0800 8047 256

United Kingdom
EACS on LinkedInEACS on TwitterEACS on YouTubeEACS on FacebookEACS on Goolge+EACS on Pintrest
≡ Menu

Technical Tip of the Week: Delegate Control to Users Working with GPOs

Another tip from the EACS technical support team…

Delegate Control to Users Working with GPOs

You can allow a non-administrative user or a group (including users and groups from other domains) to work with a domain, site, or OU GPO by granting one of three specific permissions:

  • Read – Allows the user or group to view the GPO and its settings.
  • Edit Settings – Allows the user or group to view the GPO and its settings and also change settings. The user or group cannot delete the GPO or modify security.
  • Edit Settings, Delete, Modify Security – Allows the user or group to view the GPO and its settings and also change settings, delete the GPO, and modify security.

To grant these permissions to a user or group, follow these steps:

  1. In the GPMC, expand the entry for the forest you want to work with and then expand the related Domains node.
  2. Expand the node for the domain you want to work with. If you don’t see the domain you want to work with, right-click Domains and then click Show Domains. You can then select the domains you want to display.
  3. Select the Group Policy Objects node, and then select the GPO you want to work with in the left pane. In the right pane, select the Delegation tab.
  4. The current permissions for individual users and groups are listed. To grant permissions to another user or group, click Add.
  5. In the Select User, Computer, Or Group dialog box, select the user or group and then click OK.
  6. In the Add Group Or User dialog box, select the permission to grant: Read; Edit Settings; or Edit Settings, Delete, Modify Security. Click OK.
Share

Technical Tip of the Week: Quickly Filter Event Logs in Windows Server 2008

Our weekly technical tip from our technical support team…

The Event Viewer automatically creates several filtered views of the event logs. Filtered views are listed under the Custom Views node. When you select the Administrative Events node, you see a list of all errors and warnings for all logs. When you expand the Server Roles node and then select a role-specific view, you see a list of all events for the selected role.

You can also create a custom view to make it easier to look for specific types of events. To do so, follow these steps:

1. In Server Manager, expand the Diagnostics node and the Event Viewer node.

2. Select Custom Views. In the actions pane or on the Action menu, click Create Custom View.

3. Use the Logged list to select the included time frame for logged events. You can choose to include events from the Last Hour, Last 12 Hours, Last 24 Hours, Last 7 Days, or Last 30 Days.

4. Use the Event Level check boxes to specify the level of events to include. Select Verbose to get additional detail.

5. You can create a custom view for either a specific set of logs or a specific set of event sources:

– Use the Event Logs list to select event logs to include. You can select multiple event logs by selecting their related check boxes. If you select specific event logs, all other event logs are excluded.

– Use the Event Sources list to select event sources to include. You can select multiple event sources by selecting their related check boxes. If you select specific event sources, all other event sources are excluded.

6. Optionally, use the User and Computer(s) boxes to specify users and computers that should be included. If you do not specify the users and computers to include, events generated by all users and computers are included.

7. When you click OK, Windows displays the Save Filter To Custom View dialog.

8. Type a name and description for the custom view.

9. Select where to save the custom view. By default, custom views are saved under the Custom Views node. You can create a new node by clicking New Folder, entering the name of the new folder, and then clicking OK.

10. Click OK to close the Save Filter To Custom View dialog box. You should now see a filtered list of events. Review these events carefully and take steps to correct any problems that exist.

If you want to see a particular type of event, you can filter the log by following these steps:

1. In Server Manager, expand the Diagnostics node and the Event Viewer node.

2. Expand Windows Logs or Applications And Services Logs as appropriate for the type of log you want to configure. You should now see a list of event logs.

3. Select the log you want to work with. In the actions pane or on the Action menu, click Filter Current Log.

4. Use the Logged list to select the included time frame for logged events. You can choose to include events from the Last Hour, Last 12 Hours, Last 24 Hours, Last 7 Days, or Last 30 Days.

5. Use the Event Level check boxes to specify the level of events to include. Select Verbose to get additional detail.

6. Use the Event Source list to select event sources to include. If you select specific event sources, all other event sources are excluded.

7. Optionally, use the User and Computer(s) boxes to specify users and computers that should be included. If you do not specify the users and computers to include, events generated by all users and computers are included.

8. Click OK. You should now see a filtered list of events. Review these events carefully and take steps to correct any problems that exist. To clear the filter and see all events for the log, click Clear Filter in the actions pane or on the Action menu.

Share

Simple Steps to PST Freedom

PSTs don’t have to put valued corporate data at risk. Whether you decide to live with them, discover and manage the PST data where it resides or you choose to eliminate PST files altogether, you have options to set you free. Options that don’t put an unnecessary burden on IT, your system resources or users.

Understanding why you want to get rid of PST files is a key first step. Our 10 Point Plan then looks at the following:

  1. Create a strategic plan: Where, How, When?
  2. Establish PST location and details
  3. Establish owners of ‘Lost’ or ‘de-coupled’ PSTs
  4. Re-evaluate strategy – feasibility check
  5. Legal Hold requirements

Eliminate PST files so they can be efficiently integrated into an overall corporate retention policy for assured data protection, corporate compliance and litigation readiness.

For the next 5 steps, read the White Paper: PST Files – 10 Point Plan.

Share

Technical Tip of the Week: Pin A Drive to the Taskbar

The taskbar isn’t just for apps and documents. In just a few seconds you can pin drive icons there, too.

Right-click an empty part of the desktop, select New > Text File, and rename the file to drive.exe. Drag and drop this onto your taskbar, then delete the original file.

Right-click your new “drive.exe” taskbar button, then right-click its file name and select Properties.

Change the contents of both the Target and Start In boxes to point at the drive or folder of your choice, perhaps click Change Icon to choose an appropriate drive icon, and you’re done – that drive or folder is now available at a click.

Share

Technical Tip of the Week: Rearrange the System Tray

With Windows 7 we finally see system tray icons behave in a similar way to everything else on the taskbar. So if you want to rearrange them, then go ahead, just drag and drop them into the order you like.

Share

Technical Tip of the Week: Find Bottlenecks

If your Windows 7 PC seems sluggish, it’s now much easier to uncover the bottleneck.

Click Start, type RESMON and press Enter to launch the Resource Monitor, then click the CPU, Memory, Disk or Network tabs. Windows 7 will immediately show which processes are hogging the most system resources.

The CPU view is particularly useful, and provides something like a more powerful version of Task Manager. If a program has locked up, for example, then right-click its name in the list and select Analyze Wait Chain. Windows will then try to tell you why it’s hanging – the program might be waiting for another process, perhaps – which could give you the information you need to fix the problem.

Share