To ensure that the preference in GPO1 applies only to domain member servers and not to domain controllers or client computers, while still allowing all other Group Policy settings in GPO1 to apply to all computers, you can use Item Level Targeting with the "Operating System" setting.
By running the command "netdom.exe query fsmo" from a command prompt, you will obtain a list of Flexible Single Master Operations (FSMO) role holders in the domain, including the PDC emulator. The output will display the server name that is currently holding the PDC emulator role.
Modifying the replication schedule for each site link can help minimize the convergence time for changes to Active Directory in a multi-site environment. By customizing the replication schedule for each site link, you can control when replication occurs, allowing you to optimize network bandwidth and reduce convergence time for changes to Active Directory in your multi-site environment.
To ensure that only the members of the fabrikam\Group1 group can authenticate to server1.contoso.com, you should enable Selective authentication for the forest trust between the contoso.com and fabrikam.com forests.
Selective authentication allows you to control which users or groups from a trusted forest can access resources in the local forest. By default, a forest trust grants authentication permissions to all users and groups in the trusted forest. Enabling Selective authentication allows you to restrict authentication to specific groups.
GPOs can only be completely managed by the Enterprise Admins group and the Domain Admins group. Members of the Group Policy Creator Owners group have the ability to create new GPOs, but they are not able to manage or link existing GPOs to sites, domains, or OUs.
To ensure that users who reset their passwords using Self-Service Password Reset (SSPR) in Azure AD can use the new passwords in the Active Directory Domain Services (AD DS) domain, you should run the Microsoft Azure Active Directory Connect wizard and select the "Password writeback" option.
To ensure that users can use Windows Hello for Business when signing in to Azure AD hybrid-joined Windows 10 devices, you should select the "Password writeback" optional feature in Azure AD Connect.
Windows Hello for Business provides a more secure and convenient way for users to authenticate to their devices using biometric or PIN-based authentication. By enabling the "Password writeback" feature, the new passwords set by users in Azure AD will be synchronized back to the on-premises AD DS domain.