摘要:
A system and method comprising a reporting mechanism for outputting an HMTL and XML document from a collection of hierarchically maintained settings such as group policy object settings or resultant set of policy data. The reporting mechanism provides a substantially complete view of which settings are configured (enabled) in a given group policy object, or a view for a resultant set of policy (that is applied to a given SOM), along with the values of the settings. The markup language format enables viewing a flat representation of the settings, and printing, saving and/or transporting of the settings. XML schemas describe a valid representation of group policy settings, and a valid representation of resultant set of policy.
摘要:
A system and method for managing group policy objects in a network, including interfaces that allow access by programs or a user interface component to functions of a group policy management console that performs management tasks on group policy objects and other related objects. The interfaces abstract the underlying data storage and retrieval, thereby facilitating searching for objects, and providing the ability to delegate, view, change and permissions on those objects, and check and save those permissions. Modeling and other test simulations are facilitated by other interfaces. Other interfaces provide dynamic and interactive features, such as to convey progress and rich status messages, and allow canceling of an ongoing operation. Still other interfaces provide methods for operating on group policy related data, including group policy object backup, restore, import, copy and create methods, and methods for linking group policy objects to scope of management objects.
摘要:
A system and method for managing group policy objects in a network, including interfaces that allow access by programs or a user interface component to functions of a group policy management console that performs management tasks on group policy objects and other related objects. The interfaces abstract the underlying data storage and retrieval, thereby facilitating searching for objects, and providing the ability to delegate, view, change and permissions on those objects, and check and save those permissions. Modeling and other test simulations are facilitated by other interfaces. Other interfaces provide dynamic and interactive features, such as to convey progress and rich status messages, and allow canceling of an ongoing operation. Still other interfaces provide methods for operating on group policy related data, including group policy object backup, restore, import, copy and create methods, and methods for linking group policy objects to scope of management objects.
摘要:
A system and method for performing various operations on group policy objects, by manipulating group policy objects as a single entity to perform backup, restore, import and copy operations. The backup operation transfers the various subparts of a selected group policy object to a file system. A restore operation restores a backed-up group policy object to its domain, in the same state as when the backup was performed. An import operation transfers the settings within a backed-up source group policy object to a destination group policy object, erasing its previous settings. A copy operation transfers the settings from a source group policy object to a new group policy object. Copy and import operations can be cross-domain, and a migration table can be used to convert security group and UNC pathnames as appropriate for the destination domain. Backup management, rollback of incomplete operations, and support for application deployment are also provided.
摘要:
Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
摘要:
Provided are support mechanisms for a user interface mechanism that performs group policy management. The support mechanisms include a context menu map that provides a consistent and efficient way to generate interactive context menus for nodes using only straightforward declarations. The declarations are processed to invoke code with corresponding parameters that in turn generates a data structure corresponding to a context menu that is to be displayed. The data structure is processed into another data structure, from which data is extracted to meet the requirements of a hosting management application. An intermediary communications object is provided to separate the user interface into multiple components which each exchange data. A progress dialog is also provided to update the user as to the progress of lengthy operations performed on various managed objects, and to drive those operations. Refresh logic replicates changes made at one location in the user interface to other nodes.
摘要:
A user interface is disclosed for representing group policy object topology and relationships, while allowing interaction to facilitate group policy management. Forests, sites and domains are hierarchically displayed in a treeview that reflects the network topology. The treeview also represents group policy objects, links, filters and other nodes. Administrators perform operations across forests, domains and sites, and perform operations on other nodes in the treeview. Administrators control which forests, sites and domains are viewable in the treeview, and the treeview state is persisted. Logic automatically reduces the topology's complexity by limiting the presentation of forests and/or domains to only those with which the administrator's forest and domain have a proper trust relationship. Also provided is a tabbed view in a result pane area that provides a rich display of complex data, and intelligent refresh logic to update changes in one user interface area to other user interface areas.
摘要:
Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.
摘要:
Provided are support mechanisms for a user interface mechanism that performs group policy management. The support mechanisms include a context menu map that provides a consistent and efficient way to generate interactive context menus for nodes using only straightforward declarations. The declarations are processed to invoke code with corresponding parameters that in turn generates a data structure corresponding to a context menu that is to be displayed. The data structure is processed into another data structure, from which data is extracted to meet the requirements of a hosting management application. An intermediary communications object is provided to separate the user interface into multiple components which each exchange data. A progress dialog is also provided to update the user as to the progress of lengthy operations performed on various managed objects, and to drive those operations. Refresh logic replicates changes made at one location in the user interface to other nodes.
摘要:
Accessing a data set with secret and non-secret data. A method includes accessing a data set image. The data set image comprises secret data. The data set image is derived from an authorized data set associated with a master key that authorizes access to the secret data. The master key is not provided with the data set image. The method further comprises restoring the data set image to a computing system to create a degraded data set. Data in the degraded data set other than the secret data is accessed without restoring the master key.