Introduction
Intended for system administrators, architects, and others who need to create and manage Group Policy settings, this paper explains Group Policy infrastructure and shows how the new Group Policy Management Console (GPMC) fits into this infrastructure. The paper includes detailed information about Group Policy Processing as well as a.
Introduced in Windows? 2000 Server, Group Policy provides directory-based desktop configuration management. With Group Policy, you can specify settings for registry-based policies, security, software installation, scripts, folder redirection, Remote Installation Services, and Internet Explorer maintenance. The Windows Server 2003 Family Of Operating Systems, Extends Group Policy In A Number of Ways - Through GPMC, Which Includes Scripting Interfaces, Group Policy Results, Group Policy Modeling, and more.
The Group Policy settings that you create are contained in a Group Policy object (GPO). By linking a GPO with selected Active Directory? Service system containers-sites, domains, and organizational units-you can apply these settings to the users and computers in those Active Directory containers. To create GPOs, you use GPMC in conjunction with the Group Policy Object Editor, an MMC snap-in, also known previously as the Group Policy snap-in, Group Policy Object Editor, or gPedit.
Administrative Requirements for Using Group Policy
In order to use of all of its features, Group Policy requires Active Directory and client computers running Windows 2000 or later. To set Group Policy for a selected Active Directory container, you must have a Windows 2000 or Windows Server 2003 domain controller installed, and you must have read and write permission to access the system volume of domain controllers (Sysvol folder) and modify rights to the currently selected directory container. The system volume folder is automatically created when you install a domain controller (or promote a server to domain controller ) .Note Group Policy depends on Active Directory;.. therefore, it is crucial to understand Active Directory and its structure It is highly recommended that you familiarize yourself with Active Directory concepts before implementing Group Policy to learn about Active Directory, see the Active Directory White papers at http://www.microsoft.com/ad. Information on Planning and Implementing Active Directory Is Available from O The Windows Deployment and Resource Kits Page At http://www.microsoft.com/reeskit.
GPMC System Requirements
GPMC can manage both Windows 2000 and Windows Server 2003 domains with Active Directory. In either case, the computer on which the tool itself runs must be running Windows Server 2003 or Windows XP Professional (with Windows XP Service Pack 1 and the Microsoft .NET Framework ) Note:.. When installing GPMC on Windows XP Professional with SP1, a post SP1 hotfix is required This hotfix (Q326469) is included with GPMC GPMC Setup prompts you to install Windows XP QFE Q326469 if it is not already present..
Feedback on this Paper
If you have any Comments About this paper, Contact mailto: gpdocs@microsoft.com.
What's New About Group Policy in Windows Server 2003This section summarizes new features in Windows Server 2003 Group Policy. The biggest change for Group Policy in Windows Server 2003 is the introduction of GPMC, the new solution for Group Policy management that helps you manage an enterprise more cost-effectively. It consists of a new Microsoft Management Console (MMC) snap-in and a set of scriptable interfaces for managing Group Policy. GPMC is available for download from the Microsoft GPMC Web site at http://www.microsoft.com / Windowsserver2003 / gpmc. this paper assumes you are useless gpmc.
Group Policy Management Console
GPMC simplifies the management of Group Policy by providing a single place for managing core aspects of Group Policy It addresses the top Group Policy deployment requirements by providing the following functionality.:
· A user interface tria makes group policy much easier to us.
· Backup / restore of gpos.
· Import / Export and Copy / Paste of GPOS AND Windows Management Instrumentation (WMI) Filters.
· Simplified Management Of Group Policy-Related Security.
· HTML Reporting for GPO Settings and Resultant Set of Policy (RSOP) DATA.
· Scripting of policy-related Tasks That Are Exposed With Tool (Not Scripting of Settings WITHIN A GPO).
GPMC is buy to create, view, and manage gpos while the group policy object Editor is buy to edit gpos.
More Information About GPMC IS Contained THROUGHOUT THIS PAPER. For Additional Information About GPMC Including Step-by-Step Instructions for Completion Tasks, See The Following Resources:
· Group Policy Administration using the Group Policy Management Console. This white paper provides additional technical details of functionality in GPMC. · GPMC Help. Available when you install GPMC, this provides step-by-instructions for GPMC tasks and addresses key concepts in GPMC.
Microsoft GPMC Web Site At http://www.microsoft.com/windowsserver2003/gpmc/. This Site Provides Links To The Latest GPMC Resources Information.
New Policy Settings
Windows Server 2003 Includes More 200 New Policy Settings. The New Windows Server 2003 Policy Settings Allow Administrators to Control The Behavior of:
System Restore, Error Reporting, PC Health.
Terminal Server.
· Networking Such As SNMP, Quality of Service (QoS), Personal Firewall, And Dialup Connections.
· DNS AND NET LOGON.
ROAMING User Profiles and Group Policy.
· Control panel.
· Windows Media? Player.
· Wireless Configuration.
Software Restriction Policy.
Administrative Templates Changes
For Administrative Templates policy settings, Group Policy Object Editor provides explain text directly in the Web view of the console. You also can find this explain text by double-clicking the policy setting and then clicking the Explain text tab. In either case, this text Shows Operating System Requirements, Defines The Policy Setting, and Includes Any Specific Details About The Effect of Enabling OR Disabling The Policy Setting.
Because new Administrative Template policy settings have been added that only work on specific versions of the operating system such as Windows XP Professional or Windows Server 2003, you can view only the Administrative Template policy settings that might be applied in your users' work environment, based on the "supported" keyword in each Administrative Template (.adm) file. For example, you may want to edit only policy settings that could be applied on client computers running Windows 2000 Service Pack 3. in Group Policy Object Editor, you can specify these options in the Filtering dialog box, available by clicking a node in the Administrative Templates section, clicking the View menu, and then clicking Filtering. For more information, see the section Using Administrative Templates in this paper.Command Line Refresh of Policy
Administrators can now refresh policy settings from the command line using Gpupdate, which replaces secedit / refreshpolicy in Windows 2000. Gpupdate gives administrators better control and flexibility in refreshing policy. For more information, see the section Refreshing Policy from the Command Line in this paper.
