in your domain.&lt;/p&gt;

&lt;p&gt;The reason for the schema upgrade is that to-printer connection objects get a new âfast queryâ lookup via LDAP in Active Directory. This way, the Print Management Console (which weâll explore in a bit) doesnât have to inspect every GPO in the domain to figure out where printers are currently deployed.&lt;/p&gt;

&lt;p&gt;Just pop in the R2 media. You are then presented with the option to âContinue Windows Server 2003 R2 Setup.â If you click that, however, you get the message seen below.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-01.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-03.jpg&quot; style=&quot;height:343px; width:447px&quot; /&gt;&lt;br /&gt;
Figure 1: In order to upgrade Windows 2003 to R2, the schema must be upgraded. &lt;em&gt;(Click image for larger view)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The dialog box says it all. In short, you need to run the command adprep /forestprep which is located in the R2 CD-ROM in the cmpnentsr2adprep directory.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-02.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 2: Once you press âCâ to continue, your schema will be upgraded to the R2 schema.(Click image for larger view)&lt;/p&gt;

&lt;p&gt;From here, weâll assume you want to test drive this on your Windows 2003 Server and upgrade it to R2. Weâll also assume that you want to manage your printers from there (as opposed to an Windows XP management station).&lt;/p&gt;

&lt;p&gt;Once the schema update has been performed, you can then run the âR2Auto.exeâ on the root of the R2 CD-ROM and select to âContinue Windows Server 2003 R2 Setup.â At this point, you may be informed that you have a service pack installed (and continuing will prevent any possibility of uninstalling it). Select âYes.â Once you do, youâll be at the âR2 Setup Wizard.â The Wizard is self-explanatory.  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;&lt;em&gt;Installing the Print Management Components&lt;/em&gt;&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Next on the docket is loading the Print Management Component. Again, this is a comprehensive tool which allows you to manage many facets of your printer universe. To load the Print Management Component, go to Add/Remove Programs | Windows Components | Management and Monitoring tools and select Print Management Component, as seen below.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-03.jpg&quot; style=&quot;height:343px; width:447px&quot; /&gt;&lt;br /&gt;
Figure 3: You can load the Print Management Console components into a Windows 2003/R2 server.&lt;/p&gt;

&lt;p&gt;Note that next time the (annoying) Configure Your Server Wizard appears, youâll see that itâs been installed as seen here:&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-04.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 4: The Configure Your Server Wizard now has a new option. (Click image for larger view)&lt;/p&gt;

&lt;p&gt;Now that the Print Management Components are loaded, youâre ready to deploy printers to either your users or your computers. You can do this âby handâ using the regular Group Policy editor snap-in, or using the tools provided in the Print Management console.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Deploying printers using GPOs&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Letâs deploy printers by hand first using the Group Policy editor, then weâll move on to the Print Management console.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;First step: Define Deployed Printers&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To zap a printer down to your users or computers, you start out by creating a GPO and linking it to an OU containing either users or computers. Say, the Sales Users OU.&lt;/p&gt;

&lt;p&gt;When you edit your next GPO, youâll see a âDeployed Printersâ node in both the computer and user half of the GPO along with a new Action called âDeploy Printerâ in the Action menu as seen below.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-05.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 5: Youâll be able to manage printers directly within the Group Policy Object editor (Click image for larger view)&lt;/p&gt;

&lt;p&gt;Note that if you donât see the âDeployed Printers nodeâ, itâs likely that you donât have the updated Adminpak tools on your management station (the computer from which youâre editing this GPO). To get the latest tools, get the R2 Adminpak &lt;a href=&quot;http://tinyurl.com/e9jm4&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. Note that it isnât âone big .msiâ like Adminpak.msi. Rather this is a collection of smaller files for specific updated components like the Print Console.&lt;/p&gt;

&lt;p&gt;Once you select User Configuration | Deployed Printers | Deploy Printers (as seen in Figure 5 ) or Computer Configuration | Deployed Printers | Deploy Printers, youâll be ready to blast new printer assignments down. Just type &lt;a href=&quot;file://server//printer&quot;&gt;serverprinter&lt;/a&gt; into the âEnter printer nameâ dialog (shown below), click Add, and youâre done.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-06.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 6: Enter the UNC path of the printer you want to push. (Click image for larger view)&lt;/p&gt;

&lt;p&gt;Or are you? Hereâs where the going gets tough. That is, just when you think youâve got it super-easy, you need to go the last mile of this journey manually. All youâve done right now is define which printer the folks affected by this GPO should get. But now you need to actually tell them to get it. That trick is done through a little executable program that you have to kick off via Login script (for printers assigned to users) or Startup script (for printers assigned to computers).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Second Step: Assign the PushPrinterConnections executable&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The âmoving partâ to make the printer assignment is a little .exe called pushprinterconnections.exe. If youâre deploying printers to users, the .exe needs to be run in the userâs Login Script. If youâre deploying printers to computers, it needs to be run in the computerâs Startup Script.&lt;/p&gt;

&lt;p&gt;The pushprinterconnections.exe gets placed on your R2 server in the &lt;a href=&quot;file://windows//PMCSnap&quot;&gt;windowsPMCSnap&lt;/a&gt; directory along with some other bits associated with the Print Management console (which weâll talk about in a minute). You can see that here.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-07.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 7: Youâll need to copy the pushprinterconnections.exe to each GPOâs script container. (Click image for larger view)&lt;/p&gt;

&lt;p&gt;The key point is that the location where it starts out isnât the location where you need to run it from. Your job is to take the file and plunk it directly into the GPO itself. Here are the rough steps to do this:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;While editing the GPO, drill down to the script type (User Login, or Computer Startup).&lt;/li&gt;
	&lt;li&gt;Click the Show Files button.&lt;/li&gt;
	&lt;li&gt;Copy the pushprinterconnections.exe into the window that opens up.&lt;/li&gt;
	&lt;li&gt;Back at the properties of the script, click Add, locate and select the pushprinterconnections.exe file.&lt;/li&gt;
	&lt;li&gt;Click OK&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-08.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 8: Call the pushprinterconnections.exe from directly within the scripts portion of the GPO. (Click image for larger view)&lt;/p&gt;

&lt;p&gt;Note: If you want to enable troubleshooting logging information, type âlog in the Script Parameters box. A per-user debug log file will be written to %temp%. A per-machine debug log will be written to %windir%temp. (Note that these are totally different directories.) Itâs worth noting that you shouldnât use the âlog parameter in a production environmentâyou wouldnât want the utility filling up your client machine hard disks with megabytes of log files.&lt;/p&gt;

&lt;p&gt;A quick âfuture lookingâ note about Vista. This utility isnât required for Vista. The ability to push down printer connections is built in.&lt;/p&gt;

&lt;p&gt;So, the first thing that PushPrinterConnections.exe does when you run it is to check if it is running on Windows Vista. If it is running on a Vista machine, the utility exits without doing anything. So network administrators donât have to worry if they accidentally push out the pushprinterconnections.exe utility down to Windows Vista clients.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The results!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;At this point, you should see goodness when you log in as the user or restart the computer. Note that these printers wonât âchangeâ during background refresh after youâre already logged in. Thatâs because the pushprinterconnections.exe only runs at login or startup.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-09.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 9: Success on an Windows XP machine! (Click image for larger view)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The easier way to do it (sort of)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We just deployed printers to our users or computers by hand using the Group Policy editor. However, thereâs an alternate method: using the Print Management Console. The Print Management Console gives a âone stop shop viewâ of printers deployed via GPOs. In this list, you can see each of my printers (HPLaser1 and HPLaser2) and which GPOs theyâre being dictated in, and which sideâuser or computerâis being forced.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-10.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 10: The Deployed Printers node in the Print Management Console âhunts downâ GPOs which are using the Deployed Printers feature. (Click image for larger view) However, the Print Management Console has another trick up its sleeve: the ability to zap printers directly by creating GPOs of its own.&lt;/p&gt;

&lt;p&gt;Using the Print Management Console, just drill down to Print Management | Custom Printer Filters | All Printers, locate the printer you want to zap down to a computer or user, and select âDeploy with Group Policyâ, as shown below.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-11.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 11: You can see any printer in the Print Management Console and zap it down using Group Policy. (Click image for larger view) With no disrespect to the designers of R2, this is where it starts to get a little bit difficult to work with. It starts out innocently enough as you can see in the âDeploy with Group Policyâ dialog box below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-12.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 12: The interface for deploying printers via GPOs using the Print Management Console. (Click image for larger view)&lt;/p&gt;

&lt;p&gt;The interface from here on out is, well, almost a throwback to pre-GPMC daysÃ¢â¬Â¦and we all hated those days. But thatâs the interface we have here after we perform our next step.&lt;/p&gt;

&lt;p&gt;The idea here is to click Browse and either find a GPO you happen to know is linked to a Site, Domain, or OU (because, of course, you have that memorized) or drill down into an OU and choose to create a new GPO thatâs linked to the level you drilled down to. You can see this in Figure 13.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-13.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 13: Click to create a new GPO to affect your target OU. (Click image for larger view)&lt;/p&gt;

&lt;p&gt;And, of course, you all knew that an icon of two people with a little star over their heads means âCreate a new GPO and link it here.â Right? (Maybe not.) Thankfully, the tooltip tells the tale of the inexplicable icon.&lt;/p&gt;

&lt;p&gt;Once youâve created the GPO and linked it, itâs time to deploy the printer. Here you select which side of the house you want to deploy to: users, computers, or both. In my case, Iâm deploying to Nurse Users, so Iâm choosing users.&lt;/p&gt;

&lt;p&gt;Now, hereâs where you gotta stay with meâso Iâve numbered the steps like a âfollow the bouncing ball.â Before I reveal these steps, I want to confess that I tried this procedure no less than 5 times before I finally figured it out.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n17-14.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 14: Steps to deploy a printer using this dialog. (Click image for larger view)&lt;/p&gt;

&lt;p&gt;Why did I go though the painstaking trouble to number the steps and show you exactly where to click? Because the procedure is to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Choose the user and/or computer side of things.&lt;/li&gt;
	&lt;li&gt;Click the Add button.&lt;/li&gt;
	&lt;li&gt;Then click OK&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In short, I kept missing the ADD button and was driving myself completely nuts! I think I was missing it because âAddâ is ever-so-slightly higher in the dialog than the checkboxes, and my brain thought âWhy would I need to click here? I should just click OK and be done.â But my brain was wrong. Learn from my brain.&lt;/p&gt;

&lt;p&gt;Hereâs the trick: Deploying printers via the Print Management Console doesnât do 100% of the required steps. That is, while it puts the printer in place in the Deployed Printers node, it doesnât jam the pushprinterconnections.exe into the Logon Script or Startup Script. this means you have to go back in, via the GPMC, edit the GPO, and jam in the pushprinterconnections.exe (basically, what I showed you in the first part of the article). Frustrating? A little, but now you know what you have to do!&lt;/p&gt;

&lt;p&gt;If Iâm missing something here, dear readers, donât be shy. Itâs a mystery to me why this whiz-bang Print Management console only does half the job while using the âDeploy with Group Policyâ feature.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final thoughts&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Clearly, this ability to zap printers down to either users or computers is a nice leap forward. But, the bad news is subtle: That is, this new magic isnât built on the client-side extension goodness that IS Group Policy. Rather, this is a little hack that Microsoft put together to zap printers down to users. What Iâd like to see is the ability for users to get a changed GPO, and have the printers change on the fly with the background refresh interval. Itâs not there yet, but appears to be coming soon with Vista.&lt;/p&gt;

&lt;p&gt;One more note about all this before we move on:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Windows 2000 machines only support per-user printer connections.&lt;/li&gt;
	&lt;li&gt;Windows XP or Windows 2003 support per-user or per-computer printer connections.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Finally, if you want to learn more about the Print Management Console for the other goodies it brings to the table, be sure to read the âPrint Management Step-by-Step Guide for Windows Server 2003 R2â found &lt;a href=&quot;http://tinyurl.com/n2pvh&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000 (THIRD EDITION&lt;/em&gt;)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;  Do you have the new THIRD EDITION of the Group Policy book? It&#039;s got 50 new pages, fully covers XP/SP2 and Windows Server 2003/SP1, an armload of new tidbits here and there, and whole new section on the Security Configuration Wizard.&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Additionally available is my new title Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment from&lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144470&quot;&gt;http://www.amazon.com/gp/product/0782144470&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Now Available: Private GP Course in &quot;Less Intensive&quot; format&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Everyone knows the two-day Group Policy course is really three days of material packed into two intensive days. However, some customers have asked for a &quot;Less Intensive&quot; format.&lt;/p&gt;

&lt;p&gt;Your wish has been granted!&lt;/p&gt;

&lt;p&gt;This course starts with a half day warm-up of Active Directory, managing users, and delegating permissions. Then, we move on to the Group Policy goodies. This way, those with less Group Policy and day-to-day administration experience can get a bit of the fundamentals before diving into the Group Policy waters.&lt;/p&gt;

&lt;p&gt;This &quot;three-day Less Intensive&quot; option is ONLY available as a private course. Note, the &quot;two-day intensive&quot; option is available as either a private or a public course.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Learn more about the Group Policy courses here.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Public Group Policy Intensive Training and Workshop Schedule Update&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;ve basically lost count at this point of how many people have signed up and taken the two-day Group Policy Intensive training and workshop. Students LOVE it, and managers LOVE the results the training gives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;You BOUGHT and IMPLEMENTED Active Directoryânow DO SOMETHING with it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So, learn to properly drive that &quot;Ferrari&quot; you bought by coming to a class!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Classes for remainder of 2006:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;  June 7â8: Austin, TX (by popular demand!)&lt;br /&gt;
July 11â12: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Denver, CO&lt;/a&gt;&lt;br /&gt;
Aug 23â24: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Phoenix, AZ&lt;/a&gt;&lt;br /&gt;
Oct 24â25: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Portland, OR&lt;/a&gt;&lt;br /&gt;
Nov 21â22: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Seattle, WA&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Why THESE cities? Because people used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and ASKED me to have classes here.&lt;/p&gt;

&lt;p&gt;Here&#039;s hoping you&#039;ll take advantage of the opportunity!&lt;/p&gt;

&lt;p&gt;Learn more and sign up at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop&lt;/a&gt;&lt;br /&gt;
(Don&#039;t forget to scroll all the way to the bottom of that page and locate your city!)&lt;/p&gt;

&lt;p&gt;Or, if you think you might want your own in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japanâor wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does have the distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;p&gt;Here&#039;s a testimonial from someone at a major upscale jewelry retailer who said his knowledge of Group Policy helped him and his SMS team be more efficient all around.&lt;/p&gt;

&lt;blockquote&gt;&lt;em&gt;Jeremy,&lt;/em&gt; &lt;em&gt;We actually use the SMS+ZTI (Zero Touch Installation) scripts you talked about in your last two newsletters. For us, we could only be successful with SMS+ZTI in conjunction with Group Policy settings -- a lot of which you taught.&lt;/em&gt; &lt;em&gt;I made a Staging OU and redirected all new systems which get added to the domain to this new OU. The GPOs for this OU are quite restrictive. It makes the machine basically unusable. Heck, I make sure theyâre presented with POPUPS which instruct users to call the help center if they get the popup message. This forces our deployment team to move the machine to a correctly managed OU.&lt;/em&gt; &lt;em&gt;Some additional things that have accomplished via Group Policy since your class:&lt;/em&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Our new laptops come with Wireless cards. But, I needed to make sure they are initially disabled. Then, only turned on for the ârightâ people -- if you know what I mean. I created a wireless access GPO that disables the wireless service from starting (and removed administrators from enabling it as some extra protection.) I also used a technique in your class to guarantee who gets Wireless turned on, and who doesnât. So now when we want to enable the access itâs just a quick change!&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;I set up Restricted Groups for different OUâs. This helped with Sarbanes Oxleyâs local admin requirements. Using a MOF through SMS we now report who has local admin rights.&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;We implemented Microsoft Live Communicator â through Group Policy we restrict the settings.&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;em&gt;So yes, your class was very helpful in getting me on my way. I can only hope it helped other administrators âsee the lightâ like I did!&lt;/em&gt; &lt;em&gt;Thanks, Jeremy!&lt;/em&gt;&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Sponsor Update&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;At GPanswers.com, we want to welcome the following sponsors to the Solutions Guide:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;FullArmor Corporation&lt;/li&gt;
	&lt;li&gt;Smartline, inc.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Be sure to check out their cool tools and all other vendor&#039;s tools at the &lt;a href=&quot;https://www.gpanswers.com/component/content/section/5.html?layout=blogcompany&quot;&gt;Solutions Guide&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address:&lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please &lt;strong&gt;FORWARD THE ENTIRE&lt;/strong&gt; email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk. If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; If you have questions about ordering a book, contact my assistant Jon at: &lt;a href=&quot;mailto:jons@moskowitz-inc.com?subject=Question&quot;&gt;jons@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#16 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue16</link>
        <pubDate>2006-03-28T23:30:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Why is this follow-up newsletter needed?

I want to thank you all for your comments and observations about my &amp;quot;Newsletter 15&amp;quot; rant. Some of you opted to post in my community forum, and there are some nice comments there. Others posted &amp;quot;side discussions&amp;quot; on, say, the SMS lists.

(PS: This whole newsletter update is being posted to the GPanswers.com newsletter folks and the SMS-list folks.)

I&amp;#39;ve spent the extra &amp;quot;quality time&amp;quot; getting to know the BDD a bit b ]]>
        </description>
        <content:encoded>
            &lt;h3&gt;&lt;strong&gt;Why is this follow-up newsletter needed?&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I want to thank you all for your comments and observations about my &quot;Newsletter 15&quot; rant. Some of you opted to post in my community forum, and there are some nice comments there. Others posted &quot;side discussions&quot; on, say, the SMS lists.&lt;/p&gt;

&lt;p&gt;(PS: This whole newsletter update is being posted to the GPanswers.com newsletter folks and the SMS-list folks.)&lt;/p&gt;

&lt;p&gt;I&#039;ve spent the extra &quot;quality time&quot; getting to know the BDD a bit better. I&#039;m ready to put this whole thing to bed, and I&#039;m grateful for the insights everyone has brought to the table.&lt;/p&gt;

&lt;p&gt;Again, if you have comments, my preferred way to handle them is via the Community forum. Or, if you&#039;re getting this on the SMS-list, then, feel free to post there too.&lt;/p&gt;

&lt;p&gt;Special thanks to the BDD team (Michael Niehaus) for making contact to help me get to the bottom of some of my questions, as well as key members of the SMS-list (Rod Trent and Todd Hemsell) who chose to reach out to help everyone better understand why this is important to them.&lt;/p&gt;

&lt;p&gt;Thanks, all.&lt;/p&gt;

&lt;p&gt;PS: If you wish to respond, please do not email me about this topic. If you want to participate, please post here&lt;a href=&quot;http://tinyurl.com/htaxw&quot;&gt;http://tinyurl.com/htaxw&lt;/a&gt; on my community forum.  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Findings&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Ultimately, here are my findings after &lt;strong&gt;seriously&lt;/strong&gt; going through the BDD materials. (Yes, true, I went thru them semi-seriously before. But this pass was even more so.)&lt;/p&gt;

&lt;p&gt;Indeed, I found some videos of the whole process &lt;a href=&quot;http://tinyurl.com/q93o6&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; and watched every single one and I suggest anyone interested in learning this better also watch them.&lt;/p&gt;

&lt;p&gt;Warning: Whomever is giving the talk is clearly just &lt;strong&gt;READING&lt;/strong&gt; from a script. And, hence, it&#039;s a little easy to &quot;tune out&quot; even though the information is quite good. With all that re-exploring, here is the Reader&#039;s Digest version on my findings:&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;About BDD/Standard&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I seem to have been correct that the BDD, at the end of the day, deploys &quot;Ghost-style monolithic images.&quot; These images are based on an &quot;assisted scripted process&quot; which helps wrap up all the steps (including hardware-specifics and timed reboots into the process.)&lt;/p&gt;

&lt;p&gt;But in the words of the BDD team in a personal email: &quot;In the end, this is captured as an image.&quot;&lt;/p&gt;

&lt;p&gt;I think, in the end analysis, this is the big dealbreaker for me.&lt;/p&gt;

&lt;p&gt;Let&#039;s say I change hardware. Or add something that requires another step.&lt;/p&gt;

&lt;p&gt;Sure, I can go BACK and tweak my script to then create ANOTHER Ghost-style image. But that seems like more work to me. And now I&#039;ve got different images running around.&lt;/p&gt;

&lt;p&gt;Not that the BDD team or Microsoft needs my advice, but here it is: Take a hard-line stand, and support ONE method.&lt;/p&gt;

&lt;p&gt;And that method should be a 100% automated, scripted install.&lt;/p&gt;

&lt;p&gt;Here&#039;s why: People who already use Ghost-style tools already USE those tools without the process and guidance the BDD offers. And, the manufacturer of those Ghost-style tools should provide any process around them -- Microsoft shouldn&#039;t.&lt;/p&gt;

&lt;p&gt;I don&#039;t think folks already using Ghost-style tools would necessarily jump ship over to BDD. I do think the BDD team could attract more flies by answering the problem of &quot;How can I build a glorious, sexy scripted install that works on ALL my hardware, even if my hardware changes a lot?&quot;&lt;/p&gt;

&lt;p&gt;While it has a lot of excellent prescriptive guidance, I would be surprised to learn that many, many people use the BDD/Standard edition.&lt;/p&gt;

&lt;p&gt;The BDD team has expressed that they do not assume AD is in place with the BDD/Standard edition. Therefore, none of the process involves any use of GPOs or scripts with GPOs. My suggestion to the BDD team: Start assuming people have AD and can &quot;get it together&quot; enough to use GPOs.&lt;/p&gt;

&lt;p&gt;Seriously, even SBS installations run AD and most use GPOs, and they have 10-50 users.&lt;/p&gt;

&lt;p&gt;If the target audience for the BDD doesn&#039;t even have ONE DC (hence, no AD) I think it&#039;s safe to assume that they DONT or WONT want to use a tool like this.&lt;/p&gt;

&lt;p&gt;Do people WITHOUT AD really think &quot;process&quot; when doing anything? If the BDD&#039;s target audience really assumes about 500+ machines, then, c&#039;mon -- we&#039;re ONLY talking AD here. :-)&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;About BDD/Enterprise&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I think this is where the majority of administrators will find usefulness. The ZTI scripts which are part of the BDD really do add the &quot;finishing touches&quot; that SMS needed when the OSD was released.&lt;/p&gt;

&lt;p&gt;And, I think that was my confusion, too. That is, that the OSD doesn&#039;t, by itself, come with the ZTI scripts. No no.. THOSE only come with BDD/Enterprise.&lt;/p&gt;

&lt;p&gt;So, my overall suggestion would be to roll up the USEFUL BITS of BDD/Enterprise and marry them RIGHT to the OSD. I mean, is there a majority case in using ZTI &lt;strong&gt;without&lt;/strong&gt; the OSD? If not, put the goodies where the SMS admins can just use &#039;em.&lt;/p&gt;

&lt;p&gt;It seems, overall, that the SMS admins and I agree on the general &quot;philosophy&quot;. That is SMS admins seem to often use BDD/Enterprise to smoke &quot;broken&quot; machines then use SMS to lay down their applications. That sounds awfully familiar when I teach about smoking a machine using RIS then laying down applications with GPOs. It&#039;s the exact same theory. (Yes, itâs true that GPOs require MSI packages, where SMS can deliver just about anything.)&lt;/p&gt;

&lt;p&gt;There are some differences, and some similarities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Difference #1.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;With RIS, I need to walk out to the machine to kick it off -vs-With SMS, if the client is loaded and responding, I can kick it off remotely. If the SMS client isn&#039;t responding I need to either use RIS to boot WinPE or run out there with a WinPE CD-ROM. (Meanwhile, WinPE is still a &quot;licensed&quot; entity. RIS is included as a component for all Windows servers.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Similarity #1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Both RIS and SMS/OSD seem to use the same &quot;idea&quot; of how they store files. That is, they&#039;re not âGhost-style Monolithic images.â RIS stores &quot;bunches of files&quot; stored on the RIS server. SMS/OSD uses a &quot;WIM&quot; format. Both formats store about 20% less information than a &quot;Ghost-style monolithic image.&quot;&lt;/p&gt;

&lt;p&gt;So, at the end of the day, an SMS/OSD and a &quot;naked&quot; RIS install are going to take about the same amount of time. (That is, unless you&#039;re doing something tricky with the ZTI scripts and downloading a true Ghost-style image with your Ghost-style tool.)&lt;/p&gt;

&lt;p&gt;My only question today is: If they&#039;re so SIMILAR in the underlying technology, why do we have two ways to skin the same cat? In the future, the BSD team tells me we won&#039;t. That&#039;s the right idea.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Advantage #1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;SMS has always done a good job &quot;staging&quot; files in secondary sites. And, if you have a very large environment, say, with 25 branch offices, using RIS can be a challenge. This is because you&#039;ll likely want to load ONE RIS server and replicate it to all your branches. You would use Robocopy, XCOPY, DFS, or something else to copy that one RIS server to your 25 branches. But this route could be fraught with peril. (However, I would suggest that with the improvements with WS03/R2 this might be vastly improved.)&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Onward and &lt;/strong&gt;&lt;strong&gt;upwared&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;This isn&#039;t a BDD comment, specifically. But I think it&#039;s simply silly that that I must &quot;run out&quot; to a bare-metal machine with a WinPE disk, or have a RIS server available &lt;strong&gt;alongside&lt;/strong&gt; my SMS &lt;em&gt;just&lt;/em&gt; to boot WinPE to then get bare-metal installs up to speed. Unless I&#039;m missing something, this is a kind of a big hole that the SMS team needs to address. I don&#039;t know enough about SMS 4.0 to know if this hole is plugged.&lt;/p&gt;

&lt;p&gt;I like the idea that the ZTI scripts are &quot;open&quot; and customizable. And this, I think, is why SMS admins are &quot;passionate&quot; about the BDD in general. Again, however, my suggestion (for what it&#039;s worth) is to put the ZTI scripts right into the OSD if that&#039;s the people who use them.&lt;/p&gt;

&lt;p&gt;Ultimately, the BDD has a nice message: Put some process around the way you do your deployments.&lt;/p&gt;

&lt;p&gt;I can&#039;t rant about that. Clearly,&lt;/p&gt;

&lt;p&gt;I&#039;m not a huge fan of &quot;Ghost-style monolithic images.&quot; I&#039;d rather see you script the whole install, even if it takes longer. But the BDD&#039;s goal is to prescribe some repeatable guidence for those who choose to use Ghost-syle tools. Again, I can&#039;t argue with that -- if that&#039;s the way you&#039;re choosing to do your deployment. As I said in the original newsletter -- if you&#039;re happy with Ghost and their ilk, then keep on using it. The BDD helps you put some &quot;process&quot; around that deployment method if you choose to use it.&lt;/p&gt;

&lt;p&gt;That&#039;s just good thinking all around.&lt;/p&gt;

&lt;p&gt;However, in this &quot;Son of rant&quot; I&#039;ve made some suggestions going forward I hope might be well received by both the BDD and SMS teams going forward.&lt;/p&gt;

&lt;p&gt;One last piece of the puzzle: BDD will surely evolve in the Windows Vista timeframe. I would expect it to take on the new WIM/XIMAGE/IMAGEX formats Vista will support. But, that&#039;s another discussion for another day, isn&#039;t it?&lt;/p&gt;

&lt;p&gt;PS: The BDD team responded in full to this content before it went live. And I&#039;ve tried to inject the relevant feedback about the current state of the BDD and SMS/OSD back in before we went live. However, I&#039;m currently seeking permission to print a full transcript of the conversation so you can read the response directly from the BDD team. In that response the BDD team discusses future directions, which are certainly interesting. When available, it will NOT be a newsletter. It will only be posted here &lt;a href=&quot;http://tinyurl.com/htaxw&quot;&gt;http://tinyurl.com/htaxw&lt;/a&gt; on my community forum.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address:&lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please &lt;strong&gt;FORWARD THE ENTIRE&lt;/strong&gt; email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk. If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; If you have questions about ordering a book, contact my assistant Jon at: &lt;a href=&quot;mailto:jons@moskowitz-inc.com?subject=Question&quot;&gt;jons@moskowitz-inc.com&lt;/a&gt; We endeavor to respond to everyone who email&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#15 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue15</link>
        <pubDate>2006-03-22T23:31:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Newsletter #15


	My Rant: Why imaging? Why SMS?
	Get a signed copy of...
	
		my GP book: Group Policy, Profiles and IntelliMirror
		my Windows &amp;amp; Linux Integration book
	
	
	Public Group Policy Intensive Training and Workshop Schedule Update
	Upcoming appearances and schedule
	Thanks Netpro!
	Subscribe, Unsubscribe, and Usage Information


This issue is (I&amp;acirc;m sorry folks) a rant. It&amp;acirc;s not about the war, or politics&amp;acirc;but about something close to us, ]]>
        </description>
        <content:encoded>
            &lt;p&gt;Newsletter #15&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;My Rant: Why imaging? Why SMS?&lt;/li&gt;
	&lt;li&gt;Get a signed copy of...
	&lt;ul&gt;
		&lt;li&gt;my GP book: Group Policy, Profiles and IntelliMirror&lt;/li&gt;
		&lt;li&gt;my Windows &amp; Linux Integration book&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Public Group Policy Intensive Training and Workshop Schedule Update&lt;/li&gt;
	&lt;li&gt;Upcoming appearances and schedule&lt;/li&gt;
	&lt;li&gt;Thanks Netpro!&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This issue is (Iâm sorry folks) a rant. Itâs not about the war, or politicsâbut about something close to us, that we can all rally behind: disk imaging and management products.&lt;/p&gt;

&lt;p&gt;So, without further ado, my rant.&lt;/p&gt;

&lt;p&gt;After I rant for a while, I&#039;ll give you an update on my 2006 Group Policy Class Schedule and suggest some other great stuff for you to check out.&lt;/p&gt;

&lt;p&gt;Before I forgetâthe Sacramento, CA Two-Day Group Policy class is ON for March 30, 31. We have three seats available. If you want one of those seatsâsign up soon at &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;www.GPanswers.com/workshop&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;PS: A hearty THANK YOU to the folks who came and saw me and Tom present Win/Lin topics at this season&#039;s TechMentor in Orlando. I&#039;m gone now (off to the next thing).. but thanks for brightening our days there -- you were a super audience !&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Newsletter Sponsored by: Special Operations Software&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Sometimes the out-of-the-box Password Policy in Windows isn&#039;t just enough. If you need many Password Policies perActive Directory domain or more granularcontrol of howpasswords can be created you should have a look at Specops Password Policy.&lt;/p&gt;

&lt;p&gt;Redmond Magazine says that &lt;em&gt;&quot;Password Policy is easy to install and easy to use. It provides much more granular control and doesn&#039;t have a long learning curve.&quot;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Click the link to read more on how Specops Password Policy can benefit your organization with &lt;a href=&quot;http://www.specopssoft.com/products/specopspasswordpolicy/Default.asp&quot;&gt;increased security&lt;/a&gt;.&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;As&lt;/strong&gt;&lt;strong&gt; Dennis Miller says I don&#039;t mean to go off on a rant here&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;My good friends at TechNet Magazine have recently released their March/April 2006 magazine. And, let me tell youâitâs excellent, specifically, if youâre running SMS to roll out your desktops and/or contemplating using the new Business Desktop Deployment (BDD) to roll out desktops.&lt;/p&gt;

