The domain group policy script runs automatically upon login, and the domain group policy script
Method 1:
Creating a shared directory to store script files requires the application user or group to grant read-only permission
Method 2:
Put the script in \ IP or host name \ sysvol \ Domain Name \ Policies \ unique ID \ USER \ Scripts \ Logon (LOGIN)
SYSVOL: A shared folder that stores copies of
Index optimization policy and index Policy
Note how to use these indexes after creating indexes on a table.
1. You cannot use expressions or functions in the index column.
For example:
Select * from users where upper (name) = 'abc ';
Change
Select * from users where name = 'abc ';
2. prefix index and index column Selectivity
The higher the index selectivity, the higher the index efficiency.
3.
in the enterprise operations, often found with some servers or with some servers in the data synchronization, you will find that some of the traffic will be larger, in order to ensure the normal operation of the network, we can actually use Windows with the QoS to limit the bandwidth used to sync, Here I share how to do it:
1. Open the Group Policy above the server on which you need to set QoS, start-run-gpedit.msc
3, enter the
Tcp
1028
My IP address-1028
Any IP address-any port
Gray Pigeon-1028
Stop
Udp
1026
My IP address-1026
Any IP address-any port
Gray Pigeon-1026
Stop
Udp
1027
My IP address-1027
Any IP address-any port
Gray Pigeon-1027
Stop
Udp
1028
My IP address-1028
Any IP address-any port
Gray Pigeon-1028
MySql performance tuning policy and mysql tuning policy
This topic provides detailed parameter descriptions for my. cnf configuration.
The sample configuration is as follows:
# Cat my. cnf
# MySQL client library initialization.
[Client]
Port
= 3306
Socket =/tmp/mysql. sock
Character-set-server = utf8
# The MySQL server
[Mysqld]
Init_connect = 'set names utf8' // sets utf8 encoding for connectin
MySql update optimization policy and mysql update policy
Simulation Scenario 1:
Add several fields to the structure adjustment of a table in the database and then refresh the previous data. The refreshed content matches an existing field url, then, update the newly added field type and typeid.
Later, I wrote a shell script to refresh the data. After running the shell script, I ran it. Why is it so slow ~~~
IOS Internal test distribution policy and ios distribution policy
When Apple applications are not submitted to the appstore for review, how can we invite others to test and use them out of the inner stage?The plist Apple installation package uses qiniu cloud storage to solve ios7.1 app deployment problems
We recommend two popular apps, dandelion and Fir, to assist with internal tests. Such a startup web
Group Policy appears "Windows cannot read template information" because the Guest account in win2000/xp/2003 is deleted. Solution:
1. There is a backup of the registry. It's simple, just restore the backup.
Group Policy appears "Windows cannot read template information" because the Guest account in win2000/xp/2003 is deleted. Solution:
1. There is a backup of the registry. It's simple, just restore the b
In fact, this win10 is the same as other versions of Windows as long as you turn on "Run" and then enter: Gpedit.msc then open to run to the WIN10 Group Policy.
Natalie Assistant features do not know if it has been used, we can search for it directly after the Natalie Assistant searches for "Group Policy".
Some help tips:
Win10 Run the box to open the method, we simply press the Win + R combina
In addition to passwords, the screen lock settings are dimmed and the message "Saved By administrator, encryption policy, or certificate" is displayed, this is because the device encryption or external SD card encryption function is set in the mobile phone. To change the screen lock mode, decrypt the device or decrypt the external SD card.Operation:1. Cancel device encryption. Method: set-security-decrypt the device-click "decrypt the device"-enter th
1. What is group policy?(1) What are the functions of a group of policies?
When it comes to group policies, you have to raise the registry. The Registry is a database that stores system and application software configurations in windows. As Windows functions become more and more abundant, there are more and more configuration items in the registry. Many configurations can be customized, but these configurations are released in every corner of the Re
OverviewIn the policy mode, we can define some independent classes to encapsulate different algorithms, each of which encapsulates a specific algorithm, where each class of encapsulation algorithms can be called a strategy (strategy), in order to ensure consistency in the use of these policies, Typically, an abstract policy class is provided to define the rules, and each algorithm corresponds to a specific
1. Manage Non-Restricted Processes
Non-Restricted processes run in non-restricted domains. For example, the init process runs in the unrestricted initrc_t domain, the unrestricted kernel process runs in the kernel_t domain, and the unrestricted user runs in the unconfined_t domain. SELinux policy rules still apply to non-restricted processes. However, rules that allow processes to run in non-restricted domains allow almost all accesses. Therefore, if
Group PolicyIt is critical for the system administrator, but it is also a headache for the system administrator when the Group Policy is in trouble. The following describes how to troubleshoot the Group Policy in detail.
The power of a group strategy is well known, but it is also well known that the troubles brought about when its results are often not what you expected. It is equally annoying that group po
Group Policy--local policyThere is a local policy in every Windows system, and starting with Windows Server 2008, local Group Policy supports setting different policies for different users.mmc-Group Policy Object Editor-users-Choose a different user650) this.width=650; "height=" 351 "title=" clip_image002 "style=" marg
Anonymous Source: It expert network Forum 2007-07-23 13:31 First, what IS Group Policy (a) What is the use of Group Policy?When it comes to Group Policy, you have to mention the registry. The registry is a database of storage systems, application software configurations in Windows systems, and as Windows features become richer, more and more configuration items
Netsh ipsec usage
In the command line, use netsh ipsec static to configure the IPSEC Security Policy. The premise is that the IPSEC service is enabled.An IPSEC consists of one or more rules. A rule consists of an IP Filter list and a corresponding filter action. The filter list and filter can be unique to the system, if no filter exists, you must create one filter and one filter is composed of one or more filters. Therefore, IPSEC must be configured s
netsh ipsec usage methodsUnder the command line, IPSec security policy is configured through netsh ipsec static. If the IPSec service is already open.
One IPSec consists of one or more rules; A rule consists of an IP filter list and a corresponding filter action; This filter list and filter can be not in the system itself, and if not, it needs to be established, and a filter consists of one or more filters. Therefore, IPSec must be configured in a ste
Group Policy application Settings EncyclopediaFirst, desktop project settings1. Hide unwanted desktop icons2. Prohibit changes to the desktop3. Enable or disable Active Desktop4. To the "Start" menu to lose weight5. Protect the Taskbar and Start Menu settingsIi. Hide or disable Control Panel items1. Prohibit access to the control Panel2. Hide or disable the "Add/Remove Programs" item3. Hide or disable "show" itemsThird, the System project Setup1. Do n
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.