Group Policy

advertisement
MS Windows 2000 Group Policy
Presented by
Howard Hultgren, Chad Hinkle, and Howard Barnes
With Special Thanks to Julie Evans
MS Win 2K Group Policy
•
•
•
•
•
•
•
Introduction to Group Policy
Group Policy Overview
Group Policy Processing
Group Policy Delegation
Group Policy Security Settings
Design and Other Group Policy Issues
References
Copyright, University of Tulsa, 2002
MS Win 2K Group Policy
Introduction to Group Policy
by Howard Hultgren
Copyright, University of Tulsa, 2002
MS Win 2K Group Policy
Group Policy Overview
by Howard Hultgren
Copyright, University of Tulsa, 2002
MS Win 2K Group Policy
• What is it – in general?
– A management technology provided for change and configuration
management in Microsoft Windows® 2000 operating system.
• Who uses it?
– Administrators - to specify options for managed configurations for
groups of computers and users.
– Users (sometimes) for local computer configuration
• Features – in general?
– options for registry-based policy settings, security settings,
software installation, scripts, folder redirection, Remote Installation
Services, and Internet Explorer maintenance.
Copyright, University of Tulsa, 2002
Group Policy Uses
• Manage registry-based policy through
Administrative Templates.
– workstation or server settings – written to registry
under HKEY_CURRENT_USER (HKCU)
– computer-specific settings – written to registry
under HKEY_LOCAL_MACHINE (HKLM)
•
•
•
•
Assign scripts
Redirect folders
Manage applications
Specify security options.
Copyright, University of Tulsa, 2002
Group Policy Management
• Group Policy Microsoft Management Console
(MMC). Snap-ins are administrative
components integrated into the MMC
interface.
• Secedit.exe is a command line version for
administering group policy.
Copyright, University of Tulsa, 2002
Group Policy Management
• Or, go to the Start/Programs/Administrative
Tools menu and find the console1.msc option:
Copyright, University of Tulsa, 2002
Policy Specification Options
• Registry-based policies.
• Security options.
• Software installation and
maintenance options.
• Scripts options.
• Folder redirection options.
Copyright, University of Tulsa, 2002
Windows 2000
Active Directory
• directory service designed for distributed
computing environments
– allows organizations to centrally manage and
share information on network resources and users
while acting as the central authority for network
security
– is designed to be a consolidation point for
isolating, migrating, centrally managing, and
reducing the number of directories that companies
require
Copyright, University of Tulsa, 2002
Active Directory &
Group Policy
• Active Directory & Group Policy are very
interconnected. Group Policy is a feature of
Active Directory.
– Group Policy settings created are contained in a
Group Policy Object (GPO), which is in turn
associated with selected Active
Directory containers, such as sites, domains, or
organizational units (OUs).
– Don’t tackle Active Directory without mastering
Group Policy.
Copyright, University of Tulsa, 2002
mmc.exe default GUI
Copyright, University of Tulsa, 2002
mmc – Adding Snap-Ins
Copyright, University of Tulsa, 2002
Ways to Open the Group
Policy Snap-In
• You can open Group Policy in several ways,
depending on what action you want to
perform with the snap-in.
• You can apply Group Policy to:
–
–
–
–
–
the local computer
another computer
a site
a domain
an organizational unit
Copyright, University of Tulsa, 2002
Group Policy - How to:
• Apply Group Policy to the local
computer
– Open Group Policy (one way is to click
Start, click Run, type gpedit.msc, and
then press ENTER).
– Make whatever policy setting you want in
the Group Policy console.
Copyright, University of Tulsa, 2002
Group Policy - How to:
•
Apply Group Policy to another computer
1. Open Microsoft Management Console.
2. On the MMC console's menu bar, click Console,
and then click Add/Remove Snap-in.
3. On the Standalone tab, click Add.
4. In the Add Standalone Snap-in dialog box,
click Group Policy, and then click Add.
5. In the Select Group Policy object dialog box,
browse to find the Group Policy object you want.
6. Click Finish, and then click OK. The Group
Policy snap-in now opens the specified Group
Policy object for editing.
