Skip to main content

what are the GPC and the GPT

Every GPO is made up of two components (the GPC and GPT), and those components are split between two places inside that Domain Controller.

GPOs are initially born in the PDC Emulator, and then, a bit later, they are replicated to the other Domain Controllers within the site and then between sites. Assuming the PDC Emulator is available, you can give your GPO a friendly name, say "Hide Settings Tab / Restore Screen Saver Tab," .
Once that happens, your GPO is officially "born." The PDC Emulator has already performed certain functions on your behalf:

It created a Group Policy Container (GPC) in the "Policies" folder of the Configuration container in the Active Directory database. Think of this as a reference in Active Directory for your new GPO.

It created a Group Policy Template (GPT) in the SYSVOL directory of the PDC Emulator. This is where the real files that make up your GPO live. They're replicated to every Domain Controller for quicker retrieval.
Additionally, if "Create and link a GPO here..." is used when focused on the domain or OU level (or the old-school interface is used), the new GPO you just created is automatically linked to the current level you were focused at--site, domain, or OU.
The GPO is given a unique ID that takes its form as a globally Unique Identifier (GUID).

Group Policy Containers (GPCs) The Active Directory holds GPCs, which hold multiple properties of the Group Policy--for instance, version and status information and some policy settings. A GPC has a name that takes the format of a globally unique identifier (GUID)--see the sidebar that follows. The underlying name is not the friendly name we use when administrating the GPO.
You can see the GPCs for every Group Policy you create by diving into the Active Directory Users And Computers console.
To view the GPCs and their GUIDs, follow these steps:

Log on to the server WINDC01 as Administrator of the domain.

Choose Start Ø Programs Ø Administrative Tools Ø Active Directory Users And Computers.

Choose View Ø Advanced Features, to display the Policies folder.
Expand the System folder to display the Policies folder along with the GPCs,

When a GPC object is created, it is given several attributes:

Common Name (CN) In Active Directory, you'll see attribute is really called cn. An LDAP (Lightweight Directory Access Protocol) designation for the name assigned to an object. GPC names use the GUID format to ensure uniqueness throughout a forest. For example, CN=2C53BFD6-A2DB-44AF-9476-130492934271.

Distinguished Name (DN) In Active Directory, you'll see attribute is really called distinguishedName. The object's common name plus the path to the object from the root of the LDAP tree. For example, CN=2C53BFD6-A2DB-44AF-9476-130492934271, CN=Policies, CN=System, DC=corp, DC=com.

Display Name In Active Directory, you'll see attribute is really called displayName.The friendly name assigned to the Group Policy in the user interface, for example, the Hide Screen Saver Tab GPO.

Version In Active Directory, you'll see attribute is really called versionNumber. A counter that keeps track of updates to a GPC object (more on this topic a little later).

GUID In Active Directory, you'll see attribute is really called objectGUID.The GUID assigned to the object itself. Active Directory uses the object's GUID as a reference for handling table moves, building indexes, and doing other database activities.

You might find it a little confusing for the GPC object to have a GUID that refers to the object itself and a name that uses a GUID format. For an important reason, Microsoft needed a way to make the underlying, real name of GPOs unique, independent of their friendly names. Suppose two administrators create two (or more) GPOs with the same friendly name on their own Domain Controllers. When these GPC objects replicate, one of them would have to be discarded, overwritten, or renamed, depending on the exact circumstances of the replication collision. That could be a bad thing. Therefore, Microsoft solves this problem by using underlying unique names formatted with the GUID format. There is a negligible chance of identical GUIDs being created, not only within one Active Directory but also across the entire world, should the need arise to coexist with GPOs in other forests (such as with cross-forest trusts).

Comments

Popular posts from this blog

INSTALL CISCO VPN CLIENT ON WINDOWS 10 (32 & 64 BIT). FIX REASON 442

This article shows how correctly install Cisco VPN Client (32 & 64 bit) on Windows 10 (32 & 64 bit) using simple steps, overcome the ‘ This app can’t run on this PC ’ installation error , plus fix the Reason 442: Failed to enable Virtual Adapter error message . The article applies to New Windows 10 installations or Upgrades from earlier Windows versions and all versions before or after Windows 10 build 1511 .  To simplify the article, we’ve broken it into the following two sections: How to Install Cisco VPN client on Windows 10 (clean installation or upgrade from previous Windows), including Windows 10 build prior or after build 1511 . How to Fix Reason 442: Failed to enable Virtual Adapter on Windows 10 Figure 1. The Cisco VPN Client Reason 442: Failed to enable Virtual Adapter error on Windows 10 HOW TO INSTALL CISCO VPN CLIENT ON WINDOWS 10 (NEW INSTALLATIONS OR O/S UPGRADES) The instructions below are for new or clean Windows 10 inst...

Linux File and Directory Permissions

file & directory protection is a essential of any OS and Linux OS is no exception for it! These authorizations allow you to choose exactly who can access your files & directory, providing an overall improved system security. There was one of the major flaws in the older Windows operating-system where, by standard, all users can see each other people's information (Windows 95, 98, Me). For overcoming it, editions of the Windows based computer system such as NT, 2000, XP and 2003 lot more security features added. They fully support file & directory permissions, just as Linux system has since the beginning. Together, we'll now assess a directory listing from our Lab Linux system hosting server, to help us understand the information provided. a simple 'ls' command will give you the file and directory listing within a given directory, including the option  '-l' will display number of new areas that we are going to discuss here:

How to create a Hirens Boot CD 15.2 USB Disk

Hiren’s BootCD (HBCD) is a bootable CD that contains a set of tools that can help users to fix their computer if their system fails to boot. More specifically, HBCD contains hardware diagnostic programs, partition tools, data recovery utilities, antivirus tools and many other tools to fix your computer problems.  I write this article because I use Hiren’s BootCD frequently to troubleshoot computer problems, specially when a computer doesn’t boot anymore due to a virus attack or due to a corrupted file system. In this article you will find instructions on how to put Hiren’s BootCD on a USB flash drive (stick) in order to troubleshoot computer problems in the future.