answersLogoWhite

0


Best Answer

Group Policy applies to the user or computer in a manner that depends on where both the user and the computer objects are located in Active Directory. However, in some cases, users may need policy applied to them based on the location of the computer object alone. You can use the Group Policy loopback feature to apply Group Policy Objects (GPOs) that depend only on which computer the user logs on to.

To set user configuration per computer, follow these steps:

1. In the Group Policy Microsoft Management Console (MMC), click Computer Configuration.

2. Locate Administrative Templates, click System, click Group Policy, and then enable the Loopback Policy option.

This policy directs the system to apply the set of GPOs for the computer to any user who logs on to a computer affected by this policy. This policy is intended for special-use computers where you must modify the user policy based on the computer that is being used. For example, computers in public areas, in laboratories, and in classrooms.

Note Loopback is supported only in an Active Directory environment. Both the computer account and the user account must be in Active Directory. If a Microsoft Windows NT 4.0 based domain controller manages either account, the loopback does not function. The client computer must be a running one of the following operating systems:

* Windows XP Professional

* Windows 2000 Professional

* Windows 2000 Server

* Windows 2000 Advanced Server

* Windows Server 2003

When users work on their own workstations, you may want Group Policy settings applied based on the location of the user object. Therefore, we recommend that you configure policy settings based on the organizational unit in which the user account resides. However, there may be instances when a computer object resides in a specific organizational unit, and the user settings of a policy should be applied based on the location of the computer object instead of the user object.

Note You cannot filter the user settings that are applied by denying or removing the AGP and Read rights from the computer object specified for the loopback policy.

Normal user Group Policy processing specifies that computers located in their organizational unit have the GPOs applied in order during computer startup. Users in their organizational unit have GPOs applied in order during logon, regardless of which computer they log on to.

In some cases, this processing order may not be appropriate. For example, when you do not want applications that have been assigned or published to the users in their organizational unit to be installed when the user is logged on to a computer in a specific organizational unit. With the Group Policy loopback support feature, you can specify two other ways to retrieve the list of GPOs for any user of the computers in this specific organizational unit:

* Merge Mode

In this mode, when the user logs on, the user's list of GPOs is typically gathered by using the GetGPOList function. The GetGPOList function is then called again by using the computer's location in Active Directory. The list of GPOs for the computer is then added to the end of the GPOs for the user. This causes the computer's GPOs to have higher precedence than the user's GPOs. In this example, the list of GPOs for the computer is added to the user's list.

* Replace Mode

In this mode, the user's list of GPOs is not gathered. Only the list of GPOs based on the computer object is used.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What allows the Group Policy processing order to circle back and reapply the computer policies after all user policies and logon scripts run?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Where do scripts on my computer come from?

Scripts are coming from server.In the HTML code we include all scripts paths.so at the time of downloading the page all these scripts download and store in the cache.


Are all computer scripts malicious?

True


What are scripts and ActiveX on a computer?

not sure maybe clonestop.com


What manner are user logon scripts applied in?

Asynchronous Processing: See textbook, page 149.


What are the function and duties of a computer microprocessor?

The main function of this part of the computer is to read scripts and process computer programs.


What computer languages cannot be used to write CGI scripts?

java programming language cannot be used to write CGI scripts


Difference between a Logon Script and a Startup Script?

basic ideaScripts (Startup/Shutdown): Use this extension to specify the scripts that run when you start and shut down the computer. To configure the computer startup and shutdown scripts, start the Group Policy snap-in, expand Computer Configuration, expand Windows Settings, click Scripts (Startup/Shutdown), and then in the right pane, double-click the script that you want to configure. These scripts run on the Local System account.Scripts (Logon/Logoff): Use this extension to specify the scripts that run when a user logs on or logs off the computer. To configure the user logon and logoff scripts, start the Group Policy snap-in, expand User Configuration, expand Windows Settings, click Scripts (Logon/Logoff), and then in the right pane double-click the script that you want to configure. These scripts run on the User account and not on the Administrator account.


Where can one get a picture of an apple background for their computer?

Still scripts shows instructions on how to personalise the background screens of ones computer. Specifically to the latter, still scripts provide information on how to set the apple background as the main screen display.


How do you turn on VB scripting on computer?

VB Scripts only work in an Internet Explorer Browser.


Who is Doctor Eliza?

ELIZA was a computer program and an early example (by modern standards) of primitive natural language processing. ELIZA operated by processing users' responses to scripts, the most famous of which was DOCTOR, a simulation of a Rogerian psychotherapist. In this mode, ELIZA mostly rephrased the user's statements as questions and posed those to the 'patient.' ELIZA was written by Joseph Weizenbaum between 1964 to 1966.[Wikipedia]


Was The Lion King handwritten?

I'm not sure I quite understand the question, but I do believe the scripts were written on computer.


How are Computer Viruses Developed?

Computer viruses are developed with the help of different codes, strings and scripts. They are developed to destroy something or to hack or steal some data.