1116-1120_7-PDF_Windows Server 2008 R2

advertisement
Managing Active Directory with Policies
1093
10. On the WMI Filters for Users page, select the All Linked Filters option button, and
click Next to continue.
11. On the WMI Filters for Computers page, select the All Linked Filters option button,
and click Next to continue.
12. On the Summary of Selections page, review the choices and if everything looks
correct, click Next to run the GPO modeling tool.
13. When the process completes, click Finish to return to the GPMC and review the
modeling results.
14. In the Settings pane, the summary of the computer and user policy processing will
be available for view. Review the information on this page and then click on the
Settings tab to review the final GPO settings that would be applied, as shown in
Figure 27.34.
27
FIGURE 27.34 Reviewing the GPO modeling resultant settings.
15. Close the GPMC and log off.
In situations when Group Policy is not delivering the desired results, GPO Results can be
run to read and display the Group Policy processing history. GPO Results are run against a
specific computer, but can also be used to collect user policy processing. To run GPO
Results to review the GPO processing history, perform the following steps:
1. Log on to a designated Windows Server 2008 R2 administrative server.
2. Open the Group Policy Management Console from the Administrative Tools menu.
3. In the tree pane, select the Group Policy Results node, right-click the node, and
select Group Policy Results Wizard.
1094
CHAPTER 27
Group Policy Management for Network Clients
4. On the Welcome page, click Next to continue.
5. On the Computer Selection page, choose to run the policy against another computer
and locate a Windows 7 system that a user has already logged on to. Also be sure to
uncheck the Do Not Display Policy Settings for the Selected Computer in the Results
check box, and click Next.
6. On the User Selection page, select the Display Policy Settings For option button, and
then select the Select a Specific User option button. Select a user from the list, and
click Next to continue. Only users who have previously logged on to the selected
computer will be listed and they will only be listed if the user running the tool is a
domain admin or has been granted the right to run Resultant Set of Policies
(Logging) for the particular users.
7. On the Summary of Selections page, review the choices and click Next to start the
GPO Results collection process.
8. When the process completes, click Finish to return to the GPMC.
9. When the process completes, the results will be displayed in the Settings pane on
the Summary, Settings, and Policy Events tabs. Review the results and close the
GPMC when finished.
Managing Group Policy from Administrative or Remote Workstations
It is very common for Windows system administrators to manage group policies from
their own administrative workstations. To manage a Windows Server 2008 R2 environment properly, domain group policy administration should be performed using a
Windows Server 2008 R2 or Windows 7 system with the Group Policy Management tools
and the Print Services tools installed. The main reason for this is that by using the latest
version of the tools possible, the administrator ensures that all possible features are available and that the most stable version of the tools are being used.
Group Policy management, aside from creating and managing policies, provides administrators with the ability to simulate policy processing for users and computers in specific
containers in Active Directory using the Group Policy Modeling node in the GPMC.
Furthermore, the previous application of Group Policy for users and computers can be
collected and reviewed in the Group Policy Management Console using the Group Policy
Results node in the GPMC. For an administrator, even a member of the Domain Admins
group, to perform remote Group Policy Modeling using the GPMC from a machine other
than a domain controller, the following requirements must be met:
 The administrator must be a member of the domain Distributed COM Users security group.
 The administrator must be delegated the Generate Resultant Set of Policy (Planning)
right in Active Directory, as shown in Figure 27.35. This right must be applied to the
domain, OU, container, or site that contains all of the computers and users the
administrator will run simulated GPO processing against.
 The administrator must have the right to read all the necessary group policies, and
this should be allowed by default.
Summary
1095
FIGURE 27.35 Delegating the Generate Resultant Set of Policy (Planning) right.
To perform remote Group Policy Results tasks using the GPMC from a machine other than
a domain controller, the following requirements must be met:
 The administrator must be a member of the remote computer’s local Distributed
COM Users security group.
 The administrator must be a member of the remote computer’s local Administrators
security group for legacy desktop platforms and the remote system must be accessible on the network.
