top of page

Managing Windows Environments with Group Policy (M50255)

Course Outline


Module 1: Introduction to Configuration Management


This module describes the basis of what configuration management is and how it functions.



  • Configuration Management Overview

  • Configuration Management Using Group Policy

  • Group Policy Features Introduced with Later Versions of Windows

  • Using Windows PowerShell in the Configuration Management Process


Lab : Introducing Configuration Management

  • Define configuration management

  • List the ways you can use configuration management in Windows

  • Describe the new Group Policy features available in the latest versions of Windows


Module 2: Using Group Policy Management Tools


This module describes the differences between local and domain policies and the Group Policy management tools you can use to manage these policies.  This module also describes the Group Policy refresh process and hot to manually force a refresh ahead of the default interval.



  • Local and Domain Policies

  • Using Group Policy Management Console

  • Understanding Group Policy Refresh


Lab : Using Group Policy Management Tools

  • Describe the advantages of using domain policies instead of local policies

  • List the capabilities of the Group Policy Management Console

  • Describe the requirements for installing the Group Policy Management Console

  • Explain how to use the different GPMC features to create and manage policies

  • Describe the elements of the gpupdate command


Module 3: Designing a Group Policy Infrastructure


This module details the steps a successful Group Policy deployment should follow, linking your design to how your company can best use the features.  Essential network components and security design are also defined.



  • Design Stages for a Group Policy Infrastructure

  • Planning your Group Policy Design

  • Designing Your Group Policy Solution

  • Deploying Your Group Policy Solution

  • Managing Your Group Policy Solution


Lab : Designing a Group Policy Infrastructure

  • Describe the four stages of implementing Group Policy

  • Explain how to plan Group Policy in accordance with a company’s requirements

  • Describe the guidelines that you should follow when you create new GPOs

  • Explain how to manage Group Policy by delegating administration and setting permissions


Module 4: Understanding the Architecture of Group Policy Processing


This module details the concepts that you must grasp in order to troubleshoot Group Policy.  The module also describes the options that are available to change the standard Group Policy processing sequence.



  • Group Policy Components in AD DS

  • Understanding the Group Policy Deployment Order

  • Modifying Group Policy Processing


Lab : Understanding the Group Policy Processing Architecture

  • Describe the Active Directory components that you can use to deploy Group Policy

  • Explain the order in which Group Policy is deployed in Active Directory

  • Describe the methods that are available to modify Group Policy processing


Module 5: Troubleshooting and Backing Up GPOs


This module explains how to use the RSoP tools to determine whether policies are being processed in the correct manner.  This module discusses how to use the available tools to troubleshoot policy issues; back up, restore, import, copy, and search for GPOs; and migrate GPOs from one domain to another.



  • Using Group Policy Troubleshooting Tools

  • Integration of RSoP Functionality

  • Using Logging Options

  • Backing Up, Restoring, Importing, and Copying GPOs

  • Building Migration Tables


Lab : Troubleshooting and Backing Up GPOs

  • Describe the Group Policy troubleshooting tools

  • Describe the GPMC tools that have RSoP functionality

  • Describe the GPO logging tools used to obtain more detail about the GPO processing issues

  • Explain how to back up, restore, import, and copy GPOs using the GPMC

  • Explain how to build migration tables


Module 6: Securing Windows Using Group Policy


This module defines the Windows security model and describes the process of using Group Policy to implement user account, computer account, and domain security.



  • Exploring the Windows Security Architecture

  • Securing User Accounts

  • Exploring Security Policies

  • Windows Firewall with Advanced Security

  • Implementing Domain Security


Lab : Securing Windows Using Group Policy

  • Describe the Windows security architecture

  • Explain how to secure user accounts with Group Policy

  • Explain how to harden computer accounts

  • Explain how to control the domain security policy with a GPO


Module 7: Implementing Application Security Using Group Policy


This module describes the process of securing applications in a Windows environment. It also

explains how to implement UAC (User Account Control) to help prevent users from running

unauthorized software, reducing the likelihood that viruses, Trojan horses, or spyware might

intrude upon the environment.



  • Managing UAC Settings

  • Defending Against Malware

  • Using AppLocker to Restrict Software

  • Implementing Windows 8 App Security Settings


Lab : Implementing Application Security Using Group Policy

  • Describe UAC

  • Describe the AppLocker features

  • Explain the features of Windows 8 Apps


Module 8: Configuring the Desktop Environment with Group Policy


This module explains many of the settings that are available to configure and restrict the user desktop environment, such as Control Panel restrictions, Start Menu settings, and Windows Explorer configuration.



