Now that you have MDT and the ADK installed, we need to set up a deployment share in MDT. Regardless of whether this is a clean install of MDT on a dedicated box or your existing MDT server, we’re going to start off by creating a new Deployment Share that will be dedicated to reference […]
Tag: Windows 7
When it comes to deploying an operating system to a computer, speed and accuracy are the name of the game. If you’re installing applications that are common across your organization as tasks in your OS deploy or installing the latest Windows updates after the deploy finishes, you can save tons of time by using a […]
In this series, I discuss AppLocker (application whitelisting/blacklisting) in Windows 7: Part 1: Planning – Planning your AppLocker deployment including how to auto-generate rule and how to audit your rules first. Part 2: Best Practices – Best Practices for writing your AppLocker rules. Part 3: Testing – How to test your AppLocker rules before deploying […]
If you try to manage BitLocker drive encryption on a computer that has had a user type in his/her PIN too many times, you may get this error: BitLocker Drive Encryption Error Cannot run. The TPM is defending against dictionary attacks and is in a time-out period.
Following our last tip, today’s Group Policy Quick Tip is about adding additional security to Remote Desktop sessions on your computers. Normally, an RDP session is established before authentication takes place. Enabling Network Level Authentication (NLA) allows authentication to take place before the RDP session is established.
Welcome to the first of what will [hopefully] be an ongoing feature here at Group Policy, Y’all! After troubleshooting a Group Policy problem for someone (completely and totally unrelated to Remote Desktop), the person I was helping told me how he just kept forgetting to set this one setting for new PC’s. A rather long […]
Here’s a series of articles I wrote for 4Sysops.com on setting up your Active Directory for BitLocker. It includes the instructions, Best Practices from Microsoft, and tips & tricks: Part 1: Introduction Part 2: Schema Update, ACE Settings, Password Recovery Viewer Part 3: Group Policy Settings Part 4: Encrypting Hard Disks Part 5: BitLocker to […]