Copyright, University of Tulsa, 2002
Group Policy - How to:
• Apply Group Policy to a site
– Active Directory must be set up (To open
Active Directory Sites and Services, click Start,
point to Programs, point to Administrative
Tools, and then click Active Directory Sites
and Services).
– then link a Group Policy object to the
intended site.
Copyright, University of Tulsa, 2002
Group Policy - How to:
• To apply Group Policy to a domain
– Open Group Policy from Active Directory Sites and
Services, and then link a Group Policy object to
the intended domain.
• To apply Group Policy to an organizational
unit
– Open Group Policy from Active Directory Sites and
Services, and then link a Group Policy object to
the intended organizational unit.
– You can also link a Group Policy object to an
organizational unit higher in the Active Directory
hierarchy, so that the organizational unit can
inherit Group Policy settings.
Copyright, University of Tulsa, 2002
Group Policy - How to:
• To apply Group Policy to any existing
Group Policy object or set of Group
Policy objects
– Create and save your own custom MMC
console.
Copyright, University of Tulsa, 2002
Group Policy Snap-In
Copyright, University of Tulsa, 2002
User & Computer Policy
• Users and Computers are the only types
of Active Directory objects that receive
policy
– User Policy settings are located under User
Configuration and are obtained when a
user logs on
– Computer policy settings are located under
Computer Configuration, and are obtained
when a computer boots.
Copyright, University of Tulsa, 2002
Group Policy Objects
• Policy settings are stored in Group
Policy objects
– Non-local Group Policy Objects
– Local Group Policy Objects
Copyright, University of Tulsa, 2002
MS Win 2K Group Policy
Group Policy Processing
by Chad Hinkle
Copyright, University of Tulsa, 2002
Order of Application
• Policies are applied in this order:
1.The unique local Group Policy object.
2.Site Group Policy objects, in administratively
specified order.
3.Domain Group Policy objects, in administratively
specified order.
4.Organizational unit Group Policy objects, from
largest to smallest organizational unit (parent to
child organizational unit), and in administratively
specified order at the level of each organizational
unit.
Copyright, University of Tulsa, 2002
Filtering Policy
• Policy can be filtered by security group
membership
– A security group access control entry (ACE)
on a Group Policy object can be set to Not
configured (no preference), Allowed, or
Denied. Denied takes precedence over
allowed.
Copyright, University of Tulsa, 2002
Policy Inheritance
• In general, group policy is passed down from
parent to child containers.
– If a parent OU has policy settings that are not
configured, the child OU doesn’t inherit them.
– If a parent policy and a child policy are
compatible, the child inherits the parent policy,
and the child's setting is also applied.
– If a policy configured for a parent OU is
incompatible with the same policy configured for a
child OU, the child does not inherit the policy
setting from the parent. The setting in the child is
applied.
Copyright, University of Tulsa, 2002
Blocking Inheritance
• Inheritance of policies can be blocked at
the site, domain or OU level using the
Block Inheritance check box.
• Group Policy must be opened from
Active Directory Sites and Services to
use this feature.
Copyright, University of Tulsa, 2002
Enforcing Inheritance
• The No Override check box forces all
child policy containers to inherit the
parent's policy even if those policies
conflict with the child's policies, and
even if Block Inheritance has been
set for the child.
• Group Policy must be opened from
Active Directory Sites and Services to
use this feature.
