What Group Policy Does
Group Policy lets an administrator define a setting once and have it automatically apply to every machine or user in scope — without touching each machine individually. Common uses include enforcing password complexity, mapping network drives, restricting USB access, deploying software, configuring Windows Firewall, and setting the desktop wallpaper.
Group Policy settings are split into two categories: Computer Configuration (applies to the computer regardless of who logs in) and User Configuration (applies to the user account regardless of which computer they log into).
GPO Processing Order — LSDOU
When a machine boots or a user logs on, Windows applies GPOs in a specific order. Each level can override the previous one — so the last policy applied wins (unless enforcement is used).
Local → Site → Domain → OU — memorise this order. The A+ and Security+ both test it directly. Remember: later = higher priority. An OU policy overrides a Domain policy on the same setting. If two GPOs at the same level conflict, the one with the lower link order number (higher priority in GPMC) wins.
The exam may also ask: which GPO wins when there's a conflict? The answer is always the one that applies last in the LSDOU order — unless Enforcement is set, which inverts this.
Inheritance, Blocking, and Enforcement
| Feature | What It Does | Who Can Set It |
|---|---|---|
| Inheritance | GPOs linked to a parent OU automatically apply to all child OUs below it. A policy linked to the domain flows down to all OUs unless blocked. | Default behaviour — no configuration needed |
| Block Inheritance | An OU administrator can block GPOs from flowing down from parent OUs. Useful when a department needs different settings from the rest of the domain. | OU admins (set on the OU) |
| Enforcement (No Override) | A domain admin can mark a GPO as Enforced — it cannot be blocked by child OUs and takes priority over all conflicting policies below it. Overrides Block Inheritance. | Domain admins (set on the GPO link) |
| Security Filtering | By default, a GPO applies to "Authenticated Users" (everyone). Security filtering restricts the GPO to specific users, computers, or groups — only they receive the policy. | Admins with GPO edit rights |
| WMI Filtering | Applies a GPO only to computers matching a WMI query (e.g., only Windows 11 machines, only machines with more than 8 GB RAM). More granular than security filtering. | Domain admins |
| Loopback Processing | Normally, user settings follow the user. Loopback processing makes the computer's OU-linked GPOs apply to all users who log into that computer — useful for kiosks and shared computers. | Computer Configuration → Group Policy settings |
Block Inheritance is set on an OU — it prevents GPOs from parent levels flowing in. Enforcement is set on a GPO link — it forces the GPO through even if an OU has Block Inheritance enabled. Enforcement always wins. A domain admin using Enforcement can guarantee a policy applies everywhere, regardless of OU-level blocking.
Common Security Policies Configured via GPO
| Policy Area | Common Settings | GPO Path |
|---|---|---|
| Password Policy | Minimum length (8+ chars), complexity requirements, maximum age (90 days), history (remember last 24) | Computer Config → Policies → Windows Settings → Security Settings → Account Policies → Password Policy |
| Account Lockout | Lockout threshold (5 invalid attempts), lockout duration (30 min), observation window | Computer Config → … → Account Policies → Account Lockout Policy |
| Audit Policy | Log successful/failed logons, object access, privilege use — feeds into Event Viewer and SIEM | Computer Config → … → Local Policies → Audit Policy |
| User Rights Assignment | Who can log on locally, who can shut down the system, who can manage audit logs | Computer Config → … → Local Policies → User Rights Assignment |
| Windows Firewall | Enable/disable firewall profiles, create inbound/outbound rules, block specific ports | Computer Config → Policies → Windows Settings → Security Settings → Windows Firewall |
| Software Restriction / AppLocker | Whitelist or blacklist applications by path, hash, publisher, or zone | Computer Config → … → Application Control Policies → AppLocker |
| BitLocker | Require BitLocker on OS drives, set encryption method, configure TPM requirements | Computer Config → Administrative Templates → Windows Components → BitLocker |
| Drive Mapping | Map network drives (e.g., H: → \\fileserver\home\%username%) at logon | User Config → Preferences → Windows Settings → Drive Maps |
| Folder Redirection | Redirect Desktop, Documents, Downloads to a network share — keeps user data on server, not local disk | User Config → Policies → Windows Settings → Folder Redirection |
| Restrict Control Panel | Prevent standard users from accessing Control Panel or specific applets | User Config → Administrative Templates → Control Panel |
GPO Commands — gpupdate and gpresult
GPOs are normally applied at startup (Computer Configuration) and logon (User Configuration), then refreshed every 90 minutes (± 30 minutes random offset) in the background. To force an immediate refresh without rebooting or logging off:
When multiple GPOs apply to a user or computer, the final merged result is the Resultant Set of Policy (RSoP). This is what the machine actually enforces after all inheritance, filtering, and conflicts are resolved. You can view the RSoP using gpresult /r, the RSoP snap-in (rsop.msc), or the Group Policy Results wizard in GPMC. RSoP is the primary troubleshooting tool when a user says "the policy isn't applying."
Default Domain Policy vs Default Domain Controllers Policy
| GPO | Linked To | Purpose | Should You Edit It? |
|---|---|---|---|
| Default Domain Policy | Domain root | Sets baseline password policy, account lockout policy, and Kerberos settings for all domain users and computers. Best practice: only edit password/lockout/Kerberos settings here. | Only for password/lockout/Kerberos — create new GPOs for everything else |
| Default Domain Controllers Policy | Domain Controllers OU | Applies to all domain controller computers. Sets security settings specific to DCs — audit policies, user rights, security options. Applies only to DC machines. | Sparingly — create new GPOs for DC-specific settings |
Exam Scenarios
Studying for the CompTIA A+?
See the best courses, practice exams, and study guides for 220-1201 and 220-1202.