&lt;p&gt;And, I have some questions (and please donât answer me directly via email. Please, please, please answer this question or agree/disagree with this rant by going to &lt;a href=&quot;http://tinyurl.com/htaxw&quot;&gt;http://tinyurl.com/htaxw&lt;/a&gt;on my community forum and post your 2 cents there.)&lt;/p&gt;

&lt;p&gt;My three questions are:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Why does Microsoft have 7 ways to deploy a desktop?&lt;/li&gt;
	&lt;li&gt;Why bother with image-style desktop deployments at all? and&lt;/li&gt;
	&lt;li&gt;Why bother with SMS-style tools?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;So, letâs get started on this very special ârantâ issue.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Microsofts desktop deployment options&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;By my count, Microsoft has seven ways of âofficiallyâ deploying a desktop: Category 1: via winnt.exe&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Put in the CD and restart the machine. This basically runs winnt.exe and installs Windows.&lt;/li&gt;
	&lt;li&gt;DOS-style Network boot disk to connect over the network to run winnt.exe&lt;/li&gt;
	&lt;li&gt;WinPE-style to again run winnt.exe (almost the same as a DOS-style network boot disk in practice)&lt;/li&gt;
	&lt;li&gt;Remote Installation Services (via PxE) where winnt.exe gets invoked&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Category 2: via image&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;SMS + Operating Systems Deployment Pack (OSD)&lt;/li&gt;
	&lt;li&gt;Business Desktop Deployment (BDD)
	&lt;ul&gt;
		&lt;li&gt;Standard Edition and&lt;/li&gt;
		&lt;li&gt;Enterprise Edition&lt;/li&gt;
	&lt;/ul&gt;
	and&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
	&lt;li&gt;Vistaâs all-new image-based deployment&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The methods in Category 1 âbuildâ a PC from scratch, loading Windows step by step (or via answer file), but fundamentally âcreateâ a PC by formatting it and loading each file.&lt;/p&gt;

&lt;p&gt;The methods in Category 2 âphotocopyâ from an image source in Ghost style.&lt;/p&gt;

&lt;p&gt;So, hereâs the question (again): why bother using either the Zero Touch Deployment for SMS (with the Operating System Deployment pack), the BDD, or the upcoming Vista image-based methods to roll out your desktops?&lt;/p&gt;

&lt;p&gt;First of all, unless Iâm missing somethingâthese latest tools from Microsoft compete with each other for your desktop rollout attention. Not to mention that Vista will also come with its image-style based deployment mechanism. So, between the BDD, SMS+OSD and Vistaâs Imaging mechanismâIâm one confused guyâand Iâm trying to understand why each has itâs place.&lt;/p&gt;

&lt;p&gt;So, thatâs three image-style mechanisms to do the same job. Thatâs my real question: can someone (anyone) explain why I might choose, say, the BDD over the SMS+OSD even if could deploy both at exactly the same hard and soft costs. (Again, donât reply hereÃ¢â¬Â¦post about it, at &lt;a href=&quot;http://tinyurl.com/htaxw&quot;&gt;http://tinyurl.com/htaxw&lt;/a&gt;.)&lt;/p&gt;

&lt;p&gt;To me, it seems a main selling point of both the BDD and SMS+OSD appears to be that it will âmaintain stateâ as you do a desktop upgrade from say Windows 2000 to Windows XP. With a little elbow grease, you use the built-in User State Migration tool, shoot up a copy of the userâs important stuff, blast down a new desktop, and restore the important stuff (like desktop backgrounds, etc., etc.)&lt;/p&gt;

&lt;p&gt;Great. But again, why bother specifically saving the state?&lt;/p&gt;

&lt;p&gt;If youâre using the network to store the important stuff (say, by using Roaming Profiles), and use Group Policy to maintain your application settings, why specifically go out of your way to preserve any of it? Those of you whoâve heard my talks on desktop deployment know it will still be there waiting on the network when you deploy that new desktop to the user.&lt;/p&gt;

&lt;p&gt;So, if you want to educate meÃ¢â¬Â¦ please do so. Again, respond by posting to &lt;a href=&quot;http://tinyurl.com/htaxw&quot;&gt;http://tinyurl.com/htaxw&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Beyond the Microsoft image-based deployments&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Since I&#039;m already off on a rant here, let me take it one step fartherÃ¢â¬Â¦&lt;/p&gt;

&lt;p&gt;Truthfully, I don&#039;t even see the point of having any image-style/âphotocopy-styleâ deployments (including other non-Microsoft image-style deployments a la Ghost, PowerQuest, or anything else). Those of you whoâve seen me speak at conferences or those who have taken my more in-depth two-day Group Policy course know my feelings about image based deployments. Yes, theyâre fastâbut, ultimately, theyâre a âphotocopy.â To recap the process, you essentially wrap up a âperfectâ PC with a set of âcoreâ applications and make a big image. Then, you deploy that image to a zillion machines. And you do it fast.&lt;/p&gt;

&lt;p&gt;Great.&lt;/p&gt;

&lt;p&gt;But, this means several downsides when thinking long term. First, thereâs the problem with the âphotocopyâ aspect in terms of hardware deployment.&lt;/p&gt;

&lt;p&gt;Yes, I knowâWindows sysprep is supposed to be the answer. Sysprepâs job (especially with the -pnp switch) is to shut the machine down for photocopying. Then, once the photocopied machine is turned back on, itâs supposed to magically discover all the correct hardware, and birds will land on the computer singing and chirping.&lt;/p&gt;

&lt;p&gt;Except itâs not guaranteed (especially the birds). Not to mention the problem with photocopying from one machine to anotherâthe required drivers might not be there. If youâre photocopying the same image for a Dell Latitude and an IBM Thinkpadâyou let me know how thatâs working out for you. If you can sleep at night while doing this, youâre a stronger man than I.&lt;/p&gt;

&lt;p&gt;Okay, Iâm sure the BDD and SMS+OSD deployment have some provisions to handle this situation. But, I was at a loss on specifically how to add new drivers to either the BDD or SMS+OSD if, say, a new network card showed up in your next desktop shipment. What I am sure of is that in each case, the WinPE image (which provides you the ability to access the image) would indeed need to be tweaked to accommodate this (already a hassle). But my confusion is what about the drivers for when Windows is actually running? If Iâm pulling down a fully formed image, how can I jam in new drivers? If you know, and can educate me, please do so.&lt;/p&gt;

&lt;p&gt;Even if there is a native way to do this (easy or cumbersome) it appears that Binary Research (the original makers of Ghost) has created something to help fail-safe the process. Their âUniversal Imaging Utilityâ product (&lt;a href=&quot;http://www.binaryresearch.net/UIU/About.htm&quot; target=&quot;_blank&quot;&gt;found here&lt;/a&gt;) is supposed to help inject a bazillion drivers into your imagesâspecifically to remediate this very problem Iâm describing.&lt;/p&gt;

&lt;p&gt;The next big problem with the photocopy isâitâs obsolete the very day itâs placed into service. Why? Letâs explore a typical photocopy-style rollout. Letâs say weâre deploying our image to 1000 desktops. Just to give it a name, weâll call our project OurImage 1.0. After rolling out 300 of our 1000 desktops someone on the deployment team realizes theyâve forgotten a critical application patch, or bite-sized application, or a configuration setting, or misspelled a directory, or any number of a 1,000 things that can go wrong during image building. So, the desktop engineering team cleans up the image, and rolls out OurImage 1.1. They then roll out to the next 300 desktops. (And, of course, the problems werenât big enough to retrofit the first 300 desktops and disrupt users.) So, now, you have 600 desktops deployed: half on OurImage 1.0 and half on OurImage 1.1.&lt;/p&gt;

&lt;p&gt;Not ideal, to be sure.&lt;/p&gt;

&lt;p&gt;Then, one of the applications in the image has a new minor version (which the manufacturer strongly recommends you start deploying right away). Back to the drawing board, and a new revision, OurImage 1.2, is created. The deployment rollout must go on! And OurImage 1.2 is now deployed to the next 300 clients.&lt;/p&gt;

&lt;p&gt;So, now, thatâs three somewhat-different images over 900 clients. Now when any of those users calls the helpdesk for help, which version of the image are they using? Remember each version of the image has slightly different application versions tucked inside.&lt;/p&gt;

&lt;p&gt;Or, consider this case: the image is rolled out to 300 peopleâboth Sales and Marketing. But Sales is constantly playing around with applications in the image they have no right to even use. Should those applications have ever been in the image at all? Sure,those applications are needed for the Marketing guys. But not for Sales. So what do some IT departments do? They send someone to trot out to the Sales desktops and manually uninstall those applications (or script it, or touch it with SMS or something).&lt;/p&gt;

&lt;p&gt;So, it must appear as if Iâm âdownâ on photocopy-style desktop deployments such as Ghost, SMS+OSD or the BDD. Itâs not that Iâm down on them, just utterly confused why anyone would use them.&lt;/p&gt;

&lt;p&gt;With that in mind, whatâs my proposed desktop deployment solution?&lt;/p&gt;

&lt;p&gt;Group Policy of course (with a little help from Remote Installation Services)!&lt;/p&gt;

&lt;p&gt;Why RIS? Because RIS doesnât âphotocopyâ an image. It âbuildsâ the computer from scratch, installing just the software it needs in order for Windows to run. And, there are provisions for centrally adding new and updated drivers when new hardware comes out (like NICs, sound cards, etc.).&lt;/p&gt;

&lt;p&gt;Why Group Policy? Because you can deploy just the applications you need to just the specific people who need them. If Fred in Sales shouldnât get an application only Marketing would use, then itâs not in any photocopy where youâd have to worry about it. Fred only pulls down applications Fred needs.&lt;/p&gt;

&lt;p&gt;Yes, I know the downside to my strategy. That is, in order for my suggested strategy to be successful, you have to be 100% committed to the MSI promised land (or buy 3rd party Group Policy tools to deploy applications other than only MSI apps).&lt;/p&gt;

&lt;p&gt;Now, before you napalm my houseâlet me wrap up this section with this one thought:&lt;br /&gt;
I AM NOT SAYING TO ABANDON GHOST, POWERQUEST OR ANY OTHER IMAGE-BASED TOOL IF ITâS WORKING FOR YOU.&lt;/p&gt;

&lt;p&gt;I know lots of people are quite attached to their desktop deployment methods. If something is working for you, and youâre happyâkeep on truckinâ.&lt;/p&gt;

&lt;p&gt;Don&#039;t let me stop you.&lt;/p&gt;

&lt;p&gt;The main reason I&#039;m down on image-type deployments is for the reasons I mentioned above:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Again, first, itâs a photocopy, and even though sysprep -pnp should work from machine to machine, it doesnât always. If it does work for youâfantastic. Consider yourself blessed, and continue to make use of the speed that photocopying provides.&lt;/li&gt;
	&lt;li&gt;However, consider the second problem: âcore applicationsâ in the image make it difficult to customize each userâs experience for them. If you get away from photocopying, you get away from deploying unnecessary apps (or forgetting to put apps in your image).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So again, yes I know RIS is slow. Slower than a photocopy, yes. And, if youâre comfortable photocopying machine to machine to get the OS deployed then, again, keep on doing that. All Iâm asking is for you to consider not imbedding the applications in the image.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;My problem&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now, if you want to help me out you can explain a few things to me.&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;If youâre actually using the SMS+OSDâhow is it really âzero touchâ as itâs touted? I donât get it. Iâve read countless pieces of documentation, but it still appears as if the client needs to be âseenâ by the SMS system in order to zap a new photocopy upon it. That means it needs to be an SMS client. If Iâm cracking out a desktop or laptop from the cardboard box and put it on the wire, Iâm totally unclear how SMS will âfindâ this new machine and zap it my corporate photocopy. From what Iâm reading it seems (dig this) that the prescription is to actually use RIS to deploy that initial desktop, then get the SMS client loaded, then zap down the remaining applications. Wait a secondâthat sounds like âThe Jeremy Prescriptionâ (except you substitute GPO for SMS!) If Iâm missing something, and youâre an expert here, please, please educate me.&lt;/li&gt;
	&lt;li&gt;The BDD has lots of wizard-driven steps to help you create your photocopy and then deploy it. Why would anyone would use the BDD at all, for any reason, when there are clearly other options which do the job? And, unless Iâm looking it wrong, it seems the BDD requires a Ghost-style imaging tool to do the work. Indeed the documentation talks about the Powerquest tool quite a bit. Again, Iâm at a loss to understand why the RIS/Group Policy/MSI combo wouldnât be the preferred way to go hereâor just about anywhere.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;More stuff to rant about(Or, why I&#039;m already unpopular with the SMS team at Microsoft)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Since I&#039;m ranting about SMS anyway&lt;/p&gt;

&lt;p&gt;The issue of TechNet magazine I mentioned has a whole article dedicated to SMS troubleshooting. When people ask me if Iâd prefer SMS over Group Policy, Iâll tell them âEven if you gave me all the licenses I need for SMS, Iâd still pick Group Policy over it any day.â Yes, yes, I know SMS has more features than Group Policy does.&lt;/p&gt;

&lt;p&gt;But a Dodge Caravan has more features than a Mazda Miata. Get the picture?&lt;/p&gt;

&lt;p&gt;In the end analysis what are the features people use when they buy that Dodge Caravan, er, SMS? Letâs look:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Software Deployment with targeting (which can be done with Group Policy Software Installation and WMI filters)&lt;/li&gt;
	&lt;li&gt;Hardware and software inventory (which can not be done natively with Group Policy but is, I hear, coming soon with 3rd party Group Policy tools.)&lt;/li&gt;
	&lt;li&gt;SMS has Software Metering toolsâbut no one I know uses it much.&lt;/li&gt;
	&lt;li&gt;SMS has compliance/patch-management tools. I do know some companies which do make use of theseâbut only because the free WSUS wasnât yet available, and now they feel like theyâre âlocked in.â&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, why would I pick Group Policy over SMS even if someone handed me unlimited free licenses? The TechNet article in the same issue entitled âNo Desktop Left Behind: SMS Troubleshooting Basicsâ about sums it up. Not to saturate you with all the steps the author expertly describes, but, holy cow does it ever take some troubleshooting skillz (thatâs skillz with a âzâ) to get to the bottom of things when SMS stops working. In a nutshell: SMS has about a zillion moving parts. The author expertly demonstrates how to âtraceâ where the problem is within all those moving parts.&lt;/p&gt;

&lt;p&gt;In a basic (very basic) comparison, the same operation (software deployment) for Group Policy is refreshingly simple. There are, in short,&lt;em&gt;many fewer moving&lt;/em&gt; parts to troubleshoot when things go wrong. Yes, okay, maybe Iâm a little biased due to my love of all things Group Policy. And that isnât to say Group Policy always works, either.&lt;/p&gt;

&lt;p&gt;What I am saying, however, is that when Group Policy âbreaksâ itâs a much easier proposition to figure out where the problem is, then actually get to fixing it. For the record, in case you think Iâm making stuff up here to specifically beat up SMS, I am certified in SMS 2.0 and do know a little about what Iâm talking about. (And, yes, I know SMS 2003 is a different, though similar animal.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Simpler is better&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Okay, poor SMS. I just beat it up a little bit, and Iâm feeling a little guilty here. But, ask yourself if you need a tool like SMS at all.&lt;/p&gt;

&lt;p&gt;If you need itâyou need it.&lt;/p&gt;

&lt;p&gt;But, the question is do you &lt;strong&gt;&lt;em&gt;really &lt;/em&gt;&lt;/strong&gt;need it?&lt;/p&gt;

&lt;p&gt;I&#039;ve personally met a handful of people who seem to be with me; ditching SMS and Tivoli (and the like) for a pure Group Policy-based solution to their management.&lt;/p&gt;

&lt;p&gt;Here&#039;s the thought process: By not introducing an SMS-style tool, youâre reducing complexity.&lt;/p&gt;

&lt;p&gt;Again, the Group Policy moving parts are already built-into the operating system.&lt;/p&gt;

&lt;p&gt;So, if you can make use of the moving parts inside the box, my advice is to do so.&lt;/p&gt;

&lt;p&gt;Now, let me be super-clear before the hate mail comes in from the SMS team (or SMS-style product companies). As I said: if you need itâyou need it. Thatâs the trick, and the trap I see many organizations fall into. Many organizations inadvertently increase their complexity by adding an SMS-style management tool for &lt;em&gt;not&lt;/em&gt; a lot of benefit. When I ask people âWhy did you end up deploying your SMS-style tool?â The #1 response I get is âWe needed a way to distribute software.â And 10% actually use the overall âpower featuresâ SMS provides over Group Policy.&lt;/p&gt;

&lt;p&gt;So, again, my feeling is that, yes, an SMS-style tool is greatâif it truly gives you something you cannot achieve a different way. Again, SMS provides software distribution, hardware and software inventory, patch management, image deployment, and software metering. If you need something on this list that Group Policy cannot do natively (or enhanced with third-party tools) then, yes, go get it.&lt;/p&gt;

&lt;p&gt;But, if you don&#039;t need itâwhy introduce it, even if youâre getting the licenses for free?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wrapup&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For the love of Pete (whoever he is) do NOT email me directly about this rant. While I strive to answer everyoneâs email, Iâm making an exception in this case. Itâs not because I donât love you, itâs because I want you to respond publicly &lt;a href=&quot;http://tinyurl.com/htaxw&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; where we can all talk about it. Key points to talk about:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If youâre using the BDDÃ¢â¬Â¦why? What does the BDD give you that other methods do not?&lt;/li&gt;
	&lt;li&gt;If youâre using SMS+OSDÃ¢â¬Â¦why? Howâs it working out for you?&lt;/li&gt;
	&lt;li&gt;How can you add drivers when Windows runs using the BDD or SMS+OSD?&lt;/li&gt;
	&lt;li&gt;If youâre using the âJeremy Methodâ of RIS + Group Policy + MSI, howâs that working out for you? Was getting to the MSI promised land a tough haul? Did you succeed, or give up?&lt;/li&gt;
	&lt;li&gt;Why save user state and restore it using the USMT during the BDD or SMS+OSD process? If youâre using the network properly (redirected MyDocs and Application Data), what precisely are you saving by using the USMT?&lt;/li&gt;
	&lt;li&gt;Has anyone introduced an SMS-like product only to then realize it was overkill and the same task could be performed via Group Policy? How did you handle that?&lt;/li&gt;
	&lt;li&gt;Or, is SMS your life blood and youâre using it for a task I didnât describe here?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Thanks for listening.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000 (THIRD EDITION&lt;/em&gt;)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Do you have the new THIRD EDITION of the Group Policy book? It&#039;s got 50 new pages, fully covers XP/SP2 and Windows Server 2003/SP1, an armload of new tidbits here and there, and whole new section on the Security Configuration Wizard.&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Additionally available is my new title Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment from &lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144470&quot;&gt;http://www.amazon.com/gp/product/0782144470&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Public Group Policy Intensive Training and Workshop Schedule Update&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I&#039;ve basically lost count at this point of how many people have signed up and taken the two-day Group Policy Intensive training and workshop. Students LOVE it, and managers LOVE the results the training gives.&lt;br /&gt;
&lt;strong&gt;You BOUGHT and IMPLEMENTED Active Directoryânow DO SOMETHING with it.&lt;/strong&gt;&lt;br /&gt;
So, learn to properly drive that &quot;Ferrari&quot; you bought by coming to a class! Classes for first half of 2006 (lots of date changes since the last newsletter. Sorry about that.):&lt;br /&gt;
Mar 30-31, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Sacramento, CA&lt;/a&gt;âThis class is ON. If you want a seat, I suggest you sign up now. Only three seats left!&lt;br /&gt;
Apl 18-19: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Atlanta, GA&lt;/a&gt;&lt;br /&gt;
Apr 20-21, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Tulsa, OK&lt;/a&gt; (not Okla. City, as previously reported.)&lt;br /&gt;
Apr 26-27, 2006 (new class): &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;Richmond, VA&lt;/a&gt;&lt;br /&gt;
May 15-16, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot; target=&quot;_blank&quot;&gt;London, England&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Why THESE cities? Because people used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and ASKED me to have classes here.&lt;/p&gt;

&lt;p&gt;Here&#039;s hoping you&#039;ll take advantage of the opportunity!&lt;/p&gt;

&lt;p&gt;Learn more and sign up at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop&lt;/a&gt; (Don&#039;t forget to scroll all the way to the bottom of that page and locate your city!)&lt;/p&gt;

&lt;p&gt;Or,if you think you might want your own in-house training (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japanâor wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services, and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;.&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Upcoming Appearances and schedule&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;It&#039;s going to be a busy month for me. Embrace the travel! Love the airport. Embrace the security dweebs patting me down. Well, maybe not.&lt;/p&gt;

&lt;p&gt;Here&#039;s my ever-so-brief schedule.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NetPro Directory Experts Conference: Mar 26 - Mar 29&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;ll be speaking on Windows/Linux authentication integration. My speech is 9.15 Tuesday the 28th. &lt;a href=&quot;http://www.dec2006.com/agenda_tues.cfm&quot; target=&quot;_blank&quot;&gt;www.dec2006.com/agenda_tues.cfm&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Linuxworld Boston: Apl 3 - Apl 6&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Again, on Windows/Linux authentication integration. My specific speech date is 4/4/06 and it&#039;ll be at 2.30 PM. Hope to see you there !&lt;a href=&quot;http://tinyurl.com/7dspg&quot; target=&quot;_blank&quot;&gt;tinyurl.com/7dspg&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WinConnections Orlando: Apl 9 - Apl 12&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;ll be speaking on a variety of topics at this WinConnections. &quot;Group Policy Toolbelt&quot;, Shared Computer Toolkit&quot; &amp; &quot;WindowsâLinux Integration: Authentication Services&quot; and a 3-hour Group Policy Pre-Conference warm-up. &lt;a href=&quot;http://www.winconnections.com/&quot; target=&quot;_blank&quot;&gt;www.winconnections.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Microsoft Teched Boston: Jun 11 -1 5&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Again, on Windows/Linux authentication integration. Don&#039;t know my exact speech date yet. &lt;a href=&quot;http://tinyurl.com/7lktw&quot; target=&quot;_blank&quot;&gt;tinyurl.com/7lktw&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thanks, Netpro!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Recently Netpro had a cool webinar, and they mentioned usâGPanswers.com. Neat! Thought Iâd return the favor. Hereâs how to check out the webinar with a good message for anyone managing Active Directory. WEBCAST: &lt;a href=&quot;http://tinyurl.com/mlw7u&quot; target=&quot;_blank&quot;&gt;16 Steps to a healthier and happier Active Directory&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before going about securing Active Directory, you should make sure that certain configurations have not created unexpected security holes. In this webcast, NetPro CTO Gil Kirkpatrick will examine various aspects of Active Directory, from backup to DNS configuration to Group Policy management, that, when executed properly, can ensure a secure installation. &lt;a href=&quot;http://tinyurl.com/mlw7u&quot; target=&quot;_blank&quot;&gt;Register here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please &lt;strong&gt;FORWARD THE ENTIRE&lt;/strong&gt; email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk. If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you have questions about ordering a book, contact my assistant Jon at: &lt;a href=&quot;mailto:jons@moskowitz-inc.com?subject=Question&quot;&gt;jons@moskowitz-inc.com&lt;/a&gt; We endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#14 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue14</link>
        <pubDate>2006-01-17T23:32:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ Welcome to 2006


	Technology Takeaway (r), a service of Moskowitz, inc.
	
		Just one LOONG tip: Creating a Bulletproof desktop with the Shared Computer Toolkit.
	
	
	Get a signed copy of...
	
		my GP book: Group Policy, Profiles and IntelliMirror
		my Windows &amp;amp; Linux Integration book
	
	
	Free, Free, Free speeches by Jeremy
	By popular demand: The three-day less-intensive GP Course in PA
	Upcoming Public two-day GP Classes for 2005 / 2006
	What&amp;#39;s new from GPanswers.com ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;strong&gt;Welcome to 2006&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Technology Takeaway (r), a service of Moskowitz, inc.
	&lt;ul&gt;
		&lt;li&gt;Just one LOONG tip: Creating a Bulletproof desktop with the Shared Computer Toolkit.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of...
	&lt;ul&gt;
		&lt;li&gt;my GP book: Group Policy, Profiles and IntelliMirror&lt;/li&gt;
		&lt;li&gt;my Windows &amp; Linux Integration book&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Free, Free, Free speeches by Jeremy&lt;/li&gt;
	&lt;li&gt;By popular demand: The three-day less-intensive GP Course in PA&lt;/li&gt;
	&lt;li&gt;Upcoming Public two-day GP Classes for 2005 / 2006&lt;/li&gt;
	&lt;li&gt;What&#039;s new from GPanswers.com&lt;/li&gt;
	&lt;li&gt;What&#039;s new from Microsoft&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;&lt;a href=&quot;http://www.moskowitz-inc.com/&quot;&gt;Moskowitz, inc.&lt;/a&gt; and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt;&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;This issue, we tackle something that&#039;s near and dear to me: Desktop Lockdown. It certainly feels as if all the Group Policy settings available to us would allow us full control over our desktops. But, there&#039;s something missing. In this issue, we&#039;ll explore the Shared Computer Toolkit which makes your Ultimate Desktop Smackdown vision possible.&lt;/p&gt;

&lt;p&gt;After we talk about this, I&#039;ll give you an update on my 2006 Group Policy Class Schedule and show you some cool new features we&#039;ve added to GPanswers.com.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;Newsletter Sponsored by: DesktopStandard&lt;/p&gt;

&lt;p&gt;Built-in Windows security management features simply don&#039;t give you enough granular access. As a result, administrators run applications with full administrative access - even if it is not required. This exposes the network to unnecessary security risks like viruses and spyware.&lt;/p&gt;

&lt;p&gt;DesktopStandard&#039;s PolicyMaker line of Group Policy Extensions solves this problem with &lt;a href=&quot;http://www.desktopstandard.com/PolicyMakerApplicationSecurity.aspx&quot;&gt;Application Security policy&lt;/a&gt;. Click the link to learn how you can empower your users to be more secure today.&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Technology&lt;/strong&gt;&lt;strong&gt; Takeaway®, a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Bulletproofing your shared desktop -- with the shared computer toolkit&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;One of the top requests I get at GPanswers.com is how to take machines and âlock them down.â People want ways to ensure their machines canât be broken by Joe User or Harry Badguy. The âout of the boxâ Group Policy settings can go a long way towards solving this common conundrum. But the settings in the box can only take you so far.&lt;/p&gt;

&lt;p&gt;The situations involving computer lockdown can get complexâfast. You might not even know the people who are walking up to the machine, but you still have to give them some portion of your network resources like Internet browsing, file viewing, or printing.&lt;/p&gt;

&lt;p&gt;You would typically find computers like these in places like universities, airports, hotels, community centers, museums, kiosk stands, and conference centers . So, these arenât the kinds of machines that your typical business users utilize day to day; these are the kinds of machines where people need sporadic access, and they are people that you may or may not trust. And by ânot trustâ I mean theyâre potentially downloading infectious junk off the Internet. They may be inadvertently adding spywareâor worse, theyâre really out to get you and are going out of their way to try to damage your public-access PC.&lt;/p&gt;

&lt;p&gt;What you need is a way to restrict anything from being written to the Windows partition. You need a way to trap the bad stuff, but keep the good stuffâlike critical Windows updates and antivirus updates. You need a way to lock down Windows so itâs much harder to get to the under-the-hood Windows stuff, like the C:Windows directory. And you need a way for new users to get a guaranteed profile, so youâre dictating their experience, not fighting to clean up after them. However, if youâre dreaming a little bit, you might also want to manage exceptions. That is, you might want to have a known or trusted user use this shared PC for some specific task, and to make sure that their data and settings stick around.&lt;/p&gt;

&lt;p&gt;What you need is the Shared Computer Toolkit, or SCT. While the SCT can be many things to many people, itâs not specifically meant to be loaded on every desktop to restrict the actions of day-to-day employees (though Iâm sure some enterprising geeks will attempt to roll it out corporation-wide). Itâs also not really meant as a âparental controlâ device either, though there might be some attributes of the SCT which might be useful there.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Requirements&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To use the SCT, you need a Windows XP/SP2 machine with at least 1GB of unallocated space (though having 10% of the hard drive unallocated is recommended.) This unallocated space will be converted into a special âprotection partitionâ by the SCT Additionally, you might want a second âDataâ partition to store persistent data from trusted users to whom you specifically grant access. For instance, if someone uses this machine for their daily work, you might want them to be able to save Word documents on this additional partition.&lt;/p&gt;

&lt;p&gt;One of the tricks is getting a machine which already runs Windows XP/SP2 and carving out some unallocated space. Typically, when Windows is installed the entirety of the hard drive is used, therefore there is no unallocated space. However, any repartitioning tool will make it possible, such as Symantec Partition Magic, Terrabyte BootIt Next Generation, or Acronis Partition Manager (part of the Acronis Disk Director Suite). The Microsoft documentation for the SCT specifically mentions the first two, but I already own the Acronis product and used that one with no problems.&lt;/p&gt;

&lt;p&gt;There are two main ways to use the SCT: when machines are not joined to the domain, or when machines are joined to the domain. Weâll examine both scenarios here.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Getting Started with the SCT&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;After youâve re-partitioned the machine, youâll take the following steps to use the SCT:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Install all the applications that you want to make available on the shared computer.&lt;/li&gt;
	&lt;li&gt;Remove Windows components that you donât want people to use (or would be potentially dangerous for people to use) like IIS, or Outlook Express.&lt;/li&gt;
	&lt;li&gt;Install the SCT after installing the required User Profile Hive Cleanup Service (UPHClean).&lt;/li&gt;
	&lt;li&gt;Configure the SCT.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Once SCT has been configured, its goal is to keep your computer as clean as the day you installed it. Therefore, be careful that youâre not actually loading âjunkâ on your shared computer as youâre preparing it for use.&lt;/p&gt;

&lt;p&gt;At the heart of the SCT is the Windows Disk Protection service, or WDP. The goal of WDP is to âtrapâ writes to the Windows system volume, and temporarily store them on the Protection Partition so the bad guys canât actually do any permanent damage to the real Windows partition. Once the session is over, so is any accompanying potential damage.&lt;/p&gt;

&lt;p&gt;However, the SCTs cannot prevent certain attacks from being attempted. Even though the SCT will help you lock out Windows functions like Explorer, that doesnât mean an application youâve installed and made available for use doesnât have Explorer-like capabilities. For instance, many applications allow you to browse the contents of the hard drive when youâre in their File | Open dialog boxes. Again, the SCT will ultimately prevent the disruption of Windows because of the WDPâthat is, the WDP ultimately discards any writes to the system volume. However, it is incapable of preventing this kind of âpoking aroundâ attack if your application lets them poke around.&lt;/p&gt;

&lt;p&gt;To download the SCT, go to Microsoftâs website &lt;a href=&quot;http://www.microsoft.com/windowsxp/sharedaccess/default.mspx&quot;&gt;here&lt;/a&gt;. What I like most about the website is the opening graphic where three kids are ostensibly âlearningâ on the machine. However, what we really know is that theyâre right-clicking over your favorite disk partition and selecting âFormat.â With the SCT, youâll be protected from rascals of all age groups.&lt;/p&gt;

