Welcome!

Java IoT Authors: Liz McMillan, Elizabeth White, Yeshim Deniz, Pat Romanski, Paul Simmons

Related Topics: Microsoft Cloud, Java IoT, Linux Containers, Containers Expo Blog, Silverlight, @CloudExpo

Microsoft Cloud: Blog Post

Working with the Windows 8.1 Interface

Windows 8.1 for Business: Remember Our Good Friend Group Policy

imageHopefully you never forgot Group Policy!

Whenever the topic of working with desktops in business is brought up, IT Pro’s always want to manage and maintain those desktops.  For me the first thing that always come to mind is Group Policy and hopefully does for you as well.  Group Policy is one of the primary tools you can quickly leverage to help control your IT infrastructure.    What better way to manage our desktops than with a free tool that is built into Active Directory, and has been there since the Windows NT days.

In today’s post I am going to take a look at some of the new features in Windows 8.1 Group Policy as well as some of the new settings you will want to learn to leverage to help manage your desktops.  Oh, by the way you can still change the user's desktop background to blue, with blue labels on the shortcuts, or put the logoff command in the log in script, if you are so inclined not that I have ever done that.

Now if you are not familiar with Group Policy I would highly recommend you start here:  Group Policy for Beginners The article will help you get familiar with how Group Policy works and how it is configured.

New Settings in Windows 8.1

imageWindows 8.1 has a lot of new Group Policy settings from controlling the Start Screen to controlling the caching mode of Group Policy and everything in between.  So where can you go to learn about all the settings?  The best place to start is the Group Policy Settings reference.  This is a spreadsheet you can download and has all the group policy settings documented for you to review. It also provides some nice filtering tools.  Specifically you can filter for polices that are new to Windows 8.1, by filtering the last column New in 8.1 to True. (Thanks Keith for the tip)  You can download the settings reference file here:

Group Policy Settings Reference for Windows and Windows Server

The rest of this article will focus on some useful new settings including policy caching and settings to help you control the Start Screen.

Group Policy Caching

New in Windows Server 2012 R2  group policy caching helps speed up your group policy processing when you are in synchronous mode processing.  Before I go any further, in Group Policy there are two modes of how policies are processed by the client, synchronous and asynchronous.  This mode impacts how fast policy is processed and ultimately when a user sees the login screen.

  • Synchronous: at a high level, this processing mode will make sure Group Policy is processed in order and the user will not be presented with the login screen until all the policies have been processed.
  • Asynchronous: this processing mode is going to try to get to the login in screen as fast as it can during system start up.  Potentially this means you may be able to login while Group Policy is still processing in the background.  You may have heard of this setting before as it was known as Fast Logon, which was introduced in Windows XP.

With Policy caching when your system gets the latest version of a policy from the imagedomain controller, it writes that policy to a local store. Then if Group Policy is running in synchronous mode the next time the computer reboots, it reads the most recently downloaded version of the policy from the local store, instead of downloading it from the network. This is especially important if you have a latent connection to the domain controller, for example, with DirectAccess or for computers that are off premises. To configure this you will need to modify the Configure Group Policy Caching policy, and that is found in this location: Computer Configuration\Administrative Templates\

System\Group Policy\

To take a more in detailed look at Group Policy Caching take a look here: Understanding Group Policy Caching in Windows 8.1

Managing the Start Screen

One of the new improvements to Windows 8.1 group policy is the ability to manage the Start Screen.  In previous operating systems you also had many ways to control the start menu, desktop layout, and many other settings to help manage your users experience when they logged on.   There are two areas we will take a look at in this section. First we will take a look at customizing the start screen layout.  Secondly you will see how you can start the users on the desktop instead of the Start Screen.

imageCustomizing the Start Screen begins with building a desktop with the Start Screen layout that meets your corporate requirements.  Once that is done then you get to use our friend PowerShell and the Export-StartLayout cmdlet to export your Start Screen layout into an .xml or .bin file.  To learn more about the cmdlet take a look here: Export-StartLayout.  The PowerShell command would look something like this, if you wanted to save an .xml file to the d: drive.

Export-StartLayout -Path "d:\startlayout.xml" -As XML

Once you have the file created, you will want to place the file in a shared folder on one of servers that your desktops can access, for example you could place the files on share in your DC.  Then you will need to configure the Start Screen Layout policy located here: Administrative Templates\Start Menu and Taskbar in either User Configuration or Computer Configuration.  This then will allow you to control the layout of the desktops for the users you apply the policy to.  For a deeper look and how to set this up as well as configuring this locally take a look here:

Customize Windows 8.1 Start Screens by Using Group Policy

Lastly, let’s take a look at how to start your users on the desktop.  As I mentioned in my article on the Start imageScreen, Windows 8.1 for Business- Oh Start menu, how do I miss thee…or do I , my favorite app is the desktop when I am working.  My teammate Jennelle showed you how to start on the desktop by hand in her article, Beloved Desktop, Where Art Thou.  Now let’s take a look at how easy this is to do with Group Policy.

The policy you will want to set is the Go to the desktop instead of Start when signing in or when all the apps on a screen are closed This policy will start your users right on the desktop when the login.  You can find this policy here:  User Configuration\Administrative Templates\Start Menu and Taskbar .

This article took a look at  just a couple of the new policies settings for Windows 8.1 desktop.  However, do not forgot the 1000’s of other policy settings at your fingertips or that you can also use Group Policy to manage your servers as well.

I hope you enjoyed a look at Group Policy and Windows 8.1 and we hope you are enjoying the series, and if you missed any of the Windows 8.1 for business series you can find them here: http://aka.ms/Win814Biz

More Stories By Matt Hester

Matt Hester is a Senior Information Technology Professional Evangelist for Microsoft. Matt has been involved in the IT Pro community for over 20 years. Matt is a skilled and experienced evangelist presenting to audiences nationally and internationally. Prior to joining Microsoft Matt was a highly successful Microsoft Certified Trainer for over 8 years. After joining Microsoft, Matt has continued to be heavily involved in IT Pro community as an IT Pro Evangelist. In his role at Microsoft Matt has presented to audiences in excess of 5000 and as small as 10. Matt has written 4 articles for TechNet magazine. In addition Matt has published 3 books:

You can contact Matt off his blog at http://aka.ms/matthester

@ThingsExpo Stories
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo at the Javits Center in New York City, NY.
In his session at @ThingsExpo, Arvind Radhakrishnen discussed how IoT offers new business models in banking and financial services organizations with the capability to revolutionize products, payments, channels, business processes and asset management built on strong architectural foundation. The following topics were covered: How IoT stands to impact various business parameters including customer experience, cost and risk management within BFS organizations.
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
In his session at Cloud Expo, Alan Winters, U.S. Head of Business Development at MobiDev, presented a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to maximize project result...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abilit...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, discussed how they built...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...