Group Policy

advertisement
Lecture 3:
Active
Directory
Domain Service
(AD DS)
Agenda
• Active Directory Domain Service (AD DS)

Installing and Configuring Active Directory Domain
Services

Implementing a Group Policy Infrastructure

Managing User Desktop with Group Policy
Module 1
Configuring Active
Directory® Domain
Services
Module Overview
• Installing Domain Controllers
• Configuring Read-Only Domain Controllers
• New Features in Group Policy
• Configuring Group Policy Preferences
Lesson 1: Installing Domain Controllers
• Requirements for Installing AD DS
• What Are Domain and Forest Functional Levels?
• AD DS Installation Process
• Advanced Options for Installing AD DS
Requirements for Installing AD DS
Requirements
Description
Server
• A computer running Windows Server 2008
Network
configuration
• TCP/IP must be configured, including DNS
AD DS Installation
Permissions
• Local Administrator permissions to install the
(Web Server edition is not supported)
• Minimum disk space of 250 MB and a partition
formatted with NTFS file system
client settings
• DNS Server that supports dynamic updates
must be available or will be configured on the
domain controller
first domain controller in a forest
• Domain Administrator permissions to install
additional domain controllers in a domain
• Enterprise Administrator permissions to install
additional domains in a forest
What Are Domain and Forest Functional Levels?
Functional levels:
• Determine the AD DS features available in a domain or forest
• Restrict which Windows Server operating systems can be
run on domain controllers in the domain or forest
Supported functional levels:
Domain
Supported Domain Controller
Operating Systems
Forest
Windows 2000
Server native
• Windows Server 2008
• Windows Server 2003
• Windows 2000 Server
Windows 2000
Windows Server
2003
• Windows Server 2008
• Windows Server 2003
Windows Server
2003
Windows Server
2008
• Windows Server 2008
Windows Server
2008
AD DS Installation Process
the Active Directory Domain Services role by
1 Install
using the Server Manager
Run the Active Directory Domain Services
2 Installation Wizard (Dcpromo)
3 Choose the deployment configuration
4 Select the additional domain controller features
Select the location for the database, log files, and
5 SYSVOL folder
Configure the Directory Services Restore
6 Mode Administrator Password
Advanced Options for Installing AD DS
To access the advanced mode installation options,
choose the Advanced Mode option in the Active Directory Domain
Services Installation Wizard or run dcpromo /adv
Use the advanced mode options to:
• Create a new domain tree
• Use backup media as the source for AD DS information
• Select the source domain controller for the installation
• Modify the default domain NetBIOS name
• Define the Password Replication Policy for an RODC
Installing AD DS by Using IFM (Install From Media)
Use Ntdsutil.exe to create the installation media
Ntdsutil.exe can create the following types of installation media:
• Full (or writable) domain controller
• Full (or writable) domain controller with SYSVOL data
• Read-only domain controller with SYSVOL data
• Read-only domain controller
Upgrading to Windows Server 2008 AD DS
To prepare previous versions of Active Directory for a Windows
Server 2008 domain controller installation:
Current Version
Before Installing
Windows 2000
Server or
Windows Server
2003
• Windows Server 2008
adprep /forestprep
Windows 2000
Server
• Windows Server 2008
adprep /domainprep
/gpprep
Windows Server
2003
• Windows Server 2008
adprep /domainprep
Windows Server
2003
• Windows Server 2008
adprep /rodcprep
domain controllers
• Must be run before other
Adprep commands
domain controllers
domain controllers
RODCs
Command
Lesson 2: Configuring Read-Only Domain Controllers
• What Is a Read-Only Domain Controller?
• Read-Only Domain Controller Features
• What Are Password Replication Policies?
What Is a Read-Only Domain Controller?
RODCs host read-only partitions of the AD DS
database, only accept replicated changes to
Active Directory, and never initiate replication
RODC
RODCs provide:
• Additional security for branch office with
limited physical security
• Additional security if applications must run on a
domain controller
RODCs:
• Cannot hold operation master roles or be configured as
replication bridgehead servers
• Can be deployed on servers running Windows Server 2008
Server Core for additional security
Read-Only Domain Controller Features
RODCs provide:
• Unidirectional replication
• Credential caching
• Administrative role separation
• Read-only DNS
• RODC filtered attribute set
What Are Password Replication Policies?
• The password replication policy determines how the
RODC performs credential caching for authenticated user
• By default, the RODC does not cache any user credentials
or computer credentials
Options for configuring password replication policies:
• No credentials cached
• Enable credential caching on an RODC for specified accounts
• Add users or groups to the Domain RODC Password
Allowed group so that credentials are cached on all RODCs
Lesson 3: New Features in Group Policy
• New Group Policy Settings
• What Are Multiple Local Group Policies?
New Group Policy Settings
There are approximately 700 new settings available
New settings :
• Antivirus
• Client Help
• Deployed Printer
Connections
• Internet Explorer 7
• Wireless Configuration
• Terminal Services
• Windows Error Reporting
New categories:
• Removable storage
device management
• Power management
• User Account Control
• Network Access
Protection
• Windows Defender
• Windows Firewall
with Advanced Security
What Are Multiple Local Group Policies?
• One layer of computer configurations that applies to
all users
• Layers apply only to individual users, not to groups
• There are three layers of user configurations:
• Administrator
• Non-Administrator
• User-specific
Lesson 4: Configuring Group Policy Preferences
• What Are Group Policy Preferences?
• Difference Between Group Policy Preferences and Settings
• Group Policy Preference Features
What Are Group Policy Preferences?
Group Policy preferences expand the range of configurable
settings within a GPO and:
• Are not enforced
• Enable IT pros to configure, deploy, and manage
operating system and application settings that were
not manageable using Group Policy
Difference Between Group Policy Preferences
and Settings
Group Policy Preferences
Group Policy Settings
Are written to the normal locations
in the registry that the application
or operating system feature uses
to store the setting.
Strictly enforce policy settings by
writing the settings to areas of the
registry that standard users cannot
modify.
Do not cause the application or
Typically disable the user interface
operating system feature to disable for settings that Group Policy is
the user interface for the settings
managing.
they configure.
Refresh preferences by using the
same interval as Group Policy
settings by default.
Refresh policy settings at a regular
interval.
Are not available on local
computers.
Are available through local Group
Policy.
Group Policy Preference Features
Common Tab
Used to configure additional
options that control the
behavior of a Group Policy
preference item
Targeting Features
Determines to which users and
computers a preference
item applies
Module 2
Implementing a Group
Policy Infrastructure
Module Overview
• Understand Group Policy
• Implement GPOs
• Manage Group Policy Scope
• Group Policy Processing
• Troubleshoot Policy Application
Lesson 1: Understand Group Policy
• What Is Configuration Management?
• Overview of Policies
• Benefits of Using Group Policy
• Group Policy Objects
• GPO Scope
• Group Policy Client and Client-Side Extensions
• Group Policy Refresh
• Review the Components of Group Policy
What Is Configuration Management?
• A centralized approach to applying one or more changes to
one or more users or computers
• Group Policy: The framework for configuration management in
an AD DS domain

