Active Directory Group Policy

advertisement
Active Directory Group Policy
Group Policy Overview
 Successor to NT policies

Much more flexible
 Only applies to 2000 workstations

Use old style policies for NT
 Used to manage desktop environment
 Integrated into Active Directory
What Can Group Policy Manage?
 Administrative Templates — registry-based settings
 Security settings
 Software installation
 Scripts

Login, logout, startup, shutdown
 Folder redirection
 Remote Installation Services
 Internet Explorer maintenance
Registry-based Settings
 Control over desktop, control panel access, Start Menu and
Taskbar, some Windows components, and more…
 Generally three settings — Not configured, Enabled, Disabled
 Implemented via Administrative Templates




Text file with .adm extension
Extensible
Can create your own
Some programs ship with their own (Office)
Security Policy Settings
 Account Policies — password, account, Kerberos
 Local Policies — auditing, user rights, security options
 Event Log — e.g. maximum size
 Restricted Group — group membership
 System Services — security and startup settings
 Registry — registry key security
 File System — file system security
 Public Key Policies — encryped data, certificate authorities
 IP Security Policies — IP security
Software Installation
 Use to install software
 Use to upgrade software
 Three methods



Assign applications to users
Assign applications to computers
Publish applications to users
 Available
to users, but not installed unless requested
Script Settings
 Assign scripts (login, logout etc.)
 Set processing order
Folder Redirection
 Redirect special folders


Start Menu, Desktop
My Pictures, My Documents, Application Data
 Choices



No redirection
Direct to same location
Different locations based on security groups
Parts of Group Policy Objects
 Each GPO has two sections


Computer Configuration
User Configuration
 Each part may be disabled

Properties of GPO/General
 Recommended — if a section is unused, disable it

E.g. On GPO to configure user desktop, disable
Computer Configuration section
Creating Group Policy Objects
 AD Users and Computers


Properties of Domain/OU
Creates new GPO linked to that domain/OU
 AD Sites and Services

To create site GPO
 Also via MMC Group Policy Snap-in
 To create a GPO not linked to a site, domain or OU
How are Group Policy Objects Applied
 GPOs may be linked to AD containers


Sites, Domains and Organizational Units (OUs)
Apply to users and computers within container
 Objects in child OUs inherit GPO settings from parent OUs,
domain and site unless explicitly blocked
 No
inheritance across domain boundaries
 One GPO may be linked to multiple containers
 Multiple GPOs may be linked to a container
 GPOs are not linked to groups
Modifying GPO Inheritance
 Block Inheritance

If enabled on a container, objects in container do not
receive any GPO settings from parent containers
 No Override


If enabled on a GPO link, inheritance of GPO settings
cannot be stopped via block inheritance
NB Applied to link, not the GPO itself
Filtering Group Policy Settings
 GPO settings applied to all objects in container
 Filter using security groups

Change default GPO permissions
 Need
Read and Apply GP ACEs to be able to apply a GPO
 Need Read and Write GP ACEs to be able to read and
modify a GPO
Deleting and Disabling Group Policy
Objects
 Disabling a GPO
 Disable Computer or User sections
 Disable both to disable GPO entirely
 Also disable using Options button in AD Users and
Computers/Container Properties
 Deleting a GPO
 AD Users and Computers
 Will be offered two options
 Remove the link from the list — deletes link but not GPO
 Remove the link and delete the GPO permanently — deletes GPO
Disabling and Inheriting:— What do the
Properties Belong to?
 Properties of a given GPO


Disable Computer Configuration Settings
Disable User Configuration Settings
 Properties of a given container

Block policy inheritance
 Properties of a given link


No override
Disabled: the GPO is not applied to this container
Storage of Group Policy Objects
 Group Policy Container (GPC)
 Active Directory object storing version, status etc.
 View by enabling Advanced Features in AD Users and Computers,
then System/Policies
 Named by GUID
 Group Policy Template (GPT)
 Sysvol\Policies folder
 Contains all GP) settings
 Named by GUID
 GPC and GPT replicated separately
 Policies only apply if both GPC and GPT are in sync
Storage of Group Policy Settings
 Stored in client registry


HKEY_LOCAL_MACHINE (Computer settings)
HKEY_CURRENT_USER (User settings)
 Special registry keys used


\Software\Policies (preferred)
\Software\Microsoft\Windows\CurrentVersion\Policies
 Removed when GPO no longer applies
Order of GPO Application
 Order of application is Site, Domain OU (SDOU)
 Multiple OUs — order of application is according to
domain hierarchy (start at top of tree and work down)
 Multiple GPOs for same OU — processed in reverse
order of list of GPOs shown for that OU


I.e. GPO at top of list takes precedence
Order can be changed
When are GP Settings Applied?
 Computer settings


On boot
According to periodic refresh cycle
 User settings


On user logon
According to periodic refresh cycle
 If computer and user settings conflict, computer
settings take precedence
Refreshing Group Policy
 Default refresh intervals


2000 professional and member servers — very 90
minutes with randomized 30 minutes offset
Domain controllers — every five minutes
 Changed by altering administrative template settings
for user or computers
 Exception — software installation and folder
redirection policies only applied on boot or user
logon, not periodically
Conflicts
 Where settings for GPO of parent container conflict
with those for GPO of child, child container settings
win
 Where settings from different GPOs linked to same
container conflict, settings of GPO highest in list are
win

