Welcome!

Linux Containers Authors: Liz McMillan, Chris Kocher, XebiaLabs Blog, Elizabeth White, Craig Lowell

Related Topics: Microsoft Cloud, Java IoT, Linux Containers, Containers Expo Blog, Silverlight, @CloudExpo

Microsoft Cloud: Blog Post

Working with the Windows 8.1 Interface

Windows 8.1 for Business: Remember Our Good Friend Group Policy

imageHopefully you never forgot Group Policy!

Whenever the topic of working with desktops in business is brought up, IT Pro’s always want to manage and maintain those desktops.  For me the first thing that always come to mind is Group Policy and hopefully does for you as well.  Group Policy is one of the primary tools you can quickly leverage to help control your IT infrastructure.    What better way to manage our desktops than with a free tool that is built into Active Directory, and has been there since the Windows NT days.

In today’s post I am going to take a look at some of the new features in Windows 8.1 Group Policy as well as some of the new settings you will want to learn to leverage to help manage your desktops.  Oh, by the way you can still change the user's desktop background to blue, with blue labels on the shortcuts, or put the logoff command in the log in script, if you are so inclined not that I have ever done that.

Now if you are not familiar with Group Policy I would highly recommend you start here:  Group Policy for Beginners The article will help you get familiar with how Group Policy works and how it is configured.

New Settings in Windows 8.1

imageWindows 8.1 has a lot of new Group Policy settings from controlling the Start Screen to controlling the caching mode of Group Policy and everything in between.  So where can you go to learn about all the settings?  The best place to start is the Group Policy Settings reference.  This is a spreadsheet you can download and has all the group policy settings documented for you to review. It also provides some nice filtering tools.  Specifically you can filter for polices that are new to Windows 8.1, by filtering the last column New in 8.1 to True. (Thanks Keith for the tip)  You can download the settings reference file here:

Group Policy Settings Reference for Windows and Windows Server

The rest of this article will focus on some useful new settings including policy caching and settings to help you control the Start Screen.

Group Policy Caching

New in Windows Server 2012 R2  group policy caching helps speed up your group policy processing when you are in synchronous mode processing.  Before I go any further, in Group Policy there are two modes of how policies are processed by the client, synchronous and asynchronous.  This mode impacts how fast policy is processed and ultimately when a user sees the login screen.

  • Synchronous: at a high level, this processing mode will make sure Group Policy is processed in order and the user will not be presented with the login screen until all the policies have been processed.
  • Asynchronous: this processing mode is going to try to get to the login in screen as fast as it can during system start up.  Potentially this means you may be able to login while Group Policy is still processing in the background.  You may have heard of this setting before as it was known as Fast Logon, which was introduced in Windows XP.

With Policy caching when your system gets the latest version of a policy from the imagedomain controller, it writes that policy to a local store. Then if Group Policy is running in synchronous mode the next time the computer reboots, it reads the most recently downloaded version of the policy from the local store, instead of downloading it from the network. This is especially important if you have a latent connection to the domain controller, for example, with DirectAccess or for computers that are off premises. To configure this you will need to modify the Configure Group Policy Caching policy, and that is found in this location: Computer Configuration\Administrative Templates\

System\Group Policy\

To take a more in detailed look at Group Policy Caching take a look here: Understanding Group Policy Caching in Windows 8.1

Managing the Start Screen

One of the new improvements to Windows 8.1 group policy is the ability to manage the Start Screen.  In previous operating systems you also had many ways to control the start menu, desktop layout, and many other settings to help manage your users experience when they logged on.   There are two areas we will take a look at in this section. First we will take a look at customizing the start screen layout.  Secondly you will see how you can start the users on the desktop instead of the Start Screen.

imageCustomizing the Start Screen begins with building a desktop with the Start Screen layout that meets your corporate requirements.  Once that is done then you get to use our friend PowerShell and the Export-StartLayout cmdlet to export your Start Screen layout into an .xml or .bin file.  To learn more about the cmdlet take a look here: Export-StartLayout.  The PowerShell command would look something like this, if you wanted to save an .xml file to the d: drive.

Export-StartLayout -Path "d:\startlayout.xml" -As XML

Once you have the file created, you will want to place the file in a shared folder on one of servers that your desktops can access, for example you could place the files on share in your DC.  Then you will need to configure the Start Screen Layout policy located here: Administrative Templates\Start Menu and Taskbar in either User Configuration or Computer Configuration.  This then will allow you to control the layout of the desktops for the users you apply the policy to.  For a deeper look and how to set this up as well as configuring this locally take a look here:

Customize Windows 8.1 Start Screens by Using Group Policy

Lastly, let’s take a look at how to start your users on the desktop.  As I mentioned in my article on the Start imageScreen, Windows 8.1 for Business- Oh Start menu, how do I miss thee…or do I , my favorite app is the desktop when I am working.  My teammate Jennelle showed you how to start on the desktop by hand in her article, Beloved Desktop, Where Art Thou.  Now let’s take a look at how easy this is to do with Group Policy.

The policy you will want to set is the Go to the desktop instead of Start when signing in or when all the apps on a screen are closed This policy will start your users right on the desktop when the login.  You can find this policy here:  User Configuration\Administrative Templates\Start Menu and Taskbar .

This article took a look at  just a couple of the new policies settings for Windows 8.1 desktop.  However, do not forgot the 1000’s of other policy settings at your fingertips or that you can also use Group Policy to manage your servers as well.

I hope you enjoyed a look at Group Policy and Windows 8.1 and we hope you are enjoying the series, and if you missed any of the Windows 8.1 for business series you can find them here: http://aka.ms/Win814Biz

More Stories By Matt Hester

Matt Hester is a Senior Information Technology Professional Evangelist for Microsoft. Matt has been involved in the IT Pro community for over 20 years. Matt is a skilled and experienced evangelist presenting to audiences nationally and internationally. Prior to joining Microsoft Matt was a highly successful Microsoft Certified Trainer for over 8 years. After joining Microsoft, Matt has continued to be heavily involved in IT Pro community as an IT Pro Evangelist. In his role at Microsoft Matt has presented to audiences in excess of 5000 and as small as 10. Matt has written 4 articles for TechNet magazine. In addition Matt has published 3 books:

You can contact Matt off his blog at http://aka.ms/matthester

@ThingsExpo Stories
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.