&lt;p&gt;The SCT installation is Wizard-driven, and is a snap to use. However, it requires an additional package, called the User Profile Hive Cleanup Service, or UPHClean. UPHClean is popular with Terminal Services administrators whose users have difficulties logging off Terminal Services and having their User Profiles setting saved. Itâs interesting to note that UPHClean is now a required component for this SCT. It would have been nice if the SCT installation didnât make you download it separately, but (since you need it anyway) simply made it part of the SCT installation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuring the SCT in 8 Easy Steps&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once SCT has been installed, configuring it is made easier with a Getting Started page (seen in Figure 1), which steps you though the configuration process.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n14-01.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;em&gt;Figure 1: The SCT Getting Started page is a like a guided setup (click on figure to enlarge)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;After the Getting Started guide appears, itâs easy to walk step-by-step through the process. The second step, as seen in Figure 2, is mostly configuring security-related Group Policy settings which are being set within the local GPO. In most cases, youâll want to make sure all boxes are checkmarked.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n14-02.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 2: Step 2 mostly deals with security-related Group Policy settings (click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;Step 3 simply has you create a new local user and give it a name of your choosing, such as Public.&lt;/p&gt;

&lt;p&gt;Step 4 has you actually configure the user account the way you want: configure the desktop wallpaper, accept first-time run settings and license agreements (for programs such as Windows Media Player, Microsoft Office, and Acrobat Reader), add printers, etc. Whichever way you configure this profile is how all public users on this machine will see it.&lt;/p&gt;

&lt;p&gt;Step 5 has you select the Public profile and locking down some additional settings, as seen in Figure 3. There are too many options to delve into right here. Thankfully, the recommended settings are all located in one place and can be selected with one Checkboxwhich highlights all of them. Defaults here include the restriction on running applications from USB thumb drives, restricting the running of system tools (such as regedit.exe), and preventing users from right-clicking within Internet Explorer.&lt;/p&gt;

&lt;p&gt;Optional Restrictions, such as âRemove CD and DVD burning featuresâ and âPrevent printing from Internet Explorerâ are welcome additions.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n14-03.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;em&gt;Figure 3: Itâs easy to administer perform the kinds of restrictions you want to apply to all users (click on figure to enlarge)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Step 6 has you actually testing the Public profile before you go into lockdown mode. This enables you to see what the user will see, but still makes it easy for you to go back and make changes in the SCT Getting Started steps.&lt;/p&gt;

&lt;p&gt;Step 7 contains the secret sauceâthe Windows Disk Protection service, which requires a reboot before it can be configured. Here, you can specify whether or not to retain changes made by public users, and how critical updates are handled, as you can see in Figure 4.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n14-04.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;em&gt;Figure 4: Once Windows Disk Protection is turned on, you can Clear, Save, or Retain changes as you see fit, as well as schedule Critical Updates, and set other options. (click on figure to enlarge)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The WDP features a very, very strong protection mechanism with four choices:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;âClear changes with each restartâ: Once this function is turned on, the system is officially protected. All historically âsensitiveâ parts of the system, such as the registry, services, even critical boot files like boot.ini and NTLDR are protected from permanent harm.&lt;/li&gt;
	&lt;li&gt;âSave changes with next restartâ: Once the CST has been running for a while, you might realize you want to add another application to the system, or make another permanently desired change. To do this, you need to specifically select âSave changes with next restartâ and youâll have skirted around WDP this one time and integrated your changes. A quite note before this functionâs use: be sure to restart the computer before you load your new application, so as not to keep something bad or unknown. Then, once loaded, select âSave changes with next restart.â&lt;/li&gt;
	&lt;li&gt;âRetain changes for one restartâ: If youâre adding a new application, and that application requires a reboot to finish its installation, select this option. Then, once youâre convinced youâve loaded and configured the application correctly, pick the âSave changes with next restartâ option to permanently seal in your changes.&lt;/li&gt;
	&lt;li&gt;âRetain changes indefinitelyâ: If you want to load many applications and watch their interactions over time, you might select this option. Once youâre ready to accept your changes then select âSave changes with next restart.â If you want to back out of all changes, select âClear changes with each restart.â For example, this functionality is great for computer training centers where a new class comes in every week and you want students to have free rein over the computer. You can let them do what they want and they can restart the computer us much as they need to. At the end of the week, just clear the changes and the computer will be restored to its Monday morning state.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Another way to think about these settings is that once WDP is turned on, all changes are written to the Protection Partition (this was the previously unallocated space you carved out) until you choose âSave changes with next restartâ, and they are merged with the real partition.&lt;/p&gt;

&lt;p&gt;Itâs likely your other corporate computers are downloading critical Windows updates from Microsoft or from WSUS by themselves (see my &lt;a href=&quot;http://www.microsoft.com/technet/technetmag/issues/2005/11/HandsOn/default.aspx&quot;&gt;article&lt;/a&gt; in Technet Magazine about corporate WSUS settings.) However, computers using the SCT need a little TLC. That is, these computers need you to manually grab these updates. When itâs time to automatically install patches, the interactive user is logged off, and during the Critical Updates installation time, no users (other than administrators) can log on. It should be noted that when Critical Updates are downloaded, they are always written directly to the ârealâ Windows partition and not the Protection Partition. The process is quite elegant: An automatic reboot clears any potentially damaging changes users might have introduced, andthen the updates are written. This ensures that only the Critical Updates make it onto the disk.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Additional Ways to Configure the SCT&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;So far, the discussion has been for one standalone PCânot a domain environment. One PC is a good start, but not likely how corporations, schools, and the like will ultimately roll this out. The two additional scenarios to consider are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Domain-joined SCT machines, and&lt;/li&gt;
	&lt;li&gt;Mass deployment of the SCT (domain-joined or not)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If your target SCT machine or machines are domain-joined you can, of course, go through all the steps listed above to get the job done. But that means you have to visit each and every machine to do the job. Instead, the SCT team (thankfully) rounded up their hard work and made a Group Policy ADM file which just snaps right in to the Group Policy Editor. This file (SCTSettings.adm) is located in the C:Program FilesMicrosoft Shared Computer Toolkitbin directory. This enables you to make mass changes on multiple SCT-enabled machines, as seen in Figure 5. The ADM template is a little rough around the edges and could use a little cleaning up of the Explaintext entries to be as useful as possible, but itâs a really good start.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n14-05.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 5: You can mass-implement changes to SCT-enabled machines via Group Policy (click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;There are some additional technical obstacles to overcome with domain-joined machines. For instance, how do you run around to 1,000 SCT-enabled machines and reconfigure their disk-protection settings? Thankfully, thereâs a DiskProtect.wsf provided which you can use to script the behavior of your SCT-enabled machines. You also need to manually implement the suggested Software Restriction Policy settings which prevent System Tools and unwanted programs to run. This is all very well spelled out in Chapter 10 of the Shared Computer Toolkit Handbook, which is titled âThe Shared Computer Toolkit in Domain Environments.â&lt;/p&gt;

&lt;p&gt;The next hurdle is the mass deployment issue. That is, how do you get the SCT bits and pieces on the target machines in the first place? The suggested avenue here is to imbed the pre-installed SCT and corresponding bits inside your âGhost-styleâ or âRIPrepâ image build. Or, if you deploy âcleanâ machines, you could simply script the UHPClean and SCT installation using post-installation script commands. My first choice would be to use Group Policy Software Installation and simply assign both UHPClean and the SCT to your shared computers via Active Directory and Group Policy.&lt;/p&gt;

&lt;p&gt;Once you have the required bits on the machines, simply use the included Group Policy ADM and .VSB files to control the computers after theyâve been deployed.&lt;/p&gt;

&lt;p&gt;However, there are still two more hurdles to overcome. Every Windows machine must be expressly validated by Windows Genuine Advantage. This becomes a bit of a problem because each machine needs to be âtouchedâ, either by installing an IE Active X&lt;a href=&quot;http://go.microsoft.com/fwlink/?LinkId=51033&quot;&gt;control&lt;/a&gt;or running an HTA &lt;a href=&quot;http://www.microsoft.com/genuine/downloads/RunHTA.aspx&quot;&gt;application&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The last problem is, how do you remotely repartition a computerâs hard drive if you donât want to trot over to it? Remember, every SCT computer needs the required Protection Partition. If you have your own ideas of how to âmass validateâ computers via GTA or remotely repartition a computer, donât keep it a secret! Let me know and Iâll post a follow-up on GPanswers.com.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final Outcome&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once the computers have been deployed, your users log on with the username you set; in our examples it was âPublicâ. And if you were using a domain account, you could feel free to use that as well. Once theyâre logged on, it really is a restricted, bulletproof machine as seen in Figure 6.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n14-06.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
&lt;em&gt;Figure 6: The final outcome of an SCT-enabled machine with restrictions enforced (click on figure to enlarge)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This is a really great tool with lots of potential uses. The tool itself as well as the documentation is well thought out, and the additional control via Group Policy is just icing on the cake for a Group Policy control freak like me.&lt;/p&gt;

&lt;p&gt;Online support for the tool is available at Microsoftâs newsgroups, &lt;a href=&quot;news:///news.microsoft.com/microsoft.public.windows.sharedaccess&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Additionally, before running headlong into a real deployment using the SCT, I suggest you read the included Shared Computer Toolkit Handbook, which is well-laid-out PDF file.&lt;/p&gt;

&lt;p&gt;For a 1.0 release, this tool really gets the job done.&lt;/p&gt;

&lt;p&gt;SPECIAL THANKS to the Shared Computer Toolkit team at Microsoft for reviewing this article for technical accuracy. This article will appear in the July issue of Microsoft&#039;s TechNet Magazine. Consider subscribing. &lt;a href=&quot;http://www.microsoft.com/technet/technetmag/&quot;&gt;Click here&lt;/a&gt; to check out the magazine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000 (THIRD EDITION&lt;/em&gt;)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Do you have the new THIRD EDITION of the Group Policy book? It&#039;s got 50 new pages, fully covers XP/SP2 and Windows Server 2003/SP1, an armload of new tidbits here and there, and whole new section on the Security Configuration Wizard.&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Additionally available is my new title Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment from &lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144470&quot;&gt;http://www.amazon.com/gp/product/0782144470&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free, Free, Free!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Well, the price is right, even if it stinks. But it won&#039;t stink -- I promise you&#039;ll learn something, or DOUBLE your money back!&lt;/p&gt;

&lt;p&gt;Windows &amp; Linux: Perfect Together (Online Roundtable)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Jan 26, 2006 from 2.00 to 3.00 PM EST (11.00 to 12.00 PST)&lt;/strong&gt; &lt;strong&gt;&lt;strong&gt;This will be a live talk with me, my co-author of my Windows/Linux Integration book (Tom Boutell) and others! The topic: Windows &amp; Linux Integration -- so sign up and see you online! Bring your questions! &lt;a href=&quot;http://tinyurl.com/9ybr3&quot;&gt;Click here to register.&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;WSUS Architecture Crash course&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Feb 10, 2006 from 12.00 to 1.00 PM EST (9.00 to 10.00 PST)&lt;/strong&gt; &lt;strong&gt;&lt;strong&gt;Patches and updates can be a real headache to manage. Microsoft Windows Server Update Services (WSUS) is here to make your life easier. Have you implemented it yet? This is a &quot;Power Hour&quot; webcast with 30 minutes allotted to talk and demos and 30 minutes allotted to questions and answers. &lt;a href=&quot;http://tinyurl.com/dwm5b&quot;&gt;Click here to register.&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;By popular demand: The &quot;Less Intensive&quot; Group Policy course is available as a trial in Pennsylvania &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Last month I &lt;/strong&gt;debuted my new three-day &lt;strong&gt;&quot;Less Intensive&quot; format. I explained how this course was only available for PRIVATE courses.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Well, as an experiment, I&#039;m making it available as a PUBLIC course in Newtown, PA in February 7, 8 and 9. &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This course starts with a half day warm-up of Active Directory, managing users and delegating permissions. Then, we move on to the Group Policy goodies. This way, those with less Group Policy and day-to-day administration can get a bit of fundamentals before diving in to the Group Policy waters. &lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Public Group Policy Intensive Training and Workshop Schedule Update&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I&#039;ve basically lost count at this point to how many people have signed up and taken the two-day Group Policy Intensive training and workshop. Students LOVE it, and managers LOVE the results the training gives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;You BOUGHT and IMPLEMENTED Active Directory -- now DO SOMETHING with it&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;So, learn to properly drive that &quot;Ferrari&quot; you bought by coming to a class!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Classes for first half of 2006&lt;/strong&gt; (lots of date changes since the last newsletter. Sorry about that.):&lt;/p&gt;

&lt;p&gt;Feb 7, 8, 9: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Newtown, PA&lt;/a&gt; (Three day, &quot;less-intensive&quot; AD/GPO course). Newtown, PA is near Trenton, Philly, and other major metro areas.&lt;br /&gt;
Feb 21 - 22, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;San Antonio&lt;/a&gt; &lt;em&gt;(We almost have enough interested people. If you&#039;re interested, or ready to sign up, don&#039;t be a stranger! You might be that one person we need to make this class A GO.)&lt;/em&gt;&lt;br /&gt;
Feb 27 - 28, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Portland, OR&lt;/a&gt;&lt;br /&gt;
Mar 2 - 3, 2006 : &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Atlanta, GA&lt;/a&gt;&lt;br /&gt;
Mar 15 - 16, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Washington, DC&lt;/a&gt;&lt;br /&gt;
Mar 30 - 31: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Sacramento, CA&lt;/a&gt;&lt;br /&gt;
Apr 20 - 21, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Tulsa, OK&lt;/a&gt; (not Okla. City, as previously reported.)&lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt; &lt;/a&gt;&lt;br /&gt;
May 15 - 16, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;London, England&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Why THESE cities? Because people used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and ASKED me to have classes here.&lt;/p&gt;

&lt;p&gt;Here&#039;s hoping you&#039;ll take advantage of the opportunity!&lt;/p&gt;

&lt;p&gt;Learn more and sign up at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop&lt;/a&gt;&lt;br /&gt;
(Don&#039;t forget to scroll all the way to the bottom of that page and locate your city!)&lt;/p&gt;

&lt;p&gt;Or ... if you think you might want your own in-house training of the course (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Other Changes around GPanswers.com&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the last issue, I explained about our &quot;mini-web overhaul.&quot; I&#039;m trying to keep the new features coming so you can have the best Moskowitz,inc. / GPanswers.com / WinLinAnswers.com experience. New since last time:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;The FAQ/Tips and Tricks area has even BETTER categories, which makes things easier to search&lt;/li&gt;
	&lt;li&gt;Did you know the GPanswers and WinLinAnswers community forums are RSS enabled?
	&lt;ul&gt;
		&lt;li&gt;The RSS feed for the GPanswers.com/community room is: https://www.gpanswers.com/community/rss.php&lt;/li&gt;
		&lt;li&gt;The RSS feed for the WinLinanswers.com/community room is: http://www.winlinanswers.com/community/rss.php&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;If you&#039;re not a big fan of RSS, you can get new posts on any given forum MAILED to you. I&#039;ve been waiting FOREVER for this feature. You need to enable it for any and every forum you want to &quot;watch&quot;. When any new post appears in the forum -- you get a little email summary. This is great for the Announcements forum, or any specific technical forum to make sure you don&#039;t miss a great question, or a great answer. Click on the graphic below to see where this feature is found.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/newsletter14-announce.jpg&quot; style=&quot;width:451px&quot; /&gt; &lt;em&gt;(Click picture to enlarge)&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We&#039;re working on a global GPanswers.com search -- which should also be able to buzz through PDFs and all questions in the forums. Not there yet with this one, but stay tuned.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;What&#039;s new from Microsoft?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Lots, actually! Microsoft has three new documents to help better understand GP. Well, the first one isn&#039;t really a &quot;document&quot; but rather a(nother) FAQ for GPOs. Yes, we have one here at GPanswers.com, but I guess it&#039;s okay that the boys in Redmond have their own too, right? :-)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Additionally, they released to documents to help understand how Vista and Longhorn will change with Group Policy.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;So, how do you find all these new resources? You could Google for hours and not find it! Of course, we have the links, right off our&lt;a href=&quot;https://www.gpanswers.com/component/content/200.html&quot;&gt;Microsoft Resources&lt;/a&gt; page. Just scroll to the bottom to check out the new docs. &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please &lt;strong&gt;FORWARD THE ENTIRE&lt;/strong&gt; email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; If you have questions about ordering a book, contact my assistant Jon at: &lt;a href=&quot;mailto:jons@moskowitz-inc.com?subject=Question&quot;&gt;jons@moskowitz-inc.com&lt;/a&gt; We endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#13 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue13</link>
        <pubDate>2005-11-25T23:33:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ 


	It&amp;#39;s Issue 13 ... Do you feel lucky?
	Technology Takeaway (r), a service of Moskowitz, inc.
	
		Tips and tricks
		
			Just one tip: Delegated permissions, the perils therein and how to pull back the reigns
		
		
	
	
	Get a signed copy of...
	
		my GP book: Group Policy, Profiles and IntelliMirror
	

	
		my Windows &amp;amp; Linux Integration book
	
	
	Something new... Two Training Options: Intensive Two day and &amp;quot;Less Intensive Three Day&amp;quot;
	
		Upcoming Public  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;&lt;a href=&quot;https://www.gpanswers.com/newsletter/132-issue-13.html?task=edit&amp;ret=aHR0cDovL2dwYW5zd2Vycy5jb20vbmV3c2xldHRlci80Ni1uZXdzbGV0dGVyLzEzMi1pc3N1ZS0xMy5odG1s&quot;&gt;&lt;img alt=&quot;edit&quot; src=&quot;https://www.gpanswers.com/images/M_images/edit.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 13 ... Do you feel lucky?&lt;/li&gt;
	&lt;li&gt;Technology Takeaway (r), a service of Moskowitz, inc.
	&lt;ul&gt;
		&lt;li&gt;Tips and tricks
		&lt;ul&gt;
			&lt;li&gt;Just one tip: Delegated permissions, the perils therein and how to pull back the reigns&lt;/li&gt;
		&lt;/ul&gt;
		&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of...
	&lt;ul&gt;
		&lt;li&gt;my GP book: Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;/ul&gt;

	&lt;ul&gt;
		&lt;li&gt;my Windows &amp; Linux Integration book&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Something new... Two Training Options: Intensive Two day and &quot;Less Intensive Three Day&quot;
	&lt;ul&gt;
		&lt;li&gt;Upcoming Public GP Classes for 2005 / 2006&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;What&#039;s new around GPanswers.com&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;&lt;a href=&quot;http://www.moskowitz-inc.com/&quot;&gt;Moskowitz, inc.&lt;/a&gt; and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; -- Issue 13&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;It wasn&#039;t long since the last newsletter, but... when I get busy working on something that affects a lot of people, I want to make sure you get it ASAP!&lt;/p&gt;

&lt;p&gt;I think you&#039;re really going to like this newsletter. It&#039;s HUGE and has *TONS* of graphics for this massive how-to. Don&#039;t be scared away by the &quot;unlucky&quot; number 13. Okay, so the big problem we tackle this month is large. The lucky part is that you found this newsletter, and will be well prepared to correct for it!!&lt;/p&gt;

&lt;p&gt;After we talk about this, I&#039;ll give you an update on my 2006 Group Policy Class Schedule and talk about some other stuff.&lt;/p&gt;

&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Technology&lt;/strong&gt;&lt;strong&gt; Takeaway, a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Delegation... the perils therein, and how to pull back the reigns&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;One of the key things for your organization to get right is the proper balance of power. Specifically, you need to decide just who creates GPOs and who can link them to areas in Active Directory.&lt;/p&gt;

&lt;p&gt;Sometimes, it&#039;s just the people in the Domain Admins group. That&#039;s fine, if that works for your organization. But if you&#039;re the only Domain Administrator, or, if there&#039;s only a handful of you, then managing Group Policy for hundreds or thousands of users could be a troubling, cumbersome task which you&#039;re always doing again and again. When there&#039;s something to be tweaked - you&#039;re the one who&#039;s called - every time.&lt;/p&gt;

&lt;p&gt;Again, if you like it that way - that&#039;s great. I&#039;m not proposing to take that away from you. However, if you want some helpers with your GPO comings and goings, then enter the magical world of Group Policy delegation.&lt;/p&gt;

&lt;p&gt;The idea is simple: give someone else the rights to create GPOs in the domain, and you won&#039;t have to do it. Before you run away and say &quot;My people can&#039;t handle this task!!&quot; let&#039;s actually analyze this for a second.&lt;/p&gt;

&lt;p&gt;First, you need to ask yourself, &quot;Who knows my users best?&quot; Sometimes, that is the Domain Administrator. Sometimes, however, it&#039;s the OU administrator, or even, perhaps someone else. We&#039;ll call these people (whomever they are) &quot;helper-administrators.&quot; For our definition, &quot;helper-administrators&quot; don&#039;t have Domain Administrator rights - they&#039;re just average Janes and Joes with some ability you&#039;ve delegated them.&lt;/p&gt;

&lt;p&gt;When it comes to Group Policy implementation, one often-successful strategy is to get the power in the hands of the helper-administrators that are closest to the users. So, even though by default, the only people who can create GPOs are Domain Administrators, you might want to re-consider and delegate the permissions such that other administrators (usually OU administrators with non Domain Administrator powers) can also create GPOs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Delegation 101&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In this picture, you can see the basic procedure which permits people the ability to create new GPOs. First, click on the Group Policy Objects node. Then, click on the Delegation tab. Finally, click on Add (at the bottom of the page) and add in the user you want to delegate the ability to create GPOs.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-01.png&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 1: Delegation to create new GPOs occurs at the Group Policy Objects node in the delegation tab (Click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;In this example, we&#039;ll anoint a helper-administrator, Nurse1 to create GPOs. Now, just because this helper-administrator can create GPOs doesn&#039;t mean they can actually do anything useful, like linking them somewhere. In other words, the simple fact that a GPO is &lt;em&gt;created&lt;/em&gt;doesn&#039;t inherently mean it&#039;s doing anything or affecting anyone. For that, there&#039;s another delegation tab, which you&#039;ll find at the level in Active Directory you want to delegate (for instance, domain or OU).&lt;/p&gt;

&lt;p&gt;In this example, you can see the delegation tab at the Nurses OU.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-02.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 2: The Delegation tab at the OU level determines who can link GPOs to this OU (Click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;Now that the user Nurse1 can create GPOs, and link them to the Nurses OU, you&#039;ve empowered this helper-administrator. The idea, again, is that this helper-administrator knows the user population very well, and has the proper knowledge of creating GPOs which (hopefully) won&#039;t &quot;break stuff&quot; (to use a technical term.)&lt;/p&gt;

&lt;p&gt;However, there are some pitfalls in allowing a helper-administrator to do this. One fear that Domain Administrators (rightly) have is that these delegated helper-administrators can do bad, bad things. This is always a possibility, but then again, you wouldn&#039;t delegate someone to drive your Ferrari unless they took a lesson or two, right? (Subtle hint to get your Domain Administrators and OU admins into my highly acclaimed two-day Group Policy Intensive Training and Workshop class, but I digress).&lt;/p&gt;

&lt;p&gt;It&#039;s very similar here; and as Domain Administrators, sometimes we have issues letting go. :) Let&#039;s put aside that specific fear of a helper-administrator messing something up inside a GPO and affecting users, but rather move on to a different sort of problem. The problem of that helper-administrator trying (or inadvertently) &quot;hiding&quot; access of the GPO from the Domain Administrator.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;When Good Admins go Bad&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Specifically, the person who creates the GPOs also owns the GPO as you can see in this picture.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-03.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 3: Someone who is delegated the right to create a GPO also owns the GPO (Click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;Because the helper-administrator user owns the GPO, they can basically do whatever they want to the GPO. The idea here is that you&#039;re granting someone you trust the ability to create GPOs and use them wisely. Hopefully, these helper-administrators will use the power wisely; but, sometimes, administrators are rogues (as Microsoft calls them) or jerks (as I call them).&lt;/p&gt;

&lt;p&gt;Rogue-like (or Jerk-like) behavior could include changing the permissions on the GPO so even the Domain Administrator can&#039;t see the GPO. In this example, the helper-administrator has set the permissions on the GPO that she has access to as follows:&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-04.jpg&quot; style=&quot;height:489px; width:392px&quot; /&gt;&lt;br /&gt;
Figure 4: The helper-administrator has removed permissions from the Domain Administrator with an explicit Deny on all attributes&lt;/p&gt;

&lt;p&gt;In other words, the Domain Administrator is Deny-ied access from even &lt;em&gt;seeing&lt;/em&gt; the GPO. Now, when the Domain Administrator looks at the Group Policy Objects node in GPMC, the GPO is simply &lt;strong&gt;not listed &lt;/strong&gt;because it is being hiddenby the explicit Deny properties the Nurse put on the GPO.&lt;/p&gt;

&lt;p&gt;Note, however, that when Nurse1 linked the GPO to a location in Active Directory the GPO&#039;s properties are still viewable though Inaccessible as seen below.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-05.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 5: The GPO is now missing from the Group Policy Objects node in the GPMC. However, you can see an Inaccessible marker where it&#039;s been linked. (Click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;Depending on your perspective, this could be a problem.&lt;/p&gt;

&lt;p&gt;On the one hand, the GPO is, in fact, working as advertised and nothing is technically wrong here. The Nurses will get the GPO applied to them and everything will continue functioning normally. The only problem is an unruly helper-administrator who is hiding his or her actions from the Domain Administrator. At this point, you can choose to do two things: nothing, or perform a Take Ownership upon the GPO and put the power back in to your hands.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reclaiming the Fort: Taking Ownership&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Let&#039;s examine what it takes to Take Ownership of a GPO as a Domain Administrator and restore the GPO back to health. First, the Group Policy Objects node in the GPMC is a representation of the two halves of a GPO: the GPC (the part that lives in Active Directory) and the GPT (the part that lives in the SYSVOL). In order to perform this, we need to take ownership of both halves.&lt;/p&gt;

&lt;p&gt;Let&#039;s first examine how to take ownership of the GPC part, because this is the part that controls visibility of the GPO in GPMC.&lt;/p&gt;

&lt;p&gt;To do this, we need to go back to the old-school way we used to manage GPOs: Active Directory Users and Computers. To get started, you need to view Advanced Features as seen here in Active Directory Users and Computers.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-06.jpg&quot; style=&quot;height:285px; width:369px&quot; /&gt;&lt;br /&gt;
Figure 6: To dive in and see the GPC, we need to enable Advanced Features in Active Directory Users and Computers.&lt;/p&gt;

&lt;p&gt;Once Advanced Features is enabled,you can dive down into the GPC part of the Group Policy. You do this by diving into System | Policies and looking for the GUID of the GPO object that currently has the problem. What&#039;s interesting in this view is that you cannot see the GUID of the GPO in the left pane, but only in the right pane listed as Unknown.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-07.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 7: Inaccessible objects show up in the right pane as Unknown. (Click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;When you go to the properties of this object and click the Security tab, you&#039;ll see the error message in Figure 8 below.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-08.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 8: The ACL editor forbids you, the Domain Administrator, from seeing the permissions because you are expressly Denied. (Click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;From this point, you might be tempted to give the Domain Administrator, say, Full Control rights. But, if you try it, it won&#039;t work. What you really need to do first is to take ownership of the object.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-09.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 9: You need to select the Administrators group as the new owner and select Apply. (Click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;Unfortunately, once you&#039;ve taken ownership of the object, you cannot immediately give the proper permissions back to the object. You need to close the ACL editor, and then right-click on the GPC portion again and select Properties | Security. Only now can you actually change the permissions.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-10.jpg&quot; style=&quot;height:450px; width:405px&quot; /&gt;&lt;br /&gt;
Figure 10: To fix the GPC portion, click Full Control | Allow for the Domain Admins group&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Taking Ownership of the GPT&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Once you&#039;ve granted Domain Admins Full Control over the GPC again, you&#039;re about halfway finished. Again, all you&#039;ve fixed is the GPC. Now, it&#039;s time to dive into the GPT and perform the same Take Ownership tasks.&lt;/p&gt;

&lt;p&gt;The GPT part of a GPO lives on every Domain Controller, typically in the windows system sysvol sysvol {domain-name} policies directory. (Yes, that&#039;s two sysvol directories.) Then, inside this directory are directories for each GPO&#039;s GPT. In my example here, my GPT has a GUID starting with 0f8D1AD2 (as seen in Figures 7, 8, and 10 among others). So, we need to locate that directory, and take ownership of it in the same way we did with the GPC. You can see this in Figure 11.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-11.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 11: Take ownership of the file-based GPT the same way you did with the Active Directory based GPC (Click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;Once performed, you&#039;ll have to (again) exit the ACL editor and re-enter it. Then, ensure that Administrators have Full Control similar to the way that you did with the GPC. Though in this case, note that the default permissions should automatically set Administrators (not Domain Admins) to Full Control.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Final Fixeroo&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you were now to go back to the GPMC and refresh the Group Policy Objects node, you would now see the previously-hidden GPO. However, when you click on it, you might get a message similar to what is seen in Figure 12.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-12.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 12: The GPMC recognizes that permissions are amiss between the GPC and GPT. (Click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;This is exactly the gift we wanted! Clicking OK will copy the permissions from the GPC over to the GPT. However, the bad news is that you might not actually get this message! If you don&#039;t get this message, you have to manually kickstart permissions synchronization between the GPC and GPT.&lt;/p&gt;

&lt;p&gt;To do this, click on the Delegation tab of the GPO and click the Advanced button. When you do, you&#039;re able to edit the actual ACLs of the GPO, which should (simultaneously) affect both the GPC and GPT. Make a change (any change) and apply it even if it&#039;s something temporary. For instance, add a new user and grant that user Read access. Then apply that change. Then, remove that user. The point is to make any change. When you do this, you are writing the ACLs to both the GPC and GPT.&lt;/p&gt;

&lt;p&gt;Now they&#039;re in sync, and now you&#039;ve fixed the problem.&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/n13-13.jpg&quot; style=&quot;width:451px&quot; /&gt;&lt;br /&gt;
Figure 13: Make a change any change (and apply it). When you do, the GPC and GPT will be simultaneously adjusted to reflect the ACL change. (Click on figure to enlarge)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Moral of the Story&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Delegation is a very good thing if you trust the people to whom you&#039;re delegating. You can&#039;t cover every base, however, and some helper-admins are just going to be jerks. For that reason, this tutorial on how to restore permissions on hidden GPOs will help you know how to take back control.&lt;/p&gt;

&lt;p&gt;SPECIAL THANKS to Darren Mar-Elia, CTO for Infrastructure Management Solutions at Quest Software, and operator of GPOguy.com for helping work out this problem with me.&lt;/p&gt;

&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000 (THIRD EDITION&lt;/em&gt;)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Do you have the new THIRD EDITION of the Group Policy book? It&#039;s got 50 new pages, fully covers XP/SP2 and Windows Server 2003/SP1, an armload of new tidbits here and there, and whole new section on the Security Configuration Wizard.&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Additionally available is my new title Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment from&lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144470&quot;&gt;http://www.amazon.com/gp/product/0782144470&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Now available: Private GP Course in &quot;Less Intensive&quot; format&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Everyone knows the two-day Group Policy course is really three days of material packed in to two intensive days. However, some customers have asked for a &quot;Less Intensive&quot; format.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Your wish has been granted!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This course starts with a half day warm-up of Active Directory, managing users and delegating permissions. Then, we move on to the Group Policy goodies. This way, those with less Group Policy and day-to-day administration can get a bit of fundamentals before diving in to the Group Policy waters. &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This &quot;Three-day Less Intensive&quot; option is ONLY available as a private course. Note, the &quot;Two-day intensive&quot; option is available as either a private of public course.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Learn more about the Group Policy courses here.&lt;/a&gt; &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Public Group Policy Intensive Training and Workshop Schedule Update&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;ve basically lost count at this point to how many people have signed up and taken the two-day Group Policy Intensive training and workshop. Students LOVE it, and managers LOVE the results the training gives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;You BOUGHT and IMPLEMENTED Active Directory -- now DO SOMETHING with it&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;So, learn to properly drive that &quot;Ferrari&quot; you bought by coming to a class!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Classes remaining in 2005:&lt;/strong&gt;&lt;br /&gt;
Dec 13 - 14, 2005: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Minneapolis (Bloomington), MN&lt;/a&gt; &lt;em&gt;(We almost have enough interested people. If you&#039;re interested, or ready to sign up, don&#039;t be a stranger! You might be that one person we need to make this class A GO.&lt;/em&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Classes for first half of 2006&lt;/strong&gt;:&lt;br /&gt;
Jan 16 - 17, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Philly / Berwyn, PA&lt;/a&gt; (moved from Nov 2005) &lt;em&gt;(We almost have enough interested people. If you&#039;re interested, or ready to sign up, don&#039;t be a stranger! You might be that one person we need to make this class A GO.&lt;/em&gt;)&lt;br /&gt;
Jan 24 - 25, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Sacramento, Ca&lt;/a&gt;&lt;br /&gt;
Jan 26 - 27, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Portland, OR&lt;/a&gt;&lt;br /&gt;
Feb 21 - 22, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;San Antonio&lt;/a&gt; &lt;em&gt;(We almost have enough interested people. If you&#039;re interested, or ready to sign up, don&#039;t be a stranger! You might be that one person we need to make this class A GO.)&lt;/em&gt;&lt;br /&gt;
Mar 2 - 3, 2006 : &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Atlanta, GA&lt;/a&gt;&lt;br /&gt;
Mar 15 - 16, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Washington, DC&lt;/a&gt;&lt;br /&gt;
Apr 20 - 21, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Oklahoma City, OK&lt;/a&gt;&lt;br /&gt;
May 15 - 16, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;London, England&lt;/a&gt; Why THESE cities? Because people used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and ASKED me to have classes here.&lt;/p&gt;

&lt;p&gt;Here&#039;s hoping you&#039;ll take advantage of the opportunity! Learn more and sign up at: &lt;a href=&quot;https://www.gpanswers.com/live-class&quot;&gt;www.gpanswers.com/live-class&lt;/a&gt;&lt;br /&gt;
(Don&#039;t forget to scroll all the way to the bottom of that page and locate your city!)&lt;/p&gt;

&lt;p&gt;Or ... if you think you might want your own in-house training of the course (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/online-class&quot;&gt;www.gpanswers.com/online-class&lt;/a&gt;&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Other Changes around GPanswers.com&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;We&#039;ve had a mini-web overhaul lately. It might not look a whole lot different, but there&#039;s a lot of things, here and there that have been changed.&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;There is no more &quot;downloads&quot; section off the main page. The downloads that were there were moved to the FAQ/Tips and Tricks&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Speaking of the FAQ/Tips and Tricks area, the Tips and Tricks are now in categories, which makes things easier to search&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;The book downloads (and any updates) are now centrally located right off the main page. It&#039;s now called &quot;GP Book Resources&quot;&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;We came up with a way to be able to click on any graphic and have it pop-up to full page view. We&#039;re working on backfilling all Tips and Tricks, Solutions Guide, and other areas which have scaled-down graphics to enable pop-ups to full size.&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;We&#039;re working on a global GPanswers.com search -- which should also be able to buzz through PDFs and all questions in the forums. Not there yet with this one, but stay tuned. &lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please &lt;strong&gt;FORWARD THE ENTIRE&lt;/strong&gt; email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#12 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue12</link>
        <pubDate>2005-11-07T23:34:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	It&amp;#39;s Issue 12 ... Wow.. a new format!
	Group Policy Intensive Training and Workshop Schedule Update for 2006
	Technology Takeaway (r), a service of Moskowitz, inc.
	
