Now that we've seen how servers dole out the various group policies and how clients download and apply them, let's look at specific policy types to see how to use them to our advantage.
This topic covers the mechanics of implementing and troubleshooting the various policy types. For further information, refer to the following:
Chapter 19, “Managing the User Operating Environment,” has more information about using folder redirection and logon scripts to control the user environment.
Chapter 11, “Understanding Network Access Security and Kerberos,” covers specifics about using security policies.