WMI Filtering
WMI makes a large amount of data, such as hardware and software inventory, settings, and configuration information, available for a target computer. WMI retrieves data from the registry, drivers, file system, Active Directory, SNMP, MSI, SQL, networking, and Exchange. WMI Filtering in Windows Server 2003 allows you to create queries based on this data. These queries (also called WMI filters) determine which users and computers receive all of the policy configured in the GPO where you create the filter. This functionality lets you target Group Policy based on a significant number of different properties of the target In most organizations only senior administrators would actually create WMI filters;.. other administrators would simply access the WMI filters that have been created for their domain for more information, see the Section WMI Filtering in this Paper.Tools for Best Practice Organizational Unit Design
Redirusr.exe (for user accounts) and Redircomp.exe (for computer accounts) are two new tools included with Windows Server 2003 that enable you to change the default location where new user and computer accounts are created so you can more easily scope GPOs directly to newly created user and computer objects. By running Redirusr.exe and Redircomp.exe once for each domain, the domain administrator can specify the organizational units into which all new user and computer accounts are placed at the time of creation. for more information, ......................
Forest Trust
The Windows Server 2003 family introduces a new feature called Forest Trust that enables you to authenticate and authorize access to resources from separate, networked forests. With trusts established between forests, you can manage Group Policy throughout your enterprise, which provides greater flexibility especially in large Organizations. for more information, see the section Using Group Policy Features Across forsts in this paper.domain rename
The ability to rename a domain provides you with the flexibility to make important changes to your forest structure and namespace as the needs of your organization change Renaming domains can accommodate acquisitions, mergers, name changes, or reorganizations Domain rename allows you to..:
1.change the dns and netbios names of any domain in the forest (include).
2.Restructure the position of any domain in the forest (Except The Forest Root Domain).
You can only rename domains in a forest where all of the domain controllers are running Windows Server 2003 and the forest functional level has been raised to Windows Server 2003. For more information, see Windows Server 2003 Domain Rename Tools at http: // www. Microsoft.com/windowsServer2003/downloads/domainrename.mspx.
Restore GPOS Tool
This is a new command-line tool intended for failure recovery. The tool, dcgpofix.exe, restores the default GPOs to their original state (that is, the default state after initial installation). For more information, see "Troubleshooting Windows Server 2003 Group Policy "Available from the Microsoft GPMC Web Site At http://www.microsoft.com/windowsserver2003/gpmc/.
Wireless Support
A new Wireless Network (IEEE 802.11) Policies Group Policy extension allows you to configure wireless network settings that are part of Group Policy for Computer Configuration. Wireless network settings include the list of preferred networks, Wired Equivalent Privacy (WEP) settings, and IEEE 802.1 X settings. These settings are downloaded to targeted domain members, making it much easier to deploy a specific configuration for secure wireless connections to wireless client computers.Software Restriction Policy Settings
Software restriction policy settings address the need to regulate unknown or untrusted software. With the rise in the use of networks, the Internet, and email for business computing, users find themselves exposed to new software in a variety of ways. Users must constantly make decisions about running unknown software. Viruses and Trojan horses often intentionally misrepresent themselves to trick users into running them. It is difficult for users to make safe choices about which software they should run.
With software restriction policy settings, you can protect your computing environment from untrusted software by identifying and specifying which software is allowed to run. You can define a default security level of unrestricted or disallowed for a GPO so that software is either allowed or not allowed to run by default. you can make exceptions to this default security level by creating rules for specific software. for example, if your default security level is set to disallowed, you can create rules that allow specific software to run. for more information, see the Section Software Restriction Policy Settings in this Paper.
Internet Explorer Enhanced Security Configuration, INTERNET EXPLORTION
Internet Explorer Enhanced Security Configuration, also known as Internet Explorer hardening, is enabled by default on computers running Windows Server 2003. It can be managed using Group Policy in an enterprise environment to ensure consistent trusted sites and security settings on targeted server computers or to disable the feature on specific servers. For example, you may wish to ensure that Internet Explorer Enhanced Security Configuration is reapplied on a specific computer if the local administrator on that computer turns it off using the Optional Component Manager in the Windows Components Wizard (available from Add or Remove Programs.) in addition, it's likely that you will want to manage computers or groups of computers in your organization by defining a set of trusted sites and / or a specific security level for sites in the Internet or Trusted sites zones. for more Information, See Using Group Policy and Internet Explorer Enhanced Security Configuration Later in this document and Managing Internet Explorer Enhanced Security Configuration, available from the Microsoft Group Policy Web site at http://www.microsoft.com/grouppolicy.Overview of Group Policy Infrastructure and Mechanics
Group Policy uses a document-centric approach to creating, storing, and associating policy settings. Similar to the way in which Microsoft Word stores information in .doc files, Group Policy settings are contained in GPOs. GPOs are linked to the following Active Directory containers : Sites, Domains, or Organizational Units. The settings for the gpos area. Evaluated by the Affected Clients
Linking Group Policy Objects to Active Directory Containers
GPOs can not be linked directly to users, computers, or security groups. They can only be linked to sites, domains and organizational units.A given GPO can be linked to more than one site, domain, or organizational unit. Conversely, a given site , domain, or organizational unit can have multiple GPOs linked to it. in the case where multiple GPOs are linked to a particular site, domain, or organizational unit, you can prioritize the order of precedence in which these GPOs are applied.
By Linking Gpos To Sites, Domains, And Organizational Units, You CAN IMPLEMENT GROUP Policy Settings for As Broad or As Narrow A Portion of the Organization As You Want:
· A gpo linked to a site applies to all users and computers in the site.
· A GPO Applied to A Domain Applies Directly To All Users and computers in the domain and computers in childly.. Note That Policy.
A GPO Applied to An Organizational Unit Applies Directly To All Users and computers in The Organizational Unit and Computers in Child Organizational Units.
To link a gpo to a site, domain, or Organizational unit, use gpmc. In the console tree, locate the site, domain or organizational unit and then link an existing gpo or create and link a gpo here.
Note that GPOs are stored in domains not in organizational units For example, if you create and link a new GPO for an organizational unit, GPMC is actually completing two steps at once:. Creating a GPO in the domain and then linking that GPO to that . organizational unit The link is not a component of the GPO;. it is a component of the container to which it is linked Therefore, if you want to delegate the ability to manage links for a given container, it must be delegated on that container , not the GPO. in the GPMC tree view, GPO links on a given container are shown as child nodes of that container.Although you can link a site, domain, or organizational unit to a GPO in another trusted domain, this is not generally Recommended for Performance Reasons Because of the Potential Delay of Processing GPOS At Logon.
