SESSION 6: CREATING A GROUP POLICY TEMPLATE

advertisement
COMP3122 SESSION 5: CONTROLLING LOCAL AND
DOMAIN SECURITY WITH GROUP POLICY TEMPLATES
As with previous exercises, we will use Windows 2003 as the exemplar.
Other equivalent “group policy” systems exist with other network operating
systems.
The order of application of Windows 2003 policies is…
1. the local policy.
2. site level policies (if they exist…) in the administratively specified order.
3. domain level group policies, again in the specified order.
4. group policies associated with the organizational units. If a single
organizational unit contains multiple group policies, the policies are applied in an
administratively specified order.
First, we can look at local policies on a machine using Microsoft Management
Console (MMC)
MMC does not itself perform Windows 2003 administrative functions, but it does
host many “snap-in” tools that do, by means of “console” files.
It can be used in:
user mode, working with existing MMC consoles to administer a system
author mode, creating new consoles or modifying existing MMC consoles.
In this exercise, as local administrator, you will be able to “author” consoles on
the local machine.
Exercise 5(a): Starting up MMC & Installing the “Security
Configuration and Analysis” and “Security Templates” Snap-ins
MMC provides a wizard for accessing the various snap ins which controlling
Windows registry settings, including Security features. It also provides access to
templates for configuring/controlling all aspects of machine security policy and
group security policy
1
1. MMC could be accessed from the desktop; in this case, we will use the
command line. Type MMC and press ENTER. The MMC window will
appear.
2. The main MMC window will have a default name console1. On the
console menu, click Add/Remove Snap-in. A new dialogue box should
open.
3. Click on Add. A new dialogue box Add Standalone Snap in should open
4. Click on Security Configuration and Analysis, and click on Add.
5. Also click on Add for Security Templates, and Group Policy Object
Editor. Both “snap ins” should have been transferred on the screen to the
add/remove snap in window.
6. Click Close, and then OK, to remove the two dialogue boxes
7. On the main console menu, click Save As to save the console file
8. Right click on the security configuration and analysis snap in, and use
Open Database feature to create and save the console database with
associated policy template to a suitable folder as a file named
SecurityTools (The sdb suffix is added automatically).
9. Now right click on the security configuration and analysis snap in and click
on analyse computer now, to get a full run down of the current settings –
which make up the “local policy” (ie settings for the local machine).
10. Select local policies look at the settings in each category. Plenty of
options available… are they all appropriately set?
11. When you select security settings, linger a little longer. You should now
be presented with a particularly large number of settings that control
security aspects of local policy. Note that each setting can be set to
enabled, disabled, or not configured.
The “local machine” settings (copied into registry and held there from boot up
onwards) interact with group policy security settings after domain logon to
provide a security profile that is appropriate for that group of users.
2
Exercise 5 (b): Creating a Policy from a Template
A group policy is particularly useful when it is applied at domain level, to provide
local control of settings whenever a user logs on based on the group(s) they
belong to. Group policies don’t just stop at the domain level, but can apply right
across a domain tree.
1. The Group Policy Object Editor is divided into two basic sections,
Computer Configuration and User Configuration.
Computer configuration settings such as audit policy, (all) user rights
assignments, and security options) are associated with the local policy
object, whilst User Configuration relates to the settings that relate
directly to user desktop settings.
2. Do a bit of exploring to find out where the security settings you looked at
through the analysis tool are actually stored.
As there is no domain to administer at the moment, you can only apply
security settings via template to “local policy”. Nevertheless, what follows
is a useful exercise…
3. Double click on security templates… Now double click again to provide a
list of seven pre-prepared templates. Look at the contents of each in
turn. In particular, look at the three categories in “account policies” and
“local policies”. Also, note that “system services” contains settings for all of
the Windows programs offered as “services”, which may currently be
“undefined”.
4. Make a note of the name, and double-click on one of these files. As you
can see, it is just a configuration file containing lots of settings, rather like
a registry file. The settings are divided into a series of sub-groups (e.g.
account policy, local policies, event log, restricted groups…), and provide
the basis of a security policy for users and groups of users. Double-click
as necessary to look closely at all the settings.
5. Now repeat 4 with a different template file. Can you see how the template
file relates to its function?
6. Working with a partner, spend some time discussing the appropriateness
of each of these settings for users on a typical medium-security network
3
connected to the Internet. A print out of some settings is available, and
might be helpful to you, but if a setting is not currently defined, it will not
be displayed at all.
7. Make a note of the agreed settings you would wish to impose on users as
a local policy. Be prepared to defend such changes in a discussion… Now
change the settings on one of the templates, and resave it with a different
name. You can save your template file to a USB stick if you wish.
8. Finally… (if someone lets you…) you may be able to use the modified
template file try out security settings applied locally to another computer.
Exercise 5(c) Applying security policies to domains
For controlling security on a real network, this is the really important part…
Fortunately… the principles are the same as for local policies, but there is more
to manage. Implementation of group policies may be outside the time constraints
of this session (you can always come back another time…)
One way to investigate group policies is from Active Directory…
1. Open the Active Directory Management Console (Active Directory
Users and Computers).
2. Locate the container in which your user objects reside (usually an
Organizational Unit).
3. Right-click the container in the left panel tree view and click Properties.
4. Click the Group Policy tab in the Properties dialog.
5. Click New, to add a new Group Policy,
6. Fill in a new Policy name and click Edit.
7. create the group policy… (only joking!!!)
8. Click OK & Close the Group Policy Object Editor.
Another way to control Group Policy settings is to use the legendary GPMC
snap in for MMC… (try this also, if you have time. It is meant to be quick!)
However, you will need to install it first.
4
Exercise 5(d): Creating and Accessing Group Policy
1. MMC again…
2. Double-click Active directory sites and services snap-in from the Available
standalone snap-ins list box.
3. In the Select Group Policy object dialog box, Local computer is selected under
Group Policy object. Click Finish to edit the local Group Policy object. Click
Close in the Add standalone snap-in dialog box.
4. In the Available standalone snap-ins list box, double-click Group Policy.
5. In the Add/Remove Snap-in dialog box, click the Extensions tab. Ensure that
the Add all extensions check box is checked for each primary extension added
to the MMC console (these are checked by default). Click OK.
6. Click Close, and then OK, to remove the two dialogue boxes
7. On the main console menu, click Save As, in the File name text box, type
GPWalkthrough, and then click Save.
Accessing: From Active Directory Sites and Services…
1. In the GPWalkthrough MMC console, in the console tree, click the + next to Active
Directory Sites and Services.
2. In the console tree, right-click the site for which to access Group Policy.
3. Click Properties, and click Group Policy.
Accessing: From Active Directory Users and Computers
1. In the console tree in the GPWalkthrough MMC console, click the + next to Active
Directory Users and Computers.
2. In the console tree, right-click either the reskit domain or the OU for which to access
Group Policy.
3. Click Properties, and click Group Policy.
Note: To access Group Policy scoped to a specific computer (or the local computer), load the
Group Policy snap-in into the MMC console namespace targeted at the specific computer (or local
computer). There are two major reasons for these differences:

