Then he remembered a rumor he’d dismissed as hacker folklore: You can control Group Policy entirely from the command line.
Alex opened an elevated command prompt on a remote machine using PowerShell remoting and typed:
gpupdate /force Nothing visible changed on screen except a success message, but in the background, every policy on his local machine was re-downloaded from the Domain Controller and reapplied. He realized that gpupdate was his heartbeat—but it wasn't enough. He needed to edit policy, not just refresh it.
He pulled up the heavy artillery: (Local Group Policy Object Utility). This wasn't a native Windows command; it was a tool from Microsoft’s Security Compliance Toolkit. Alex copied it to his network share.
He opened Command Prompt as Administrator and typed his first command:
gpfixup /oldname /newname "That," Alex said, "rewrites domain references in SYSVOL. Use it wrong, and no computer will know which domain to trust."
Then he remembered a rumor he’d dismissed as hacker folklore: You can control Group Policy entirely from the command line.
Alex opened an elevated command prompt on a remote machine using PowerShell remoting and typed:
gpupdate /force Nothing visible changed on screen except a success message, but in the background, every policy on his local machine was re-downloaded from the Domain Controller and reapplied. He realized that gpupdate was his heartbeat—but it wasn't enough. He needed to edit policy, not just refresh it.
He pulled up the heavy artillery: (Local Group Policy Object Utility). This wasn't a native Windows command; it was a tool from Microsoft’s Security Compliance Toolkit. Alex copied it to his network share.
He opened Command Prompt as Administrator and typed his first command:
gpfixup /oldname /newname "That," Alex said, "rewrites domain references in SYSVOL. Use it wrong, and no computer will know which domain to trust."