Group Policy Hierarchy
By Default, Group Policy is inherited and cumulative, and it affects all computers and users in an Active Directory Container. Gpos area process
1.Local GPO. Each Computer Has Exactly One GPO That Is Stored Locally, Shared By All Users of That Computer. This Processes for Both Computer And User Group Policy Processing.
2.Site. Any GPOs that have been linked to the site that the computer belongs to are processed next. Processing is in the order that is specified by the administrator, on the Linked Group Policy Objects tab for the site in GPMC. The GPO with The Lowest Link Order Is Processed Last, and Therefore Has The Highest Precedence.
3.Domain. Processing of multiple domain-linked GPOs is in the order specified by the administrator, on the Linked Group Policy Objects tab for the domain in GPMC. The GPO with the lowest link order is processed last, and therefore has the highest precedence .4.Organizational units. GPOs that are linked to the organizational unit that is highest in the Active Directory hierarchy are processed first, then GPOs that are linked to its child organizational unit, and so on. Finally, the GPOs that are linked to the Organizational Unit That Contains The User or Computer Are Processed.
At the level of each organizational unit in the Active Directory hierarchy, one, many, or no GPOs can be linked. If several GPOs are linked to an organizational unit, their processing is in the order in which GPOs are linked to the organizational unit. for example, if you link three GPOs to an organizational unit the first GPO you added has the highest precedence and overwrites the settings of all other GPOs. Alternatively, you can specify the order on the Linked Group Policy Objects tab for the organizational unit in GPMC .
This order means that the local GPO is processed first, and GPOs that are linked to the organizational unit of which the computer or user is a direct member are processed last, which overwrites settings in the earlier GPOs if there are conflicts. (If there are No Conflicts, THE Earlier and later settings are melely aggregated.)
In GPMC, You Can View The Precedence ORDER OF INHERITED GPOS for a Given Site, Domain Organizational Unit by Navigating Tab for Any Site, Domain, or Organizational Unit.
Managing Inheritance of Group Policy
You can further control precedence and how GPO links are applied to specific domains, sites, or organizational units by:.. · Changing the link order Within each domain, site, and organizational unit, the link order controls when links are applied To change the precedence of a link, you can change the link order, moving each link up or down in the list to the appropriate location. The link with the higher order (with 1 being the highest order) has the higher precedence for a given site, domain , or organizational unit. For example, if you add six GPO links and later decide that you want the last one that you added to have highest precedence, you can move the GPO link to the top of the list. However, the link order of An inherited gpo cannot be altered.
· Blocking Group Policy inheritance. You can block policy inheritance for a domain or organizational unit. Using block inheritance prevents GPOs linked to higher sites, domains, or organizational units from being automatically inherited by the child-level. By default, children inherit all GPOs from the parent, but it is sometimes useful to block inheritance. for example, if you want to apply a single set of policies to an entire domain except for one organizational unit, you can link the required GPOs at the domain level from which all ( Organizational Units Inherit Policies By Default), And The Block Inheritance Only On The Organizational Unit To Which The Policies Should Not Be Applied. Blocking Does Not Affect Local GPOS.
· Enforcing a GPO link. You can specify that the settings in a GPO link should take precedence over the settings of any child object by setting that link to Enforced (formerly known as "no override"). GPO-links that are enforced can not be blocked from the parent container. Without enforcement from above, the settings of the GPO links at the higher level (parent) are overwritten by settings in GPOs linked to child organizational units, if the GPOs contain conflicting settings. With enforcement, the parent GPO link always has precedence. Note that Enforce policy options always take precedence over Block Inheritance. · Disabling a GPO link. By default, processing is enabled for all GPO links. You can completely block the application of a GPO for a given site, domain, or Organizational Unit by Disabling The GPO LINK for That Domain, Site, or Organizational UNIT. Note That Does Not Disable The GPO itself, and if the gpo is linked to other seats, Domains or Organizational Units, They Will Continue To Process The GPO, IF Their Links Are Enabled.
· Disabling user and / or computer settings. A GPO may have its user settings disabled, its computer settings disabled, or all settings disabled. By default, neither user settings nor computer settings are disabled on a GPO.
Note A GPO LINK May Be Enforced, or Disabled, or Both. By Default, A GPO LINK IS NEITHER EnForced NOR Disabled. IF The link is enforced and disabled, The disabled link has precedence.
Figure 1 Below Shows A Sample Domain Structure To Illustrate How GPOS Can Be Applied to Containers In Active Directory.
Figure 1. Group Policy and Active Directory
Filtering the scope of the group policy object
You Can Further Refine Which Groups of Computers A Particular GPO INFLUENCES BY Using Security Groups Or WMI Filtering.security Filtering
Security filtering is a way of refining which users and computers will receive and apply the settings in a GPO. Using security filtering, you can narrow the scope of a GPO so that it applies only to a single group, user, or computer by specifying that only certain security principals within a container where the GPO is linked apply the GPO Security filtering determines whether the GPO as a whole applies to groups, users, or computers;. it can not be used selectively on different settings within a GPO.
In order for the GPO to apply to a given user or computer, that user or computer must have both Read and Apply Group Policy (AGP) permissions on the GPO, either explicitly, or effectively though group membership.
By default, all GPOs have Read and AGP both Allowed for the Authenticated Users group. The Authenticated Users group includes both users and computers. This is how all authenticated users receive the settings of a new GPO when it is applied to an organizational unit, domain or site. Therefore, the default behavior is for every GPO to apply to every Authenticated User. By default, Domain Admins, Enterprise Admins, and the local system have full control permissions, without the Apply Group Policy ACE. However, administrators are members of .
You can change these permissions to limit the scope to a specific set of users, groups, or computers within the organizational unit, domain, or site. Group Policy Management manages these permissions as a single unit, and displays the security filtering for the GPO on the GPO Scope tab. Using GPMC, you can add and remove groups, users, and computers to be used as security filters for each GPO. In addition, security principals used for security filtering also appear on the Delegation tab for a GPO as having Read (from Security Filtering), since they have read access to the GPO.To modify security filtering, you add or remove groups in the Security Filtering section on the Scope tab of a GPO. in practice, you do not have to set the two access control entries (ACEs), because GPMC sets both for you when you set security filtering. In addition, The Read and AGP permissions are visible separately, and able to be set independently of one another, through the access control list (ACL) editor In GPMC, the Security Filtering section of the Scope tab of a GPO shows only whether the GPO will apply. If you want to see the permissions separately, you can open the ACL editor by clicking the Advanced button on the Delegation tab for the GPO.