Copyright, University of Tulsa, 2002
Group Policy:
Best Practices
• Disable unused parts of a Group Policy object
• Use the Block Policy Inheritance and No Override
features sparingly
• Minimize the number of Group Policy objects
associated with users in domains or organizational
units
• Filter policy based on security group membership
• Override user-based Group Policy with computerbased Group Policy only when necessary
• Limit the overall number of domain and enterprise
administrators
Copyright, University of Tulsa, 2002
MS Win 2K Group Policy
Group Policy Delegation
by Howard Barnes
Copyright, University of Tulsa, 2002
Group Policy Delegation
Ways that administrators can manage and
delegate control over Group Policy:
• Manage Group Policy links for a
container object
• Create GPOs
• Edit GPOs
• Restrict access to certain snap-ins
Copyright, University of Tulsa, 2002
Managing GPO Links
• Properties: gPLink, gPOptions
• By default: Domain and Enterprise
Administrators can manage
• Can delegate to other users or groups
• Need Read and Write permissions
• Recommended: groups, not individuals
• Caution on non-administrative groups
Copyright, University of Tulsa, 2002
Granting a Group Ability to
Manage Group Policy Links
• Start  Programs  Administrative Tools 
Active Directory Users and Computers
• Right click on the container to delegate
• Select Delegate Control from pull-down menu
• Click Next
• Click the Add button to add users and/or groups
• Select each group to have the ability to manage links
• Click Add for each one
• Click OK
• Click Next
Copyright, University of Tulsa, 2002
Granting Ability to
Manage Links (continued)
• Delegate the following
common tasks must be
selected
• Click the Manage Group
Policy Links check box
• Click Next
• Click Finish
Copyright, University of Tulsa, 2002
Creating GPOs
•
•
•
•
Who can create a new GPO?
Domain Administrators group
Enterprise Administrators group
SYSTEM group
Group Policy Creator Owners group
(member creating a new GPO becomes
Creator Owner of it).
Copyright, University of Tulsa, 2002
Editing GPOs
To grant edit access to a GPO:
• Open a GPO
– In the Group Policy snap-in or
– Through a container’s Properties  Group Policy tab
• Right click the GPO and select Properties
• Click the Security tab
• Click Add to add user and/or group to ACL
– Grant Read and Write permissions in Allow column for GPO
• Click OK
Copyright, University of Tulsa, 2002
Restricting the Use of
Sensitive Snap-ins (1)
To permit or allow access to certain snap-ins:
• Open a GPO
• If through Group Policy tab, highlight desired GPO
and click Edit button
• Navigate down to the User Configuration\Administrative
Templates\Windows Components\Microsoft Management Console node
• Double-click Restrict users to the explicitly permitted list of snap-ins in
right pane
• Click radio button
– Enabled to disallow most snap-ins, allow a few
– Disabled to allow most snap-ins, disallow a few
Copyright, University of Tulsa, 2002
Restricting the Use of
Sensitive Snap-ins (2)
To restrict or allow access to specific snap-in:
• Navigate down to the User Configuration\Administrative
Templates\Windows Components\Microsoft Management
Console\Restricted/Permitted snap-ins node
• Double click desired snap-in, in right pane
• Click radio button
– Enabled if explicitly allowing access to snap-in
– Disabled if explicitly denying access
• To restrict access to a Group Policy extension:
– Double-click Group Policy node
– Select snap-in from list
– Enable or disable it
Copyright, University of Tulsa, 2002
Which snap-ins to allow
for given group of users?
• Often environment and network specific
• Normal users restricted from several snap-ins by
default
– May need greater restriction
• For non-administrative users:
– May want to define snap-ins they can access
– Implicitly deny access to all others
– No access to Security Templates and Security
Configuration and Analysis snap-ins
• Groups of administrative users
– If delegated Active Directory abilities, can be limited to
certain tasks
Copyright, University of Tulsa, 2002
Recommendations
Summary
• Use caution when delegating Group Policy to groups
other than administrators.
• Assign Group Policy permissions to security groups
and not individual users.
• Full Control is not necessary to manage links or
modify GPOs; assign the fewest permissions needed.
• Limit the use of sensitive snap-ins, such as Group
Policy, Security Templates, and Security Configuration
and Analysis.
• In the case of non-administrative users, define GPOs
that deny access to all snap-ins except those deemed
necessary and explicitly listed as permitted.
Copyright, University of Tulsa, 2002
MS Win 2K Group Policy
Group Policy Security Settings
by Howard Barnes
Copyright, University of Tulsa, 2002
Security Settings
Overview
• Under
Computer Configuration\Windows
within a GPO
• Can be accessed via Group Policy snapin
• Computer, not user specific
• Security Settings node expands to
reveal nine security areas.
