Method and system for implementing group policy operations
First Claim
1. In a computing environment, a method comprising:
- receiving a request to perform an operation based upon a first group policy object having a first state including settings;
attempting to perform the operation to change a second group policy object having a second state to a state that includes at least some of the settings of the first group policy object; and
determining whether the attempted operation was successful, and if not, returning the second group policy object to the second state.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for performing various operations on group policy objects, by manipulating group policy objects as a single entity to perform backup, restore, import and copy operations. The backup operation transfers the various subparts of a selected group policy object to a file system. A restore operation restores a backed-up group policy object to its domain, in the same state as when the backup was performed. An import operation transfers the settings within a backed-up source group policy object to a destination group policy object, erasing its previous settings. A copy operation transfers the settings from a source group policy object to a new group policy object. Copy and import operations can be cross-domain, and a migration table can be used to convert security group and UNC pathnames as appropriate for the destination domain. Backup management, rollback of incomplete operations, and support for application deployment are also provided.
244 Citations
83 Claims
-
1. In a computing environment, a method comprising:
-
receiving a request to perform an operation based upon a first group policy object having a first state including settings;
attempting to perform the operation to change a second group policy object having a second state to a state that includes at least some of the settings of the first group policy object; and
determining whether the attempted operation was successful, and if not, returning the second group policy object to the second state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. In a computing environment, a method comprising:
-
receiving a request to perform an operation on a group policy object, the group policy object including a software-related object;
determining whether the software-related object exists, and if the software-related object does not exist, determining whether the software-related object can be reanimated, and a) if the software-related object can be reanimated, reanimating the software-related object, and b) if the software-related object cannot be reanimated, having a new software-related object generated; and
performing the requested operation using data of the software-related object. - View Dependent Claims (30, 31)
-
-
32. In a computing environment, a method comprising:
-
collecting data corresponding to a group policy object; and
backing up the collected data to a persistent storage, including creating a uniquely-identified backup data structure on the persistent storage, storing at least some of the collected data in relation to that uniquely identified data structure, and placing information corresponding to at least some of the collected data in an index file containing indexing data for the uniquely-identified backup data structure and at least one other backup data structure. - View Dependent Claims (33, 34, 35, 36, 37, 38)
-
-
39. In a computing environment, a method comprising:
-
receiving a request to migrate at least some data corresponding to a group policy object of a first domain to a group policy object of a second domain; and
migrating the data, including accessing migration information to convert at least some data relative to the first domain to corresponding data relative to the second domain. - View Dependent Claims (40, 41, 42, 43, 44, 45)
-
-
46. A computer-readable medium having stored thereon a data structure, comprising:
-
at least one mapping;
a first field of the mapping including source data corresponding to a source group policy object;
a second field of the mapping including destination data corresponding to a destination group policy object, the mapping relating the second field to the first field; and
wherein the first field is accessed during an operation involving a source group policy object and a destination group policy object to locate a mapping having source data corresponding to the source group policy object, and if found, to obtain from the second field information on the destination data corresponding to the destination group policy object. - View Dependent Claims (47, 48, 49, 50, 51, 52)
-
-
53. In a computing environment, a method comprising:
-
receiving a request to perform an operation on a group policy object, the group policy object comprising a plurality of component objects;
performing at least part of the operation, including attempting to access a selected component object of the group policy object; and
providing at least one status message during the operation, including a status message identifying the selected component object and a status of the attempt to access the selected component object. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62)
-
-
63. In a computing environment, a method comprising:
-
receiving a request to perform a copy operation based upon a first group policy object having a first state comprising settings and a unique first identifier;
creating a second group policy object with a unique second identifier; and
copying the settings substantially exactly from the first group policy object to the second group policy object, without changing the second unique identifier of the second group policy object. - View Dependent Claims (64, 65, 66, 67, 68)
-
-
69. In a computing environment, a method comprising:
-
receiving a first request to perform an operation on group policy-related data;
beginning the requested operation in response to the first request;
receiving a second request to cancel the operation while the requested operation is ongoing; and
canceling the operation in response to the second request. - View Dependent Claims (70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83)
-
Specification