<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>gpo</title><link>https://evotec.xyz/de/tags/gpo</link><description>Evotec Main Website</description><atom:link href="https://evotec.xyz/de/tags/gpo/index.xml" rel="self" type="application/rss+xml" /><item><title>The only command you will ever need to understand and fix your Group Policies (GPO)</title><link>https://evotec.xyz/de/blog/the-only-command-you-will-ever-need-to-understand-and-fix-your-group-policies-gpo</link><description>I’ve been working on cleaning up Group Policies for a couple of months. While it may seem trivial, things get complicated when you’re tasked with managing 5000 GPOs created over 15 years by multiple teams without any best practices in mind. While working on GPOZaurr (my new PowerShell module), I’ve noticed that the more code I wrote to manage those GPOs, the more I knew passing this knowledge to admins who will be executing this on a weekly/monthly basis is going to be a challenge. That’s why I’ve decided to follow a similar approach as my other Active Directory testing module called Testimo. I’ve created a single command that analyses Group Policies using different methods and shows views from different angles to deliver the full picture. On top of that, it provides a solution (or it tries to) so that it’s fairly easy to fix – as long as you agree with what it proposes.</description><pubDate>Sun, 24 Jan 2021 17:15:04 GMT</pubDate><guid>https://evotec.xyz/de/blog/the-only-command-you-will-ever-need-to-understand-and-fix-your-group-policies-gpo</guid><category>active directory</category><category>gpo</category><category>group policy</category><category>powershell</category></item><item><title>Using Win32_UserAccount WMI filter in PowerShell/Group Policies and what to avoid</title><link>https://evotec.xyz/de/blog/using-win32_useraccount-wmi-filter-in-powershell-group-policies-and-what-to-avoid</link><description>Some months ago, I created PowerShell Script to create local administrative users on workstations – Create a local user or administrator account in Windows using PowerShell. It’s a bit overcomplicated, but the goal was it should work for Windows 7 and up, and that means supporting PowerShell 2.0. As part of that exercise, I’ve been using Win32_UserAccount WMI based query to find local users and manage them to an extent. While Get-LocalUser exists, it’s not suitable for the PowerShell 2.0 scenario. I also use the same query in GPO for WMI filtering. You can say it’s been a good friend of mine.</description><pubDate>Tue, 02 Jun 2020 15:45:54 GMT</pubDate><guid>https://evotec.xyz/de/blog/using-win32_useraccount-wmi-filter-in-powershell-group-policies-and-what-to-avoid</guid><category>active directory</category><category>ad</category><category>gpo</category><category>powershell</category><category>wmi</category></item><item><title>Active Directory DFS Health Check with PowerShell</title><link>https://evotec.xyz/de/blog/active-directory-dfs-health-check-with-powershell</link><description>One of the critical parts of Active Directory is DFS. It allows you to share same NETLOGON/SYSVOL folders across all Domain Controllers in your Forest. Its health is vital to the functionality of your Active Directory. If it’s broken, a lot of things may not work, and it’s not that easy to tell the status of it. At first sight, everything may seem to work correctly, but if you take a closer look – not so much. It’s great if you find it out by yourself, but not fun if suddenly GPO’s don’t apply to some users, computers, and you find out a year later.</description><pubDate>Thu, 20 Feb 2020 20:29:20 GMT</pubDate><guid>https://evotec.xyz/de/blog/active-directory-dfs-health-check-with-powershell</guid><category>active directory</category><category>adessentials</category><category>dfs</category><category>gpo</category><category>PowerShell</category><category>testimo</category></item><item><title>Finding GPOs missing permissions that may prevent GPOs from working correctly</title><link>https://evotec.xyz/de/blog/finding-gpos-missing-permissions-that-may-prevent-gpos-from-working-correctly</link><description>I’ve been in IT for a longer time now. I’ve made my fair share of mistakes and misconfigurations. One of those misconfigurations was removing Authenticated Users from Security filtering in Group Policy Objects. While it worked fine at some point Microsoft rolled out a Hotfix MS16-07 on June 14th 2016.</description><pubDate>Wed, 19 Feb 2020 21:08:35 GMT</pubDate><guid>https://evotec.xyz/de/blog/finding-gpos-missing-permissions-that-may-prevent-gpos-from-working-correctly</guid><category>active directory</category><category>adessentials</category><category>gpo</category><category>powershell</category></item><item><title>Create a local user or administrator account in Windows using PowerShell</title><link>https://evotec.xyz/de/blog/create-a-local-user-or-administrator-account-in-windows-using-powershell</link><description>Recently I got a simple task to implement LAPS for the newly created local user instead of using the built-in local administrator account. It seemed easy at first. Go to Group Policies, create a new user, add it to an administrators group, and then follow standard steps to implement LAPS. That is until you find out it’s actually not possible anymore due to password encryption key being available in the wild, which made Microsoft block that Group Policy Preference. While that road is blocked, I still need to get my user-created somehow. Let’s do it with PowerShell. It’s quite simple – use New-LocalUser a few parameters, some random password that I don’t need to save as LAPS will overwrite it. Except it’s not available on PowerShell 2.0, which is the default for Windows 7 that I have to support. Things get even more complicated if you consider that Administrators group is called differently in different countries. While I stopped supporting anything below PowerShell 5.1, I can’t say if it’s the project requirement.</description><pubDate>Wed, 30 Oct 2019 13:44:27 GMT</pubDate><guid>https://evotec.xyz/de/blog/create-a-local-user-or-administrator-account-in-windows-using-powershell</guid><category>administrator</category><category>gpo</category><category>powershell</category><category>Windows</category></item><item><title>Prepare Windows 10 Start Menu for all computers in Active Directory</title><link>https://evotec.xyz/de/blog/prepare-windows-10-start-menu-computers-active-directory</link><description>Windows 10 in my humble opinion is very good system. It has it’s pros and cons but so does each…</description><pubDate>Fri, 26 Jan 2018 14:08:44 GMT</pubDate><guid>https://evotec.xyz/de/blog/prepare-windows-10-start-menu-computers-active-directory</guid><category>1703</category><category>1709</category><category>Active Directory</category><category>gpo</category><category>gpresult</category><category>gpupdate</category><category>group policy</category><category>powershell</category><category>powershell editor</category><category>powershell ise</category><category>start menu</category><category>Windows</category><category>windows 10</category><category>windows 10 1703</category><category>windows 10 1709</category></item></channel></rss>