Setting: Definition of a change or configuration

Scope: Definition of the users or computers to which the change
applies

Application: A mechanism that applies the setting to users and
computers within the scope

Tools for management, configuration, and troubleshooting
What Is Group Policy?
Group Policy enables IT administrators to automate one-to-many
management of users and computers
Use Group Policy to:
• Apply standard configurations
• Deploy software
• Enforce security settings
• Enforce a consistent desktop environment
Local Group Policy is always in effect for local and domain users
and local computer settings
Group Policy Settings
Group Policy
settings for
users control
these settings:
•
•
•
•
Software
Windows
Security
Desktop
Group Policy
settings for
computers
control these
settings:
•
•
•
•
Software
Windows
Security
Operating systems
How Group Policy Is Applied
Computer starts
Refresh Interval
Every 90 minutes
• Computer settings
applied
• Startup scripts run
User logs on
Refresh Interval
Every 90 minutes
• User settings applied
• Logon scripts run
Overview of Policies
• The granular definition of a change or configuration

Prevent access to registry-editing tools

Rename the Administrator account
• Divided between

User Configuration ("user policies")

Computer Configuration
("computer policies")
• Define a setting

Not configured (default)

Enabled

Disabled
Benefits of Using Group Policy
• Apply security settings
• Manage desktop and application settings
• Deploy software
• Manage folder redirection
• Configure network settings
Group Policy Objects
• Container for one or more policy settings
• Managed with the GPMC
• Stored in Group Policy Objects container
• Edited with the GPME
• Applied to a specific level in AD DS hierarchy
GPO Scope
• Scope

Definition of objects (users or computers) to which GPO
applies
• GPO Links

GPO can be linked to multiple sites, domain, or organizational
unit (OU) (SDOU)