Use Up/Down to change position
 Exception — where computer and user settings
conflict, computer settings win

Except IP Security and User Rights settings
Managing Group Policy Objects
 Creating or editing GPOs controlled by PDC emulator by
default

Minimise conflicts
 To change


Group Policy mmc snap-in/View/DC Options
Or use Group Policy
 Recommended that this is left unchanged
 NB By default, only Domain Admins, Enterprise Admins,
Group Policy Creator Owners and System account can create
and edit GPOs
Loopback Processing
 Computer settings part of GPO linked to OU apply
only to computers within OU
 Similarly, user settings apply only to users within OU
 Therefore, normally, user in OU A logging on to
computer in OU B gets combination of user settings
from OU A GPOs and computer settings from OU B
GPOs (and any inherited etc.)
Loopback Processing cont.
 May want to apply same user settings to any user
logging on to a given workstation, regardless of user
OU

E.g. classroom, public area workstations
 Loopback processing does this


Merge mode applies normal GPOs for user as well (but
those from computer take precedence)
Replace mode does not apply normal GPOs for user
Local Group Policy
 Computers also have a single Local Group Policy Object
(LGPO)
 Only supports Security Settings, Administrative Templates
and Scripts
 Processed before AD GPOs

Block inheritance does not stop its application
 Generally unused in an AD setup

Most useful for configuring standalone computers
Delegation
 It is possible to delegate responsibility for the
following tasks



Managing links
Creating GPOs
Editing GPOs
DomainExceptions for Domain
Controllers
 Some settings only from GPOs linked to domain


Domain controllers share same account database so some settings
must be the same
Not applied to Domain Controllers OU because DCs may be moved
out of this OU
 NB Can change these settings in other GPOs but will have no
effect on domain policy

Will affect local logons (i.e. non-domain) if they apply to
workstations or member servers
Exceptions for Domain Controllers cont.
 Domain-wide settings


All account policies (Computer Configuration/Windows
Settings/Security Settings)
 I.e. Password, Account lockout and Kerberos policies)
Some settings from Computer Configuration/Windows
Settings/Local Policies/Security Options
 Automatically log off users when logon time expires
 Rename administrator account
 Rename guest account
Common Desktop Management
Scenarios
 Package containing GPOs developed for six different
scenarios that can be loaded into AD


Includes white paper describing scenarios
Excel spreadsheet documenting all GPO settings
 Scenarios are for the following
 Lightly Managed Desktop (e.g. power user)
 Mobile User
 Multi-User Desktop
 AppStation (Highly Managed Desktop) (e.g. admin user)
 TaskStation (e.g. single task)
 Kiosk (e.g. public workstation)
Common Desktop Management
Scenarios
 NB Loading GPOs into AD does not mean they take
immediate effect

Not linked to any container
 Use as starting points
 Use Excel spreadsheet to document GPO changes
Common Desktop Management
Scenarios
 White paper

http://www.microsoft.com/technet/treeview/default.asp?
url=/TechNet/prodtechnol/windows2000serv/deploy/grp
polsc.asp
 All files

http://www.microsoft.com/windows2000/zipdocs/group
polscen.exe
OU Design Issues
 Deep OU structure


Easier to apply GPOs without filtering
More likely to require inheritance modifications
 Flat OU structure


More likely to need filtering
Easier to troubleshoot (less inheritance issues)
Number of GPOs Required
 Few comprehensive GPOs


Less to manage
Shorter logon times
 Many narrowly focussed GPOs



More to manage
Likely to need to more filtering
Increased logon times
 In theory, up to 20 GPOs applying to a user should not have
major impact on logon times
Recommendations
 Disable unused parts of GPO (computer, user
settings)
 Limit use of inheritance blocking, no override,
loopback processing and filtering

Simplifies troubleshooting
 Limit total number of GPOs that apply to a user or
computer

Improves logon times
Recommendations cont.
 Limit the number of admins who can edit GPOs
 Test thoroughly before applying to users/computers
 Document settings

Use spreadsheets from Common Desktop Management
Scenarios package
References
 Windows 2000 Group Policy

http://www.microsoft.com/windows2000/docs/grouppol
wp.doc
 Loopback Processing of Group Policy

http://support.microsoft.com/support/kb/articles/Q231/2/
87.ASP
 How to Use Group Policy Objects to Deploy SP1 for
Windows 2000

http://support.microsoft.com/support/kb/articles/Q260/3/
01.ASP
References
 Group Policy Application Rules for Domain
Controllers

http://support.microsoft.com/support/kb/articles/Q259/5/
76.ASP
 Domain Security Policy in Windows 2000

http://support.microsoft.com/support/kb/articles/Q221/9/
30.ASP
 Configuring Account Policies in Active Directory

http://support.microsoft.com/support/kb/articles/Q255/5/
50.ASP
Diagnosing Problems
 Resource kit
 Gpotool.exe
 Gpresult.exe
 FAZAM 2000
 Help to see end results of applying a number of GPOs
 http://www.microsoft.com/windows2000/techinfo/reskit/tools/existi
ng/fazam2000-o.asp
 Reduced functionality version
 http://www.fullarmor.com/solutions/group/
 Full, commercial version
Download