To prevent a GPO from applying to a specified group requires removal of the AGP ACE from that group. In the ACL editor, if you remove the AGP ACE (clear the Allow check box) for Authenticated Users, you can then explicitly grant this permission to Individual Security Groups. Alternative, You Could Set Agp To Deny For Certain Classes of Users, Such As Administratrs, That Will Never Need That Policy.
Note: Use the Deny ACE with caution A Deny ACE setting for any group has precedence over any Allow ACE given to a user or computer because of membership in another group.Best Practice:. If you disallow Apply Group Policy for a GPO for some users , consider also disallowing Read access to those users. When the Read ACE is allowed and the Apply Group Policy is not, the GPO is still processed by the user even though it is not applied to the user. Therefore, to improve performance, you should remove the Read Access Control Entry to prevent the user from processing the GPO. In addition, removing Read access increases security. with Read access allowed, it is possible for an inquisitive user with considerable knowledge of Active Directory to read the contents of that GPO, Even if it's not applied to the. this May Not Be Desirable in Some Cases, Such As a GPO for A Human Resources Group. It might be advisable to limit read access on GPOS That Affect The HR Users to Only Those Users.
Security Groups and Dacls Are Also Used to Delegate Control of GPOS, AS Explained In The Section Delegating Group Policy.
Notes
Granting Read and AGP is not sufficient to ensure that the GPO is processed for a user or computer. The GPO also has to be linked to a site, domain or organizational unit containing the user or computer, directly or through inheritance.
A GPO with security filtering set to Read and AGP does not necessarily apply to all security principals that have security filtering. It only applies to them if those user or computer objects are in the container or child container that is linked to the GPO.
THE LOCATION OF A Security Group in Active Directory Is Irrelevant To Security Filtering and, More Generally, Irrelevant To Group Policy Processing.wmi filtering
WMI Filters Allow You to Dynamical Determine The Scope of GPOS Based On Attributes of The Target Computer.
When a GPO that is linked to a WMI filter is applied on the target computer, the filter is evaluated on the target computer. If the WMI filter evaluates to false, the GPO is not applied (except if the client computer is running Windows 2000, In which case the filter is ignored and the gpo is always applied). If the WMI Filter Evaluates To True, The GPO is Applie.
WMI makes data about a target computer available for administrative use. Such data can include hardware and software inventory, settings, and configuration information. For example, WMI exposes hardware configuration data such as CPU, memory, disk space, and manufacturer, as well as Software Configuration Data from The Registry, Drivers, File System, Active Directory, The Windows Installer Service, Networking Configuration, And Application Data.
A WMI filter consists of one or more queries based on this data. If all queries are true, the GPO linked to the filter will be applied. The queries are written using the WMI Query Language (WQL), a SQL-like language. Queries can be combined with aND and OR logical operators to achieve whatever effect the administrator wants. Each query is executed against a particular WMI namespace. When you create a query, you must specify the namespace. The default is root / CIMv2, which is appropriate for most WMI queries. For more information, see Windows Management Instrumentation in the Microsoft Platform SDK at http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wmisdk/wmi/wmi_start_page.asp .The WMI filter is a separate object from the GPO in the directory. to apply a WMI filter to a GPO, you link the filter to the GPO. This is shown in the WMI filtering section on the Scope tab of a GPO. Each GPO Can have only one WMI Filter, HOWEVER THE WMI Filter Can Be Linked to Multiple GPOS .
WMI Filters, Like GPOS, Are Stored On a Per-Domain Basis. A WMI Filter and The GPO IT IS Linked to Must Be in The Same Domain.
Notes
Client support for WMI filters exists only on Windows XP, Windows Server 2003, and later operating systems. Windows 2000 clients will ignore any WMI filter and the GPO is always applied, regardless of the WMI filter.
WMI Filters are Only Available in Domains That Have at Least One Windows Server 2003 Domain Controller. In An Environment Consisting Only Of Windows 2000 Domains, The WMI Filter Node in GPMC is Not shown.
Here Area Sample Uses of WMI Filters.
· Services - computers where dhcp is turned.
Registry - Computers That Have this Registry Key Populate.
Hardware Inventory - Computers with a Pentium III Processor. · Software Inventory - Computers with visual studio? .NET Installed.
Hardware Configuration - Computers with NICS On Interrupt Level 3.
Software Configuration - Computers with Multi-Casting Turned ON.
· Associations - Computers That Have Any Service Dependent On SNA Service.
Ping - Computers That Can Ping Server1 in Less Than 100 Milliseconds.
WMI filtering allows administrators to filter the application of a GPO by attaching one set of Windows Query Language query to a GPO. The queries can be written to query WMI for multiple items. If the query returns true for all queried items, then the GPO will Be applied to the target user or computer. The WMI Filter Applies to Every Setting in The GPO, SO You Want To Create Separate GPOS Specification for WMI Filtering.
There Are Two Distinct Parts To WMI Filtering In Windows Server 2003:
· Server Administration of WMI Filters. This include to the group policy Object Editor, And Filter Specifications.
(WMI Supports Batch Processing of WMI Filters).
· For More Information About WMI Filtering Including Sample Filters for Specific Scenarios, See Appendix C in This Paper.
MMC Snap-in Extension Model
The nodes of the Group Policy Object Editor are also MMC snap-in extensions. These extensions include Administrative Templates, Scripts, Security Settings, Software Installation, Folder Redirection, Remote Installation Services, and Internet Explorer Maintenance. Extension snap-ins may in turn be extended. For example, the Security Settings snap-in includes several extension snap-ins. Developers can also create their own MMC extensions to the Group Policy Object Editor to provide additional policy settings.For more information on creating MMC extensions, see the Microsoft Management Console Section of The Microsoft Platform SDK Documentation At: http://www.microsoft.com/msdownload/platformsdk/sdkupdate/.
By default, all the available Group Policy Object Editor extensions are loaded when you start the Group Policy Object Editor. You can modify this default behavior by creating a custom MMC console, or by using policy settings to control the behavior of MMC itself. MMC options are accessed under the User Configuration / Administrative Templates / Windows Components / Microsoft Management Console node. For more information, see Specifying Group Policy to Control the Behavior of MMC and Snap-ins, later in this document.