GPO link(s) define maximum scope of GPO
• Security Group Filtering

Apply or deny application of GPO to members of global
security group

Filter application of scope of GPO within its link scope
• WMI Filtering

Refine scope of GPO within link based on WMI query
• Preference Targeting
Group Policy Client and Client-Side Extensions
• How GPOs and their settings are applied
• Group Policy Client retrieves ordered list of GPOs
• GPOs are downloaded, and then cached
• Components called CSEs process the settings to apply the
changes

One for each major category of policy settings: Security,
registry, script, software installation, mapped drive
preferences, and so on

Most CSEs apply settings only if the GPO as a whole has
changed

•
Improves performance
•
Security CSE applies changes every 16 hours
GPO application is client driven ("pull")
Group Policy Refresh
• When GPOs and their settings are applied
• Computer Configuration

Startup

Every 90-120 minutes

Triggered: GPUpdate command
• User Configuration

Logon

Every 90-120 minutes

Triggered: GPUpdate command
Lesson 2: Implement GPOs
• Local GPOs
• Domain-Based GPOs
• Demonstration: Create, Link, and Edit GPOs
• GPO Storage
• Manage GPOs and Their Settings
Local GPOs
• Apply before domain-based GPOs

Any setting specified by a domain-based GPO will override the
setting specified by the local GPOs.
• Local GPO

One local GPO in Windows 2000 Server, Windows XP,
Windows Server 2003

Multiple local GPOs in Windows Vista and later
•
Local GPO: Computer settings and settings for all users
•
Administrators GPO: Settings for users in Administrators
•
Non-administrators GPO: Settings for users not in Admins
•
Per-user GPO: Settings for a specific user
• If domain members can be centrally managed using
domain-linked GPOs, in which scenarios might local GPOs
be used?
Domain-Based GPOs
• Created in Active Directory, stored on domain controllers
• Two default GPOs

Default Domain Policy
•

Define account policies for the domain: Password, account
lockout, and Kerberos policies
Default Domain Controllers Policy
•
Define auditing policies for domain controllers and Active
Directory
GPO Storage
GPC
GPO
• Stored in AD DS
• Friendly name, globally unique
identifier (GUID)
• Version
GPT
• What we call a GPO is actually
two things, stored in two places
• Separate replication
mechanisms
• Stored in SYSVOL on domain
controllers (DCs)
• Contains all files required to
define and apply settings
• .ini file contains Version
Manage GPOs and Their Settings
• Copy and Paste into a Group Policy Objects container

Create a new "copy" GPO and modify it

Transfer a GPO to a trusted domain, such as test-toproduction
• Back Up all settings, objects, links, permissions (access
control lists [ACLs])
• Restore into same domain as backup
• Import Settings into a new GPO in same or any domain

Migration table for source-to-destination mapping of UNC
paths and security group names

Replaces all settings in the GPO – not a "merge"
• Save Report
• Delete
• Rename
Lesson 3: Manage Group Policy Scope
• GPO Links
• Group Policy Processing Order
• GPO Inheritance and Precedence
• Use Security Filtering to Modify GPO Scope
• WMI Filters
• Enable or Disable GPOs and GPO Nodes
• Target Preferences
• Loopback Policy Processing
GPO Links
• GPO link

Causes policy settings in GPO to apply to users or computers
within that container

Links GPO to site, domain, or OU (SDOU)
•
Must enable sites in the GPM console

GPO can be linked to multiple sites or OUs

Link can exist but be disabled

Link can be deleted, but GPO remains
Group Policy Processing Order
GPO1
Local Group
GPO2
Site
GPO3
GPO4
Domain
GPO5
OU
OU
OU
Computer D
User D
Domain
Business
OU
Computer B
User B
Computer
User E
Employees
Computer C
User C
Groups
Clients
Computer D+B+C
User D+B+E
Computer D
User D
Domain
Block
Inheritance
Business
OU
Computer B
User B
Computer
User E
Employees
Computer C
User C
Groups
Clients
Computer B+C
User B+E
Security
Computer D
Computer S
User D
User S
Domain
Block
Inheritance
Business
OU
Enforced
Computer B
User B
Computer
User E
Employees
Computer C
User C
Groups
Clients
Computer B+C+S
User B+E+S
GPO Inheritance and Precedence
• The application of GPOs linked to each container results in
a cumulative effect called inheritance

Default Precedence: Local  Site  Domain  OU  OU…
(LSDOU)

Seen on the Group Policy Inheritance tab
• Link order (attribute of GPO Link)