 The Windows Firewall must be configured to allow the inbound Remote
 The administrator must be delegated the Generate Resultant Set of Policy (Logging)
right in Active Directory. This right must be applied to the domain, OU, container,
or site that contains all of the computers and users the administrator will run simulated GPO processing against.
 The administrator must have the right to read all the necessary group policies, and
this should be allowed by default.
Summary
Windows Server 2008 R2 Group Policy provides administrators with many options to standardize configuration and management of users and computer settings. Management policies can be fine tuned based on the function, location, and security needs of the users or
the security requirements of the organization. This chapter offers many suggestions and
examples of how Group Policy can be leveraged in any organization. Although group policies are very functional and can be a very attractive option for user and computer management, the planning and testing of group policies is essential in delivering the desired
27
Administration exception and the remote workstation must be on a network that is
defined within this exception.
1096
CHAPTER 27
Group Policy Management for Network Clients
configuration and security settings to users and computers in an Active Directory or
Windows workgroup environment.
Best Practices
The following are best practices from this chapter:
 The only changes that should be made to the default domain policy should be
modifying the password and account policy settings and nothing else.
 When the local or domain Administrator user account is a member of a group that
will be managed with domain group policy restricted groups, do not count on the
GPO to leave it in; instead, define it within the member policy setting of a
restricted group.
 When naming group policies, try to use naming conventions that will more easily
help identify the function of the policies for the organization.
 Assign or publish software to high-level Active Directory objects. Because Group
Policy settings apply by default to child containers, it is simpler to assign or publish
applications by linking a Group Policy Object to a parent organizational unit or
domain as long as each of the objects in the child containers requires the application.
 Assign or publish just once per Group Policy Object. When multiple packages are
included in a single policy, often only one package gets applied and they do not
necessarily get processed in order.
 When using folder redirection for user profile folders, allow the system to create the
folders and ensure that the share and root folder permissions are set up appropriately to allow this.
 Configure policies with application control policies to be processed by machines
running Windows 7 Enterprise and Ultimate operating systems and/or Window
Server 2008 R2 systems.
 Use fully qualified (UNC) paths, such as \\server.companyabc.com\share or DFS
links such as \\companyabc.com\share.
 Have systems administrators use standard user accounts to do their day-to-day tasks
and use User Account Control to allow for prompting of elevation when administrator privileges are required.
CHAPTER
28
File System Management
and Fault Tolerance
IN THIS CHAPTER
 Windows Server 2008 R2 File
System Overview/Technologies
 File System Access Services
and Technologies
 Windows Server 2008 R2 Disks
Computer networks were created to share data. The most
primitive form of sharing data on computer networks, of
course, is accessing files and folders stored on networked
systems or central file servers, such as Windows Server 2008
R2 file servers.
As data storage needs and computer services have evolved
in the past 20 or so years, many different methods have
become available to present, access, secure, and manage
data. As an example, data can be accessed through a web
browser; by accessing data stored on external storage media,
such as USB drives, floppy disks, CDs, and DVDs; and by
accessing data stored on any of the different types of media
for the many different operating systems, network storage
devices, and file systems available.
 Utilizing External Disk
Subsystems
 Managing Windows Server
2008 R2 Disks
 System File Reliability
 Adding the File Services Role
 Managing Data Access Using
Windows Server 2008 R2
Shares
 Volume-Based NTFS Quota
Management
 File Server Resource Manager
(FSRM)
 The Distributed File System
This chapter covers the file system features and services
 Planning a DFS Deployment
included with Windows Server 2008 R2. The goal of this
chapter is to introduce administrators to the Windows Server
2008 R2 file services and give them the tools they require to
deploy fault-tolerant and reliable enterprise file services for
their organizations using Windows Server 2008 R2.
 Installing DFS
Windows Server 2008 R2 File
System Overview/Technologies
Windows Server 2008 R2 provides many services that can
be leveraged to deploy a highly reliable, manageable, and
fault-tolerant file system infrastructure. This section of the
chapter provides an overview of these services.
 Managing and Troubleshooting
DFS
 Backing Up DFS
 Using the Volume Shadow
Copy Service
Download