		Juicy tips and tricks (Jumbo sized!)
		
			All about login scripts (Offline and Online)
			All about WSUS settings
		
		
	
	
	Upcoming Conferences, Appearances, and Classes
	
		Upcoming GP Classes for 2005 and 2006
	
	
	Additional Technical Tidbits
	
		All about VMware&amp;#39;s new gizmo an ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 12 ... Wow.. a new format!&lt;/li&gt;
	&lt;li&gt;Group Policy Intensive Training and Workshop Schedule Update for 2006&lt;/li&gt;
	&lt;li&gt;Technology Takeaway (r), a service of Moskowitz, inc.
	&lt;ul&gt;
		&lt;li&gt;Juicy tips and tricks (Jumbo sized!)
		&lt;ul&gt;
			&lt;li&gt;All about login scripts (Offline and Online)&lt;/li&gt;
			&lt;li&gt;All about WSUS settings&lt;/li&gt;
		&lt;/ul&gt;
		&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming Conferences, Appearances, and Classes
	&lt;ul&gt;
		&lt;li&gt;Upcoming GP Classes for 2005 and 2006&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Additional Technical Tidbits
	&lt;ul&gt;
		&lt;li&gt;All about VMware&#039;s new gizmo and Microsoft&#039;s whizbang licensing!&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Windows &amp; Linux Integration&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;Moskowitz, inc. and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; -- Issue 12&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;This is the first newsletter for a LOT of people I&#039;ve met in the last several months. I&#039;ve been to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;SMB Nation in Seattle&lt;/li&gt;
	&lt;li&gt;Two or three Microsoft TS/2 Roadshows&lt;/li&gt;
	&lt;li&gt;WinConnections&lt;/li&gt;
	&lt;li&gt;TechMentor&lt;/li&gt;
	&lt;li&gt;and more !&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, a big hearty WELCOME to all those people who signed up via giving me a business card at an event.&lt;/p&gt;

&lt;p&gt;As you can see, our newsletter format has changed a bit. It&#039;s now online as a full web page, instead of being a mail-delivered document. Of course, you got the notification via email -- and that&#039;s going to stay the same. The good news about putting things in a web page like this is simple: I can inject graphics and other HTML goodies without getting your spam filters all huffy at me.&lt;/p&gt;

&lt;p&gt;Let&#039;s get right to the goodies, then I&#039;ll give you an update on my 2006 Group Policy Class Schedule and talk about some other stuff.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Technology Takeaway (r)&lt;/strong&gt;&lt;strong&gt;, a service of Moskowitz, inc.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Here&#039;s what&#039;s on people&#039;s minds recently...&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Can logon scripts be set to run when a user re-docks their laptop? (or otherwise force user login script GPO processing via a command or script?)&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Scenario: A notebook user can log on to their computer with cached credentials (ie: not connected to the network.) When this happens, it appears that their logon script that maps their drives does not run. Upon returning to the office they dock their computer, but they still do not get their network drives.&lt;/p&gt;

&lt;p&gt;So... Can logon scripts be forced to run when the user returns to the office?&lt;/p&gt;

&lt;p&gt;The answer in this case is no. Logon GPOs are processed in the foreground, so since they are already logged on using cached credentials, they only get a background refresh, so the logon script settings in this GPO does not run.&lt;/p&gt;

&lt;p&gt;This question was submitted recently via email, and it&#039;s a good one (so good, we added to the FAQ at &lt;a href=&quot;https://www.gpanswers.com/faq&quot;&gt;www.gpanswers.com/faq&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Is there any advantage to running a login script from the network or from the local PC?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is something you should consider for laptop users. If you place a script on the local drive of the client and point the GPO to it, the script will run upon logon even if the laptop it is not connected to the network. BUT, it can only perform tasks that don&#039;t require the network, so things like mapping network drives won&#039;t work.&lt;/p&gt;

&lt;p&gt;Oftentimes, administrators choose to perform tasks like mapping network drives and other things which are simply impossible if the network is not available. However, again, technically, the script is trying to run - even if it cannot perform the command you want.&lt;/p&gt;

&lt;p&gt;If you have a script that performs some other action that does not depend on the network, login scripts should perform those actions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;How can I configure a workstation to download updates from my WSUS Server (or SUS I haven&#039;t upgraded) instead of Windows update?&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Windows XP / SP2 comes with the latest &quot;wuau.adm&quot; ADM template which contains the power you need to point your workstation anywhere you want it to retrieve its updates from. The settings are under Computer Configuration | Administrative Templates | Windows Components | Windows Update as seen here.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/wuau1.png&quot; style=&quot;height:258px; width:451px&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Here you find the following ten settings (a more detailed explanation of each can be found on the settings Explain tab).&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;em&gt;Configure Automatic Updates&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This setting must be enabled if you want to specify the settings the workstation needs to retrieve automatic updates using Group Policy. It is essentially the same as using the Control Panel applet to configure the download option, and the installation schedule.&lt;/p&gt;

&lt;p&gt;Note there are four potential settings... #2, #3, #4 and #5 as seen below.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/wuau2.png&quot; style=&quot;height:450px; width:405px&quot; /&gt;  &lt;/p&gt;

&lt;p&gt;When you set up an OU which contains regular workstations, you&#039;ll likely want to set this value to #4 -- which will auto download AND install the patches. This can often mean a reboot, so, be sure to educate your users to SAVE their files before going home for the say.&lt;/p&gt;

&lt;p&gt;For the least amount of disruption for your users, you&#039;ll want to set your installation to happen off hours, say 3.00 AM.&lt;/p&gt;

&lt;p&gt;When you set up an OU which contains SERVERS, you&#039;ll likely want to set this value to #3 -- which will auto download, but then notify an administrator who logs on locally to that server that patches have been downloaded. The idea here is that you wouldn&#039;t want a server just rebooting at 3.00 AM! You want to control that installation and reboot process a little more closely.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;em&gt;Specify intranet Microsoft update services location&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This setting allows you to point the workstation to the WSUS (or SUS) server in your organization (e.g http://wsus1.company.com). Note that both fields need to point to the same server. It is an invalid configuration to have different entries here.&lt;/p&gt;

&lt;p&gt; &lt;img alt=&quot;gp&quot; src=&quot;https://www.gpanswers.com/images/newsletter/wuau3.png&quot; style=&quot;height:448px; width:404px&quot; /&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;em&gt;Enable client-side targeting&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In WSUS, you can create groups for your workstations to belong to. Note that these &quot;groups&quot; aren&#039;t NT-style groups. I wish Microsoft had called these &quot;collections&quot; to make the distinction. And, what&#039;s more WSUS really doesn&#039;t hook in to Active Directory beyond this one setting.&lt;/p&gt;

&lt;p&gt;The idea is to have several collections, er, groups then approve specific updates differently as you see fit. For instance, you could have a pilot test group before you roll the update out to everyone. Or, you might manage Doctors differently than Nurses.&lt;/p&gt;

&lt;p&gt;The one trick here is that you must first pre-create the groups on the WSUS server. Then, once your client receives this setting you&#039;re delivering via Group Policy, they&#039;ll automatically find the group.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;em&gt;Reschedule Automatic Updates scheduled installations&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;What happens if the workstation is off when it&#039;s supposed to be installing your approved patches? In this case, the update will be installed at system startup. This setting allows you to tell the workstation how long to wait after system start before installing the update, and rebooting the workstation.&lt;/p&gt;

&lt;p&gt;Be careful not to have the computer wait too long after startup, as your users may start working away and all of the sudden their machine says is about to reboot. Chances are, your user will turn on their computer before they grab their morning coffee, so if you can set the delay to less then five minutes, chances are they wonât even notice!&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;em&gt;No auto-restart for scheduled Automatic Updates installations&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you have âReschedule Automatic Updates scheduled installationsâ setting enabled, you can also enable this setting if you do not want the computer to automatically reboot after the installation. The user will be notified that a reboot is required to complete the installation.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;em&gt;Automatic Updates detection frequency&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can tell the workstation how often it should check in with the Update Server by enabling this setting. The detection frequency is the hours specified, minus zero to 20 percent of the hours specified. The default setting 22 hours.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;em&gt;Allow Automatic Updates immediate installation&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If an update that is approved can be installed without interrupting Windows service and does not restart Windows, it will be installed immediately upon detection if this setting is enabled.&lt;/p&gt;

&lt;p&gt;Although an update like this has yet to have been seen, itâs a nice idea, to have the update apply as soon as possible.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;em&gt;Delay Restart for scheduled installations&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By default, Windows will wait five minutes after installation before rebooting the computer. This setting allows you to specify how many minutes the computer should wait before reboot.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;em&gt;Re-prompt for restart with scheduled installations&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This setting allows you to set the amount of time that passes before re-prompting that a restart is required to complete an installation of updates.&lt;/p&gt;

&lt;p&gt;If you are automatically installing updates and restarting machines after hours, this setting isnât necessary.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;em&gt;Allow non-administrators to receive update notifications&lt;/em&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Enabling this setting will allow non-administrators to receive notifications either before downloading or before installation of updates.&lt;/p&gt;

&lt;p&gt;Again, If you are setting your computers to install and restart during off hours, this setting isnât necessary, unless you really want your users to install the updates and restart their computers during the workday.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Group Policy Intensive Training and Workshop Schedule Update&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I&#039;ve basically lost count at this point to how many people have signed up and taken the two-day Group Policy Intensive training and workshop. Students LOVE it, and managers LOVE the results the training gives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;You BOUGHT and IMPLEMENTED Active Directory -- now DO SOMETHING with it&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;So, learn to properly drive that &quot;Ferrari&quot; you bought by coming to a class!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Classes remaining in 2005:&lt;/strong&gt;&lt;br /&gt;
Nov 28 - 29, 2005: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Philadelphia (Berwyn, PA) &lt;/a&gt;&lt;br /&gt;
&lt;em&gt;(We almost have enough interested people. If you&#039;re interested, or ready to sign up, don&#039;t be a stranger! You might be that one person we need to make this class A GO.)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Dec 13 - 14, 2005: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Minneapolis (Bloomington), MN&lt;/a&gt;&lt;br /&gt;
&lt;em&gt;(We almost have enough interested people. If you&#039;re interested, or ready to sign up, don&#039;t be a stranger! You might be that one person we need to make this class A GO.&lt;/em&gt;)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Classes for first half of 2006&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;Jan 24 - 25, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Sacramento, Ca&lt;/a&gt;&lt;br /&gt;
Jan 26 - 27, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Portland, OR&lt;/a&gt;&lt;br /&gt;
Feb 21 - 22, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;San Antonio&lt;/a&gt;&lt;br /&gt;
&lt;em&gt;(We almost have enough interested people. If you&#039;re interested, or ready to sign up, don&#039;t be a stranger! You might be that one person we need to make this class A GO.)&lt;/em&gt;&lt;br /&gt;
Mar 2 - 3, 2006 : &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Atlanta, GA&lt;/a&gt;&lt;br /&gt;
Mar 15 - 16, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Washington, DC&lt;/a&gt;&lt;br /&gt;
Apr 20 - 21, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;Oklahoma City, OK&lt;/a&gt;&lt;br /&gt;
May 15 - 16, 2006: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;London, England&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Why THESE cities? Because people used the &quot;Suggest a city&quot; form at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt; and ASKED me to have classes here.&lt;/p&gt;

&lt;p&gt;Here&#039;s hoping you&#039;ll take advantage of the opportunity!&lt;/p&gt;

&lt;p&gt;Learn more and sign up at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop&lt;/a&gt;&lt;br /&gt;
(Don&#039;t forget to scroll all the way to the bottom of that page and locate your city!)&lt;/p&gt;

&lt;p&gt;Or ... if you think you might want your own in-house training of the course (with all the personalized attention that affords), I&#039;d love to join you onsite!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially endorsed by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy, Microsoft Consulting Services and Product Support Services teams at Microsoft!&lt;/p&gt;

&lt;p&gt;For a public class, sign up online at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop/&lt;/a&gt;&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408.  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Additional technical tidbits...&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Even though the thoughts in this section aren&#039;t necessarily Group Policy related, I thought these tidbits might be something you all would find interesting.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tidbit #1&lt;/strong&gt;: Microsoft gets really generous with virtualization licensing Microsoft has a new press release regarding their upcoming virtualization strategy here: &lt;a href=&quot;http://tinyurl.com/c78kf&quot;&gt;http://tinyurl.com/c78kf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There&#039;s a lot here, but there&#039;s one key sentence which rocked my world (and I quote):&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&quot;Licenses for the upcoming Windows Server 2003 R2 Enterprise Edition will allow customers to run up to four virtual instances on one physical server at no additional cost...&quot;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;And, this licensing deal is also expected to carry through to Longhorn (Enterprise) Server as well.&lt;/p&gt;

&lt;p&gt;In a word: WOW. This means that if you buy one copy of Enterprise server, and you run it virtually, you basically get 4 copies of Enterprise server for the price of one! Now, of course, the key word here is &quot;Enterprise.&quot; This is the more (much more) expensive version of Windows Server. Note that Windows Standard server (the less expensive sibling) is left out in the cold here.&lt;/p&gt;

&lt;p&gt;The other issue is... is this deal only good when you use Microsoft&#039;s Virtualization technology (Virtual PC or Virtual Server?) In other words, if a shop chooses to use VMware as their virtualization platform, does the deal hold up? Well, there&#039;s nothing here in this press release which specifically says you can&#039;t use VMware if you wanted -- which is good news. However, before rolling out a bazillion (free) copies of Windows R2 Enterprise Server, be sure to consult with your licensing mavens, just to be sure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tidbit #2&lt;/strong&gt;: VMware gets really generous with free virtualization technology!&lt;/p&gt;

&lt;p&gt;Rumors have it that Windows Vista will have a free free free built-in version of Microsoft Virtual PC. There will be a small restriction on it, though: you can only have ONE running virtual-machine at a time. I think when VMware heard this upcoming plan, they got a little nervous, and came out with {insert fanfare music here} the VMware Player. The VMware Player takes existing VMware virtual-machines and allows you to, you guessed it -- use them for free anywhere you like. And you&#039;re not limited to just ONE running virtual-machine. So, in short, if you&#039;ve already CREATED your virtual-machine with, say, VMware Workstation or VMWare GSX server -- just copy the files to a friend, give him or her the free VMware Player application -- and -- they&#039;re running your virtual-machine! Way to go VMware! It&#039;s in beta (thought it looks like production quality software to me.) &lt;a href=&quot;http://www.vmware.com/download/player/&quot;&gt;You can download it here.&lt;/a&gt; Again, the only thing you really CANNOT do in VMware Player is CREATE new virtual-machines. Other than that -- it&#039;s quite similr to VMware Workstation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get signed copies of...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000 (THIRD EDITION&lt;/em&gt;)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;-and-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Do you have the new THIRD EDITION of the Group Policy book? It&#039;s got 50 new pages, fully covers XP/SP2 and Windows Server 2003/SP1, an armload of new tidbits here and there, and whole new section on the Security Configuration Wizard.&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking here: &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;https://www.gpanswers.com/book/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Additionally available is my new title Windows &amp; Linux Integration: Hands on Solutions for a Mixed Environment from &lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.WinLinAnswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own either book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so here:&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144470&quot;&gt;http://www.amazon.com/gp/product/0782144470&lt;/a&gt; (GPO book)&lt;br /&gt;
&lt;a href=&quot;http://www.amazon.com/gp/product/0782144284&quot;&gt;http://www.amazon.com/gp/product/0782144284&lt;/a&gt; (WinLin book)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;New Forum in the GPanswers.com/community&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Want to have an ongoing discussion about anything in this newsletter? Then head on over to&lt;a href=&quot;https://www.gpanswers.com/community/viewforum.php?f=33&quot;&gt;https://www.gpanswers.com/community/viewforum.php?f=33&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;where you can talk with your peers about anything in this newsletter (or previous ones!) Be sure to use the newsletter number when you post!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe, Unsubscribe, and Usage Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that, too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can use this information as you see fit, but if you&#039;re going to copy any portion, please &lt;strong&gt;FORWARD THE ENTIRE&lt;/strong&gt; email.&lt;/p&gt;

&lt;p&gt;While Moskowitz, inc. tries to ensure that all information is technically accurate, we make no warranty with regard to the information within. Please use at your own risk.&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#11 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue11</link>
        <pubDate>2005-09-04T23:34:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	It&amp;#39;s Issue 11 ... So much news, I can&amp;#39;t take it!!
	Big News Item #1: Updated Group Policy Book!
	Big News Item #2: A New Book and a New Website for Windows/Linux Integration!
	GPanswers.com &amp;quot;Suggest a City&amp;quot; a Success
	Group Policy Intensive Training and Workshop Schedule Update
	Technology Takeaway (r), a service of Moskowitz, inc.
	
		Three juicy tips and tricks
	
	
	Upcoming Conferences, Appearances, and Classes
	Get a signed copy of Group Poli ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 11 ... So much news, I can&#039;t take it!!&lt;/li&gt;
	&lt;li&gt;Big News Item #1: Updated Group Policy Book!&lt;/li&gt;
	&lt;li&gt;Big News Item #2: A New Book and a New Website for Windows/Linux Integration!&lt;/li&gt;
	&lt;li&gt;GPanswers.com &quot;Suggest a City&quot; a Success&lt;/li&gt;
	&lt;li&gt;Group Policy Intensive Training and Workshop Schedule Update&lt;/li&gt;
	&lt;li&gt;Technology Takeaway (r), a service of Moskowitz, inc.
	&lt;ul&gt;
		&lt;li&gt;Three juicy tips and tricks&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming Conferences, Appearances, and Classes&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Subscribe, Unsubscribe, and Usage Information&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;Moskowitz, inc. and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; -- Issue 11&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;There&#039;s so much news, I simply don&#039;t know where to begin.&lt;/p&gt;

&lt;p&gt;First, however, I want to welcome about 100 new people since the last newsletter, which went out only about three weeks ago.&lt;/p&gt;

&lt;p&gt;I got to meet a lot of great people in my own home town of Wilmington, DE at a Microsoft / TS2 event.&lt;/p&gt;

&lt;p&gt;People here are downright excited about Windows Server Update Services (WSUS), and specifically, how an admin can use GPOs to control WSUS even more granularly than the older Software Update Services (SUS).&lt;/p&gt;

&lt;p&gt;We&#039;ll address some of those issues in this newsletter, right after we announce all these goodies!&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Big News Item #1: Updated Group Policy Book!&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I have a Third Edition of my popular Group Policy book (Group Policy, Profiles and IntelliMirror) coming out THIS MONTH (September).&lt;/p&gt;

&lt;p&gt;What&#039;s more -- you can &lt;a href=&quot;https://www.gpanswers.com/admin/www.GPanswers.com/book&quot;&gt;pre-order&lt;/a&gt; a SIGNED COPY!&lt;/p&gt;

&lt;p&gt;In this edition, we&#039;re building on the last, but adding in the bits and pieces for Windows 2003 / SP1 and Windows XP / SP2.&lt;/p&gt;

&lt;p&gt;And, since I cannot leave well enough alone, there are lots of little adjustments and improvements throughout. Here are the TOP 12 things that have been updated since the previous edition...&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;More &quot;prescriptive guidance&quot; is peppered throughout the book, based on additional experiences over the years.&lt;/li&gt;
	&lt;li&gt;In the last book, I tested using XP/SP2 *BETA*. I made educated guesses how XP/SP2 *WOULD react*. This time, I made sure.&lt;/li&gt;
	&lt;li&gt;We had Kevin Sullivan, a fellow Enterprise Mobility MVP, as the Technical Editor and reviewer. That means additional assurance of technical accuracy in all areas of the book.&lt;/li&gt;
	&lt;li&gt;We give guidance about how to deal with XP/SP2&#039;s built-in firewall. Because some aspects of Group Policy won&#039;t work with the firewall enabled, we give specific guidance on how to deal with this feature.&lt;/li&gt;
	&lt;li&gt;We&#039;ve added clearer guidance on what happens during backup and restore operations.&lt;/li&gt;
	&lt;li&gt;We&#039;ve added more troubleshooting guidance.&lt;/li&gt;
	&lt;li&gt;We&#039;ve added more guidance on how to ensure that you can &quot;see&quot; all the settings for XP/SP2 and Windows Server 2003 / SP1.&lt;/li&gt;
	&lt;li&gt;We fully cover the Windows Server 2003 / SP1 &quot;Security Configuration Wizard.&quot; Specifically, we demonstrate how to make your servers more secure via Group Policy. This is a really big addition for this edition.&lt;/li&gt;
	&lt;li&gt;We&#039;ve included some newly updated information regarding Windows Installer 3.0.&lt;/li&gt;
	&lt;li&gt;ALL of the URLs are &quot;tiny&quot; now. Not a big deal, but now you&#039;re not typing in 300 characters for a URL to Microsoft.&lt;/li&gt;
	&lt;li&gt;We&#039;ve addressed a notorious quirk when dealing with GPOs. Have you ever had to press &quot;OK&quot; 52 times when editing a GPO? This is &quot;The Retroactive Bug That Ate New York.&quot; In this new edition, we squash this bug with a rock.&lt;/li&gt;
	&lt;li&gt;And last but certainly not least, there are lots of little things that have been clarified, fixed, adjusted, and generally made better.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Oh, and all the web downloads will be updated (really soon!). We&#039;ve gone through the effort to document every single Group Policy Setting and made these available. Again, stay tuned for updated web downloads just as soon as the publisher releases them!&lt;/p&gt;

&lt;p&gt;So, the big question that I&#039;m sure you have is: &quot;Do I &lt;em&gt;NEED&lt;/em&gt; this edition?&quot; It&#039;s a tough call, because the book DID NOT go through a MAJOR re-write like it did from the First Edition to the Second Edition. Here&#039;s what&#039;s the same:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;All chapters from the Second Edition are here again in the Third Edition.&lt;/li&gt;
	&lt;li&gt;The book has the same cast of characters.&lt;/li&gt;
	&lt;li&gt;The book has the same &quot;flow&quot; and the same holistic approach.&lt;/li&gt;
	&lt;li&gt;The scripting chapter is 100% unchanged. (It&#039;s the only untouched chapter in the book, though.)&lt;/li&gt;
	&lt;li&gt;In short, it really is the same book.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So, again, the question is: &quot;Do I &lt;em&gt;NEED&lt;/em&gt; this edition?&quot;&lt;/p&gt;

&lt;p&gt;I know it&#039;s not easy forking over your hard-earned dough to get a copy of a book that&#039;s, well, very similar to the previous edition. So, how can you make the best decision? Here&#039;s my take on it...&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;If you&#039;re rolling out XP/SP2 and Windows Server 2003/SP1, I&#039;d say Yes, this new addition is for you. Again, I updated the book expressly for this purpose. And, while I was here, I cleaned up anything I wasn&#039;t 100% happy with.&lt;/li&gt;
	&lt;li&gt;If you&#039;re NOT rolling out XP/SP2 and/or Windows Server 2003/SP1, then just the &quot;bug fixes&quot; alone aren&#039;t worth plunking down the dough to get a copy. The bad news, however, is that the book&#039;s &quot;bug fixes&quot; alone are not availableas a download on GPanswers.com. This is because there really were too many pages changed between this edition and the last.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Hopefully, that makes sense, and gives you some direction on whether or not you should get the updated edition.&lt;/p&gt;

&lt;p&gt;-If you want a signed copy ($45, includes shipping), the place is &lt;a href=&quot;https://www.gpanswers.com/component/content/207.html&quot;&gt;www.GPanswers.com/book&lt;/a&gt;&lt;br /&gt;
-If you want a cheaper copy from Amazon ($32.99), the place is: &lt;a href=&quot;http://www.amazon.com/exec/obidos/tg/detail/-/0782144470&quot;&gt;http://www.amazon.com/exec/obidos/tg/detail/-/0782144470&lt;/a&gt; (For some reason, the cover image says &quot;Second Edition,&quot; but I assure you that it&#039;s the &quot;Third Edition.&quot;)&lt;br /&gt;
-If you want an even cheaper copy, from Bookpool ($31.50), the place is: &lt;a href=&quot;http://www.bookpool.com/sm/0782144470&quot;&gt;http://www.bookpool.com/sm/0782144470&lt;/a&gt; (Again, for some reason the cover image says &quot;Second Edition,&quot; but I assure you that it&#039;s the &quot;Third Edition.&quot;)&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Big News Item #2: A New Book and a New Website for Windows/Linux Integration!&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I know, I know. I can hear you from here ... &quot;Whaaa? Jeremy, I thought you were the Group Policy dude. I didn&#039;t think you did that &#039;Linux thing.&#039;&quot; Well, I do.&lt;/p&gt;

&lt;p&gt;It&#039;s interesting, exciting, and coming to an IT shop near you. And you&#039;d better be prepared for it.&lt;/p&gt;

&lt;p&gt;There are plenty of books you can get that try to describe how to &quot;walk away&quot; from your Windows investment and ... blink! ... go 100% Linux.&lt;/p&gt;

&lt;p&gt;But there are two problems with the &quot;walk away from Windows&quot; idea:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;First, it&#039;s often not possible. That is, there is a good chance you will always have Windows applications that run your business. And they might never be able to run natively on Linux.&lt;/li&gt;
	&lt;li&gt;Second, it&#039;s simply not realistic. Assuming every application could be re-coded for Linux, you&#039;ve already got a lot invested in Windows desktops, applications, architecture, training, personnel, and more.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And yet, Linux offers undeniable advantages of its own. Compelling open-source applications, like the Apache web server and the MySQL database engine, are available today and will continue to appear. And the option of running these applications on an open-source operating system presents undeniable cost advantages. Yes, Linux has its own costs, such as re-training users and administrators familiar with Windows. But the presence of Linux in your business can save money and solve problems today.&lt;/p&gt;

&lt;p&gt;In short, neither Windows nor Linux is leaving this planet (or the datacenter) any time soon. And for that reason, it&#039;s more important to be able to cooperatively utilize what &quot;the other guy&quot; has to offer, instead of trying to punch his lights out.&lt;/p&gt;

&lt;p&gt;My new book is entitled:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Practical Windows &amp; Linux Integration: Hands-on Solutions for a Mixed Environment&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;And, along with a book, I&#039;m launching a new web site: &lt;a href=&quot;http://www.winlinanswers.com/&quot;&gt;www.WinLinAnswers.com&lt;/a&gt;&lt;br /&gt;
WinLinAnswers.com is similar to GPanswers.com. It has:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Its own newsletter&lt;/li&gt;
	&lt;li&gt;Its own community forum&lt;/li&gt;
	&lt;li&gt;Its own downloads (many, many downloads for the book)&lt;/li&gt;
	&lt;li&gt;Its own links and other resources&lt;/li&gt;
	&lt;li&gt;Coming soon, its own Win/Lin Integration Training course&lt;/li&gt;
	&lt;li&gt;And more...&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It shares the same look and feel as GPanswers.com and shares the same &quot;Where is Jeremy?&quot; calendar that runs along the right-hand side.&lt;/p&gt;

&lt;p&gt;For the record ... No, no, no! I&#039;m NOT abandoning GPanswers.com for other pastures. I am not going to stop living and breathing Group Policy. I&#039;m simply expanding a little bit and hope you&#039;ll join me for the ride.&lt;/p&gt;

&lt;p&gt;For now, if you want to receive Win/Lin updates, you&#039;ll have to specifically sign up for THAT newsletter at &lt;a href=&quot;http://www.winlinanswers.com/newsletter&quot;&gt;www.WinLinAnswers.com/newsletter&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;(For the record, I may change my mind in the future and go to one unified newsletter. But for now, they&#039;re separate.)&lt;/p&gt;