Group Policy Object Editor Namespace
The root node of the group policy object Editor is displayed as the name of the gpo and the domain to which it belongs, in the follow finmat:
GPO Name [domainname.com] policy
For example:
Default Domain Policy [hq-res-dc-01.contoso.com] policy
Computer Configuration And User Configuration
Below the root node, the namespace is divided into two parent nodes:. Computer Configuration and User Configuration These are the parent nodes that you use to configure Group Policy settings Computer-related Group Policy is applied when the operating system boots and during the periodic. Refresh Cycle, Explained Later in this document. User-research group policy is applied1 Uses log on to completion and during the periodic refresh cycle.extensions to the group policy object Editor
Three nodes exist under the Computer Configuration and User Configuration parent nodes:. Software Settings, Windows Settings, and Administrative Templates The Software Settings and Windows Settings nodes contain extension snap-ins that extend either or both of the Computer Configuration or User Configuration nodes Most. . of the extension snap-ins extend both of these nodes, but frequently with different options The Administrative Templates node namespace contains all policy settings pertaining to the registry; it can be extended by using .adm files.
The Group Policy Extension Snap-Ins Include:
· Administrative Templates. This extension contains all registry-based policy settings, including those for the Windows 2000 and Windows Server 2003 operating systems and their components as well as any registry-based policy settings provided by applications. You use these policy settings to mandate registry settings that control the behavior and appearance of the desktop, the operating system components, and applications that provide registry-based policy. This node uses .adm files to specify the registry settings that can be modified through the Group Policy Object Editor user interface. For more information on .adm files, see Administrative Templates later in this paper. · Security Settings. The Security Settings extension is used to set security options for computers and users within the scope of a GPO. You can define local computer, domain, IP security Settings, Wireless Configuration, And Software Restriction Policy Settings. for More Information on Security Settin GS, SEE Security Settings And Appendix A: Security Settings and User Rights, Later IN This Paper.
· Software Installation. You can use the Software Installation snap-in to centrally manage software in your organization. You can assign and publish software to users and assign software to computers. For more information on software installation, see Software Installation, later in this document .
· Scripts. Scripts are used to automate tasks at computer startup and shutdown, and at user logon and logoff. You can use any language supported by Windows Script Host. These include the Microsoft Visual Basic? Development system, Scripting Edition (VBScript), JavaScript , Perl, And MS? DOS? -Style Batch Files (.bat and .cmd). See Scripts, Later in this document and microsoft windows script web site at http://www.microsoft.com/scripting for more information.. Remote Installation Services. Remote Installation Services (RIS) is used to control the behavior of the Remote Operating System Installation feature as displayed to client computers. See Remote Installation Services, later in this document.
· Internet Explorer Maintenance. Internet Explorer Maintenance is used to manage and customize Internet Explorer on computers running Windows 2000 or later. You can also export settings for Windows 95, Windows 98, and Windows NT? 4.0-based client computers (the settings are exported into an .ins and .cab file format for those platforms). Administrators can set options for Browser UI, connections, URLs, proxy settings, security zones, Favorites, and other options. See Internet Explorer Maintenance, later in this document.
· Folder Redirection. You can use folder redirection to redirect special directories on Windows 2000 or Windows Server 2003 from their default user profile location to an alternate location on the network. These special folders include My Documents, Application Data, Desktop, and the Start menu SEE Folder Redirection, Later IN this Document.
For more information about extending the functionality of the Group Policy Object Editor see "Implementing Registry-Based Group Policy" at http://www.microsoft.com/windows2000/techinfo/howitworks/management/rbppaper.asp.Client-side Extensions to GROUP Policy
Some of the Group Policy Object Editor extensions also include client-side extensions. These extensions are DLLs that are responsible for implementing Group Policy at the client computers. For more information on the client-side extensions, see the Client-side Processing of Group Policy Section Later in this paper.
Group Policy Storage
A GPO is a virtual object The policy setting information of a GPO is actually stored in two locations:.. The Group Policy container (GPC) and the Group Policy template (GPT) The Group Policy container is an Active Directory container that stores GPO properties , including information on version, GPO status, and a list of components that have settings in the GPO. The Group Policy template is a directory structure within the file system that stores Administrative Template-based policy settings, security settings, script files, and information regarding applications that are available for Software Installation. The Group Policy template is located in Sysvol in the / Policies sub-directory for its domain. GPOs are identified by their globally unique identifiers (GUIDs) and stored at the domain level. Replication of a GPO To Other Domain Controllers Happens Through Two Different Mechanisms. The Group Policy Container IS Replicated by Using Active Directory Replication, Whereas The Group Polic y template is replicated using File Replication Service (FRS) The settings from a GPO are only applied when the Group Policy container and Group Policy template are synchronized For additional information on storage of Group Policy information, see Appendix B:.. Group Policy Storage, Later in this paper.migrating gpos across Domains
.
Although the collection of settings in a GPO is logically a single entity, the data for a single GPO is stored in multiple locations and in a variety of formats; some data is contained in Active Directory and other data (of various types) is stored on the Sysvol file share on the domain controllers. This means that copying GPOs is not as simple as taking a directory and copying it from one computer to another.In addition to the complex way in which GPO data is stored, certain policy data may be valid in one domain but be invalid in the domain that the GPO is being copied to. for example, Security Identifiers (SIDs) stored in security policy settings are often domain specific. in addition, Universal Naming Convention (UNC) paths for folder redirection or software Installation Policies May NOT Work Properly if The Data In The GPO is Copied without Modification To a Different Domain.
MIGRATION TABLES
The solution is to modify these references in the GPO that are domain-specific, during the import or copy operation, so that the settings in the destination GPO are written with the appropriate information for the destination domain. GPMC supports this capability using migration tables.
A migration table is a file that maps references to users, groups, computers, and UNC paths in the source GPO to new values in the destination GPO. A migration table consists of one or more mapping entries. Each mapping entry consists of a type, source reference, and destination reference. If you specify a migration table when performing an import or copy, each reference to the source entry will be replaced with the destination entry when writing the settings into the destination GPO.
The migration table will apply to any references in the settings within a GPO, whether you are performing an import or copy operation. In addition, during a copy operation, if you choose the option to preserve the discretionary access control list (DACL) on the GPO, the migration table will also apply to both the DACL on the GPO and the DACLs on any software installation settings in the GPO.Migration tables store the mapping information as XML, and have their own file name extension, .migtable. You can create migration tables using the Migration Table Editor (MTE). The MTE is a convenient tool for viewing and editing migration tables without having to work in, or be familiar with, XML. The MTE is associated with the .migtable extension so that when you double .