Lower number  Higher on list  Precedent
• Block Inheritance (attribute of OU)

Blocks the processing of GPOs from above
• Enforced (attribute of GPO Link)

Enforced GPOs “blast through” Block Inheritance

Enforced GPO settings win over conflicting settings in lower
GPOs
Use Security Filtering to Modify GPO Scope
• Apply Group Policy permission

GPO has an ACL (Delegation tab  Advanced)

Default: Authenticated Users have Allow Apply Group Policy
• Scope only to users in selected global groups

Remove Authenticated Users

Add appropriate global groups
•
Must be global groups (GPOs don’t scope to domain local)
• Scope to users except for those in selected groups

On the Delegation tab, click Advanced

Add appropriate global groups

Deny Apply Group Policy permission

Does not appear on the Delegation tab or in filtering section
WMI Filters
• Create a WMI filter
• WQL

Similar to T-SQL

Select * FROM Win32_OperatingSystem WHERE
Caption="Microsoft Windows XP Professional" AND
CSDVersion="Service Pack 3"
• Create a WMI filter
• Use the filter for one or more GPOs
Enable or Disable GPOs and GPO Nodes
• GPO Details tab  GPO Status drop-down list
• Enabled: Both Computer Configuration and User
Configuration settings will be applied by CSEs
• All settings disabled: CSEs will not process the GPO
• Computer Configuration settings disabled: CSEs will not
process settings in Computer Configuration
• User Configuration settings disabled: CSEs will not process
settings in User Configuration
Target Preferences
• Targeting within a GPO

Scope =
scope of GPO
+
scope of targeting

Only possible with
preferences
• Multiple options
• Test effect
• Test performance
impact
Loopback Policy Processing
• At user logon, user settings from GPOs scoped to
computer object are applied

Create a consistent user experience on a computer

Conference rooms, kiosks, computer labs, VDI, RDS, and so
on
• Computer Configuration\Policies\Administrative
Templates\System\Group Policy

User Group Policy loopback processing mode
• Replace mode

User gets none of the User settings that are scoped to the user
and gets only the User settings that are scoped to computer
• Merge mode

User gets the User settings scoped to the user, but those
settings are overlaid with User settings scoped to the
computer. The computer settings prevail.
Business
OU
•
Computer
User E
Employees
Computer B
User B
Loopback
Computer K
User K
Computer C
User
Groups
Clients
Computer B+C
User B+E
Replace
Computer B+K
User B+K
Kiosks
Merge
Computer B+K
User E+B+K
Lesson 4: Group Policy Processing
• Detailed Review of Group Policy Processing
• Slow Links and Disconnected Systems
• Identify When Settings Take Effect
Detailed Review of Group Policy Processing
1.
Computer starts; RPCSS and MUP are started
2.
Group Policy Client starts and obtains an ordered list of
GPOs that are scoped to the computer
•
Local  Site  Domain  OU  Enforced GPOs
GPC processes each GPO in order
3.
•
Should it be applied? (enabled/disabled/permission/WMI
filter)
•
CSEs are triggered to process settings in GPO
•
Settings configured as Enabled or Disabled are processed
4.
User logs on
5.
Process repeats for user settings
6.
Every 90-120 minutes after startup, computer refresh
7.
Every 90-120 minutes after logon, user refresh
Slow Links and Disconnected Systems
• Group Policy Client determines whether link to domain
should be considered slow link

By default, less than 500 kilobits per second (kbps)

Each CSE can use determination of slow link to decide whether
it should process
•
Software CSE, for example, does not process
• Disconnected

Settings previously applied will continue to take effect

Exceptions include startup, logon, logoff, and shutdown scripts
• Connected

Windows Vista and newer operating systems detect new
connection and perform Group Policy refresh if the refresh
window was missed while the system was disconnected
Identify When Settings Take Effect
• GPO replication must happen

GPC and GPT must replicate
• Group changes must be incorporated

Logoff/logon for user; restart for computer
• Group Policy refresh must occur

Windows XP, Windows Vista, and Windows 7 clients

Always wait for network at startup and logon
• User must logoff or logon or the computer must restart
for the settings to take effect
• Manually refresh: GPUpdate [/force] [/logoff] [/boot]
• Most CSEs do not reapply settings if GPO has not changed

Configure in Computer\Admin Templates\System\Group Policy
Lesson 5: Troubleshoot Policy Application
• Resultant Set of Policy
• Generate RSoP Reports
• Perform What-If Analyses with the Group Policy Modeling
Wizard
• Examine Policy Event Logs
Resultant Set of Policy
• Inheritance, filters, loopback, and other policy scope and
precedence factors are complex
• RSoP