&lt;p&gt;You can find out more and pick up a signed copy of the new Windows / Linux Integration book at &lt;a href=&quot;http://www.winlinanswers.com/book&quot;&gt;www.winlinanswers.com/book&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;GPanswers.com &quot;Suggest a City&quot; a Success&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;People are using the new &quot;SUGGEST YOUR OWN CITY&quot; service. The idea is for YOU to tell ME where you want a Group Policy class.&lt;/p&gt;

&lt;p&gt;Simply click on the workshop page and find the link to SUGGEST YOUR OWN CITY.&lt;/p&gt;

&lt;p&gt;Or, go directly to &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;www.GPanswers.com/suggest&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once we get 5-7 interested people in the same city, we&#039;ve got a class!&lt;/p&gt;

&lt;p&gt;Maybe your city is already listed? Check it out and add your suggestion. (It takes, maybe, 10 seconds.)  &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Group Policy Intensive Training and Workshop Schedule Update&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Learn more and sign up at: &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;https://www.gpanswers.com/workshop&lt;/a&gt;&lt;br /&gt;
-or-&lt;br /&gt;
Suggest your own city at &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;https://www.gpanswers.com/suggest&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Technology Takeaway (r), a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Here&#039;s what&#039;s on people&#039;s minds recently...&lt;/p&gt;

&lt;p&gt;Three juicy tips and tricks&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Q. Can I upgrade from SUS to WSUS?&lt;/p&gt;

&lt;p&gt;A. Before we get into upgrading SUS to WSUS, there&#039;s good news. If you&#039;re still on SUS, Microsoft is providing 6 more months of support. That&#039;s a good idea ... because getting to WSUS could take a while. I suggest that if you&#039;re working with SUS and want to move to WSUS, you should check out this resource: &lt;em&gt;&lt;a href=&quot;http://tinyurl.com/dp3wy&quot;&gt;TechNet Webcast: Migration from Software Update Services to Windows Server Update Services (Level 300)&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;About the talk (Copied from Microsoft&#039;s website):&lt;/p&gt;

&lt;blockquote&gt;&lt;em&gt;Marc Shepard, Program Manager, Microsoft Corporation&lt;/em&gt; &lt;em&gt;Many customers today use Software Update Services (SUS) &lt;/em&gt;&lt;em&gt;to deploy Windows updates across their businesses. During this session, which was highly rated when presented at TechEd 2005 in Orlando, Florida, as MGT350, learn how to upgrade from SUS to Windows Server Update Services, the next version of SUS, to reap the benefits of the enhanced capabilities and broadened application support. Learn best practices and pitfalls to watch out for to help you upgrade seamlessly.&lt;/em&gt;&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;TIP 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Q. Are there any bugs in the GPMC that you know about?&lt;/p&gt;

&lt;p&gt;A. The &quot;GPMC with SP1&quot; has been out for some time, and it squashed lots of the remaining bugs. But not all. Here&#039;s one I know of...&lt;/p&gt;

&lt;p&gt;If you select a GPO link in the GPMC, select the &#039;Details&#039; tab, and set the GPO status to &#039;All settings disabled&#039;, the link itself will grey out, but the actual GPO doesn&#039;t.&lt;/p&gt;

&lt;p&gt;So is it disabled or not?&lt;/p&gt;

&lt;p&gt;Actually, it is. Just right-click on the domain name and select Refresh, and the icon will grey out.&lt;/p&gt;

&lt;p&gt;Ok, it&#039;s not really a tip, but it is something to keep in mind!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Q. How can I script ... ?&lt;/p&gt;

&lt;p&gt;A. There are just a GAGGLE of Group Policy goodies waiting for you on your scripting adventure. They are located in a &#039;scripts&#039; folder in the installation folder of the GPMC.&lt;/p&gt;

&lt;p&gt;Samples include a script to back up all GPOs (handy if you want to schedule the backup), a script to find unlinked GPOs, a script to copy a GPO. And lots more. Check &#039;em out!&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Upcoming Conferences, Appearances, and Classes&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;On &lt;a href=&quot;http://www.moskowitz-inc.com/&quot;&gt;www.moskowitz-inc.com&lt;/a&gt; (or &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt;) I have a neat-o calendar that I&#039;m always updating with any public (and private) appearances. So, check it out any time for up-to-date information!  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Not free... but worth it! Upcoming classes!&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I&#039;d love to see you in one of the two-dayGroup Policy intensive training and workshop classes. These two-day classes get you up to speed, working with Group Policy, Security settings, ADM templates, and just about all you need to know to hit the ground running -- Fast!&lt;/p&gt;

&lt;p&gt;Or ... if you think you might want your own in-house training of the course (with all the personalizedattention that affords), I&#039;d love to join you on-site!If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially _endorsed_ by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy team at Microsoft.&lt;/p&gt;

&lt;p&gt;At the MMS 2004 and TechEd 2004 conferences, Mark Williams from the Group Policy team encouraged the throngs of attendees to check out the new Group Policy book and the training!In fact, he dedicated a whole slide to the book, the training,and GPanswers.com for each of his sessions!&lt;/p&gt;

&lt;p&gt;Wow! Thanks again, Microsoft!&lt;/p&gt;

&lt;p&gt;How do attendees feel about the class? Here are some of my favorite feedback comments:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&quot;Fantastic Presentation !&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Can&#039;t wait to go back to share the wealth !&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Would recommend to other IT people in my company.&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;I had a foot in the GPO door, and now I can hold it open.&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Easily the best training about AD I&#039;ve had in the last 5 years !!&quot;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And my favorite of pack is from Joey P, who works for a major retailer writes:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&quot;If you have folks that are even going to SNIFF Active Directory, they *MUST* take this class!&quot;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I don&#039;t really know what Joey means, but I&#039;ll take it as a compliment.&lt;/p&gt;

&lt;p&gt;Thanks, Joey -- and to ALL my students !&lt;/p&gt;

&lt;p&gt;For a public class, sign up &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;online&lt;/a&gt;.&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408 (note the new phone number.)  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Get a signed copy of Group Policy, Profiles &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;We&#039;ve had dozens of people order books directly from GPanswers.com. If you&#039;d like a copy, it&#039;s easy to order, and I&#039;ll sign the book to you, free!&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards, including AMEX just fine.) Thanks for understanding!&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/book.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own the book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so &lt;a href=&quot;http://www.amazon.com/exec/obidos/tg/detail/-/0782142982/&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SPECIAL THANKS&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I want to say &quot;thanks&quot; for a killer book review from one of our subscribers, &quot;AVero&quot;.&lt;/p&gt;

&lt;p&gt;The review was originally posted &lt;a href=&quot;http://www.security-forums.com/forum/viewtopic.php?t=32526&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;but is also posted on GPanswers.com &lt;a href=&quot;https://www.gpanswers.com/community/viewtopic.php?p=1585#1585&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Pick one if you&#039;re interested in reading it. Thanks again!&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Subscribe and Unsubscribe Information&lt;/strong&gt;&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;subscribe to this newsletter&lt;/li&gt;
	&lt;li&gt;unsubscribe from this newsletter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How did you get this newsletter? It&#039;s very likely you got it because you handed me (Jeremy Moskowitz) a business card at an event at some kind. And, consequently, I signed you up for my newsletter.&lt;/p&gt;

&lt;p&gt;Or, possibly, you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Author, Instructor, Infrastructure Architect&lt;br /&gt;
Moskowitz, inc.&lt;br /&gt;
&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;br /&gt;
Learn more about Group Policy at GPanswers.com !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#10 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue10</link>
        <pubDate>2005-08-05T23:35:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	It&amp;#39;s Issue 10... Wow.. the big 10 !
	GPanswers.com Growth Spurt
	Moskowitz, inc. Technology Takeaway&amp;Acirc;&amp;reg;
	
		Three juicy tips and tricks
	
	
	Upcoming conferences, appearances, and classes
	Get a signed copy of Group Policy, Profiles and IntelliMirror
	Subscribe, unsubscribe, and usage information


Moskowitz, inc. and&amp;nbsp;www.GPanswers.com&amp;nbsp;-- Issue 10

I love it when new people come to my class and they say ...&amp;quot;I think I&amp;#39;m on your ne ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 10... Wow.. the big 10 !&lt;/li&gt;
	&lt;li&gt;GPanswers.com Growth Spurt&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology TakeawayÂ®
	&lt;ul&gt;
		&lt;li&gt;Three juicy tips and tricks&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming conferences, appearances, and classes&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Subscribe, unsubscribe, and usage information&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;. and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; -- Issue 10&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I love it when new people come to my class and they say ...&quot;I think I&#039;m on your newsletter list, but I&#039;ve never seen one.&quot;&lt;/p&gt;

&lt;p&gt;Well, the idea is that this newsletter comes out &quot;Whenever I feel like it.&quot;&lt;/p&gt;

&lt;p&gt;And I feel like it again!&lt;/p&gt;

&lt;p&gt;As always, you can forward this newsletter to your friends -- but please do so in one whole piece (please don&#039;t just cut and paste).&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;GPanswers.com Growth Spurt&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Here&#039;s a little collection of updates and facts about GPanswers.com:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;We have 606 Community Forum Members&lt;/li&gt;
	&lt;li&gt;We have 1,966 newsletter recipients&lt;/li&gt;
	&lt;li&gt;We have seven sponsors and freeware vendors in the Group Policy Solutions Guide. There&#039;s more tools than ever in the &quot;GP Solutions Guide.&quot; So, be sure to click on the GP Solutions Guide off the main page to check it out!&lt;/li&gt;
	&lt;li&gt;I now have a &quot;Jeremy&#039;s GP Resources&quot; section of the website. It&#039;s a collection of all articles I&#039;ve ever published on Group Policy and related bits.&lt;/li&gt;
	&lt;li&gt;I&#039;ve installed Google Adsense in the forum. Before you throw rotten eggs, and think I sold out to &quot;The Man&quot; this turns out to be a huge benefit. Adsense is sometimes smart enough to actually advertise solutions to problems people are actually having. So, please view this as a service while inside the forums. If you end up hating this, do let me know. (Though I do think it looks pretty unobtrusive.)&lt;/li&gt;
	&lt;li&gt;New &quot;SUGGEST YOUR OWN CITY&quot; service. Simply click on the workshop page, find the link to SUGGEST YOUR OWN CITY. Or, go directly to &lt;a href=&quot;https://www.gpanswers.com/component/content/204.html&quot;&gt;www.GPanswers.com/suggest&lt;/a&gt; Once we get 5-7 interested people in the same city, we&#039;ve got a class! This is still in beta, but hopefully will help us all out !&lt;br /&gt;
	&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;Technology Takeaway (r), a service of Moskowitz, &lt;/strong&gt;&lt;strong class=&quot;gr-progress&quot;&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Here&#039;s what&#039;s on people&#039;s minds recently...&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Three juicy tips and tricks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Q. Can I disable the Startup Splash Screen in Adobe Acrobat Reader 7?&lt;/p&gt;

&lt;p&gt;A. Yes you can. We&#039;ve just added a custom adm file in our Tips section at GPAnswers.com. Thanks to Dan Thomson and Neil Toepfer for your help and support.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Q. I just added a custom ADM file (from GPanswers.com or from elsewhere), but I when I edit the GPO, I can&#039;t actually *SEE* any of the settings. What&#039;s going on?&lt;/p&gt;

&lt;p&gt;A. Chances are the ADM settings are _Preferences_ not _Policies_. You will know this for sure if the icon before the setting has a red dot on it, and not a blue dot. In the Group Policy Object Editor you need to click the view menu, and choose &lt;em&gt;Filtering&lt;/em&gt;. In the &lt;em&gt;Filtering&lt;/em&gt;dialog box, you&#039;ll need to &lt;em&gt;clear&lt;/em&gt; the last checkbox, which says &lt;em&gt;&lt;strong&gt;Only show policy settings that can be full managed&lt;/strong&gt;&lt;/em&gt;. And there you go! Your settings automagically appear!&lt;/p&gt;

&lt;p&gt;Unfortunately the filtering setting is not saved when you close out the Group Policy Object Editor, so you need to &lt;em&gt;un-select&lt;/em&gt; it every time.&lt;/p&gt;

&lt;p&gt;If anyone has figured out a way around this, please let Ron, our tip guy know !&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Q. Can I copy the settings from a GPO to another GPO? (From our &lt;a href=&quot;https://www.gpanswers.com/component/content/section/3.html?layout=blogfaq&quot;&gt;FAQ&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;A. The easiest way to do this is to make a copy of the original GPO, and rename it. Then you will have a new GPO with all of the settings of the original. To do this, open the GPMC and drill down to the Group Policy Objects node. Right-click over the GPO you want to use, and select Copy. Then, immediately select Paste. It will create a new GPO named &quot;Copy of {oldname}&quot;. Simply rename it what you wish, and you&#039;re in business!&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Upcoming Conferences, Appearances, and Classes&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;On &lt;a href=&quot;http://www.moskowitz-inc.com/&quot;&gt;www.moskowitz-inc.com&lt;/a&gt; (or &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;I have a neat-o calendar that I&#039;m always updating with any public (and private) appearances.&lt;/p&gt;

&lt;p&gt;So, check it out any time for up-to-date information!  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Not free... but worth it! Upcoming classes!&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I&#039;d love to see you in one of the two-dayGroup Policy intensive training and workshop classes. These two-day classes get you up to speed, working with Group Policy, Security settings, ADM templates, and just about all you need to know to hit the ground running -- Fast!&lt;/p&gt;

&lt;p&gt;Or ... if you think you might want your own in-house training of the course (with all the personalizedattention that affords), I&#039;d love to join you on-site!If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially _endorsed_ by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy team at Microsoft.&lt;/p&gt;

&lt;p&gt;At the MMS 2004 and TechEd 2004 conferences, Mark Williams from the Group Policy team encouraged the throngs of attendees to check out the new Group Policy book and the training!In fact, he dedicated a whole slide to the book, the training,and GPanswers.com for each of his sessions!&lt;/p&gt;

&lt;p&gt;Wow! Thanks again, Microsoft!&lt;/p&gt;

&lt;p&gt;How do attendees feel about the class? Here are some of my favorite feedback comments:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&quot;Fantastic Presentation !&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Can&#039;t wait to go back to share the wealth !&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Would recommend to other IT people in my company.&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;I had a foot in the GPO door, and now I can hold it open.&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Easily the best training about AD I&#039;ve had in the last 5 years !!&quot;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And my favorite of pack is from Joey P, who works for a major retailer writes:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&quot;If you have folks that are even going to SNIFF Active Directory, they *MUST* take this class!&quot;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I don&#039;t really know what Joey means, but I&#039;ll take it as a compliment.&lt;/p&gt;

&lt;p&gt;Thanks, Joey -- and to ALL my students !&lt;/p&gt;

&lt;p&gt;For a public class, sign up &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;online&lt;/a&gt;.&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408 (note the new phone number.)  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Get a signed copy of Group Policy, Profiles &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;We&#039;ve had dozens of people order books directly from GPanswers.com. If you&#039;d like a copy, it&#039;s easy to order, and I&#039;ll sign the book to you, free!&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards, including AMEX just fine.) Thanks for understanding!&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/book.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own the book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so &lt;a href=&quot;http://www.amazon.com/exec/obidos/tg/detail/-/0782142982/&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;HIDDEN EASTER EGG PART OF THE NEWSLETTER&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You made it to the end of the newsletter... So, goodies await you!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WS03/SP1 Blocker Tool Available&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the same way that XP/SP2 could be blocked from Automatic Updates, so too can WS03/SP1. If you want to roll out WS03/SP1 on YOUR SCHEDULE, and not automatically accept it via Automatic Updates, I highly suggest you read this &lt;a href=&quot;http://tinyurl.com/9buhh&quot;&gt;FAQ&lt;/a&gt;. The link to download the actual tool is found in the little gray box on the page on the right.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Another Group Policy Perspective&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;My pal Mark Russinovich had an interesting &lt;a href=&quot;http://tinyurl.com/bnqaa&quot;&gt;thought&lt;/a&gt; or two on Group Policy recently. A very interesting read..It echoes a similar statement I make all the time..if your users are local administrators, you could be in for a world of hurt.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe and Unsubscribe Information&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;subscribe to this newsletter&lt;/li&gt;
	&lt;li&gt;unsubscribe from this newsletter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How did you get this newsletter? It&#039;s very likely you got it because you handed me (Jeremy Moskowitz) a business card at an event at some kind. And, consequently, I signed you up for my newsletter.&lt;/p&gt;

&lt;p&gt;Or, possibly, you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;.If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Author, Instructor, Infrastructure Architect&lt;br /&gt;
Moskowitz, inc.&lt;br /&gt;
&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;br /&gt;
Learn more about Group Policy at GPanswers.com !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#9 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue9</link>
        <pubDate>2005-08-04T23:36:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	It&amp;#39;s Issue 9... Whaaa? I just saw issue 8?
	Moskowitz, inc. Technology Takeaway (r)
	
		Three juicy tips and tricks
	
	
	Upcoming conferences, appearances, and classes
	
		Classes and seminars
	
	
	Get a signed copy of Group Policy, Profiles and IntelliMirror
	Subscribe, unsubscribe, and usage information


Moskowitz, inc. and&amp;nbsp;www.GPanswers.com&amp;nbsp;-- Issue 9

Okay, okay.. I know we JUST had a newsletter. But, sometimes there&amp;#39;s more news! Again ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 9... Whaaa? I just saw issue 8?&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r)
	&lt;ul&gt;
		&lt;li&gt;Three juicy tips and tricks&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming conferences, appearances, and classes
	&lt;ul&gt;
		&lt;li&gt;Classes and seminars&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Subscribe, unsubscribe, and usage information&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;Moskowitz, inc. and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; -- Issue 9&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Okay, okay.. I know we JUST had a newsletter. But, sometimes there&#039;s more news! Again, this newsletter comes out &quot;Whenever I feel like it.&quot; And I feel like it!&lt;/p&gt;

&lt;p&gt;So... In this newsletter, I&#039;ve got good news... Yes, this is a full newsletter -- with tips and tricks and fun stuff for you.. It&#039;s all here!&lt;/p&gt;

&lt;p&gt;As always, you can forward this newsletter to your friends --but please do so in one whole piece (please don&#039;t just cut and paste).&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Technology Takeaway®, a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Here&#039;s what&#039;s on people&#039;s minds recently...&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Three juicy tips and tricks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 1 &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;How can I hide drives from my users?&lt;/p&gt;

&lt;p&gt;Out of the box, Group Policy allows you to hide a few drives from your users, but what if you want to hide a drive such as &#039;N:&#039;?&lt;/p&gt;

&lt;p&gt;We&#039;ve got ya&#039; covered! Check out our &lt;a href=&quot;https://www.gpanswers.com/component/content/section/3.html?layout=blogfaq&quot;&gt;tip&lt;/a&gt; (with screenshots!). It explains a neat tool called GPDriveOptions, available &lt;a href=&quot;http://www.petri.co.il/gpdrivesoptions.htm&quot;&gt;here&lt;/a&gt;, that will let you select any drive letters you want!&lt;/p&gt;

&lt;p&gt;Then, in no time flat -- you&#039;re restricting specific drive letters!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 2 &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;How can I set the size limit for Temporary Internet Files in Internet Explorer?&lt;/p&gt;

&lt;p&gt;Yizhar Hurwitz, MVP has created a great custom ADM file that will not only allow you to set the size limit for the cache, but also set its location, and enable automatic emptying of the cache when the browser is closed.&lt;/p&gt;

&lt;p&gt;You can find it in our &lt;a href=&quot;https://www.gpanswers.com/component/content/section/3.html?layout=blogfaq&quot;&gt;tips&lt;/a&gt; section!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 3 &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Have you ever wondered if you could download the most current, or any previous version of the ADM files? Well you can!&lt;/p&gt;

&lt;p&gt;Microsoft&#039;s Download Center has a page where you can download ANY version of a set of ADM files since their release.&lt;/p&gt;

&lt;p&gt;You can find them at &lt;a href=&quot;http://tinyurl.com/4sfgm&quot;&gt;here&lt;/a&gt;!&lt;/p&gt;

&lt;p&gt;Thanks to Ron Hrehirchuk, the &quot;GPanswers Tip Man&quot; for compiling this newsletter&#039;s tips and putting them on the web page for all of us to use!  &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Upcoming Conferences, Appearances, and Classes&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;On &lt;a href=&quot;http://www.moskowitz-inc.com/&quot;&gt;www.moskowitz-inc.com&lt;/a&gt; (or &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt;) I have a neat-o calendar that I&#039;m always updating with any public (and private) appearances.&lt;/p&gt;

&lt;p&gt;So, check it out any time for up-to-date information!&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h2&gt;&lt;strong&gt;Classes and Seminars&lt;/strong&gt;&lt;/h2&gt;

&lt;h3&gt;&lt;strong&gt;Not free... but worth it! Upcoming classes!&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I&#039;d love to see you in one of the two-dayGroup Policy intensive training and workshop classes.&lt;/p&gt;

&lt;p&gt;These two-day classes get you up to speed, working with Group Policy, Security settings, ADM templates, and just about all you need to know to hit the ground running -- Fast!&lt;/p&gt;

&lt;p&gt;Or ... if you think you might want your own in-house training of the course (with all the personalizedattention that affords), I&#039;d love to join you on-site!If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially _endorsed_ by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy team at Microsoft.&lt;/p&gt;

&lt;p&gt;At the MMS 2004 and TechEd 2004 conferences, Mark Williams from the Group Policy team encouraged the throngs of attendees to check out the new Group Policy book and the training!In fact, he dedicated a whole slide to the book, the training,and GPanswers.com for each of his sessions!&lt;/p&gt;

&lt;p&gt;Wow! Thanks again, Microsoft!&lt;/p&gt;

&lt;p&gt;How do attendees feel about the class? Here are some of my favorite feedback comments:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&quot;Fantastic Presentation !&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Can&#039;t wait to go back to share the wealth !&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Would recommend to other IT people in my company.&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;I had a foot in the GPO door, and now I can hold it open.&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Easily the best training about AD I&#039;ve had in the last 5 years !!&quot;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And my favorite of pack is from Joey P, who works for a major retailer writes:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&quot;If you have folks that are even going to SNIFF Active Directory, they *MUST* take this class!&quot;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I don&#039;t really know what Joey means, but I&#039;ll take it as a compliment.&lt;/p&gt;

&lt;p&gt;Thanks, Joey -- and to ALL my students !&lt;/p&gt;

&lt;p&gt;For a public class, sign up &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;online&lt;/a&gt;.&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408 (note the new phone number.)&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Get a signed copy of Group Policy, Profiles &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;We&#039;ve had dozens of people order books directly from GPanswers.com. If you&#039;d like a copy, it&#039;s easy to order, and I&#039;ll sign the book to you, free!&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards, including AMEX just fine.) Thanks for understanding!&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/book.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own the book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so &lt;a href=&quot;http://www.amazon.com/exec/obidos/tg/detail/-/0782142982/&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;HIDDEN EASTER EGG PART OF THE NEWSLETTER&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fun Free Thing I Found at TechEd&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Word on the street says this &lt;a href=&quot;http://whitneyfamily.org/Hacks/?item=Defrag&quot;&gt;disk defragmenter&lt;/a&gt; really does the job. And the price is right! Haven&#039;t tried it myself, but, like I said, sounds interesting.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe and Unsubscribe Information&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;subscribe to this newsletter&lt;/li&gt;
	&lt;li&gt;unsubscribe from this newsletter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How did you get this newsletter? It&#039;s very likely you got it because you handed me (Jeremy Moskowitz) a business card at an event at some kind. And, consequently, I signed you up for my newsletter.&lt;/p&gt;

&lt;p&gt;Or, possibly, you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Author, Instructor, Infrastructure Architect&lt;br /&gt;
Moskowitz, inc.&lt;br /&gt;
&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;br /&gt;
Learn more about Group Policy at GPanswers.com !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#8 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue8</link>
        <pubDate>2005-06-01T23:36:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	It&amp;#39;s Issue 8...
	GPanswers.com -- Update !
	Moskowitz, inc. Technology Takeaway (r)
	
		Three juicy tips and tricks
	
	
	Upcoming conferences, appearances, and classes
	Get a signed copy of Group Policy, Profiles and IntelliMirror
	Subscribe, unsubscribe, and usage information


Moskowitz, inc. and&amp;nbsp;www.GPanswers.com&amp;nbsp;-- Issue 8

Welcome to issue 8 of the Moskowitz, inc. newsletter.

Spring is here.. heck it&amp;#39;s almost summer. And that means all ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 8...&lt;/li&gt;
	&lt;li&gt;GPanswers.com -- Update !&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r)
	&lt;ul&gt;
		&lt;li&gt;Three juicy tips and tricks&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming conferences, appearances, and classes&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Subscribe, unsubscribe, and usage information&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;strong&gt;Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;. and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; -- Issue 8&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Welcome to issue 8 of the Moskowitz, inc. newsletter.&lt;/p&gt;

&lt;p&gt;Spring is here.. heck it&#039;s almost summer. And that means all sorts of good stuff is happening. As I write this, I&#039;m at the Red Hat conference, which is pretty good, and not totally filled with Microsoft bashing. Indeed, the Red Hat folks really have a &quot;Let&#039;s play nice&quot; attitude with regards to Microsoft. Refreshing !&lt;/p&gt;

&lt;p&gt;What am I doing here, at the RED HAT conference, you ask? It has to do with &quot;Jeremy&#039;s Next Big Thing&quot;, which I&#039;ll discuss (hopefully) in the next newsletter.&lt;/p&gt;

&lt;p&gt;In this newsletter, I&#039;ve got updated class dates, some fun new tips and tricks, and more. As always, you can forward this newsletter to your friends -- but please do so in one whole piece (please don&#039;t just cut and paste).&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;GPAnswers.com News!&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;We now have a working &quot;Group Policy Solutions Guide&quot; on GPanswers.com. The goal is give you a one-stop-shop for 3rd party tools which snap-in to Group Policy.&lt;/p&gt;

&lt;p&gt;Just click &quot;Third Party Solutions Guide&quot; after you click over to GPanswers.com to check it out! We have five sponsors (yay, sponsors!) and we also give free listings to free tools.&lt;/p&gt;

&lt;p&gt;So, if you know of any free tools that hook into Group Policy -- let me know about it! If it&#039;s a free tool, it gets a free listing!&lt;/p&gt;

&lt;p&gt;Again, check out the &lt;a href=&quot;https://www.gpanswers.com/component/content/section/5.html?layout=blogcompany&quot;&gt;tools&lt;/a&gt; we have today!&lt;/p&gt;

&lt;p&gt;Group Policy Intensive Training and Workshop&lt;/p&gt;

&lt;p&gt;Learn more and sign up at &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;here&lt;/a&gt;! (Don&#039;t forget to scroll all the way to the bottom of that page and locate your city!)&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Technology Takeaway®, a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Here&#039;s what&#039;s on people&#039;s minds recently...&lt;/p&gt;

&lt;p&gt;Three juicy tips and tricks&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 1 &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We just had to fire one of our desktop administrators. The only problem is -- he knew the local Administrator password for all of our desktop machines. How can I change all computer&#039;s local passwords?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This &lt;a href=&quot;http://tinyurl.com/c7zb8&quot;&gt;free tool&lt;/a&gt;, looks very promising. It looks like it&#039;s been around a long time, but, hey -- what the heck! Give it a shot !&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;m looking for some &quot;Plain English&quot; definitions of events in my Event Log. Any idea where to find that?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Yes! My pal Randy Franklin Smith has just a &lt;a href=&quot;http://www.ultimatewindowssecurity.com/encyclopedia.html&quot;&gt;resource&lt;/a&gt;. It&#039;s literally called &quot;Plain English Explanations of Windows Security Log Events.&quot; Check it out! And be sure to say Hi to Randy !&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;m doing some testing as a user. But, we have restricted all sorts of things. How can I temporarily log in as a user, but strip away all GPOs?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://www.petri.co.il/killpol.htm&quot;&gt;Killpol&lt;/a&gt; to the rescue!This tool asks for credentials, then lets you kill policies (temporarily) for a logged in user. Really handy when you need it!&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Upcoming Conferences, Appearances, and Classes&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;On &lt;a href=&quot;http://www.moskowitz-inc.com/&quot;&gt;www.moskowitz-inc.com&lt;/a&gt; (or &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt;)I have a neat-o calendar that I&#039;m always updating with any public (and private) appearances.&lt;/p&gt;

&lt;p&gt;So, check it out any time for up-to-date information!&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Classes and Seminars&lt;br /&gt;
Not free... but worth it! Upcoming classes!&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;I&#039;d love to see you in one of the two-dayGroup Policy intensive training and workshop classes.&lt;/p&gt;

&lt;p&gt;These two-day classes get you up to speed, working with Group Policy, Security settings, ADM templates, and just about all you need to know to hit the ground running -- Fast!&lt;/p&gt;

&lt;p&gt;Or ... if you think you might want your own in-house training of the course (with all the personalizedattention that affords), I&#039;d love to join you on-site!If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially _endorsed_ by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy team at Microsoft.&lt;/p&gt;

&lt;p&gt;At the MMS 2004 and TechEd 2004 conferences, Mark Williams from the Group Policy team encouraged the throngs of attendees to check out the new Group Policy book and the training!In fact, he dedicated a whole slide to the book, the training,and GPanswers.com for each of his sessions!&lt;/p&gt;

&lt;p&gt;Wow! Thanks again, Microsoft!&lt;/p&gt;

&lt;p&gt;How do attendees feel about the class? Here are some of my favorite feedback comments:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&quot;Fantastic Presentation !&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Can&#039;t wait to go back to share the wealth !&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Would recommend to other IT people in my company.&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;I had a foot in the GPO door, and now I can hold it open.&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Easily the best training about AD I&#039;ve had in the last 5 years !!&quot;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And my favorite of pack is from Joey P, who works for a major retailer writes:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&quot;If you have folks that are even going to SNIFF Active Directory, they *MUST* take this class!&quot;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I don&#039;t really know what Joey means, but I&#039;ll take it as a compliment.&lt;/p&gt;

&lt;p&gt;Thanks, Joey -- and to ALL my students !&lt;/p&gt;

&lt;p&gt;For a public class, sign up &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;online&lt;/a&gt;.&lt;br /&gt;
For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408 (note the new phone number.)&lt;br /&gt;
 &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Get a signed copy of Group Policy, Profiles &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;We&#039;ve had dozens of people order books directly from GPanswers.com. If you&#039;d like a copy, it&#039;s easy to order, and I&#039;ll sign the book to you, free!&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards, including AMEX just fine.) Thanks for understanding!&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/book.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own the book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so &lt;a href=&quot;http://www.amazon.com/exec/obidos/tg/detail/-/0782142982/&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Useless Time Waster&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Go &lt;a href=&quot;http://www.boutell.com/boutell/jeremy/&quot;&gt;here&lt;/a&gt;. (Don&#039;t ask.) In a nutshell, I drink a LOT of Snapple, and one of my best friends noticed. Any Java enabled web browser will do. Trust me, you won&#039;t be disappointed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe and Unsubscribe Information&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;subscribe to this newsletter&lt;/li&gt;
	&lt;li&gt;unsubscribe from this newsletter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How did you get this newsletter? It&#039;s very likely you got it because you handed me (Jeremy Moskowitz) a business card at an event at some kind. And, consequently, I signed you up for my newsletter.&lt;/p&gt;

&lt;p&gt;Or, possibly, you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go). For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Author, Instructor, Infrastructure Architect&lt;br /&gt;
Moskowitz, inc.&lt;br /&gt;
&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;br /&gt;
Learn more about Group Policy at GPanswers.com !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#7 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue7</link>
        <pubDate>2005-02-20T23:37:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	It&amp;#39;s Issue 7...
	Moskowitz, inc. Technology Takeaway&amp;Acirc;&amp;reg;
	
