• Online, Self-Paced
Course Description

In this challenge, you will configure Group Policy processing to control application of existing Group Policy Objects (GPOs) to specific users by using the link enabled, and blocking inheritance options, enforcing a GPO, implementing security filtering, and testing the results for each scenario. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Learning Objectives

In this challenge, you will configure Group Policy processing to control application of existing Group Policy Objects (GPOs) to specific users by using the link enabled, and blocking inheritance options, enforcing a GPO, implementing security filtering, and testing the results for each scenario. Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.