The "end result" of policy application

Tools to help evaluate, model, and troubleshoot the
application of Group Policy settings
• RSoP analysis

The Group Policy Results Wizard

The Group Policy Modeling Wizard

GPResult.exe
Generate RSoP Reports
• Group Policy Results Wizard

Queries WMI to report actual Group Policy application
• Requirements

Administrative credentials on the target computer

Access to WMI (firewall)

User must have logged on at least once
• RSoP report

Can be saved

View in Advanced mode
•
Shows some settings that do not show in the HTML report
•
View Group Policy processing events
• GPResult.exe /s ComputerName /h filename
Perform What-If Analyses with the Group Policy
Modeling Wizard
• Group Policy Modeling Wizard

Emulates Group Policy application to report anticipated RSoP

Can be used prior to GPO application

Recommended in Group Policy design phase
Examine Policy Event Logs
• System log

High-level information about Group Policy

Errors elsewhere in the system that could impact Group Policy
• Application log

Events recorded by CSEs
• Group Policy Operational log

Detailed trace of Group Policy application
Module 3
Managing User Desktop with
Group Policy
Module Overview
• Implement Administrative Templates
• Configure Group Policy Preferences
• Manage Software with GPSI
• Folder Redirection
Lesson 1: Implement Administrative Templates
• What Are Administrative Templates?
• How Administrative Templates Work
• Managed Settings, Unmanaged Settings, and Preferences
• Central Store
What Are Administrative Templates?
.ADMX
.ADML
Registry
How Administrative Templates Work
• Policy settings in the Administrative Templates node make
changes to the registry
• HKCU\Software\Microsoft\
Windows\CurrentVersion\
Policies\System

DisableRegeditMode
•
1–Regedit UI tool only
•
2–Also disable regedit /s
Central Store
• .ADM files
Stored in the GPT
 Leads to version control and GPO bloat problems

• .ADMX/.ADML files
Retrieved from the client
 Problematic if the client doesn't have the appropriate files

• Central Store

Create a folder called PolicyDefinitions on a DC
•
Remotely: \\contoso.com\SYSVOL\contoso.com\Policies\
PolicyDefinitions
•
Locally: %SystemRoot%\SYSVOL\contoso.com\
Policies\PolicyDefinitions

Copy .ADMX files from your %SystemRoot%\PolicyDefinitions

Copy .ADML file from language-specific subfolders (such as en-us)
Lesson 2: Configure Group Policy Preferences
• What Are Group Policy Preferences?
• Differences Between Group Policy Preferences and Settings
What Are Group Policy Preferences?
Group Policy preferences expand the range of configurable
settings within a GPO and:
• Are not enforced
• Enable IT pros to configure, deploy, and manage
operating system and application settings that were
not manageable by using Group Policy
Features of Group Policy Preferences:
• Create: Create a new item on the targeted computer
• Delete: Remove an existing item from the targeted computer
• Replace: Delete and re-create an item on the targeted computer
• Update: Modify an existing item on the targeted computer
Differences Between Group Policy Preferences
and Settings
Group Policy Preferences
Group Policy Settings
Are written to the normal locations
in the registry that the application
or operating system feature uses
to store the setting
Strictly enforce policy settings by
writing the settings to areas of the
registry that standard users cannot
modify
Do not cause the application or
Typically disable the user interface
operating system feature to disable for settings that Group Policy is
the user interface for the settings
managing
they configure
Refresh preferences by using the
same interval as Group Policy
settings by default
Refresh policy settings at a regular
interval
Are not available on local
computers
Are available through local Group
Policy
Lesson 3: Manage Software with GPSI
• Understand GPSI
• Software Deployment Options
• Create and Scope a Software Deployment GPO
• Maintain Software Deployed with GPSI
• GPSI and Slow Links
Understand GPSI (Group Policy Software Installation)
• Client-side extension (CSE)
• Installs supported packages



Windows Installer packages (.msi)
•
Optionally modified by Transform (.mst) or patches (.msp)
•
GPSI automatically installs with elevated privileges
Downlevel application package (.zap)
•
Supported by “publish” option only
•
Requires user to have admin privileges
System Center Configuration Manager and other deployment tools can
support a wider variety of installation and configuration packages
• No “feedback”

No centralized indication of success or failure

No built-in metering, auditing, license management
Software Deployment Options
• Software deployment options