  • Exploring Script Types and Controlling Script Execution

  • Defining the Desktop, Start Menu, and Taskbar Settings

  • Defining the Control Panel Settings

  • Defining the Windows Components Settings

  • Configuring the Printer Management and Pruning Settings

  • Defining the  Network Settings

  • New Settings for Windows 8 Client and Windows Server 2012


Lab : Configuring the Desktop Environment with Group Policy

  • Describe the startup, shutdown, logon, and logoff scripts and settings.

  • Identify the many ways to control the user desktop, Start menu, and taskbar settings

  • Explain how to restrict the Control Panel settings

  • Explain how to restrict operations that users can perform in Windows Explorer, Windows Internet Explorer, and Remote Desktop Services

  • Explain how to configure the printer management and pruning settings

  • Describe the network settings


Module 9: Implementing User State Virtualization


This module explains the different options available to maintain the user's personal files and settings.



  • Configuring Folder Redirection

  • Managing Offline Files

  • Implementing User Experience Virtualization

  • OneDrive for Business


Lab : Implementing User State Virtualization

  • Explain how to redirect user folders to a server

  • Describe the Offline Files feature

  • Explain the purpose of User Experience Virtualization

  • Describe the OneDrive for Business feature


Module 10: Assigning and Publishing Software Packages

This module explains how to use Group Policy for deploying software.



  • Using MSI Packages to Distribute Software

  • Using Group Policy as a Software Deployment Method

  • Deploying Software

  • Setting Up Distribution Points

  • Using the Systems Center Configuration Manager to Distribute Software


Lab : Assigning and Publishing Software Packages

  • Describe the basic elements of an MSI package

  • Determine when to build or repackage your own

  • Define the requirements for distributing software via Group Policy

  • Describe when you might want to assign and publish software

  • Explain how to upgrade and remove packages

  • Explain how to set up distribution points for software deployment

  • List the advantages of using SCCM to distribute software instead of Group Policy


Module 11: Configuration Management with Windows PowerShell


This module explains how to navigate and use basic Windows PowerShell commands and how to use Windows PowerShell to manage Group Policy. It also explains how you can use PowerShell logon scripts with Group Policy.



  • Using Windows PowerShell

  • Writing PowerShell Scripts

  • Windows PowerShell Library for Group Policy

  • Windows PowerShell-Based Logon Scripts

  • Using PowerShell Desired State Configuration


Lab : Configuration Management with Windows PowerShell

  • Describe the Windows PowerShell features

  • Explain how to perform the basic Windows PowerShell operations

  • Explain how to access the Windows PowerShell library for Group Policy

  • Manage systems using Windows PowerShell Desired State Configuration


Module 12: Creating and Deploying Administrative Templates


This module explains the logic behind administrative templates, when to use them, and the basics of how to write them. This module also explains how to deploy templates by loading legacy ADM templates into the Group Policy Management Editor, and copying ADMX templates to the Central Store.



  • Introducing  Administrative Templates

  • Legacy ADM Templates

  • Managing ADMX Templates

  • Converting and Creating Custom ADMX Templates

  • Using the ADMX Central Store


Lab : Creating and Deploying Administrative Templates

  • Describe the benefits of using Administrative Templates

  • List some of the ADM templates that are included with each version of Windows

  • List tips that you can use to write your own customer Administrative templates

  • Describe the advantages of using the new ADMX file format

  • Identify which tool converts the ADM templates to ADMX templates and also creates new ADMX templates

  • Define ADMX Central Store


Module 13: Configuring Group Policy Preferences


This module describes the function of Group Policy Preferences. You will learn how to configure Group Policy Preferences and modify the advanced configuration options.



  • Introducing Group Policy Preferences

  • Comparing Preferences and Policy Settings

  • Configuring Preferences Settings


Lab : Configuring Group Policy Preferences

  • Describe the purpose of Group Policy Preferences

  • Describe the differences between Preferences and Policy Settings

  • Identify the settings that you can configure in the Computer Configuration and User Configuration sections of the Group Policy Management Console

  • Describe the Windows and Control Panel settings

Virtual $995

On-Site: Request




Reserve seat

bottom of page