

For example, if you are using My Documents folder redirection to centrally store user files, you will want the setting to be the same when Greg logs on to either a workstation or a terminal server. This mode simplifies GPO processing by placing all settings into the Terminal Servers OU Policy, but it will force you to keep some settings in this policy in sync with changes made to the Users OU Policy. OU Loopback-The User Configuration from the Terminal Servers OU Policy is applied. Local-The User Configuration from computerl's Local Policy is applied.Ĥ. In loopback replace mode, the User Configuration from the Users OU is ignored:ġ. The disadvantage is that in this mode, you need to keep track of user settings in two GPOs. Merge mode has the advantage of being able to place global settings in the Users OU Policy and only apply lockdowns in the Terminal Servers OU Policy. In this mode, Greg could receive his Internet Explorer (IE) Proxy Server settings from the Users OU Policy, but have the Shut Down command removed from his Start menu by the Terminal Servers OU Policy. OU Loopback-The User Configuration from the Terminal Servers OU policy is applied. OU-The User Configuration from the Users OU's Users OU Policy is applied.ĥ. Domain-The User Configuration from the Domain Policy is applied.Ĥ. Site-The User Configuration from the USA Site Policy is applied.ģ. Local-The User Configuration from computer1's Local Policy is applied.Ģ. The Computer Configuration is applied as usual, but if we place TS01 into loopback merge mode, Greg's User Configuration processing looks like this:ġ. Replace mode instructs the system to ignore GPOs from the Users OU altogether and only apply User Configuration settings from the Computers OU policy. Merge mode instructs the system to first apply the User Configuration from the Users OU Policy (the standard processing order), then apply the User Configuration from the Computers OU Policy.

As Figure 4.12 shows, there are two modes of loopback processing: Replace and Merge. Loopback processing allows us to take advantage of User Configuration settings from GPOs linked to the OU that contains the computer that is being accessed.