		Three juicy tips and tricks
	
	
	Upcoming conferences, appearances, and classes
	
		Free live events
		Classes and seminars
	
	
	Get a signed copy of Group Policy, Profiles and IntelliMirror
	Even more good stuff!
	Subscribe, unsubscribe, and usage information
	&amp;nbsp;


Moskowitz, inc. and&amp;nbsp;www.GPanswers.com&amp;nbsp;-- Issue 7

Welcome to issue 7 of the Moskowitz, inc. newsletter.
 ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 7...&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology TakeawayÂ®
	&lt;ul&gt;
		&lt;li&gt;Three juicy tips and tricks&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming conferences, appearances, and classes
	&lt;ul&gt;
		&lt;li&gt;Free live events&lt;/li&gt;
		&lt;li&gt;Classes and seminars&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Even more good stuff!&lt;/li&gt;
	&lt;li&gt;Subscribe, unsubscribe, and usage information&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Moskowitz, inc. and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; -- Issue 7&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Welcome to issue 7 of the Moskowitz, inc. newsletter.&lt;/p&gt;

&lt;p&gt;It&#039;s just cold cold cold where I live, and that&#039;s no fun. But, thankfully, I get to travel a bit to San Francisco and Los Angeles and a bunch of other warm places before the winter is up.&lt;/p&gt;

&lt;p&gt;In this newsletter, I&#039;ve got updated class dates, some fun new tips and tricks, and more. As always, you can forward this newsletter to your friends -- but please do so in one whole piece (please don&#039;t just cut and paste).&lt;/p&gt;

&lt;p&gt;Also, I&#039;d like to announce that I have a &quot;Full Time Tips Man&quot; helping out at GPanswers.com. It&#039;s Ron Hrehirchuk, who knocks out questions in the forum and does a lot of work getting the FAQ/Tips and Tricks section looking great! If you want to help add to the FAQ / Tips and Tricks section, the best way is to post a message inside the Community forum &lt;a href=&quot;https://www.gpanswers.com/community/viewforum.php?f=31&quot;&gt;here&lt;/a&gt;. (Note that you must register for the forum to post.)&lt;/p&gt;

&lt;p&gt;Thanks Ron, for all you do!  &lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technology Takeaway®, a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here&#039;s what&#039;s on people&#039;s minds recently...&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Three juicy tips and tricks&lt;br /&gt;
TIP 1/Question 1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;ve been asked this question three times this month, so it must be on people&#039;s minds.&lt;/p&gt;

&lt;p&gt;&quot;Jeremy, can you explain to me why I might want to put users and computers into seperate OUs? We&#039;re debating how to implement our OU structure with regard to Group Policy. Any advice you have here would be helpful.&quot;&lt;/p&gt;

&lt;p&gt;I&#039;ve never been asked the same question three times in a month. Here&#039;s the acoop...Segmenting users and computers into different OUs is, first and foremost, a Microsoft Best Practice. And, it&#039;s a Best Practice for a good reason.&lt;/p&gt;

&lt;p&gt;Here are three good reasons to separate users and computers into different OUs:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Easier troubleshooting
	&lt;ul&gt;
		&lt;li&gt;When users and computers are separated into different OUs, you can more easily figure out what&#039;s going on when you run Resultant Set of Policy tools (ie: GPRESULT, or the Group Policy Results Wizard in the GPMC.) You&#039;ll know precisely which GPOs are affecting the OU. True, you&#039;d see this anyway, but by segmenting them, there&#039;s never a question about which half of the policy (user or computer) is affecting the target.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Easier delegation
	&lt;ul&gt;
		&lt;li&gt;You might want to grant others in your organization the ability to perform certain functions upon your structure. By seperating out users and computers, you can delegate some people to create user accounts and others to create computer accounts.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Easier implementation of loopback policy
	&lt;ul&gt;
		&lt;li&gt;The loopback processing attribute affects the computer object. By distinctly separating out computers (especially those which need loopback) it makes loopback troubleshooting a world easier.&lt;br /&gt;
		 &lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;TIP 2 / Question 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Under an Active Directory user&#039;s properties (Account Tab | Log On To settings), you can restrict what computers a user can log into. This works great but it&#039;s not currently set for all of our &quot;lab users&quot; (and its a fair amount of work to set this manually). So here&#039;s the question: How can this be set via GPO?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer:&lt;/strong&gt; There is no Group Policy settings which control this. However, using Active Directory Users and Computers, you can simply &quot;multi-select&quot; several users and select Properties. Simply click each user while holding down the CONTROL key to multi-select.&lt;/p&gt;

&lt;p&gt;Then, in the Account tab, select Computer Restrictions and go from there!&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&lt;strong&gt;TIP 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Windows Server 2003 has the ability to allow two Remote Desktop connections for administrative purposes. This can be enabled by going to the properties of &quot;My Computer&quot;, clicking on the &quot;Remote&quot; tab and enabling &quot;Remote Desktop&quot;.&lt;/p&gt;

&lt;p&gt;This can also be enabled on each server individually, using the registry setting below, or by creating a custom adm template and deploying the setting via Group Policy.&lt;/p&gt;

&lt;p&gt;Registry Settings Involved:&lt;/p&gt;

&lt;p&gt;Using regedit, navigate to&lt;br /&gt;
HKEY_LOCAL_MACHINE|SYSTEM|CurrentControlSet|Control|Terminal Server&lt;/p&gt;

&lt;p&gt;If the value &quot;DenyTSConnections&quot; does not exist, create it as a DWORD.&lt;/p&gt;

&lt;p&gt;Setting it to 0 will permit remote desktop connections and setting it to 1 will prohibit them.&lt;/p&gt;

&lt;p&gt;Wouldn&#039;t it be great if you could set this up with Group Policy so ALL your servers just did this??&lt;/p&gt;

&lt;p&gt;Well, you can. On &lt;a href=&quot;https://www.gpanswers.com/component/content/section/3.html?layout=blogfaq&quot;&gt;https://www.gpanswers.com/faq/&lt;/a&gt; we&#039;re working on a custom .adm Template that can be deployed via Group Policy by creating an .adm file using included code. After you implement it, you won&#039;t know how you did without it.&lt;/p&gt;

&lt;p&gt;It&#039;ll be up this week in the FAQ/TIPS section! So stop by and tell your friends!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upcoming Conferences, Appearances, and Classes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;On &lt;a href=&quot;http://www.moskowitz-inc.com/&quot;&gt;www.moskowitz-inc.com&lt;/a&gt; (or &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt;) I have a neat-o calendar that I&#039;m always updating with any public (and private) appearances. So, check it out any time for up-to-date information!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free Live Events&lt;br /&gt;
GROUP POLICY POWER HOUR Webinar&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;New date: Friday, December 03, 2004(was November 19th): 8:00 AM -- WEST COAST 11:00 AM -- EAST COAST Seminar #3 in the &quot;The Group Policy Power Hour!&quot; It&#039;s 1/2 hour of talk and demos, and 1/2 hour of Q&amp;A! Here&#039;s the intro:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;One of the key skills to master is to know what&#039;s going on at your client system. In this talk, Jeremy will demonstrate the various methods to get the Resultant Set of Policy, or RSOP, for your client systems. Both command-line tools and the GPMC can be used to gather this knowledge, so join Jeremy for this Power Hour session!&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Registration is available &lt;a href=&quot;http://tinyurl.com/3rxtr&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Classes and Seminars&lt;br /&gt;
Not free... but worth it! Upcoming classes!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;d love to see you in one of the two-dayGroup Policy intensive training and workshop classes.&lt;/p&gt;

&lt;p&gt;These two-day classes get you up to speed, working with Group Policy, Security settings, ADM templates, and just about all you need to know to hit the ground running -- Fast!&lt;/p&gt;

&lt;p&gt;Or ... if you think you might want your own in-house training of the course (with all the personalizedattention that affords), I&#039;d love to join you on-site!If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially _endorsed_ by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy team at Microsoft.&lt;/p&gt;

&lt;p&gt;At the MMS 2004 and TechEd 2004 conferences, Mark Williams from the Group Policy team encouraged the throngs of attendees to check out the new Group Policy book and the training!In fact, he dedicated a whole slide to the book, the training,and GPanswers.com for each of his sessions!&lt;/p&gt;

&lt;p&gt;Wow! Thanks again, Microsoft!&lt;/p&gt;

&lt;p&gt;How do attendees feel about the class? Here are some of my favorite feedback comments:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&quot;Fantastic Presentation !&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Can&#039;t wait to go back to share the wealth !&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Would recommend to other IT people in my company.&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;I had a foot in the GPO door, and now I can hold it open.&quot;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&quot;Easily the best training about AD I&#039;ve had in the last 5 years !!&quot;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And my favorite of pack is from Joey P, who works for a major retailer writes:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&quot;If you have folks that are even going to SNIFF Active Directory, they *MUST* take this class!&quot;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I don&#039;t really know what Joey means, but I&#039;ll take it as a compliment.&lt;/p&gt;

&lt;p&gt;Thanks, Joey -- and to ALL my students !&lt;/p&gt;

&lt;p&gt;For a public class, sign up &lt;a href=&quot;https://www.gpanswers.com/component/content/202.html&quot;&gt;online&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;For a private class, just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-351-8408 (note the new phone number.)  &lt;/p&gt;

&lt;h3&gt;&lt;br /&gt;
&lt;strong&gt;Get a signed copy of Group Policy, Profiles &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;We&#039;ve had dozens of people order books directly from GPanswers.com. If you&#039;d like a copy, it&#039;s easy to order, and I&#039;ll sign the book to you, free!&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards, including AMEX just fine.) Thanks for understanding!&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/book.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own the book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so &lt;a href=&quot;http://www.amazon.com/exec/obidos/tg/detail/-/0782142982/&quot;&gt;here&lt;/a&gt;.  &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;Technology Takeaway®, a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;. (Supersecret, hidden, Easter-egg Part of the Newsletter)&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;We&#039;re just giving it away! --&lt;/p&gt;

&lt;p&gt;More Technical Takeaway Tips (My way of saying thanks for making it all the way to the end of the newsletter!)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BONUS TIP #1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;  Is your company starting to use Firefox? Terrific, except out of the box, it&#039;s not Group Policy enabled... Buuut... check out: &lt;a href=&quot;http://spaces.msn.com/members/in-cider/&quot;&gt;http://spaces.msn.com/members/in-cider/&lt;/a&gt; for a way to make it enabled! (We&#039;re working on making this a permanent section within our Tips collection.)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BONUS TIP #2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Check out &lt;a href=&quot;http://www.grouppolicywiki.com/&quot;&gt;http://www.grouppolicywiki.com&lt;/a&gt;&lt;br /&gt;
It&#039;s a way for people to simply &quot;add what they know&quot; to a common body of Group Policy knowledge.&lt;br /&gt;
I&#039;ve contributed a bit, my pal Darren Mar-Elia (who runs GPOguy.com) has contributed a bit and Microsoft has contributed a LOT. Add your 2 cents! It&#039;s helpful and fun!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Useless Time Waster&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Go &lt;a href=&quot;http://www.boutell.com/boutell/jeremy/&quot;&gt;here&lt;/a&gt;. (Don&#039;t ask.) In a nutshell, I drink a LOT of Snapple, and one of my best friends noticed. Any Java enabled web browser will do. Trust me, you won&#039;t be disappointed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe and Unsubscribe Information&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;subscribe to this newsletter&lt;/li&gt;
	&lt;li&gt;unsubscribe from this newsletter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How did you get this newsletter? It&#039;s very likely you got it because you handed me (Jeremy Moskowitz) a business card at an event at some kind. And, consequently, I signed you up for my newsletter.&lt;/p&gt;

&lt;p&gt;Or, possibly, you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Author, Instructor, Infrastructure Architect&lt;br /&gt;
Moskowitz, inc.&lt;br /&gt;
&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;br /&gt;
Learn more about Group Policy at GPanswers.com !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#6 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue6</link>
        <pubDate>2004-11-27T23:38:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ &amp;nbsp;

In this issue:


	It&amp;#39;s Issue 6...
	GPanswers 2.0 -- New year, new design
	Moskowitz, inc. Technology Takeaway&amp;Acirc;&amp;reg;
	
		Correction from Newsletter #5
		Three juicy tips and tricks
	
	
	Upcoming conferences, appearances, and classes
	
		Free live events
		Classes and seminars
		Upcoming conference appearances
	
	
	Get a signed copy of Group Policy, Profiles and IntelliMirror
	Subscribe, unsubscribe, and usage information
	&amp;nbsp;


Moskowitz, inc. and&amp;nbs ]]>
        </description>
        <content:encoded>
            &lt;p&gt; &lt;/p&gt;

&lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 6...&lt;/li&gt;
	&lt;li&gt;GPanswers 2.0 -- New year, new design&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology TakeawayÂ®
	&lt;ul&gt;
		&lt;li&gt;Correction from Newsletter #5&lt;/li&gt;
		&lt;li&gt;Three juicy tips and tricks&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming conferences, appearances, and classes
	&lt;ul&gt;
		&lt;li&gt;Free live events&lt;/li&gt;
		&lt;li&gt;Classes and seminars&lt;/li&gt;
		&lt;li&gt;Upcoming conference appearances&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Subscribe, unsubscribe, and usage information&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Moskowitz, inc. and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; -- Issue 6&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It&#039;s issue 6, and welcome again to the Moskowitz, inc. / GPanswers.com newsletter. Here&#039;s hoping you had a great Thanksgiving !&lt;/p&gt;

&lt;p&gt;The personal news here is that I&#039;ve hired a new assistant--well, I guess that makes it &quot;personnel&quot; news. His name is Jon Seitzer. If you&#039;d like to drop him or note or just say &quot;Hi,&quot; you can reach him at &lt;a href=&quot;mailto:jons@moskowitz-inc.com&quot;&gt;jons@moskowitz-inc.com&lt;/a&gt; .&lt;/p&gt;

&lt;p&gt;As always, you can forward this newsletter to your friends --but please do so in one whole piece (please don&#039;t just cut and paste).&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GPanswers 2.0 -- New year, new design&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;GPanswers.com is a little over one year old. And, well, it was time for a makeover. We&#039;ve got some very exciting changes to the web site available immediately, and a little more coming up really soon.&lt;/p&gt;

&lt;p&gt;First of all, we have an updated look and feel. Not just for the sake of doing something new, but rather because I kept hearing the same report: People told me they had trouble finding &quot;where to click&quot; to find stuff on the web site. I&#039;ve had that all changed to be easier to find!&lt;/p&gt;

&lt;p&gt;Additionally, GPanswers.com URLs are now &quot;on their own.&quot; No longer are GPanswers.com URLs really just pointers to Moskowitz-inc. Of course, you can still get to Moskowitz, inc. pages in various ways on GPanswers.com.&lt;/p&gt;

&lt;p&gt;Those are the changes as of today. Here is what&#039;s coming up in the next several days/weeks:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;New searchable FAQ section&lt;/li&gt;
	&lt;li&gt;New Tips and Tricks section&lt;/li&gt;
	&lt;li&gt;Annnnnnd...the Big News! We are diligently workingon a sponsored &quot;Group Policy Solutions Guide&quot; whichenables YOU to easily locate 3rd-party softwarethat enhances Group Policy!&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We&#039;re aiming to get each and every vendor that offers a Group Policy product to join the club! If you think there&#039;s a company and product that should be listed, just let me know! Additionally, we&#039;ve updated the 2005 class location list and schedule. Be sure to click on &quot;Group Policy Workshop&quot; to get a full list of the updated schedule and/or to sign up for a class.&lt;/p&gt;

&lt;p&gt;I hope you enjoy GPanswers.com 2.0 in our second year! PS: I&#039;ll likely send out a mini-announcement when the &quot;Group Policy Solutions Guide&quot; goes live.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technology Takeaway®, a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here&#039;s what&#039;s on people&#039;s minds recently...&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Correction from Newsletter #5&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I hate to have to start out with an apology. But, alas, it happens. That is, my Bonus Tip #1 in Newsletter #5âthe &quot;TWO Remote Desktop Sessions&quot; tip--didn&#039;t pan out to be true. I did test it ... but I tested it with a Beta of SP2, and, well, that functionality was removed last minute from the ACTUAL SP2.&lt;/p&gt;

&lt;p&gt;D&#039;oh! My bad.&lt;/p&gt;

&lt;p&gt;Three juicy tips and tricks&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Recently, I&#039;ve been searching for a way to avoid going to the task bar (oops, I mean &quot;Notification Area&quot;) in order to disconnect various hardware. Often, I&#039;m just &quot;ready to roll&quot; but, alas, it takes multiple mouse clicks to get the job done to disconnect USB flash disks, Firewire hard drives, or my USB camera.&lt;/p&gt;

&lt;p&gt;Here&#039;s a tip you can use to save some time. It comes from this Microsoft KB article: &quot;&lt;a href=&quot;http://support.microsoft.com/?kbid=311272&quot;&gt;Remove hardware from a command line&lt;/a&gt;&quot;.&lt;/p&gt;

&lt;p&gt;The syntax is a little hard to follow. In this case, I&#039;m going to list the active USB devices.&lt;/p&gt;

&lt;p&gt;C:&gt;devcon find usb*&lt;br /&gt;
USBROOT_HUB4&amp;1B96DD0A&amp;1 : USB Root Hub&lt;br /&gt;
USBROOT_HUB4&amp;23036E4B&amp;1 : USB Root Hub&lt;br /&gt;
USBROOT_HUB4&amp;A2AFF59&amp;1 : USB Root Hub&lt;br /&gt;
USBROOT_HUB204&amp;18075F55&amp;1 : USB Root Hub&lt;br /&gt;
USBVID_05DC&amp;PID_A400415DEF11191525121004 : USB Mass Storage Device&lt;br /&gt;
5 matching device(s) found.&lt;/p&gt;

&lt;p&gt;Let&#039;s say I want to remove the USB Flash Disk that is currently attached. In the example, I can see that my device has a unique ID of &quot;415DEF11191525121004.&quot; To remove it, I can quickly type in a command (or, better yet, batch file) that removes this device based on a string within the device. C:&gt;devcon remove &quot;@USB*525121004*&quot; USBVID_05DC&amp;PID_A400415DEF11191525121004 : Removed 1 device(s) removed.&lt;/p&gt;

&lt;p&gt;In my short time using this utility, here&#039;s what I&#039;ve found:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Some devices complain when being &quot;ripped&quot; out of the system like this. Couple your batch file with the Sysinternals tool called &quot;Sync&quot; which can flush the data to the disk before removal. I&#039;m not saying it&#039;ll 100% prevent data damage, but it&#039;s certainly better to sync before removal.&lt;/li&gt;
	&lt;li&gt;When specifying the device to remove, be sure to put the unique device name between quotes.&lt;/li&gt;
	&lt;li&gt;Additionally, proceed it with an @ sign. Not really sure why, that&#039;s just the deal.&lt;/li&gt;
	&lt;li&gt;It seems that each time I remove a device (then plug it back in), I&#039;m essentially re-forcing the PNP subsystem to do its thing when the device is plugged in next. I guess I&#039;m really looking for a command to &quot;eject&quot; a device and not &quot;remove&quot; it.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The closest I&#039;ve come is this:&lt;/p&gt;

&lt;p&gt;&quot;RUNDLL32.EXE SHELL32.DLL,Control_RunDLL hotplug.dll&quot;&lt;/p&gt;

&lt;p&gt;It starts the &quot;Unplug or Eject Hardware&quot; wizard, but that&#039;s about all it does. If anyone figures out the command syntax for disconnecting a device WITHOUT &quot;removing&quot; it, please let me know!&lt;/p&gt;

&lt;p&gt;There&#039;s a nice website dedicated to things like this little utility &lt;a href=&quot;http://www.robvanderwoude.com/index.html&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
If you have any neat tricks to add to this, do let me know!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Everyone I know has cell phones. But heck if I know what carrier they&#039;re using. So, when I want to send a little text message (known properly as SMS messages), I have to just GUESS which service they&#039;re using.&lt;/p&gt;

&lt;p&gt;Is it @vtext.com ? @tmomail.net ? @cingular.com ? Who knows?&lt;/p&gt;

&lt;p&gt;And now, you don&#039;t have to. Just send an email to&lt;br /&gt;
@teleflip.com and -- voila! Instant SMS message to your friend or co-worker.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Ron Hrehirchuk is one of my most active GPanswers.com forum members. He&#039;s constantly knocking tough questions out of the park. Indeed, Ron is going to be helping me with enhancing the &quot;Tips and Tricks&quot; section.&lt;/p&gt;

&lt;p&gt;Recently, Ron found this &lt;a href=&quot;http://www.energystar.gov/index.cfm?c=power_mgt.pr_pm_ez_gpo&quot;&gt;little gem&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The goal? To use Group Policy to control your EnergyStar-compliant systems. I checked it out, and it is very, very nice! I didn&#039;t actually use it though, because I don&#039;t have the right kinds of hardware. But it&#039;s certainly an interesting example of how Group Policy can be used in ways not normally considered.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upcoming Conferences, Appearances, and Classes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Something new... On &lt;a href=&quot;http://www.moskowitz-inc.com/&quot;&gt;www.moskowitz-inc.com&lt;/a&gt; (or &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt;) I have a neat-o calendar that I&#039;m updating with any public (and private) appearances. So, check it out any time for up-to-date information!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Free Live Events&lt;br /&gt;
GROUP POLICY POWER HOUR Webinar&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;New date: Friday, December 03, 2004(was November 19th):&lt;br /&gt;
8:00 AM -- WEST COAST&lt;br /&gt;
11:00 AM -- EAST COAST&lt;br /&gt;
Seminar #3 in the &quot;The Group Policy Power Hour!&quot; It&#039;s 1/2 hour of talk and demos, and 1/2 hour of Q&amp;A!&lt;/p&gt;

&lt;p&gt;Here&#039;s the intro:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;One of the key skills to master is to know what&#039;s going on at your client system. In this talk, Jeremy will demonstrate the various methods to get the Resultant Set of Policy, or RSOP, for your client systems. Both command-line tools and the GPMC can be used to gather this knowledge, so join Jeremy for this Power Hour session!&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Registration is available &lt;a href=&quot;http://tinyurl.com/3rxtr&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Classes and Seminars&lt;br /&gt;
Not free... but worth it! Upcoming classes!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;d love to see you in one of the two-dayGroup Policy intensive training and workshop classes.&lt;/p&gt;

&lt;p&gt;These two-day classes get you up to speed, working with Group Policy, Security settings, ADM templates, and just about all you need to know to hit the ground running -- Fast!&lt;/p&gt;

&lt;p&gt;Or ... if you think you might want your own in-house training of the course (with all the personalizedattention that affords), I&#039;d love to join you on-site!If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!). I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially _endorsed_ by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy team at Microsoft.&lt;/p&gt;

&lt;p&gt;At the MMS 2004 and TechEd 2004 conferences, Mark Williams from the Group Policy team encouraged the throngs of attendees to check out the new Group Policy book and the training!In fact, he dedicated a whole slide to the book, the training,and GPanswers.com for each of his sessions!&lt;/p&gt;

&lt;p&gt;Wow! Thanks again, Microsoft!&lt;/p&gt;

&lt;p&gt;How do attendees feel about the class? My favorite email this month was from Chris Curran from Sullivan Data Management.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Great Class!! Ever since the training everything GPO justseems to make a heck of a lot of sense. It&#039;s like you filledan eyeglass prescription or something.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Chris Curran&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Sullivan Data Management&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;That&#039;s me ... Jeremy Moskowitz, your GPOptometrist.&lt;br /&gt;
Just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;or call me at 302-793-3957.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get a signed copy of Group Policy, Profiles &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We&#039;ve had dozens of people order books directly from GPanswers.com. If you&#039;d like a copy, it&#039;s easy to order, and I&#039;ll sign the book to you, free!&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards, including AMEX just fine.) Thanks for understanding!&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/book.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own the book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so &lt;a href=&quot;http://www.amazon.com/exec/obidos/tg/detail/-/0782142982/&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe and Unsubscribe Information&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;subscribe to this newsletter&lt;/li&gt;
	&lt;li&gt;unsubscribe from this newsletter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How did you get this newsletter? It&#039;s very likely you got it because you handed me (Jeremy Moskowitz) a business card at an event at some kind. And, consequently, I signed you up for my newsletter.&lt;/p&gt;

&lt;p&gt;Or, possibly, you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Author, Instructor, Infrastructure Architect&lt;br /&gt;
Moskowitz, inc.&lt;br /&gt;
&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;br /&gt;
Learn more about Group Policy at GPanswers.com !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#5 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue5</link>
        <pubDate>2004-10-17T23:39:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	It&amp;#39;s Issue 5...
	Where do you want me?
	Moskowitz, inc. Technology Takeaway (r)
	
		Three juicy questions and answers...
	
	
	Upcoming conferences, appearances, and classes
	
		Free live events
		Public courses until the end of the year ... and one for 2005 already!
	
	
	Get a signed copy of Group Policy, Profiles and IntelliMirror
	Subscribe, unsubscribe and usage information
	&amp;nbsp;


Moskowitz, inc. and&amp;nbsp;www.GPanswers.com&amp;nbsp;-- Issue 5

It&amp;#3 ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 5...&lt;/li&gt;
	&lt;li&gt;Where do you want me?&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r)
	&lt;ul&gt;
		&lt;li&gt;Three juicy questions and answers...&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming conferences, appearances, and classes
	&lt;ul&gt;
		&lt;li&gt;Free live events&lt;/li&gt;
		&lt;li&gt;Public courses until the end of the year ... and one for 2005 already!&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Subscribe, unsubscribe and usage information&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Moskowitz, inc. and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; -- Issue 5&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It&#039;s issue five of the Moskowitz, inc. newsletter. Hopefully, you&#039;ve all had some time to at least experiment with XP/SP2. Okay, okay ...here&#039;s my short, shameful confession: I haven&#039;t loaded it yet on my own laptop. Okay, sure, it&#039;s on my desktop machine, but not the one I travel with.&lt;/p&gt;

&lt;p&gt;Why haven&#039;t I committed? Because I&#039;m busy busy busy... running around the country, etc. I&#039;m 1% fearful that I&#039;ll be that &lt;em&gt;one guy&lt;/em&gt; who gets the BLUE SCREEN after the reboot.&lt;/p&gt;

&lt;p&gt;I have some vacation time planned in December. That&#039;s when I&#039;m making my own switch. Do you have a plan for your company? As always, you can forward this newsletter to your friends --but please do so in one whole piece (please don&#039;t just cut and paste).&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Where do you want me?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;m trying to come up with the Group Policy Intensive Training and Workshop class schedule for 2005. My plan is to do 12 PUBLIC training classes â one a month in a different city. I&#039;m committed to having one in Orlando, Phoenix, Dallas, and Philly. All dates (except Orlando) to-be-determined. Everything else is open for negotiation.&lt;/p&gt;

&lt;p&gt;So, if you think you&#039;ve got a great location for a class (we only need 5 people to make it &quot;a go&quot;), then send me an &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com?subject=CLASS%20LOCATION:%20%3Cinsert%20city%20name%20here%3E&quot;&gt;email&lt;/a&gt; with a subject line of CLASS LOCATION: . I&#039;ll take the top 6 suggestions, and that&#039;ll be that. The winning results will be in the next newsletter.Of course, I&#039;ll still be available for PRIVATE training classes inside your company. You don&#039;t have to VOTE for that. Just send me an email when you&#039;re ready to get that started.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technology Takeaway®, a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here&#039;s what&#039;s on people&#039;s minds recently...&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TIP / Question 1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We have a GPO that disables XP/SP2&#039;s Firewall until we can configure and test its use. So, when a new system starts up on our LAN, the GPO takes effect immediately and disables the firewall.&lt;/p&gt;

&lt;p&gt;However, if the user has never connected to the LAN before, and simply dials in, the policy does not appear to have any effect. Ihave left a test machine connected for over 3 hours to give the background refresh time to occur, and have tried manually initiating processing with &quot;gupdate /force&quot; -- but neither had any effect. Again, if I then connect the system to the LAN, the policy takes effect immediately.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;First, you need to be using the XP/SP2 ADM templates. (See previous newsletters for that.)&lt;/p&gt;

&lt;p&gt;Then, you can drill down to:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Computer Configuration | Administrative Templates | Network | Network Connections | Windows Firewall&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;There, you&#039;ll see both &quot;Domain Profile&quot; and &quot;Standard Profile.&quot; And, the policy setting you&#039;re after is: &quot;Firewall: Protect all network connections&quot; and you want to set it to &lt;strong&gt;DISABLED&lt;/strong&gt; (yes, Disabled). The policy settings in &quot;Domain Profile&quot; are used when AUTHENTICATED to a DC. The policy settings in &quot;Standard Profile&quot; are for when the computer ISN&#039;T AUTHENTICATED to a DC.&lt;/p&gt;

&lt;p&gt;Soooooooo.... You have a very special case, my friend. You should set *BOTH* the&lt;br /&gt;
&lt;em&gt;Domain Profile | Firewall: Protect all network connections&lt;/em&gt;&lt;br /&gt;
and the&lt;br /&gt;
&lt;em&gt;Standard Profile | Firewall: Protect all network connections&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;so they are Disabled.&lt;/p&gt;

&lt;p&gt;Why?Because when you dial in you might not be actually authenticating to a DC. Rather, if you dial in (when already logged on) you&#039;re using pass-through authentication. You might need to GET the GPO &lt;em&gt;ONE TIME&lt;/em&gt; on the LAN (ie: not dialed up) for this magic to work. Then, it should keep on working.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Question 2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;How can I stop XP/SP2 from deploying to my clients via critical update?&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 2:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Take a look at the materials on Microsoft&#039;s web site &lt;a href=&quot;http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/sp2aumng.mspx&quot;&gt;here&lt;/a&gt;. There&#039;s an ADM template to squelch XP/SP2 from being automatically downloaded until YOU&#039;RE ready. There&#039;s also other little odds and ends in there to help with the process.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Question 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Jeremy, some things just aren&#039;t going to work after I install XP/SP2. Do you know what is known to &quot;blow up&quot;?&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Check out this &lt;a href=&quot;http://support.microsoft.com/default.aspx?kbid=842242&quot;&gt;KB article&lt;/a&gt; which has a known list of stuff that might not work immediately after XP/SP2 is applied. There are lot of applications on this list, so be sure to give it a look-see &lt;em&gt;BEFORE&lt;/em&gt; you leap into XP/SP2.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upcoming Conferences, Appearances &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; Classes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Something new...&lt;br /&gt;
On &lt;a href=&quot;http://www.moskowitz-inc.com/&quot;&gt;www.moskowitz-inc.com&lt;/a&gt; (or &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; )&lt;br /&gt;
I have a neat-o calendar that I&#039;m updating with any public (and private) appearances. So, check it out anytime for up-to-date information!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Its Free! Jeremy pairs with Microsoft TechNet Presenters at key events!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft is running around the country giving free all-day Active Directory, Group Policy and ISA talks. was just paired up with TechNet presenter Bryan Von Axelson, in Dover, DE and Philadelphia, PA and it was great!&lt;/p&gt;

&lt;p&gt;I&#039;ll be there at some more dates, giving out some free books, some shirts -- oh, and some killer Group Policy tips, too! I get about 20 minutes to speak, but, believe me, you&#039;ll walk away with something you can use immediately.&lt;/p&gt;