Sites, domains, and OUs can have multiple GPOs linked to them; these GPOs require an
intermediate property page to manage them.

A GPO for a specific computer is stored on that computer and not in the Active Directory.
5
Exercise 5(e) Scoping a Domain or OU
To scope the domain or OU, use the GPWalkthrough MMC console that you
saved earlier.
To scope Group Policy for a domain or OU
1. Click Start, point to Programs, click Administrative Tools, and click
GPWalkthrough to open the MMC console you created earlier.
2. Click the + next to Active Directory Users and Computers to expand the
tree.
3. Click the + next to reskit.com to expand the tree.
4. Right-click either the domain (reskit.com) or an OU, and click Properties.
5. Click the Group Policy tab as shown in Figure 3 below.
Figure 3: Group Policy Link Management
This displays a property page where the GPOs associated with the selected
Active Directory container can be managed. You use this property page to add,
edit, delete (or remove), and disable GPOs; to specify No Override options; and
to change the order of the associated GPOs. Selecting Edit starts the Group
6
Policy snap-in. More information on using the Group Policy property page and
the Group Policy snap-in can be found later in this document.
Note: The Computers and Users containers are not organizational units;
therefore, you cannot apply Group Policy directly to them. Users or computers in
these containers receive policies from GPOs scoped to the domain and site
objects only. The domain controller container is an OU, and Group Policy can be
applied directly to it.
Scoping Local or Remote Computers
To access Group Policy for the local computer, use the GPWalkthrough console
created earlier in this exercise, and choose the Local Computer Policy node.
You can add other computers to the console namespace by adding another
Group Policy snap-in to the GPWalkthrough console, and clicking the Browse
button when the Select Group Policy object dialog box is displayed.
Note: Some of the Group Policy extensions are not loaded when Group Policy is run
against a local GPO.
7
Download