Settings\Security Settings
Copyright, University of Tulsa, 2002
Security Settings Areas
(1)
•
•
•
•
•
•
•
•
•
Account Policies *
Local Policies *
Event Log *
Restricted Groups *
System Services *
Registry *
File System *
Public Key Policies
IP Security Policies on Active Directory
* Can be initially configured via Security Templates snap-ins
Copyright, University of Tulsa, 2002
Security Settings Areas
(2)
• Account Policies - computer security settings for:
– password policy
– lockout policy
– Kerberos policy
• Local Policies - security settings for:
– audit policy
– user rights assignment
– security options.
• Event Log - controls security settings for:
– Application event log
– Security event log
– System event logs
Copyright, University of Tulsa, 2002
Security Settings Areas
(3)
• Restricted Groups – allows control of:
– Who should (not) belong
– Which groups can belong to
– Examples:
• Enterprise Administrators
• Payroll
• System Services - control:
– startup mode
– security options (security descriptors) for system
services.
Copyright, University of Tulsa, 2002
Security Settings Areas
(4)
• Registry – used to configure security settings
for registry keys including:
– Access Control
– Audit
– Ownership
• File System - used to configure security
settings for file-system objects, including:
– access control
– Audit
– ownership.
Copyright, University of Tulsa, 2002
Security Settings Areas
(5)
• Public Key Policies – includes:
– Encrypted Data Recovery Agents
– Automatic Certificate Request Settings
– Trusted Root Certification Authorities
– Enterprise Trust
• IP Security Policies on Active Directory
– includes settings for IPSec.
Copyright, University of Tulsa, 2002
Importing a Security
Template into a GPO
In Group Policy snap-in:
• Navigate to the Computer Configuration\Windows
Settings\Security node
• Right-click Security Settings
• Select Import Policy from the pull-down menu
• Select a template from the folder, or browse
• Click Open
• Can then view the settings by navigating
down through the Security Settings tree
Copyright, University of Tulsa, 2002
Design Considerations for
Security Settings
• Security Configuration Toolset miniguide provides templates for:
– Windows 2000 Servers
– Windows 2000 Workstations
• Recommendation:
– Group into separate OUs, based on role
Copyright, University of Tulsa, 2002
Recommendations
Summary
• Import security templates into GPOs.
• If separate account policies required,
consider a multiple-domain architecture.
• Computers fulfilling different roles
should be grouped into separate OUs.
Copyright, University of Tulsa, 2002
MS Win 2K Group Policy
Design and Other Group Policy Issues
by Howard, Chad, and Howard
Copyright, University of Tulsa, 2002
Design Considerations
• User and computer objects should be in
separate OUs.
• Default Domain Policy GPO applied
– Very few security settings
– Some Public Key and IPSec policies
– Account Policies settings for whole domain
• Should limit number of GPOs applied to
users and computers
Copyright, University of Tulsa, 2002
Domain Controller Group
Policy
• Domain Controllers container created by
default
– All domain controllers placed in it as added
– Default Domain Controllers Policy GPO linked
– A domain controller specific template should be
imported
• Domain controllers share domain account
database
– Some settings must be the same
– Some settings in domain Group Policy applied on
all domain controllers
Copyright, University of Tulsa, 2002
Domain Group Policy applied to
domain controllers
• All settings in
Computer
Configuration\Windows Settings\Security
Settings\Account Policies
• Settings in
Computer
Configuration\Windows Settings\Security
Settings\Local Policies\Security Options
– Automatically log off users when logon time expires
– Rename administrator account
– Rename guest account
Copyright, University of Tulsa, 2002
Group Policy
Management
• When new GPO is created
– Domain controller with PDC emulator role
does management operation
– Other domain controllers can be specified
to process GPOs
– Microsoft recommends maintaining PDC
emulator
