• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / System Administration / Group Policy Preferences Item-Level Targeting for 32-bit or 64-bit OS

Group Policy Preferences Item-Level Targeting for 32-bit or 64-bit OS

2015-05-11 by Jason

Group Policy Preferences are a great feature to use for distributing mapped drives, shortcuts, registry keys, files, and a number of other Windows components. One of the nice things about Group Policy Preferences is that it has a framework built-in to allow logic to decide when a Preference is applied. You can create or edit your Group Policy Preference under the Group Policy Editor and the preference configuration has a ‘Common’ tab. This allows general control over how the Preference is applied to the computer or user.

One particular configuration is called Item-level targeting. This allows you granularity using a variety of conditions with AND, OR, and NOT logic. For example, you might want to automatically map a drive letter for users that are members of a specific AD security group. You can map the drive with Group Policy Preferences and then scope it down to those group members using Item-level targeting.

gpp_itemlevel

Here are the possible items that you can match on, including Security Group, IP Address Range, Computer Name, and many others:

gpp_newitem

Another example of using Group Policy Preferences could entail creating a shortcut to a file or a registry key and the path to either of those items could change depending on if the operating system is 32-bit or 64-bit (Program Files (x86) or Wow6432Node). In that case, you can choose to use the Environment Variable item in your item-level targeting.

For a 32-bit operating system, the name of the environment variable is Processor_Architecture and the value is x86, as pictured below.

gpp_32bit

For a 64-bit operating system, the name of the environment variable is Processor_Architecture and the value is AMD64, as pictured below.

gpp_64bit

Using these item-level targeting features can help make your job a lot easier and your environment cleaner.

 

Filed Under: System Administration

Trending

  • Screenshot of Petya RansomwarePSA: Severe Global Ransomware Attack Underway
    In Articles, Security and Privacy
  • Using technology to solve bullying
    In Infographics
  • For Data Privacy Day, Intel sponsors ‘lol…OMG!’ book about online reputation management, cyberbullying
    In Media, Security and Privacy

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Setup your DFS namespace with DNS for compatibility in a mixed environment Setup your DFS namespace with DNS for compatibility in a mixed environment
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in