&lt;p&gt;Hope to see you there.&lt;/p&gt;

&lt;p&gt;You can sign up for the free Microsoft events &lt;a href=&quot;http://www.technetbriefings.com/&quot;&gt;here&lt;/a&gt;. They&#039;re simply EVERYWHERE around the country. But I&#039;m not. I&#039;m scheduled to appear at two more before the end of the year: December 14th, 2004in my hometown of Wilmington, DE and December 16th, 2004in either Trenton, NJ or Allentown, PA. It&#039;s still being determined. I&#039;ll keep you posted as I know more.&#039;&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Not free... but worth it! Upcoming classes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;d love to see you in one of the two-day Group Policy intensive training and workshop classes.These two-day classes get you up to speed, working with Group Policy, Security settings, ADM templates and just about all you need to know to hit the ground running -- Fast!&lt;/p&gt;

&lt;p&gt;Hope to see you in class soon!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially &lt;em&gt;endorsed&lt;/em&gt; by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy team at Microsoft.&lt;/p&gt;

&lt;p&gt;At the MMS 2004 and TechEd 2004, conferences, Mark Williams from the Group Policy team encouraged the throngs of attendees to check out the new Group Policy book and the training!In fact, he dedicated a whole slide to the book, the training, and GPanswers.com for each of his sessions!&lt;/p&gt;

&lt;p&gt;Wow! Thanks, again Microsoft!&lt;/p&gt;

&lt;p&gt;If you want to see the full course outline, and sign up for an upcoming public class, be sure to &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/gpotraining.html&quot;&gt;click here&lt;/a&gt;. Or ... If you think you might want your own in-house training of the course (with all the personalized attention that affords), I&#039;d love to join you on-site!&lt;/p&gt;

&lt;p&gt;If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!) I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-793-3957.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get a signed copy of Group Policy, Profiles &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We&#039;ve had dozens of people order books directly from GPanswers.com. If you&#039;d like a copy, it&#039;s easy to order, and I&#039;ll sign the book to you, free!&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards, including AMEX just fine.) Thanks for understanding!&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/book.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own the book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so &lt;a href=&quot;http://www.amazon.com/exec/obidos/tg/detail/-/0782142982/&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technology Takeaway (r), a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;. (Supersecret, hidden, Easter-egg)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We&#039;re just giving it away! -- More Technical Takeaway Tips (My way of saying thanks for making it all the way to the end of the newsletter!)&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BONUS TIP #1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Did you know Windows XP&#039;s SP2 has a new ability to have TWO Remote Desktop Sessions? Out the box, XP SP2 only has one. You can enable the second one with a simple registry punch.&lt;/p&gt;

&lt;p&gt;1) In the registry, drill down to: HKEY_LOCAL_MACHINE | System | CurrentControlSet | Control | Terminal Server | Licensing Core. 2) Create a new REG_DWORD value named EnableConcurrentSessions.&lt;br /&gt;
3) Set the value to 1.&lt;/p&gt;

&lt;p&gt;You may have to reboot (or maybe not). And, voila! Instant double-team!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bonus Tip #2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft had another nice online Q&amp;A chat on September 29th with the guys who head up the Group Policy division within Microsoft.&lt;/p&gt;

&lt;p&gt;If you missed the chat, you can catch the &lt;a href=&quot;http://tinyurl.com/5365f&quot;&gt;transcript&lt;/a&gt;. Some goodies in there, for sure!They even mentioned us -- GPanswers.com training! Hey, thanks! You make me blush!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bonus Tip #3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft is having a large 14-part webinar series on Group Policy. They&#039;re doing one each Wednesday until the end of the year. &lt;a href=&quot;https://www.gpanswers.com/admin/www.microsoft.com/seminar/events/series/grouppolicy.mspx&quot;&gt;Discover more about it&lt;/a&gt;!&lt;/p&gt;

&lt;p&gt;My pal Matt Hester from Microsoft is doing the presentations, so be sure to catch some!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe and Unsubscribe Information&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;subscribe to this newsletter&lt;/li&gt;
	&lt;li&gt;unsubscribe from this newsletter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How did you get this newsletter? It&#039;s very likely you got it because you handed me (Jeremy Moskowitz) a business card at an event at some kind. And, consequently, I signed you up for my newsletter.&lt;/p&gt;

&lt;p&gt;Or, possibly, you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Author, Instructor, Infrastructure Architect&lt;br /&gt;
Moskowitz, inc.&lt;br /&gt;
&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;br /&gt;
Learn more about Group Policy at GPanswers.com !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#4 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue4</link>
        <pubDate>2004-08-11T23:39:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	It&amp;#39;s Issue 4...All about Service Pack 2 for XP
	Moskowitz, inc. Technology Takeaway (r) Part I:
	Recap and Corrections from Newsletter #3
	
		Recap + Update #1: XP/SP2 gives you more -- much more
		Recap + Update #2: How to use these 700 new settings that affect XP/SP2 ?
		Recap + Update #3: Loading XP/SP2 will prevent admins from performing RSOPs
	
	
	Upcoming conferences and appearances
	Moskowitz, inc. Technology Takeaway (r) Part II:
	
		What happens if I ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;It&#039;s Issue 4...All about Service Pack 2 for XP&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r) Part I:&lt;/li&gt;
	&lt;li&gt;Recap and Corrections from Newsletter #3
	&lt;ul&gt;
		&lt;li&gt;Recap + Update #1: XP/SP2 gives you more -- much more&lt;/li&gt;
		&lt;li&gt;Recap + Update #2: How to use these 700 new settings that affect XP/SP2 ?&lt;/li&gt;
		&lt;li&gt;Recap + Update #3: Loading XP/SP2 will prevent admins from performing RSOPs&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming conferences and appearances&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r) Part II:
	&lt;ul&gt;
		&lt;li&gt;What happens if I load XP/SP2 and it bluescreens ?&lt;/li&gt;
		&lt;li&gt;Weeding through the bajillion firewall settings in XP/SP2&lt;/li&gt;
		&lt;li&gt;Da Big one: ADM Template Trouble!&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror&lt;/li&gt;
	&lt;li&gt;Subscribe and unsubscribe information&lt;br /&gt;
	 &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Moskowitz, inc. &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt; -- Issue 4&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It&#039;s issue four of the Moskowitz, inc. newsletter. Windows XP&#039;s Service Pack 2 is out, and it affects you.&lt;/p&gt;

&lt;p&gt;Unless you were living under a rock, you already knew XP/SP2 would have some impact on your systems. If you believe the hype, XP/SP2 will change everything from the climate to my bowling average. Trust me, it&#039;s not that bad -- you just need some reliable information to help you get through the change.&lt;/p&gt;

&lt;p&gt;Microsoft has some great data on XP/SP2, and the first place you should travel to is to what I call &quot;XP/SP2 Central&quot; on Microsoft.com&lt;a href=&quot;http://tinyurl.com/4l2hs&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Unfortunately, while I&#039;m sure it&#039;s in there somewhere, this site doesn&#039;t specifically highlight how Group Policy might be affected by the installation of XP/SP2. So, that, my friends, is what this newsletter is all about. (And, as late-breaking information comes out, you might expect another newsletter not too far out!) Once again, I suggest you save a copy of this newsletter (print, inbox, etc) because when Service Pack 2 for XP comes to your organization, you&#039;ll want to recall some of the juicy goodies we&#039;ll be exploring in this issue.&lt;/p&gt;

&lt;p&gt;You can forward this newsletters to your friends but please do so in one whole piece (please don&#039;t just cut and paste.)&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&lt;strong&gt;Technology Takeaway (r), a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;. (Part I)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before we dive into the new stuff for this newsletter, let&#039;s take a quick stroll back to memory lane of Newsletter 3 which also had some Group Policy goodies for XP/Service Pack 2.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recap + Update #1: XP/SP2 gives you more -- much more&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the previous newsletter, I said that XP/SP2 brings about 90 new Group Policy settings to the table. Well, I seemed to not have had my coffee that day, as I failed to mention the additional 619 policy settings which affect Internet Explorer when running on XP/SP2.&lt;/p&gt;

&lt;p&gt;Again, I have a link to Microsoft&#039;s latest spreadsheet which helps bring our the differences &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/ms-resources.html&quot;&gt;here&lt;/a&gt;.That page has now been recently updated to link to Microsoft&#039;s FINAL (not Release Candidate) version of the spreadsheet.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recap + Update #2: How to use these 700 new settings that affect XP/&lt;/strong&gt;&lt;strong&gt;SP2 ?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A common question is: &quot;How do I get these XP/SP2 policy settings to show up when I create a new Group Policy Object?&quot;&lt;/p&gt;

&lt;p&gt;A Microsoft article on how to do that is MSKB 816662, entitled: &quot;Recommendations for managing Group Policy administrative template (.adm) files.&quot; (In the last newsletter, I had the wrong KB article. Again, not enough coffee.) Or, an explanation in plain English with some extra advice for a holistic approach to ADM template management can be found in Chapter 5 of my new Group Policy book.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Recap #3 + Update #3: Loading XP/SP2 will prevent admins from performing RSOPs&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As we stated in the Newsletter 3, once you load XP/SP2, all INCOMING client communication to your clients will be prohibited. If you have viruses and other little nasties running around your network -- this is a good thing. However, you&#039;ll likely want to get back the functionality that&#039;s lost by this change.&lt;/p&gt;

&lt;p&gt;So, what do you do? You have three options:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Option 1&lt;/strong&gt;: Turn off the Windows Firewall in XP/SP2&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Result&lt;/strong&gt;: Would let the nasties back in if they&#039;re running around your network. Maybe not the best option for all organizations... The default setting for Windows Firewall is &quot;Enabled&quot; for a good reason!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Option 2&lt;/strong&gt;: Leave the Windows Firewall on, but make sure I can still perform RSoP and otherwise manage my client computers. Perform this magic using policy settings only found in the Service Pack 2 ADM files.&lt;br /&gt;
or&lt;br /&gt;
&lt;strong&gt;Option 3&lt;/strong&gt;: Manually run around and enable port 445 (to get RSoP back) on specific client machines. This option is tedious and not recommended.&lt;/p&gt;

&lt;p&gt;The net result: Opening up port 445 is essential for administrative tools to work between Active Directory and the XP machine from where you do your administration.&lt;/p&gt;

&lt;p&gt;Again, please check out Newsletter #3 for a full account for how to turn these settings on (which turns off certain Windows Firewall settings.)&lt;/p&gt;

&lt;p&gt;All our newsletter stuff is found &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/newsletter.html&quot;&gt;here&lt;/a&gt;. Additionally, please check out &lt;a href=&quot;http://support.microsoft.com/default.aspx?kbid=883611&quot;&gt;this article&lt;/a&gt;which highlights the precise problem in Microsoft&#039;s words.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upcoming Conferences, Appearances &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; Classes&lt;br /&gt;
It&#039;s free! GROUP POLICY POWER HOUR Webinar&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Seminar #2 in the &quot;The Group Policy Power Hour!&quot;&lt;/p&gt;

&lt;p&gt;It&#039;s 1/2 hour of talk and demos, and 1/2 hour of Q&amp;A!&lt;/p&gt;

&lt;p&gt;Here&#039;s the intro:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;It&#039;s true: Group Policy is now self-documenting. You just need to know where to go to get the information. And securing users&#039; access to which Group Policy functions they can perform is important. If you needed to grant someone specific access to modify a GPO, could you do that? &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Come to this session to learn some &quot;insider goodies&quot; about the Group Policy Management Console (GPMC). Then, ask as many questions as you want in the second half of the POWER HOUR!&lt;br /&gt;
&lt;a href=&quot;http://tinyurl.com/47xxt&quot;&gt;http://tinyurl.com/47xxt&lt;/a&gt;&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Not free... but worth it!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I&#039;d love to see you in one of the two-day Group Policy intensive training and workshop classes.&lt;/p&gt;

&lt;p&gt;These two-day classes get you up to speed, working with Group Policy, Security settings, ADM templates and just about all you need to know to hit the ground running -- Fast!&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially _endorsed_ by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy team at Microsoft.&lt;/p&gt;

&lt;p&gt;At both MMS 2004 and TechEd 2004 Mark Williams from the Group Policy team encouraged the throngs of attendees to check out the new Group Policy book and the training! In fact, he dedicated a whole slide to the book, the training, and GPanswers.com for each of his sessions! Wow! Thanks, again Microsoft!&lt;/p&gt;

&lt;p&gt;If you want to see the full course outline, and sign up for an upcoming public class, be sure to check out: &lt;br /&gt;
&lt;a href=&quot;https://www.gpanswers.com/live-class&quot;&gt;www.gpanswers.com/live-class&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Or... If you think you might want your own in-house training of the course (with all the personalized attention that affords), I&#039;d love to join you on-site! If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!) I&#039;ll even travel overseas to the U.K., other parts of Europe, or Japan -- or wherever! Have passport, will travel!&lt;/p&gt;

&lt;p&gt;Just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-793-3957.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technology Takeaway (r), a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;. (Part II)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here&#039;s some fresh, new material about XP/SP2!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What happens if I load XP/SP2 and it bluescreens?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As Hitchhiker&#039;s Guide to the Galaxy says, &quot;DON&#039;T PANIC.&quot; Here are the steps to rollback XP/SP2 to a (hopefully) previously working condition:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Boot to recovery console. You can do this by booting off any bootable Windows XP CD if you haven&#039;t previously loaded it.&lt;/li&gt;
	&lt;li&gt;Using the recovery console, locate the %windir% $NTServicePackUninstall$spuninst folder&lt;/li&gt;
	&lt;li&gt;Rename &quot;spuninst.txt&quot; to &quot;spuninst.bat&quot;&lt;/li&gt;
	&lt;li&gt;Then, execute the batch file with &quot;Batch spuninst.bat&quot;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This should remove XP/SP2 &lt;strong&gt;&lt;em&gt;AND&lt;/em&gt;&lt;/strong&gt; if you have it, XP/SP1, so be careful! This will return you to Windows XP -- NO SERVICE PACK!&lt;/p&gt;

&lt;p&gt;This could be especially troublesome on unprotected networks if youstill have little nasties running around within the network!&lt;/p&gt;

&lt;p&gt;Why does a bluescreen happen? Matrox Millenium drivers seem to be a major cause. Load latest drivers on Matrox web site, then re-apply the XP/SP2 installation.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Once XP/SP2 is installed, there a bajillion firewall settings. How can I figure out what they all do?-&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft has a great document just for the &quot;Star Feature&quot; of XP/SP2, the Windows Firewall. Learn how to make it sing and dance the way YOU want.&lt;/p&gt;

&lt;p&gt;The document is called:Deploying Windows Firewall Settings for Microsoft Windows XP with Service Pack 2 and you can find it &lt;a href=&quot;http://tinyurl.com/ytmue&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Da Big one: ADM Template Trouble!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Those of you hear me speak, know I talk about a concept called a &quot;Management Station.&quot; Your Management Station is where you DO your Group Policy work from.&lt;/p&gt;

&lt;p&gt;You could create a new GPO by walking up to a Windows 2000 DC, then modify that same GPO by walking up to your Windows XP PC and editing it there. In this scenario, you&#039;ve used two &quot;Management Stations&quot; -- both the Windows 2000 DC and the Windows XP PC.&lt;/p&gt;

&lt;p&gt;The problem we need to take a moment to discuss is what happens when you use templates from Windows XP/SP2 and use them on any management station OTHER THAN XP/SP2.&lt;/p&gt;

&lt;p&gt;And you&#039;ll get it about 50 (yes, 50) times (with various error messages.)&lt;/p&gt;

&lt;p&gt;Here&#039;s the link from Microsoft which describes the problem: &lt;a href=&quot;http://support.microsoft.com/?kbid=842933&quot;&gt;http://support.microsoft.com/?kbid=842933&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But what is this technote really saying?&lt;/p&gt;

&lt;p&gt;It&#039;s saying that you&#039;ll need to apply a patch on any management station you modify Group Policy from. Does this mean you have to patch EVERY server and EVERY workstation? NO! You only need to patch the locations from WHERE YOU CREATE AND EDIT GPOs.&lt;/p&gt;

&lt;p&gt;So, where do you find the patches?&lt;/p&gt;

&lt;p&gt;If you use Windows 2000 as your management station, you can use this patch, &lt;a href=&quot;http://tinyurl.com/4ze3y&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Patches for XP/SP1 and WS03-RTM are forthcoming. I&#039;ll have an announcement on the BBS when Microsoft releases them.&lt;/p&gt;

&lt;p&gt;Follow-up on this important bug, in the Moskowitz inc. Group Policy forums. Specifically, I&#039;ve started a thread &lt;a href=&quot;http://www.moskowitz-inc.com/bbs/viewtopic.php?p=510&quot;&gt;here&lt;/a&gt; in the forumsjust for this specific bug. So, sign up for the forums, and stay tuned!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get a signed copy of Group Policy, Profiles &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We&#039;ve had dozens of people order books directly from GPanswers.com. If you&#039;d like a copy, it&#039;s easy to order, and I&#039;ll sign the book to you, free!&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards, including AMEX just fine.) Thanks for understanding!&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/book.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Oh, and if you own the book, and want to say nice things on Amazon, please do so! That would be great. Thanks! You can do so &lt;a href=&quot;http://www.amazon.com/exec/obidos/tg/detail/-/0782142982/&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technology Takeaway (r), a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;. (Supersecret, hidden, Easter-egg Part III)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We&#039;re just giving it away!&lt;br /&gt;
 -- More Technical Takeaway Tips&lt;br /&gt;
(My way of saying thanks for making it all the way to the end of the newsletter!)&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bonus Tip #1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Special GOLD STAR to Andy King who has a super solution for whacking MyDoom nasties with GPOs. Just check out our ongoing support forum. Specifically, Andy posted his solution &lt;a href=&quot;http://www.moskowitz-inc.com/bbs/viewtopic.php?t=192&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
Thanks Andy!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bonus Tip #2 (Keeping with our XP/SP2 theme)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://tinyurl.com/6mvve&quot;&gt;Check this out&lt;/a&gt; on Microsoft&#039;s web site for a detailed how-to install XP/SP2 using SMS.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bonus Tip #3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Microsoft had a nice &lt;a href=&quot;http://tinyurl.com/4u6ez&quot;&gt;online Q&amp;A&lt;/a&gt; chat with the guys who head up the Group Policy division within Microsoft. If you missed the chat, you can catch the transcript. Some goodies in there, for sure!&lt;/p&gt;

&lt;p&gt;They even mentioned us -- GPanswers.com! Hey, thanks!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe and Unsubscribe Information&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;subscribe to this newsletter&lt;/li&gt;
	&lt;li&gt;unsubscribe from this newsletter&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;How did you get this newsletter? It&#039;s very likely you got it because you handed me (Jeremy Moskowitz) a business card at an event at some kind. And, consequently, I signed you up for my newsletter.&lt;/p&gt;

&lt;p&gt;Or, possibly, you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: &lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Author, Instructor, Infrastructure Architect&lt;br /&gt;
Moskowitz, inc.&lt;br /&gt;
&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;br /&gt;
Learn more about Group Policy at GPanswers.com !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#3 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue3</link>
        <pubDate>2004-07-04T23:40:00+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	Moskowitz, inc. and&amp;nbsp;www.GPanswers.com

	
		Partnering with the GPTF.ORG
	
	
	Upcoming conferences and appearances
	
		Not free... but worth it!
	
	
	Moskowitz, inc. Technology Takeaway (r)
	
		XP&amp;#39;s SP2 is imminent (save this email!)
		Bonus!: Kill Spyware with Group Policy!
	
	
	Get a signed copy of Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000
	Subscribe and unsubscribe information


&amp;nbsp;

Moskowitz, ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Moskowitz, inc. and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt;

	&lt;ul&gt;
		&lt;li&gt;Partnering with the GPTF.ORG&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming conferences and appearances
	&lt;ul&gt;
		&lt;li&gt;Not free... but worth it!&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r)
	&lt;ul&gt;
		&lt;li&gt;XP&#039;s SP2 is imminent (save this email!)&lt;/li&gt;
		&lt;li&gt;Bonus!: Kill Spyware with Group Policy!&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/li&gt;
	&lt;li&gt;Subscribe and unsubscribe information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;. and &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It&#039;s issue three of the Moskowitz, inc. newsletter. As promised, it&#039;s strategically put out &quot;Roughly whenever I feel like it.&quot;&lt;/p&gt;

&lt;p&gt;And I feel like it!&lt;/p&gt;

&lt;p&gt;Why? There&#039;s a lot of Group Policy buzz! There&#039;s a lot happening lately, and I want to be the first to bring it to you. So, let&#039;s kick off this issue.&lt;/p&gt;

&lt;p&gt;I suggest you save a copy of this newsletter (print, inbox, etc) because when Service Pack 2 for XP hits, you&#039;ll want to recall some of the juicy goodies we&#039;ll be exploring in this issue.  &lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Introducing the GPTF.ORG&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Harmony. Cooperation. Working together.&lt;/p&gt;

&lt;p&gt;These phrases are not something that is normally associated with rival product vendors. But, that&#039;s exactly what is going to be happening with an upcoming group I&#039;ve helped create called the &quot;Group Policy Task Force&quot; or, GPTF.&lt;/p&gt;

&lt;p&gt;The GPTF is a consortium of vendors which make Group Policy product add-ons. Many vendors hook-in to what Microsoft&#039;s Group Policy already offers and takes it to the next level. Even Microsoft, themselves are a member. This strong showing of support from all vendors involved demonstrates their commitment to the Group Policy &quot;way of life&quot; which we know and love to use every day.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;So, Where do I fit in?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I came up with the idea because there was no direct avenue for Microsoft to hear vendors&#039; requests, assess how important those requests were to administrators like you, and actually get the wish into the next version of Group Policy product.&lt;/p&gt;

&lt;p&gt;Additionally, because Group Policy is becoming more and more important it&#039;s only a matter of time before vendors start to want to have some interoperability between their products.&lt;/p&gt;

&lt;p&gt;I will be helping with ongoing coordination efforts My official title in this role is called &quot;Group Policy Evangelist&quot; (how cool is that!?) If I only got a scepter or something to wield around... now that would be cool. But I digress.&lt;br /&gt;
(Actually, &lt;a href=&quot;http://www.wandworkshops.freeserve.co.uk/septre-wands.htm&quot;&gt;this one&lt;/a&gt; is pretty cool)&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;So, where do you fit in?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;While the GPTF is not open for membership to the community-at-large (ie: network administrators) directly, there are two ways you can help.&lt;/p&gt;

&lt;p&gt;First, you should communicate with your 3rd party product vendor about what you want to see regarding interoperability. If you see an avenue for cross-over between vendors, there&#039;s a good chance that we can make it happen now.&lt;/p&gt;

&lt;p&gt;Also, if you have a specific wish you might want built right into Group Policy itself, we have a new forum at the GPanswers.com &lt;a href=&quot;http://www.moskowitz-inc.com/bbs&quot;&gt;bulletin-board&lt;/a&gt; entitled &quot;Group Policy Functionality Wish List&quot; where you can post what you want! No guarantees that your wish is going to be embraced, but, if you don&#039;t A-S-K, you won&#039;t G-E-T.&lt;/p&gt;

&lt;p&gt;You can check out the GPTF.ORG web site to see which vendors are participating. And, you can check out our official press release &lt;a href=&quot;http://www.gptf.org/pressrelease.html&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Upcoming Conferences, Appearances &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; Classes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Not free... but worth it!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The number one thing holding back administrators from using Group Policy more is LACK OF TRAINING. Well, there&#039;s no excuse anymore!&lt;/p&gt;

&lt;p&gt;Join us for one of my upcoming two-day &quot;Group Policy Intensive Training and Workshop&quot; classes.&lt;/p&gt;

&lt;p&gt;Again, while the training course isn&#039;t officially _endorsed_ by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy team at Microsoft.&lt;/p&gt;

&lt;p&gt;At both MMS 2004 and TechEd 2004 Mark Williams from the Group Policy team encouraged the throngs of attendees to check out the new Group Policy book and the training!&lt;/p&gt;

&lt;p&gt;In fact, he dedicated a whole slide to the book, the training, and GPanswers.com for each of his sessions! Wow! Thanks, again Microsoft!&lt;/p&gt;

&lt;p&gt;So, to sign up for an upcoming public class, and check out the full course outline, be sure &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/gpotraining.html&quot;&gt;click here&lt;/a&gt;.&lt;br /&gt;
Or... If you think you might want your own in-house training of the course (with all the personalized attention that affords),&lt;/p&gt;

&lt;p&gt;I&#039;d love to join you on-site! If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!)&lt;/p&gt;

&lt;p&gt;Just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-793-3957.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technology Takeaway (r), a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;XP&#039;s Service Pack 2 is almost ready to burst forth on the scene.&lt;/p&gt;

&lt;p&gt;Are you ready?&lt;/p&gt;

&lt;p&gt;If I were you, I&#039;d be glued to Microsoft&#039;s SP2 site for Microsoft professionals which is &lt;a href=&quot;http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/winxpsp2.mspx&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I&#039;m quite sure there will be some upcoming prescriptive guidance for it&#039;s proper deployment and implementation, so stay tuned. However, Release Candidate 2 (RC2) is out, and you can play with it today. And, you should. This is because when you apply XP/SP2 to an existing XP system, you get new functionality, new power, and the ability to manage more stuff with about 90 new policy settings to play with! (&lt;strong&gt;Correction &lt;/strong&gt;for anyone reading the archive version of this newsletter, that should have read 611 new settings if you include al the IE ones)&lt;/p&gt;

&lt;p&gt;I have a link to Microsoft&#039;s latest spreadsheet which helps bring our the differences &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/ms-resources.html&quot;&gt;here&lt;/a&gt;. The biggest thing to expect with XP/SP2 is the fact that the Windows Firewall (formally known as the Internet Connection Firewall) is &lt;strong&gt;ENABLED&lt;/strong&gt; (that is, turned ON) by default. So, as soon as XP/SP2 is installed, there&#039;s a good chance things won&#039;t work as expected.&lt;/p&gt;

&lt;p&gt;Once the Windows firewall is turned on, you won&#039;t even be able to ping your XP/SP2 machines. In other words, all &lt;strong&gt;INCOMING&lt;/strong&gt; client communication to your clients will be prohibited (though as of XP/SP2 RC2, there is an exception for Remote Assistance on port 3389.)&lt;/p&gt;

&lt;p&gt;So, what do you do?&lt;/p&gt;

&lt;p&gt;Here are some suggested avenues to mitigate your potential upcoming pain.&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&lt;strong&gt;Option 1: Turn off the Windows Firewall in XP/SP2&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;re thinking &quot;I&#039;m already working just fine, I don&#039;t want the Windows Firewall at all&quot; you can disable it when users authenticate to your domain controllers.&lt;/p&gt;

&lt;p&gt;The new policy setting is located here: &lt;em&gt;Configuration | Administrative Templates | Network |Network Connections | Windows Firewall | Domain Profile&lt;/em&gt; and is named &lt;em&gt;Windows Firewall: Protect all Network connections&lt;/em&gt; policy setting&lt;/p&gt;

&lt;p&gt;This policy setting is a little weird. In order to turn off the Windows Firewall, you need to set the policy setting to &lt;strong&gt;DISABLED&lt;/strong&gt;. This is because, the new default sets XP/SP2 to have the firewall &lt;strong&gt;ENABLED&lt;/strong&gt;; so you&#039;re essentially REVERSING the edict.&lt;/p&gt;

&lt;p&gt;Turning off the Windows firewall might be just the thing, or it might be overkill. If you think it might be overkill, read onward!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Option 2: Leave the Windows Firewall on, but make sure I can still manage my client computers&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Like I said earlier, once the Windows Firewall is on, all inbound client communications is kaput. But, you&#039;ll occasionally need to talk TO your clients from the servers.&lt;/p&gt;

&lt;p&gt;Specifically, if you use GPRESULT or the Resultant Set of Policy tools built into the GPMC, you won&#039;t be able to ask the client &quot;What&#039;s going on?&quot; without adjusting the XP/SP2 client.&lt;/p&gt;

&lt;p&gt;So, how do you fix it?&lt;/p&gt;

&lt;p&gt;Drill down to&lt;em&gt; Configuration | Administrative Templates | Network | Network Connections | Windows Firewall | Domain Profile&lt;/em&gt; and &lt;strong&gt;ENABLE&lt;/strong&gt; the policy setting named &lt;em&gt;Windows Firewall: Allow Remote Administration Exception&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Now your requests will successfully go through.&lt;/p&gt;

&lt;p&gt;Also, according to some sources, this is the same policy setting you would enable if you have your Active Directory Administration tools running on your XP/SP2 machine, such as Active Directory Users and Computers or the GPMC. This is because ENABLING this policy additionally opens up port 445 which is essential for these tools to work between Active Directory and the XP machine from where you do your administration. However, in my testing Active Directory Users and Computers, AD Domains and Trusts, and many other administration tools worked just fine without me needing to open up port 445 via this setting. Your experience might be different depending on the tools you use.&lt;/p&gt;

&lt;p&gt;A common question is: &quot;How do I get these XP/SP2 policy settings to show up when I create a new Group Policy Object?&quot;&lt;/p&gt;

&lt;p&gt;A Microsoft article on how to do that is MSKB 816662, entitled: &quot;Recommendations for managing Group Policy administrative template (.adm) files.&quot;&lt;/p&gt;

&lt;p&gt;Or, an explanation in plain English with some extra advice for a holistic approach to ADM template management can be found in Chapter 5 of my new Group Policy book.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;***BONUS TIPS***&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We&#039;re just giving it away!&lt;br /&gt;
-- More Technical Takeaway Tips&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BONUS TIP #1&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Want to preemptively kill spyware and the like leveraging GPOs? This &lt;a href=&quot;http://blogs.red-abstract.com/vermyndax/articles/304.aspx&quot;&gt;BLOG&lt;/a&gt; demonstrates how to use SpywareBlaster to leverage GPOs to configure your clients.&lt;/p&gt;

&lt;p&gt;Use at your own risk. I haven&#039;t tried it out, but it sounds good on paper.&lt;/p&gt;

&lt;p&gt;Thanks to contributor Bill Avellan for locating this!&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&lt;strong&gt;BONUS TIP #2: &lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Are your incremental backups larger than you think they should be? Maybe it&#039;s a bug with Group Policy. Check out the fix &lt;a href=&quot;http://support.microsoft.com/default.aspx?kbid=833281&quot;&gt;here&lt;/a&gt;. It corrects a problem if you&#039;re using Group Policy to change file permissions.&lt;/p&gt;

&lt;p&gt;Thanks to contributor Gary Busby for this one!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get a signed copy of Group Policy, Profiles &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We&#039;ve had dozens of people order books directly from GPanswers.com. If you&#039;d like a copy, it&#039;s easy to order, and I&#039;ll sign the book to you, free!&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards just fine.) Thanks for understanding!&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking &lt;a href=&quot;http://www.moskowitz-inc.com/grouppolicy/book.html&quot;&gt;here&lt;/a&gt;:&lt;/p&gt;

&lt;p&gt;Thanks for reading! And, as promised I&#039;ll send out the next newsletter &quot;Roughly whenever I feel like it&quot; or whenever big news hits. Until next time!&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe and Unsubscribe Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;- subscribe to this newsletter&lt;br /&gt;
- unsubscribe from this newsletter&lt;/p&gt;

&lt;p&gt;How did you get this newsletter? It&#039;s very likely you got it because you handed me (Jeremy Moskowitz) a business card at an event at some kind. And, consequently, I signed you up for my newsletter.&lt;/p&gt;

&lt;p&gt;Or, possibly, you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address:&lt;br /&gt;
&lt;a href=&quot;https://www.gpanswers.com/newsletter&quot;&gt;www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Author, Instructor, Infrastructure Architect&lt;br /&gt;
Moskowitz, inc.&lt;br /&gt;
&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;br /&gt;
Learn more about Group Policy at GPanswers.com !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#2 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue2</link>
        <pubDate>2004-05-30T23:40:42+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:


	Moskowitz, inc. and&amp;nbsp;www.GPOanswers.com, er, GPanswers.com updates

	
		Help GPanswers.com rise to the top!
		Helping your fellow Group Policy administrator!
	
