Welcome!

Containers Expo Blog Authors: Flint Brenton, Liz McMillan, Sujoy Sen, Elizabeth White, Pat Romanski

Related Topics: Microsoft Cloud, Java IoT, Linux Containers, Containers Expo Blog, Silverlight, @CloudExpo

Microsoft Cloud: Blog Post

Working with the Windows 8.1 Interface

Windows 8.1 for Business: Remember Our Good Friend Group Policy

imageHopefully you never forgot Group Policy!

Whenever the topic of working with desktops in business is brought up, IT Pro’s always want to manage and maintain those desktops.  For me the first thing that always come to mind is Group Policy and hopefully does for you as well.  Group Policy is one of the primary tools you can quickly leverage to help control your IT infrastructure.    What better way to manage our desktops than with a free tool that is built into Active Directory, and has been there since the Windows NT days.

In today’s post I am going to take a look at some of the new features in Windows 8.1 Group Policy as well as some of the new settings you will want to learn to leverage to help manage your desktops.  Oh, by the way you can still change the user's desktop background to blue, with blue labels on the shortcuts, or put the logoff command in the log in script, if you are so inclined not that I have ever done that.

Now if you are not familiar with Group Policy I would highly recommend you start here:  Group Policy for Beginners The article will help you get familiar with how Group Policy works and how it is configured.

New Settings in Windows 8.1

imageWindows 8.1 has a lot of new Group Policy settings from controlling the Start Screen to controlling the caching mode of Group Policy and everything in between.  So where can you go to learn about all the settings?  The best place to start is the Group Policy Settings reference.  This is a spreadsheet you can download and has all the group policy settings documented for you to review. It also provides some nice filtering tools.  Specifically you can filter for polices that are new to Windows 8.1, by filtering the last column New in 8.1 to True. (Thanks Keith for the tip)  You can download the settings reference file here:

Group Policy Settings Reference for Windows and Windows Server

The rest of this article will focus on some useful new settings including policy caching and settings to help you control the Start Screen.

Group Policy Caching

New in Windows Server 2012 R2  group policy caching helps speed up your group policy processing when you are in synchronous mode processing.  Before I go any further, in Group Policy there are two modes of how policies are processed by the client, synchronous and asynchronous.  This mode impacts how fast policy is processed and ultimately when a user sees the login screen.

  • Synchronous: at a high level, this processing mode will make sure Group Policy is processed in order and the user will not be presented with the login screen until all the policies have been processed.
  • Asynchronous: this processing mode is going to try to get to the login in screen as fast as it can during system start up.  Potentially this means you may be able to login while Group Policy is still processing in the background.  You may have heard of this setting before as it was known as Fast Logon, which was introduced in Windows XP.

With Policy caching when your system gets the latest version of a policy from the imagedomain controller, it writes that policy to a local store. Then if Group Policy is running in synchronous mode the next time the computer reboots, it reads the most recently downloaded version of the policy from the local store, instead of downloading it from the network. This is especially important if you have a latent connection to the domain controller, for example, with DirectAccess or for computers that are off premises. To configure this you will need to modify the Configure Group Policy Caching policy, and that is found in this location: Computer Configuration\Administrative Templates\

System\Group Policy\

To take a more in detailed look at Group Policy Caching take a look here: Understanding Group Policy Caching in Windows 8.1

Managing the Start Screen

One of the new improvements to Windows 8.1 group policy is the ability to manage the Start Screen.  In previous operating systems you also had many ways to control the start menu, desktop layout, and many other settings to help manage your users experience when they logged on.   There are two areas we will take a look at in this section. First we will take a look at customizing the start screen layout.  Secondly you will see how you can start the users on the desktop instead of the Start Screen.

imageCustomizing the Start Screen begins with building a desktop with the Start Screen layout that meets your corporate requirements.  Once that is done then you get to use our friend PowerShell and the Export-StartLayout cmdlet to export your Start Screen layout into an .xml or .bin file.  To learn more about the cmdlet take a look here: Export-StartLayout.  The PowerShell command would look something like this, if you wanted to save an .xml file to the d: drive.

Export-StartLayout -Path "d:\startlayout.xml" -As XML

Once you have the file created, you will want to place the file in a shared folder on one of servers that your desktops can access, for example you could place the files on share in your DC.  Then you will need to configure the Start Screen Layout policy located here: Administrative Templates\Start Menu and Taskbar in either User Configuration or Computer Configuration.  This then will allow you to control the layout of the desktops for the users you apply the policy to.  For a deeper look and how to set this up as well as configuring this locally take a look here:

Customize Windows 8.1 Start Screens by Using Group Policy

Lastly, let’s take a look at how to start your users on the desktop.  As I mentioned in my article on the Start imageScreen, Windows 8.1 for Business- Oh Start menu, how do I miss thee…or do I , my favorite app is the desktop when I am working.  My teammate Jennelle showed you how to start on the desktop by hand in her article, Beloved Desktop, Where Art Thou.  Now let’s take a look at how easy this is to do with Group Policy.

The policy you will want to set is the Go to the desktop instead of Start when signing in or when all the apps on a screen are closed This policy will start your users right on the desktop when the login.  You can find this policy here:  User Configuration\Administrative Templates\Start Menu and Taskbar .

This article took a look at  just a couple of the new policies settings for Windows 8.1 desktop.  However, do not forgot the 1000’s of other policy settings at your fingertips or that you can also use Group Policy to manage your servers as well.

I hope you enjoyed a look at Group Policy and Windows 8.1 and we hope you are enjoying the series, and if you missed any of the Windows 8.1 for business series you can find them here: http://aka.ms/Win814Biz

More Stories By Matt Hester

Matt Hester is a Senior Information Technology Professional Evangelist for Microsoft. Matt has been involved in the IT Pro community for over 20 years. Matt is a skilled and experienced evangelist presenting to audiences nationally and internationally. Prior to joining Microsoft Matt was a highly successful Microsoft Certified Trainer for over 8 years. After joining Microsoft, Matt has continued to be heavily involved in IT Pro community as an IT Pro Evangelist. In his role at Microsoft Matt has presented to audiences in excess of 5000 and as small as 10. Matt has written 4 articles for TechNet magazine. In addition Matt has published 3 books:

You can contact Matt off his blog at http://aka.ms/matthester

@ThingsExpo Stories
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
You deployed your app with the Bluemix PaaS and it's gaining some serious traction, so it's time to make some tweaks. Did you design your application in a way that it can scale in the cloud? Were you even thinking about the cloud when you built the app? If not, chances are your app is going to break. Check out this webcast to learn various techniques for designing applications that will scale successfully in Bluemix, for the confidence you need to take your apps to the next level and beyond.