Copyright, University of Tulsa, 2002
Local Group Policy Object
• Every computer has Local Group Policy
– First policy applied
– Subsequent policies may override
– Solid local policy is important
• Local Group Policy Object (LGPO)
– Saved in %SystemRoot%\System32\Group Policy
– Can be accessed and viewed by:
• Choosing Local Computer object in Group Policy snap-in
• Selecting Local Security Policy option under Administrative
Tools menu
– Does not have all settings available with Active Directory
Group Policy
Copyright, University of Tulsa, 2002
Loopback GPO
Processing
• Allows policy to be applied to users based on
computer logged on
• Applications normally assigned to user not
automatically available
• Two modes
– Replace mode – processes only GPOs that apply to
the computer
– Merge mode – processes GPOs for user, then for
computer (overrides)
• Use only when absolutely necessary
Copyright, University of Tulsa, 2002
Support for Windows NT
and 9x Clients
• Group Policy replaces System Policy from Windows
NT
– Not backward compatible
– Does not support legacy clients
• Upgrading Windows NT clients to Windows 2000
clients
– Manually duplicate system policies or approximate in Group
Policy
• Legacy clients not recommended in Win2K networks
– Cannot use Group Policy
– System policy can be pushed out to them
• Refer to Guide to Securing Microsoft Windows NT/9x
Clients in a Windows 2000 Network
Copyright, University of Tulsa, 2002
Monitoring and Troubleshooting
Group Policy
• Group Policy event logging can be enabled
• Two types of event logging:
– Diagnostic – writes detailed Group Policy events
– Verbose – tracks:
• Group Policy changes
• Settings applied to local computer
• Settings applied to users logging on
• Verbose log file:
– %SystemRoot%\Debug\UserMode\Userenv.log
Copyright, University of Tulsa, 2002
Enabling Diagnostic
Logging
Add following registry key and value:
Hive:
Key:
Name:
Type:
Value:
HKEY_LOCAL_MACHINE
Software\Microsoft\WindowsNT\CurrentVersion\Diagnostics
RunDiagnosticLoggingGlobal
REG_DWORD
1
May need to increase size of Application log.
Copyright, University of Tulsa, 2002
Enabling Verbose Logging
Add following registry key value:
Hive:
HKEY_LOCAL_MACHINE
Key:
Software\Microsoft\WindowsNT\CurrentVersion\Winlogon
Name: UserEnvDebugLevel
Type: REG_DWORD
Value: 30000 (decimal) – logs nothing
30001 (decimal) – enables logging of errors
30002 (decimal) – enables verbose logging
Copyright, University of Tulsa, 2002
Group Policy –
Troubleshooting
• Various Group Policy tools that Microsoft provides?
–
–
–
–
–
–
–
–
–
–
–
Resultant Set of Policies (mmc snap-in)
GPResult
GPOTool
Active Directory Users and Computers
Group Policy Editor
Active Directory Sites and Services
Secedit
Local Security Policy
DCDiag and Netdiag
NSLookup and Netdiag
Repadmin
Copyright, University of Tulsa, 2002
Group Policy –
Troubleshooting
• Something is not working properly—how can
I troubleshoot Group Policy?
– Troubleshooting Group Policy in Windows 2000
(http://www.microsoft.com/Windows2000/techinfo
/howitworks/management/gptshoot.asp) is the
single best resource for troubleshooting general
Group Policy problems. For more information
specifically related to the troubleshooting of Group
Policy–based software installation, see Group
Policy Troubleshooting (Q250842)
(http://support.microsoft.com/default.aspx?scid=k
b;EN-US;Q250842) in the Microsoft Knowledge
Base.
Copyright, University of Tulsa, 2002
Group Policy –
Troubleshooting
• How do I export Group Policy settings to a text file?
– Windows 2K and the Windows 2K Resource Kits do not
include any tools for exporting Group Policy settings.
– Microsoft is developing the Group Policy Management
Console (GPMC) which will include this ability and many
other useful features.
• The GPMC is scheduled to be available as a free download shortly
after Windows .NET Server is released.
• Full Armor currently offers Fazam, a tool that can perform many
of the tasks that the GPMC will be able to do.
• For Windows 2000 only, the Windows 2000 Server Resource Kit
CD contains a version of Fazam that has limited functionality.