GPMC as The Solution for MigRating GPOS
There Are Four Operations That GPMC Provides To Allow for Archival and Recovery of GPOS, AND for Migrating GPOS from One Environment To Another:
· Copy. A copy operation allows you to transfer settings from an existing GPO in Active Directory directly into a new GPO. The new GPO created during the copy operation is given a new GUID and is unlinked. You can use a copy operation to transfer settings to a new GPO in the same domain, another domain in the same forest, or a domain in another forest. Because a copy operation uses an existing GPO in Active Directory as its source, trust is required between the source and destination domains. Copy operations are suited for moving Group Policy between production environments, and for migrating Group Policy that has been tested in a test domain or forest to a production environment, as long as there is trust between the source and destination domains. · Backup. Backing up a GPO Copies the data in the gpo to the file system. The feed function also serves as the export capUpility for gpos. a gpo backup can be used to restore the gpo the the back-up state, or to import the Settings in the backup to another gpo.
· Import. The Import operation transfers settings into an existing GPO in Active Directory using a backed-up GPO in the file system location as its source. Import operations can be used to transfer settings from one GPO to another GPO within the same domain, to a GPO in another domain in the same forest, or to a GPO in a domain in a different forest. The import operation always places the backed-up settings into an existing GPO. It erases any pre-existing settings in the destination GPO. Import does not require trust between the source domain and destination domain. Therefore it is useful for transferring settings across forests and domains that do not have trust. Importing settings into a GPO does not affect its DACL, links on sites domains or organizational units to that GPO, OR A LINK TO A WMI Filter. Restore. Restoring a GPO REDORE. A rest of the folding cans: The gpo was back up but haas s INCE BEEN DELETED, or The GPO is Live and You Want To Roll Back to a Known Previous State.
Each of these Operations Can Be Performed Through The GPMC User Interface, or Through The GPMC Scripting Model.
For More Information, See The Following Resources:
GROUP Policy Administration Using The Group Policy Management Console White Paper. Provides Technical Details of FunctionAlicity In GPMC.
· MIGRATING GPOS Across Domains with gpmc. EXPLAINS HOW to Migrate GPOS from One Domain To Another Using GPMC.
· GPMC Help. Available When You Install GPMC, this Provides Step-by-instructions for GPMC Tasks And Addresses Key Concepts in GPMC.
Scripting Group Policy Tasks
GPMC provides a comprehensive set of COM interfaces for scripting many Group Policy-related operations. The interfaces are documented in the Group Policy Management Console SDK, which is located at% programfiles% / gpmc / scripts / gpmc.chm on any computer where you installed GPMC. (The Group Policy Management Console SDK is only available in English.) When you install GPMC, a set of sample scripts illustrating the use of these interfaces are installed to the% programfiles% / gpmc / scripts directory.
The sample scripts address real-world administrative problems and scenarios. You can perform various tasks such as finding all GPOs in a domain that have duplicate names or generating a list of all GPOs in a domain whose settings are disabled or partially disabled.
Note Scripted Control of Individual Settings Inside A GPO is not provides provid.
Delegating Group Policy
One of the features of Active Directory is its ability to delegate control of portions of the directory service. This section explains how Group Policy fits in with the delegation of sites, domains, and organizational units.
With gpmc, The folowing tasks can be delegated:
Create GPOS in A Domain.
· Set permissions on a gpo.
· Set Policy-Related Permissions on site, Domain or Organizational Unit.
· Link gpos to a giveen site, domain or Organizational unit.
Perform Group Policy Modeling Analysis On A Given Domain Organizational Unit (But Not On A Site).
· Read Group Policy Results Data for Objects in a Given Domain Organizational Unit (But Not On A Site).
Create WMI Filters in A Domain.
· Set Permissions on a WMI Filter.
GPMC simplifies delegation by managing the various ACEs required for a task as a single bundle of permissions for the task. If you want to see the ACL in detail, you can click the Advanced button on the Delegation tab.The underlying mechanism for achieving delegation is the application of the appropriate DACLs to GPOs and other objects in Active Directory. This mechanism is identical to using security groups to filter the application of GPOs to various users, as described earlier in this paper.
You can also specify Group Policy to control the behavior of MMC and MMC snap-ins. For example, you can use Group Policy to manage the rights to create, configure, and use MMC consoles, and to control access to individual snap-ins.
Using security groups to delevrate group policy
The Following Table Lists The Default Security-Permission Settings for A GPO:
GROUPS or User Read With Apply Group Policy Ace.
Note by Default, Administrators, Which Means That The Apply Group Policy Attribute Set. If this is Not Desired, Administrators Have Two Choices:
· Remove Authenticated Users from the list on the security tab of the GPO, and add a new security group with the Apply Group Policy and Read attributes set to Allow. This new group should contain all the users that this Group Policy is intended to affect.
· Set the Apply Group Policy attribute to Deny for the Domain and Enterprise Admins, and possibly the Creator Owner groups. This will prevent the GPO from being applied to members of those groups. Remember that an ACE set to Deny always takes precedence over Allow. Therefore, if a given user is a member of another group that is set to explicitly Allow the Apply Group Policy attribute for this GPO, it will still be denied.Managing Group Policy Links for a Site, Domain, or Organizational Unit
The Group Policy tab in the Properties page for a site, domain, or organizational unit allows the administrator to specify which GPOs are linked to this site, domain, or organizational unit. This property page stores the user's choices in two Active Directory properties called gPLink And gpoptions. The GPLINK Property Contains The prioritized list of gpos and the block policy inheritance setting.
To manage GPO links to a site, domain, or organizational unit, you must have read and write access to the gPLink and gPOptions properties. By default, Domain Admins have this permission for domains and organizational unit, and only Enterprise Admins and Domain Admins of The Forest Root Domain Can Manage Links to Sites.
Active Directory supports security settings on a per-property basis. This means that a non-administrator can be given read and write access to specific properties. In this case, if non-administrators have read and write access to the gPLink and gPOptions properties, They can manage the list of gpos linked to what site, domain, or Organizational unit.