Assign application to users
•
Start menu shortcuts appear
- Install-on-demand
•
File associations made (optional “Auto Install”)
- Install-on-document invocation
•

Optionally, configure to install at logon
Publish application to users
•
Advertised in Programs And Features (Control Panel)
- Install-on-request

Assign to computers
•
Install at startup
Options for Deploying and Managing Software
Using Group Policy
1
2
1.0
Preparation
Deployment
4
3
2.0
Removal
Maintenance
How Software Distribution Works
Windows Installer
Windows Installer
service
Fully automates the
software installation and
configuration process
Modifies or repairs an
existing application
installation
Benefits of
Using
Windows
Installer
Windows Installer package
contains
Information about installing or
uninstalling an application
An .msi file and any external
source files
Summary information about the
application
A reference to an installation point
Custom
installations
Resilient
applications
Clean removal
Options for Installing Software
Assign software
during Computer
Configuration
Software
Distribution
Point
Assign software
during User
Configuration
?
Publish software
using document
activation
Publish software
using Add or
Remove
Programs
Maintaining Software Using Group Policy
Users can use
only the
upgraded version
2.0
Deploy next
version of the
application
Mandatory upgrade
2.0
1.0
Users can decide
when to upgrade
2.0
Optional upgrade
2.0
1.0
Selective upgrade
You can select
specific users for
an upgrade
Create and Scope a Software Deployment GPO
• Computer [or User] Configuration \ Policies \ Software
Settings \ Software Installation

Right-click  New  Package

Browse to .msi file through network path (\\server\share)

Choose deployment option
(Recommended: Advanced)
• Managing the scope of a
software deployment GPO

Typically easiest to manage with
security group filtering

Create an app group such as
APP_XML Notepad

Put users into the group: allows users to access software
share in the event that repairs or reinstalls are necessary

Put computers into the group if assigning to computers
Maintain Software Deployed with GPSI
• Redeploy application

After successful install, client will not attempt to reinstall app

You might make a change to the package

Package  All Tasks  Redeploy Application
• Upgrade application

Create new package in same or different GPO

Advanced  Upgrades  Select package to upgrade

Uninstall old version first; or install over old version
• Remove application

Package  All Tasks  Remove

Uninstall immediately (forced removal) or
Prevent new installations (optional removal)

Don’t delete or unlink GPO until all clients have applied setting
GPSI and Slow Links
• The Group Policy Client determines whether the domain
controller providing GPOs is on the other side of a slow link

Less than 500 kbps by default
• Each CSE uses the “slow link” determination to decide
whether to process

By default, GPSI does not process over a slow link
• You can change slow link processing behavior of each CSE

Computer Configuration\Policies\Administrative Templates\
System\Group Policy
• You can change the slow link threshold

Computer [or User] Configuration\Policies\Administrative
Templates\System\Group Policy
What Is Folder Redirection?
Folder redirection allows folders
to be located on a network
server, but appear as if they are
located on the local drive
The folders that can be redirected are:
• My Documents (Documents in
Windows® Vista)
• Application Data (AppData in Windows Vista)
• Desktop
• Start Menu
Extra folders that can be redirected
in Windows Vista are:
• Contacts
• Searches
• Downloads
• Links
• Favorites
Folder Redirection Configuration Options
• Use basic Folder Redirection when
all users save their files to the
same location
• With advanced Folder Redirection,
the server hosting the folder location
is based on group membership
• Target folder location options:
• Redirect to the users’
home directory
• Create a folder for each user
under the root path
• Redirect to the
following location
• Redirect to the local
userprofile location
Accounting
Users
Accounts
A-M
Accounts
N-Z
Accounting
Managers
Misty
Anne
Options for Securing Redirected Folders
NTFS permissions for root folder
Creator/Owner
Full control - subfolders and files only
• None
Administrator
Security group of
• List Folder/Read Data, Create
users that
Folders/Append Data - This Folder Only
put data on share
• Full control
Local System
Share permissions for root folder
Full control - subfolders and files only
Creator/Owner
Security group of • Full control
users that
put data on share
NTFS permissions for each users’ redirected folder
Creator/Owner Full control - subfolders and files only
%Username%
• Full control, owner of folder
Administrators
• None
Local system
• Full Control
©2009 Microsoft, Microsoft Dynamics, the Office logo, and Your potential. Our passion. are trademarks of the Microsoft group of companies. The information
herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must
respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy
of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE
INFORMATION IN THIS PRESENTATION.
Download