Copyright, University of Tulsa, 2002
Group Policy –
Troubleshooting
• Troubleshooting in general:
– An important part of troubleshooting Group Policy
problems is to consider dependencies between
components.
• Software Installation relies on Group Policy
• Group Policy relies on Active Directory
• Active Directory relies on proper configuration of network
services.
• When trying to fix problems that appear in one
component, it is generally helpful to check whether
components, services, and resources on which it relies
are working correctly.
• Event logs are useful for tracking down problems caused
by this type of hierarchical dependency.
Copyright, University of Tulsa, 2002
Recommendations
Summary
•
•
•
•
•
Remove users and computers from built-in Users and Computers
containers and place in OUs
Set Account Policies and other domain-wide settings in a GPO linked to
domain controller
Minimize number of GPOs associated with user or computers
Group related settings in single GPO
Maintain PDC emulator domain controller as Group Policy manager
Set strong Local Group Policy for computers not part of domain
•
Use loopback processing only when absolutely necessary
•
Do not use legacy clients in Windows 2000 network
•
•
– Good LGPO can compensate for holes in subsequently applied Active
Directory GPOs
– Place all computers affected by loopback in same OU
– If necessary, investigate how to apply System Policy
Enable Group Policy diagnostic logging temporarily for troubleshooting
Copyright, University of Tulsa, 2002
MS Win 2K Group Policy
Group Policy References
Copyright, University of Tulsa, 2002
References (1)
• Babcock, Paul, et. Al., “Guide to Securing Microsoft
Windows 2000 Networks”, Version 4.1, National
Security Agency, September 6, 2000
• “Designing a Secure Microsoft Windows 2000
Network”, Microsoft Official Curriculum course
2150ACP, 2000
• Haney, Julie, “Guide to Securing Microsoft Windows
2000 Group Policy: Security Configuration Tool Set”,
Version 1.0, National Security Agency, May 2001
• Introduction to Windows 2000 Group Policy”,
http://www.microsoft.com/windows2000/techinfo/ho
witworks/management/grouppolicyintro.asp Microsoft
white paper, 1999
Copyright, University of Tulsa, 2002
References (2)
• McLean, Ian, Windows 2000 Security Little Black
Book, Coriolis Group, Scottsdale, Arizona, 2000
• Microsoft Web Site, http://www.microsoft.com/
• “Step-by-Step Guide to Understanding the Group
Policy Feature Set”,
http://www.microsoft.com/windows2000/techinfo/pla
nning/management/groupsteps.asp, Microsoft,
January 2000
• “Windows 2000 Group Policy”,
http://www.microsoft.com/windows2000/techinfo/ho
witworks/management/grouppolwp.asp, Microsoft
white paper, 2000
Copyright, University of Tulsa, 2002
Group Policy – FAQ1
• Third-party tools available for Group Policy
– Full Armor’s Fazam http://www.fullarmor.com/solutions/group
– Bindview’s BV-Admin for Windows 2000 http://www.bindview.com/products/Admin/win2
000.cfm
– Fastlane ActiveRoles from Quest Software http://www.quest.com/fastlane/activeroles/
Copyright, University of Tulsa, 2002
Group Policy – FAQ2
• Is there a way to do <some setting> using
Group Policy?
– The setting that you need may already be present
and manageable through Group Policy. You should
check using the GP Editor to see if the setting
already exists.
• How do I configure Group Policy for multiple
users without using Active Directory?
– The Local Group Policy Object, which can be used
to configure policy settings on stand-alone
computers, was not designed to work with
multiple users.
Copyright, University of Tulsa, 2002
Group Policy Summary
• Group Policy – What is it and why do I need it?
• Multiple ways of getting to the Group Policy Settings
• Summarized Windows 2000 Active Directory & its
relationship with Group Policy
• User Configuration vs. Computer Configuration
• Group Policy Objects
• Filtering
• Group Policy Inheritance (also blocking and forcing)
• Group Policy Best Practices
• Several Group Policy FAQs
• Group Policy Troubleshooting
Copyright, University of Tulsa, 2002
Questions, comments, corrections,
rebuttals?
Copyright, University of Tulsa, 2002
Download