Creating gpos
By default, only Domain Admins, Enterprise Admins, and Group Policy Creator Owners can create new GPOs. Creating GPOs is a user right of the Group Policy Creator Owners (GPCO) group by default but can be delegated to any group or user. There are TWO Methods To Grant a Group or User This Right: · Add The user or group to membership of the group policy creator Owners Group. this Was the Only Method Available Prior To GPMC.
· EXPLICITLY GRANT The Group Or User Permission to create GPOS. This Method Is Newly Available with GPMC.
You can manage this permission using the Delegation tab on the Group Policy Objects container for a given domain in GPMC. This tab shows the groups that have permission to create GPOs in the domain, including the GPCO group. From this tab, you can modify the MEMBERSHIP OF EXISTING GROUPS with this permission, or add new groups.
The ability to grant users permissions to create GPOs without using GPCO was added to facilitate the delegation of GPO creation to users outside the domain. Because the Group Policy Creator Owners group is a domain global group, it can not contain members from outside the domain. Thus Prior to GPMC, this Task Could Not Be delegated to members outside the domain.
It is recommended that for users and groups within the domain, you continue to use the GPCO group to grant them GPO creation rights. If you require that users outside the domain have the ability to create GPOs, then create a new domain local group in the Domain ("GPCO - External"), Grant That Group GPO CRETION Rights in The Domain, and the Andd External Domain Users to That Group.
Adding a user to the membership of GPCO, or granting the user GPO creation permissions directly using the new method available in GPMC, is identical in terms of permissions. Users have the ability to create GPOs in the domain, but do not have permissions on GPOs created by other users. For example, granting a user the ability to create GPOs in the domain does not give the user the ability to edit or delete existing GPOs, or the ability to link the GPO to a site, domain or organizational unit.Note that when an administrator creates a GPO, the Domain Admins group becomes the Creator Owner of the GPO. The ability to link GPOs to a site, domain or organizational unit is a permission that is specific to that site, domain or organizational unit. When delegating To Non-Administrators, You Should Also Consider Delegating The Ability To Manage The Links for a Specific Organizational Unit. The Reason is this by default, non-administrators cannot management links.
In GPMC, this permission can be managed using the Delegation tab on the site, domain or organizational unit when you click the Link GPOs option in the permission drop-down list box. At the individual permission level in Active Directory, this allows Read and Write Access to the gplink and gpoptions attributes on the site, domain, or Organizational unit. by Default, ONLY DOMAIN Admins and Enterprise Admins Have this Permission.
Editing Group Policy Objects
To Edit A GPO, The User Must Have Both Read and Write Access To The GPO. (However, Read-Only Support for Opening A GPO IS Provided in GPMC). To Edit A GPO, The User Must Be One of the Following:
· An administrator.
· A creator owner.
· A user with delegated access to the GPO. That is, an administrator, or the Creator Owner, must have provided to this user both read and write access to the GPO.By default, Domain Admins, Enterprise Admins, the operating system, and The apply group policy attribute.
Delegating an Individual GPO
..................... ..
Option in GPMC User Interface
Corresponding NT Permission in ACL Editor
Reta
Allow Read Access on The GPO
Edit Settings
Allow read, Write, Create Child Objects, And delete Child Objects.
Edit, Delete, And Modify Security Security
Allow Read, Write, Create Child Objects, Delete Child Objects, Delete, Modify Permissions, and Modify Owner. This essentially grants full control on the GPO, except that the Apply Group Policy permission is not set.
READ (from security filtering)
..........................
Custom
................................... ...CRIPLILE, INFORMATION STRUT (NATURAL SCIENCE.
Permissions on a GPO Are Managed from The Delegation Tab of That GPO.
Specifying Group Policy to Control The Behavior of MMC EXTENSIONS
Windows Server 2003 Group Policy Include SEVERAL Policy Settings Designed to Control The Behavior of MMC Snap-Ins. For Example, You CAN Use Group Policy to Manage The Rights To Use MMC Snap-INS.
Restricting Access to a List of Permitted Snap-insAdministrators can specify which MMC snap-ins may be run by the affected user and which may not. This may be specified to be inclusive, which only allows a set of snap-ins to run, or IT May Be set as Exclusive, Which Does Not Allow A Set of Snap-ins to Run.
To create a list of permitted snap-ins for users, enable the Restrict users to the explicitly permitted list of snap-ins policy. When this policy is enabled, only permitted snap-ins can be run. If this policy is disabled or not configured All Snap-Ins Are Permitted, Except Those You Explicitly Prohibit.
...........................
Controlling Access to A Snap-in
To restrict or explicitly permit access to a particular snap-in, navigate to User Configuration / Administrative Templates / Windows Components / Microsoft Management Console / Restricted / Permitted snap-ins / Group Policy in the console tree. In the details pane, double-click the snap-in that you want to permit or restrict, and then select an option. for more information on these policy settings, select a policy setting, and view the description in the Web view or click the explain tab in the Properties dialog box for The Policy Setting.
Administrators can enable the Restrict the user from entering author mode policy in order to prevent users from using MMC in author mode. This policy is available in the Group Policy console under the User Configuration / Administrative Templates / Windows Components / Microsoft Management Console node.
Creating Custom Group Policy Object Editor Consoles
You can create custom Group Policy MMC consoles (.msc files), which include only a subset of the Group Policy Object Editor extensions. You can combine this with the use of the policy settings above to provide a customized tool. For example, you could create a custom Group Policy console that includes only the Security Settings extension. This allows you to define Group Policy settings in a modular fashion.To set access permissions, use the Security tab on the Properties page of the selected GPO. These permissions allow or deny Specified groups access to the gpo.
Group policy extension Snap-INS
The Group Policy extension snap-ins constitute the main nodes in the Group Policy Object Editor namespace;. They are all loaded by default when the Group Policy Object Editor is started You can modify which extensions are loaded by creating custom consoles for Group Policy, and .............................
This Section Presents Additional Information On The Following Topics:
· Administrative Templates
· Security settings
Software Installation
Scripts (Startup / Shutdown and Logon / Logoff)
· Folder Redirection
· Internet Explorer Maintenance
Remote Installation Services
Administrative Templates
Administrative templates, (or .adm files), enable administrators to control registry settings using Group Policy. Windows comes with a predefined set of Administrative template files, which are implemented as text files (with an .adm extension), that define the registry settings that can be configured in a GPO These .adm files are stored in two locations by default:. inside GPOs in the Sysvol folder and in the% windir% / inf directory on the local computer.As new versions of Windows are released, new policy settings are added. in addition to supporting these new settings, each successive version of Windows supports all registry policy settings that were available in earlier versions of Windows. For example, the Windows Server 2003 family supports all registry policy settings available in Windows 2000 and Windows XP.
