Difficulty: Medium
Correct Answer: Create a second GPO for the OU; grant Managers Apply/Read, disable Authenticated Users Apply/Read, configure the new GPO to allow My Network Places; set the original GPO to higher priority
Explanation:
Introduction / Context:
When multiple GPOs apply to the same OU, Windows processes them by link order (lowest number wins last). You can fine-tune targeting via the GPO security filter (ACL). Here, the base GPO blocks both “My Network Places” and “System.” Managers need an exception for only My Network Places while still inheriting the System block.
Given Data / Assumptions:
Concept / Approach:
Use an additional GPO (GPO-B) scoped only to Managers that flips just the My Network Places setting to “Enabled/Allow,” leaving System untouched. Ensure GPO-A has higher precedence (processed later) only for settings we still want enforced. Because we want the exception to win for My Network Places, set the link order so GPO-B is processed later than GPO-A for Managers only. Achieve scoping by removing or disabling Authenticated Users Apply permission on GPO-B and granting Managers Apply/Read.
Step-by-Step Solution:
Verification / Alternative check:
Use Resultant Set of Policy (RSoP) or gpresult to confirm Managers see My Network Places enabled while the System CPL restriction persists.
Why Other Options Are Wrong:
Explicit deny Read/Apply (option B) blocks the GPO entirely for Managers, preventing exceptions.
Option A does not create an exception; it simply disables processing.
Option C misconfigures the new GPO to deny System again, complicating precedence unnecessarily.
None: A clear solution exists (option D).
Common Pitfalls:
Using Deny instead of removing Apply, which overrides all; forgetting to verify link order and security filtering with RSoP.
Final Answer:
Create a second GPO for the OU; grant Managers Apply/Read, disable Authenticated Users Apply/Read, configure the new GPO to allow My Network Places; set the original GPO to higher priority
Discussion & Comments