What IS Group Policy Modeling: Simulating the effect of a user (or container) logging on to a computer (or container) to perform a corresponding GPO.
Operation Steps:
Open the Group Policy Editor right-click Group Policy Modeling, Start the wizard, select Next, select which domain controller to run on
650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M00/87/18/wKiom1fTwOORnpB6AACTss6nMwo291.png-wh_500x0-wm_3 -wmp_4-s_1278328585.png "title=" 1.png "alt=" Wkiom1ftwoornpb6aactss6nmwo291.png-wh_50 "/>
Select the user and computer or user container and computer container to test
650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M01/87/18/wKiom1fTwT_gR6TVAACaddiWKtQ143.png-wh_500x0-wm_3 -wmp_4-s_2452769476.png "title=" 1.png "alt=" Wkiom1ftwt_gr6tvaacaddiwktq143.png-wh_50 "/>
Select network Environment and site
650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M00/87/16/wKioL1fTwXeAXnNTAACJYmw4btc195.png-wh_500x0-wm_3 -wmp_4-s_3863373129.png "title=" 1.png "alt=" Wkiol1ftwxeaxnntaacjymw4btc195.png-wh_50 "/>
Select the user location and computer location for impersonation execution, and the appropriate permissions, by default
650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M00/87/18/wKiom1fTwfriyooaAACP2evE8GA457.png-wh_500x0-wm_3 -wmp_4-s_3001384798.png "style=" Float:none; "title=" 1.png "alt=" Wkiom1ftwfriyooaaacp2eve8ga457.png-wh_50 "/>
650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M02/87/16/wKioL1fTwfzj0LAtAACV9qVM-cM924.png-wh_500x0-wm_3 -wmp_4-s_2562079081.png "style=" Float:none; "title=" 2.png "alt=" Wkiol1ftwfzj0lataacv9qvm-cm924.png-wh_50 "/>
650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M02/87/18/wKiom1fTwf2TBwxrAACaSSyVaL4439.png-wh_500x0-wm_3 -wmp_4-s_3463058744.png "style=" Float:none; "title=" 3.png "alt=" Wkiom1ftwf2tbwxraacassyval4439.png-wh_50 "/>
8. Select WMI Filter and select it as required
650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M02/87/16/wKioL1fTwniwwvBdAACr7m6xx9g338.png-wh_500x0-wm_3 -wmp_4-s_941298853.png "title=" 1.png "alt=" Wkiol1ftwniwwvbdaacr7m6xx9g338.png-wh_50 "/>
650) this.width=650; "Src=" Http://s5.51cto.com/wyfs02/M00/87/18/wKiom1fTwqyRxuYRAAChgSIhX2M396.png-wh_500x0-wm_3 -wmp_4-s_3817067727.png "title=" 1.png "alt=" Wkiom1ftwqyrxuyraachgsihx2m396.png-wh_50 "/>
9. Summary
650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M00/87/16/wKioL1fTwt6w8pQlAACiKHTv3Ng783.png-wh_500x0-wm_3 -wmp_4-s_3344194314.png "title=" 1.png "alt=" Wkiol1ftwt6w8pqlaacikhtv3ng783.png-wh_50 "/>
10. Group Policy Modeling Wizard completed
650) this.width=650; "Src=" Http://s1.51cto.com/wyfs02/M00/87/16/wKioL1fTwxHxhebsAADw52Nl810291.png-wh_500x0-wm_3 -wmp_4-s_475090470.png "title=" 1.png "alt=" Wkiol1ftwxhxhebsaadw52nl810291.png-wh_50 "/>
11. View information
650) this.width=650; "Src=" Http://s4.51cto.com/wyfs02/M01/87/18/wKiom1fTw6rDE1nZAAENdUw2v14039.png-wh_500x0-wm_3 -wmp_4-s_1346056880.png "title=" 1.png "alt=" Wkiom1ftw6rde1nzaaenduw2v14039.png-wh_50 "/>
This article is from the "Record Bit Technology" blog, please make sure to keep this source http://seawind.blog.51cto.com/6845370/1851413
Correct understanding of Group Policy Modeling of Group Policy