	
	Upcoming conferences and appearances
	
		It&amp;#39;s free! Windows Server 2003 Group Policy Essentials Webinar
		Not free... but worth it! Upcoming classes.
	
	
	Moskowitz, inc. Technology Takeaway (r): five juicy questions (and answers!)
	Get a signed copy of Group Policy, Profiles andIntelliMirror  ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Moskowitz, inc. and &lt;a href=&quot;http://www.gpoanswers.com/&quot;&gt;www.GPOanswers.com&lt;/a&gt;, er, GPanswers.com updates

	&lt;ul&gt;
		&lt;li&gt;Help GPanswers.com rise to the top!&lt;/li&gt;
		&lt;li&gt;Helping your fellow Group Policy administrator!&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Upcoming conferences and appearances
	&lt;ul&gt;
		&lt;li&gt;It&#039;s free! Windows Server 2003 Group Policy Essentials Webinar&lt;/li&gt;
		&lt;li&gt;Not free... but worth it! Upcoming classes.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;Moskowitz, inc. Technology Takeaway (r): five juicy questions (and answers!)&lt;/li&gt;
	&lt;li&gt;Get a signed copy of Group Policy, Profiles andIntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/li&gt;
	&lt;li&gt;Subscribe and unsubscribe information&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;br /&gt;
&lt;strong&gt;Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;. and &lt;a href=&quot;http://www.gpoanswers.com/&quot;&gt;www.GPOanswers.com&lt;/a&gt;, er...&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It&#039;s stunned analysts everywhere. Okay, actually,no one seemed to notice. But, I&#039;ve decided to change the name of GPOanswers.com to GPanswers.com&lt;/p&gt;

&lt;p&gt;Why the change?&lt;/p&gt;

&lt;p&gt;Well, the GPO (Group Policy Object) is the &quot;molecule&quot; that makes the Group Policy world go round. However, the name GPOanswers.com wasn&#039;t all encompassing enough.&lt;/p&gt;

&lt;p&gt;In reality, the forum and the web site is about all aspects of Group Policy, not just the GPO &quot;molecule.&quot;&lt;/p&gt;

&lt;p&gt;To that end, I&#039;ve renamed it to be &lt;a href=&quot;https://www.gpanswers.com/&quot;&gt;www.GPanswers.com&lt;/a&gt;. Note that &lt;a href=&quot;http://www.gpoanswers.com/&quot;&gt;www.GPOanswers.com&lt;/a&gt; will still point to the same place.&lt;br /&gt;
 &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Help GPanswers.com rise to the top!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;There&#039;s only one &quot;go to&quot; location for Group Policy help on the web. And that&#039;s. GPanswers.com!&lt;/p&gt;

&lt;p&gt;Only problem? Our Google rank is in the tank.&lt;/p&gt;

&lt;p&gt;I&#039;m not a &quot;Google-head&quot; -- that is, I don&#039;t have a genuine understanding of the Google-rhythm, or whatever the algorithm is called that pushes certain pages to the top of the ranks.&lt;/p&gt;

&lt;p&gt;Long story short, the only thing I know that helps is if others POINT to the web site. So, if you&#039;re interested in helping out the community, then, please create a web site link from your web site &lt;em&gt;to&lt;/em&gt; GPanswers.com.&lt;/p&gt;

&lt;p&gt;You&#039;ll be helping everyone who is interested in getting some extra Group Policy help.  &lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&lt;strong&gt;Helping your fellow Group Policy administrators!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Hopefully, you&#039;re finding the updated resources of GPanswers.com useful. We have some dedicated folks in the forum (&lt;a href=&quot;http://www.moskowitz-inc.com/bbs&quot;&gt;www.moskowitz-inc.com/bbs&lt;/a&gt;) constantly knocking out questions for others in need.&lt;/p&gt;

&lt;p&gt;If you&#039;re an expert (or use Group Policy a lot) we would encourage you to help out others! That&#039;s the spirit of the forum ...give a penny, leave a penny... er, ask a question, answer a question.&lt;/p&gt;

&lt;p&gt;Also, if you come across something that&#039;s new and exciting which EVERYONE should know about, then let me know.&lt;/p&gt;

&lt;p&gt;I&#039;ll make it a permanent link in the GPanswers.com site.&lt;/p&gt;

&lt;p&gt;Note that I&#039;ve changed the policy of the forum a bit. That is, we now require that you are a registered member of the forum to post. This is because guests don&#039;t have the ability to receive emails when someone responds to their posts. And we want to make sure that all answers are getting to their respective question-askers.&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&lt;strong&gt;Upcoming Conferences, Appearances &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; Classes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It&#039;s free!&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
&lt;strong&gt;Windows Server 2003 Group Policy Essentials Microsoft Technet Webinar&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;From the Microsoft site:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Just getting started with Windows Group Policy? Unsure of where WindowsR Group Policy applies or how to manage them? In this session you&#039;ll learn just what Group Policy is, and how you can deploy it correctly. Join this webcast to hear Active Directory and Group Policy guru Jeremy Moskowitz (from GPOanswers.com) and author of the recently overhauled &quot;Group Policy, Profiles and Intellimirror for Windows 2003, Windows 2000 and Windows XP teach you the ropes. Learn how to modify Group Policy objects to lock down desktops and manage your user environments. Gain insights into the thorny issues surrounding permissions. Discover how to delegate the job of creating Group Policy. Last, you&#039;ll learn how to troubleshoot Group Policy --through tools and with your bare hands.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Sign up here: &lt;a href=&quot;http://go.microsoft.com/fwlink/?LinkId=27801&quot;&gt;http://go.microsoft.com/fwlink/?LinkId=27801&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Not free... but worth it! Upcoming classes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We&#039;d love to see you in the upcoming two-day Group Policy intensive training and workshop class. Here&#039;s what one IT manager said after taking the training:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Facing the challenge of upgrading our multi-site user environment I was very concerned with my staff&#039;s limited knowledge of Group Policy.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Much like most sites we struggled with estimating outside resource requirements for our Active Directory project. Looking for Group Policy specific training proved to be a challenge and I turned to a resource from my computer security group who recommended Jeremy.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;After speaking with Jeremy about the classes I immediately identified him as someone who would be a valued resource, as he clearly understood many of the problems I was facing. After the class which wrapped up on 4/24 I find myself adjusting my project plan, as my staff went from being unsure of the challenge ahead to being able to confidently plan and implement a strong Group Policy environment.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The class was very detailed and Jeremy really knows how to control the class. The labs are great assuring that everyone can touch and feel Group Policy. Jeremy proved to be a solid professional, and from what I can tell one of the few who can drill down to the expert level in Group Policy.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Maurice McClain,&lt;br /&gt;
GSEC Manager IS Operations&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Thanks Maurice!&lt;/p&gt;

&lt;p&gt;Also, while the training course isn&#039;t officially &lt;em&gt;endorsed&lt;/em&gt; by Microsoft, the class does the have distinction of being a suggested avenue for intense Group Policy training by members of the Group Policy team at Microsoft.&lt;/p&gt;

&lt;p&gt;Indeed, at TechEd 2004 Mark Williams from the Group Policy team encouraged the 1500 attendees to check out the new Group Policy book and the training! In fact, he dedicated a whole slide to the book, the training, and GPanswers.com for each of his sessions!&lt;/p&gt;

&lt;p&gt;Wow! Thanks, Microsoft!&lt;/p&gt;

&lt;p&gt;So, to sign up for an upcoming public class, and check out the full course outline, be sure to visit: &lt;a href=&quot;https://www.gpanswers.com/my-online-class&quot;&gt;www.gpanswers.com/my-online-class&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Or... If you think you might want your own in-house training of the course (with all the personalized attention that affords), I&#039;d love to join you on-site! Just contact me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; or call me at 302-793-3957. If you have even a handful of in-house people interested in the training, the course pays for itself (as you don&#039;t need to ship people offsite!)&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technology Takeaway (r), a service of Moskowitz, &lt;/strong&gt;&lt;strong&gt;inc&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here are some questions on people&#039;s minds recently...&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Question 1:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I implemented an Account locked out policy on my domain. I set the policy to lockout after 3 tries, but most user accounts still get locked out with our old account policy. So, next, I tried to disable the policy but my domain Administrator account still gets locked out according to the old lockout policy. What could be causing this?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 1:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This sounds like you have a DNS problem. I know, I know â how can this possibly be a DNS issue, you ask? I submit that perhaps not all of your Domain Controllers are receiving the updated domain policy. Hence, they are retaining some other policy you set. So, my advice? Make one DNS server the authoritative source and have all Domain Controllers (temporarily) use that DNS server for resolution. Hopefully, the latest policy will take affect, and you&#039;ll be updated.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Question 2:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;How do restrict users from opening and editing the registry in Windows XP. All domain controllers are 2003 server.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 2:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Software Restriction Policies to the rescue! There are plenty of great Microsoft articles on Software Restriction Policies in Technet or online. (Or, you can get it in plain English in my book.) Don&#039;t forget, though, that Software Restriction Policies are only valid for Windows XP or Windows 2003 as clients â those with Windows 2000 clients are out of luck! Oh, and it doesn&#039;t matter if your DCs are 2000 or 2003.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Question 3:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Are Group Policy Objects cumulative? If a GPO is linked to the domain and then a separate GPO is linked to an OU, do features of the domain GPO &quot;flow&quot; down to the OU and apply with features set in the OU GPO as long as they don&#039;t conflict? I thought that if a GP was assigned to an OU then its features would overwrite any features set by a GP assigned to a level above.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 3:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you have no GPOs that &lt;em&gt;conflict&lt;/em&gt; anywhere in your SOM (scope of management), they will apply cumulatively. However, if you have a GPO which says to do one specific thing at, say, the Domain level, and another GPO which ways to do a specific thing, at, say the OU level, the one &quot;closer&quot; to the user (or computer) will apply. So, here&#039;s a simple example: At the domain level, imagine that you restrict the control panel, but at the OU level, you make it available again. Since the GPO linked to the OU is &lt;em&gt;closer&lt;/em&gt; to the target account, that&lt;em&gt;affect&lt;/em&gt; will take effect.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Question 4:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I blew up the Default Domain Policy in my Windows 2000 domain. How can I recover that?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 4:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You&#039;re in luck! (Well, not really since you blew up a critical GPO.) Microsoft has just released RecreateDefPol.exe. It restores the Default Domain and Default Domain Controllers policy GPOs in case of accidental deletion. This tool is for use exclusively on Windows 2000 Server, Advanced Server, and DataCenter Server. Do not use this tool on Windows Server 2003; use Dcgpofix.exe instead (included in Windows Server 2003). You can download the tool directly from Microsoft here: &lt;a href=&quot;http://tinyurl.com/3yyr3&quot;&gt;http://tinyurl.com/3yyr3&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Question 5:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I love using the Group Policy Software Deployment functionality. However, recently I tried to decommission a file server we were using, and well, chaos ensued. Any recommendations or &quot;best practices&quot; for using Group Policy Software Deployment?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer 5:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Use DFS in conjunction with software deployment, and you&#039;ll be in clover. Why? Because DFS will abstract the REAL severname from the equation. That is, you can bank on the DFS share being there, even if you change the underlying file server name. So, my recommendation is to use &lt;a href=&quot;file://%7Bdfsname%7D%7Brootshare/&quot;&gt;{dfsname}{rootshare&lt;/a&gt;} like &lt;a href=&quot;file://corp.comsoftware/&quot;&gt;corp.comsoftware&lt;/a&gt; instead of &lt;a href=&quot;file://%7Bspecificserver%7D%7Bsharename/&quot;&gt;{specificserver}{sharename&lt;/a&gt;}. This way, if you change servers, you can easily move the file share to the new server, change the DFS pointer, and everything just keeps on truckin&#039; !&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Get a signed copy of Group Policy, Profiles &lt;/strong&gt;&lt;strong&gt;and&lt;/strong&gt;&lt;strong&gt; IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We&#039;ve had dozens of people order books directly from GPanswers.com. If you&#039;d like a copy, it&#039;s easy to order, and I&#039;ll sign the book to you, free!&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards just fine.) Thanks for understanding!&lt;/p&gt;

&lt;p&gt;Order your signed copy today by clicking here: &lt;a href=&quot;https://www.gpanswers.com/books&quot;&gt;www.gpanswers.com/books&lt;/a&gt; Thanks for reading! And, as promised I&#039;ll send out the next newsletter &quot;Roughly whenever I feel like it&quot; or whenever big news hits. Until next time!&lt;/p&gt;

&lt;p&gt;Subscribe and Unsubscribe Information&lt;br /&gt;
==============================================&lt;/p&gt;

&lt;p&gt;- subscribe to this newsletter&lt;br /&gt;
- unsubscribe from this newsletter&lt;/p&gt;

&lt;p&gt;How did you get this newsletter? It&#039;s very likely you got it because you handed me (Jeremy Moskowitz) a business card at an event at some kind. And, consequently, I signed you up for my newsletter.&lt;/p&gt;

&lt;p&gt;Or, possibly, you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address :&lt;a href=&quot;https://www.gpanswers.com/component/content/section/8.html?layout=blognewsletter&quot;&gt;https://www.gpanswers.com/newsletter&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you need personalized attention in any way, just email me: &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; I endeavor to respond to everyone who emails.&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

&lt;p&gt;Jeremy Moskowitz&lt;br /&gt;
Author, Instructor, Infrastructure Architect&lt;br /&gt;
Moskowitz, inc.&lt;br /&gt;
&lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt;&lt;br /&gt;
Learn more about Group Policy at GPanswers.com !&lt;/p&gt;
        </content:encoded>
    </item>
        <item>
        <title> Issue#1 </title>
        <link>https://www.mdmandgpanswers.com/blogs/view-blog/issue1</link>
        <pubDate>2004-05-21T23:41:21+00:00</pubDate>
        <dc:creator>
            <![CDATA[ Jeremy Moskowitz ]]>
        </dc:creator>
        <description>
            <![CDATA[ In this issue:

-Jeremy&amp;#39;s put together his first newsletter!
- Moskowitz, inc. and&amp;nbsp;www.GPAnswers.com&amp;nbsp;updates:
- It&amp;#39;s OUT! The most anticipated sequel of the year!
- How to get your copy of Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000
- Join us at&amp;nbsp;www.GPAnswers.com
- Upcoming Group Policy intensive class: onsite and public
- Upcoming conferences and appearances
- Moskowitz, inc. Technology Takeaway (r): five juicy questions ]]>
        </description>
        <content:encoded>
            &lt;p&gt;In this issue:&lt;/p&gt;

&lt;p&gt;-Jeremy&#039;s put together his first newsletter!&lt;br /&gt;
- Moskowitz, inc. and &lt;a href=&quot;http://www.GPAnswers.com/&quot;&gt;www.GPAnswers.com&lt;/a&gt; updates:&lt;br /&gt;
- It&#039;s OUT! The most anticipated sequel of the year!&lt;br /&gt;
- How to get your copy of Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000&lt;br /&gt;
- Join us at &lt;a href=&quot;http://www.GPAnswers.com/&quot;&gt;www.GPAnswers.com&lt;/a&gt;&lt;br /&gt;
- Upcoming Group Policy intensive class: onsite and public&lt;br /&gt;
- Upcoming conferences and appearances&lt;br /&gt;
- Moskowitz, inc. Technology Takeaway (r): five juicy questions (and answers!)&lt;br /&gt;
- Subscribe and unsubscribe information&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Can it really be true? Jeremy&#039;s put together his first newsletter&lt;/strong&gt;!&lt;/p&gt;

&lt;p&gt;If you&#039;re getting this newsletter, it probably means that you&#039;ve handed me, Jeremy Moskowitz, a business card at a conference, meeting, or seminar -- or you&#039;ve specifically asked to be part of this list. I&#039;ve converted your email address from the business card to this email listserver, which can easily handle subscribing and unsubscribing, as well as offering a host of other features. All information on subscribing and unsubscribing can be found at the end of this newsletter. If you choose to unsubscribe, you won&#039;t get any more newsletters like these.&lt;/p&gt;

&lt;p&gt;However, I hope you stay with me! This newsletter&#039;s intent is to keep you updated on the comings and goings of Moskowitz, inc. and &lt;a href=&quot;http://www.GPAnswers.com/&quot;&gt;www.GPAnswers.com&lt;/a&gt;, provide a technical tip or three, and generally keep you apprised of the state of affairs. In the words of Scott Adams, the creator of Dilbert, this newsletter will come out &quot;roughly, whenever I feel like it.&quot; Some newsletters will have lots of news. Other issues will be shorter. In all cases, I&#039;ll try to make efficient use of your time.&lt;/p&gt;

&lt;p&gt;I do hope you&#039;ll stay aboard. &lt;strong&gt;Moskowitz, inc. and &lt;/strong&gt;&lt;a href=&quot;http://www.GPAnswers.com/&quot;&gt;&lt;strong&gt;www.GPAnswers.com&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; updates&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here&#039;s a brief rundown of what&#039;s new at Moskowitz, inc and&lt;br /&gt;
&lt;a href=&quot;http://www.GPAnswers.com/&quot;&gt;www.GPAnswers.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It&#039;s OUT -- March 22nd! The most anticipated sequel of the year!!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;...and it&#039;s 100% Jar-Jar Binks free!&lt;/p&gt;

&lt;p&gt;That&#039;s right! The follow-up to the wildly successful Windows 2000: Group Policy, Profiles and IntelliMirror is here! It&#039;s called Group Policy, Profiles and IntelliMirror for Windows 2003, Windows 2000, and Windows XP. If you liked the first one, you&#039;re going to love this edition!&lt;/p&gt;

&lt;p&gt;It&#039;s not an update -- it&#039;s an OVERHAUL!&lt;/p&gt;

&lt;p&gt;The best news is that 90-95% of the material is applicable to Windows 2000 users. Even if you have just one Windows XP machine in your domain, you&#039;ll want to take a look!&lt;/p&gt;

&lt;p&gt;Here are the major changes:&lt;/p&gt;

&lt;p&gt;- We shifted the focus primarily to Windows 2003 Server and Windows XP (from Windows 2000 Server and Professional). The Group Policy Management Console (GPMC) changes everything.&lt;/p&gt;

&lt;p&gt;Warm-ups and usage are in Chapters 1 and 2. We continue all examples of Group Policy application by demonstrating the GPMC in the remaining chapters of the book.&lt;/p&gt;

&lt;p&gt;- The &quot;secret underbelly&quot; of Group Policy Processing has changes for Windows XP. Come to Chapter 3 to find out what. I&#039;ve also made sure to have the most technically accurate information for Windows 2000 processing possible. (Chapters 1, 2, and 3)&lt;/p&gt;

&lt;p&gt;- Group Policy Troubleshooting is never easy, but with additional techniques in Chapter 3 and Chapter 4, you&#039;ll have that extra edge!&lt;/p&gt;

&lt;p&gt;- If you&#039;re getting into automation with scripting, Chapter 7, &quot;Scripting Group Policy Operations,&quot; is for you. This chapter, written by the one and only Bill Boswell, will quickly get you up to speed with a gaggle of great stuff you can do once you learn the scripting interface. All in all, this chapter will just make your life easier. We even have a super-secret trick in the book to script the &quot;push&quot; of GPOs to your client systems! Zowie!&lt;/p&gt;

&lt;p&gt;- There are lots of new add-on tools available for Group Policy management. Some are in the Microsoft Windows 2003 Resource Kit, others are third-party products, and others are free tools. There&#039;s even one feature of the GPMC which can be thought of as an add-on to help us migrate GPOs from one domain to another. It&#039;s all in the chapter entitled &quot;Group Policy and Profile Tools.&quot;&lt;/p&gt;

&lt;p&gt;- Security is a hot topic. Group Policy lets you access the heart of the security within Active Directory and across your whole network. Chapter 6, &quot;Group Policy Security Implementation,&quot; is completely revamped to home in on this important subject. There is information here that is simply not available in any other text.&lt;/p&gt;

&lt;p&gt;- Other changes you&#039;ll find in the book include new strategies for ADM template management (Chapter 5), Windows XP Profile behavior (Chapter 8), Windows XP folder redirection changes (Chapter 9), Group Policy software distribution changes (Chapter 10), remote Installation Services changes (Chapter 11), migrating GPOs with the GPMC (Appendix B), and a third-party tools list (Appendix B).&lt;/p&gt;

&lt;p&gt;- Oh, and did I forget to mention the five downloadable web resources? Everything from Restricted Groups tables to a quick reference of all the newest policy settings for Windows 2003, Windows XP, Windows XP + SP1, and Windows XP + SP2!&lt;/p&gt;

&lt;p&gt;So I hope you&#039;ll agree with me: this edition isn&#039;t just a revision, it&#039;s a total overhaul! This book is in the Mark Minasi Windows Administration Series. And Michael Dennis, the Lead Program Manager of Group Policy at Microsoft, kindly provided the Forward. Here&#039;s an excerpt from the Foreword:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;At Microsoft, we have a lot of downloadable documentation on Group Policy, Profiles, and IntelliMirror (r). What Jeremy provides with this book is a &quot;one-stop-shop&quot; for practical, how-it-works information, including real-world examples of implementing and troubleshooting Group Policy, Profiles, and IntelliMirror. Indeed, his digging and prodding into the Group Policy internals means that there is information in his book that you simply cannot find anywhere else. Jeremy has always provided an independent eye into how Group Policy works. Best of all, his writing style will keep you engaged throughout the entire book.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Jeremy&#039;s book uncovers the basics of Group Policy and GPMC and then reveals the hidden nuggets that truly unleash the power of Group Policy. He describes the many underlying and overt changes since Windows 2000 that make this book a valuable successor to his previous work. The practical, (often prescriptive) technical information just keeps rolling in -- chapter after chapter. &lt;/em&gt;&lt;/p&gt;

&lt;p&gt;-- from Michael Dennis, the Lead Program Manager of Group Policy&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Buy Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP and Windows 2000 in three ways!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you&#039;re ready to get crackin&#039; with your Group Policy workout, you can get the new book in one of three ways:&lt;/p&gt;

&lt;p&gt;- You can order it from Amazon for $35.00 plus shipping by clicking here: &lt;a href=&quot;http://www.amazon.com/exec/obidos/tg/detail/-/0782142982&quot;&gt;http://www.amazon.com/exec/obidos/tg/detail/-/0782142982&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;- You can order it from Bookpool for $30.95 plus shipping by clicking here: &lt;a href=&quot;http://www.bookpool.com/.x/ehonrnhp8m/sm/0782142982&quot;&gt;http://www.bookpool.com/.x/ehonrnhp8m/sm/0782142982&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;- If you order the book from me, I&#039;ll sign the book for you, free! I&#039;ve had many requests for this service, and I&#039;m honored that you would want it! If you order it from me, you get the book, shipping included! Usually, I try to ship out the week&#039;s orders on Mondays and Thursdays. If you need a guaranteed shipping date, then Amazon might be a better choice. The cost is $45. The slight extra cost goes toward the shipping from SYBEX to me, then me to you (not for the signature.) Again, note that shipping -is- included.&lt;/p&gt;

&lt;p&gt;Please note that I&#039;m not set up to accept credit cards directly; however, you can enjoy the security of ordering through your PayPal account (and they take credit cards just fine.) Thanks for understanding! Order your signed copy today by clicking here:&lt;a href=&quot;https://www.gpanswers.com/books&quot;&gt;www.gpanswers.com/books&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;Join us at &lt;/strong&gt;&lt;a href=&quot;http://www.GPAnswers.com/&quot;&gt;&lt;strong&gt;www.GPAnswers.com&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;You&#039;ve got questions, we&#039;ve got answers. And we won&#039;t ask for your home phone number like Radio Shack. Come join your peers at &lt;a href=&quot;http://www.GPAnswers.com/&quot;&gt;www.GPAnswers.com&lt;/a&gt; for the following goodies:&lt;/p&gt;

&lt;p&gt;- All the Web downloads from the book (you don&#039;t have to track them down at SYBEX&#039;s Web site)&lt;br /&gt;
-Additional ADM templates&lt;br /&gt;
-Additional VB scripts&lt;br /&gt;
-Pointers to all the best Microsoft Group Policy stuff&lt;br /&gt;
-Newsletter archives&lt;br /&gt;
-And an ongoing battery of new stuff as it comes up!&lt;/p&gt;

&lt;p&gt;Best of all, there&#039;s the &lt;a href=&quot;http://www.GPAnswers.com/&quot;&gt;www.GPAnswers.com&lt;/a&gt; Discussion Forum!&lt;/p&gt;

&lt;p&gt;Here, your peers are waiting to chat with you about all sorts of Group Policy, Profiles, and IntelliMirror topics: everything from troubleshooting to trying something new! And you never know who might be lurking and posting -- just waiting to answer your question or hear your feedback.&lt;/p&gt;

&lt;p&gt;We&#039;ve already received a lot of buzz... so, c&#039;mon and join the fun! Note that joining the Forum doesn&#039;t automatically join you to the newsletter, so, if you&#039;re receiving this newsletter because someone forwarded it to you, be sure to sign up for both!&lt;br /&gt;
Subscription information can be found at the end of this newsletter.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Now Available! Group Policy intensive class! Public and Onsite!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You&#039;ve asked for it, and here it is: a two-day Group Policy intensive workshop! It&#039;s really three days of stuff presented in two days. If you need to get up to speed and get using that Active Directory you&#039;ve got lying around, then this is the class for you! It&#039;ll consist of about 50% instruction, 50% demos, and 50% hands-on practice. Okay, somehow, that&#039;s 150%! But would you expect anything less?&lt;/p&gt;

&lt;p&gt;You can see an outline of the course here:&lt;br /&gt;
&lt;a href=&quot;https://www.gpanswers.com/online-class&quot;&gt;www.gpanswers.com/online-class&lt;/a&gt; And... This class can be taught as a private class within your company (with all the personalized attention that affords). Just email me at &lt;a href=&quot;mailto:jeremym@moskowitz-inc.com&quot;&gt;jeremym@moskowitz-inc.com&lt;/a&gt; for details.&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technology Takeaway (r), a service of Moskowitz, inc.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here are some questions on people&#039;s minds recently...&lt;/p&gt;

&lt;p&gt;QUESTION 1: Can you have different policies governing different types of users within the Domain? Specifically I am looking to have non-privileged users expire and change passwords every 45 days and privileged users every 30.&lt;/p&gt;

&lt;p&gt;ANSWER: Unfortunately, no. You cannot have different Account or Password policies within the domain. If you must perform what you describe, you must have two domains.&lt;/p&gt;

&lt;p&gt;QUESTION 2: I have a standalone PC with Windows XP Professional and I want to create a few users with restricted use. For example, remove the icons on the desktop or take away &quot;run&quot; in the Start menu. Now I have tried this with GPEDIT.MSC, but when I do, even the Administrator account is affected. How can I log on as an Administrator and restrict users for certain parts but not get the restriction myself?&lt;/p&gt;

&lt;p&gt;ANSWER: You should avoid using GPEDIT.MSC on local machines. When you do this, you have the least amount of control over your Active Directory. Really, you&#039;re only able to control just that one machine. Instead, you should set up GPOs linked to the domain-level or OU-level to affect your users or computers. You can use Group Policy filtering (via user groups) to specify which specific users or computers will be affected. You can remove Administrators from the processing in this fashion.&lt;/p&gt;

&lt;p&gt;QUESTION 3: Can you restrict the use of floppy and/or CD-ROM drives on workstations in a domain with Group Policy?&lt;/p&gt;

&lt;p&gt;ANSWER: Yes. Check out these two policy settings: User Configuration|Administrative Templates|Windows Components|Windows Explorer | Hide these specified drives in My Computer And User Configuration|Administrative Templates|Windows Components|Windows Explorer | Prevent access to drives from My Computer&lt;/p&gt;

&lt;p&gt;QUESTION 4: We have a Win2000 Server network environment and are running AD. About 95% of our end-user PCs are Win98 SE. How do I set Group Policies so that I can restrict end users&#039; ability to change wallpaper, etc?&lt;/p&gt;

&lt;p&gt;ANSWER: Bad news. Active Directory Group Policy cannot affect Windows 98 clients. Group Policy only affects Windows 2000, Windows XP, and Windows 2003 machines. You&#039;ll need to use old-style SYSTEM POLICY, which creates CONFIG.POL files. Remember -- these SYSTEM POLICIES will be permanent entries in your registry until you specifically change and invert the settings (a distinct disadvantage to Active Directory Group Policy).&lt;/p&gt;

&lt;p&gt;QUESTION 5: I want to leverage GPOs such that a temporary user can log on only to the computer he is given. Once there, I want him to only be able to use Word, Excel, Acrobat, and Internet Explorer, but not be able to access Windows Update, Yahoo, or Hotmail. I am new to both Active Directory and Group Policy, and I don&#039;t want to mess with other users.&lt;/p&gt;

&lt;p&gt;ANSWER: This question has a fourfold answer:&lt;/p&gt;

&lt;p&gt;1. First, load a workstation with the specific software you want him/her to run. Your list above is fine. You can do this manually, or via Group Policy Software Installation.&lt;/p&gt;

&lt;p&gt;2. To restrict a user to a specific computer, you need to be running NetBIOS. Then, in the user&#039;s Account tab, click the &quot;Log on to&quot; button and specify the computer you want to restrict the user to.&lt;/p&gt;

&lt;p&gt;3. Users, that is, non-administrators, cannot go to Windows Update. You don&#039;t have to do anything to restrict access to this site.&lt;/p&gt;

&lt;p&gt;4. To restrict users from all other Web sites, you&#039;ll need to get familiar with how to implement Internet Explorer Maintenance policies -- either via local GPOs or via Active Directory GPOs. The process is fairly detailed, but here are the steps in a nutshell: Configure a computer&#039;s IE settings to be as restrictive as you want, then use the Internet Explorer Maintenance Settings (specifically, those located in User Configuration |Windows Settings | Internet Explorer Maintenance | Security | Security Zones and Content Ratings) to import the current computer&#039;s settings. Then the other computers you apply the GPO to will embrace the same settings as well.&lt;/p&gt;

&lt;p&gt;In short, you may be new to Group Policy, but you&#039;ll have to get familiar with it to do lots of tasks -- so, better get started learning!&lt;/p&gt;

&lt;p&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Subscribe and Unsubscribe Information&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;- subscribe to this newsletter&lt;br /&gt;
- unsubscribe from this newsletter&lt;/p&gt;

&lt;p&gt;If you&#039;ve received this message as a forward from a friend, or are reading it online in the archives, you can sign up for your own newsletter subscription.&lt;/p&gt;

&lt;p&gt;Also, if you want to unsubscribe, you can do that too (but we&#039;ll be sad to see you go).&lt;/p&gt;

&lt;p&gt;For all Subscription and Unsubscription information, we have a one-stop-shop page at the following address: https://www.gpanswers.com/newsletter&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;
        </content:encoded>
    </item>
    </channel>
</rss>