Note that .adm files are Unicode files which consist of a hierarchy of categories and subcategories that define how the options are displayed through the Group Policy Object Editor and GPMC. They also indicate the registry locations where changes should be made if a particular selection is made SPECIFY Any Options Or Restrictions (in Values) That Are Associated with the selection, and in some case, indeet..................
It is important to understand that .adm files are not the actual settings that are deployed to client operating systems. The adm file is simply a template file that provides the friendly name for the setting and an explanation. This template file is used to populate the user interface. The settings that are deployed to clients are contained in the registry.pol file inside the GPO. On Windows XP and Windows Server 2003, each registry setting contains a "Supported on" tag that indicates which operating system versions support that policy setting . If a setting is specified and deployed to a client operating system that does not support that setting, the settings are ignored.Because all successive iterations of .adm files include settings from earlier versions, and because there is no harm if a new setting is Applied INADVERTENTLY TO A Computer Running An Earlier Operating System That Does Not Support That Setting, It Is Recommended To Always Create and Edit GPOS from a Computer That Has T .
Windows Server 2003 includes the following .adm files: System.adm, Inetres.adm, Conf.adm, Wmplayer.adm, and Wuau.adm, which contain all the settings initially displayed in the Administrative Templates node.
.Adm file Contains For Use on Description System.adm Settings to configure the Operating System Windows 2000 or Windows Server 2003 Loaded by default. Inetres.adm Settings to configure Internet Explorer Windows 2000 or Windows Server 2003 Loaded by default. Conf.adm Settings to configure NetMeeting v3 Windows 2000 or Windows Server 2003. Note:.. This tool is not available on Windows XP 64-bit Edition and the 64-bit versions of the Windows Server 2003 family Loaded by default Wmplayer.adm Settings to configure Windows Media Player Windows XP, Windows Server 2003. Note: This tool is not available on Windows XP 64-bit Edition and the 64-bit versions of the Windows Server 2003 family Loaded by default Wuau.adm Settings to configure Windows Update Windows 2000 SP3,.. Windows XP SP1, Windows Server 2003 Loaded by Default.Handling .adm Files in Group Policy Object Editor
· Windows Server 2003, Group Policy Object Editor uses .adm files to display available registry-based policy settings in the Administrative Templates section of a GPO. This includes Group Policy for the Windows Server 2003 operating system and its components and for applications.
· By default it attempts to read .adm files from the GPO (from the Sysvol on the domain controller). Alternatively, the .adm file can be read from the local workstation computer. This behavior can be controlled by a policy setting.
· By default, if the version of the .adm file found on the local computer is newer (based on the time stamp of the file) than the version on the Sysvol, the local version is copied to the Sysvol and is then used to display The settings. This Behavior Can Be Controlled By a policy setting.
· If the GPO contains registry settings for which there is no corresponding .adm file, these settings can not be seen in the Group Policy Object Editor. However, the policy settings are still active and will be applied to users or computers targeted by the GPO. · Policy settings pertaining to a user who logs on to a given workstation or server are written to the User portion of the registry database under HKEY_CURRENT_USER. Computer-specific settings are written to the Local Machine portion of the registry under HKEY_LOCAL_MACHINE.
Handling .adm files in GPMC
· GPMC Uses .adm files to display the friendly names of policy settings Whenrating HTML Reports for GPOS, Group Policy Modeling, And Group Policy Results.
· By Default, GPMC Uses the local .adm file, regardless of time stamp. If the file is not found, The GPMC Will Look in the GPO's Directory on sysvol.
· The User CAN Specify An Alternate Path for Where To Find, This Takes Precedency Over The Previous Locations.
· GPMC Never Copies the .adm file to the sysvol.
For more information, see recommendations for managing group policy administrative template (.adm) files at http://support.microsoft.com/default.aspx?scid=kb;n-us;816662.
Using Administrative Templates
For Administrative Templates policy settings, the Group Policy Object Editor provides explain text directly in the Web view of the console. You also can find this explain text by double-clicking the policy setting and then clicking the Explain text tab. In either case, this TEXT Shows Operating System Requirements, Defines The Policy Setting, And Includes Any Specific Detting The Policy Setting.New Policy Settings
Windows Server 2003 Includes More 200 New Policy Settings. The New Windows Server 2003 Policy Settings Allow Administrators to Control The Behavior of:
System Restore, Error Reporting, PC Health.
Terminal Server.
· Networking Such As SNMP, QoS, Personal Firewall, And Dialup Connections.
· DNS AND NET LOGON.
ROAMING User Profiles and Group Policy.
· Control panel.
To filter settings based on the "supported on" Information: Open the group policy Object Editor, Click View, and the Click Filtering. Select The Versions You Want To Show and Click OK.
Note: Showing only policy settings that can be fully managed is the default setting You can also show policy settings by supported-on information and show only configured policy settings In Windows Server 2003, the command Only show configured policy settings is now contained in.. The Filtering Dialog Box, Shown Above.
True Policy Settings Compared with Group Policy Preferences
In Windows 2000 and Later, All Shipping Policy Set Registry Keys and Values in One of the Following Locations:
· HKLM / Software / Policies (Preferred location).
· HKLM / Software / Microsoft / Windows / CurrentVersion / Policies.
· HKCU / Software / Policies (preferred location). HKCU / Software / Microsoft / Windows / CurrentVersion / Policies.
Policy Settings That Are Stored In There Spectings The registry area. Storing settings here Has The Following Advantages:
· THESE TREES Are Secure and Cannot Be Modified by a Non-Administrator.
· When Group Policy Changes, for Any Reason, The New Policy Settings Are The The New Policy.
This prevents the behavior that was often present in Windows NT 4.0, whereby System Policies resulted in persistent settings in the user and computer registry. The policy remained in effect until the value was reversed, either by a counteracting policy or by editing the registry. These Settings are Stored Outside the approved Registry Locations Above and Are Known as preferences.
All the policy settings in the System.adm, Inetres.adm, Conf.adm, Wmplayer, adm, and Wuau.adm files use registry settings in the Policies trees of the registry. This means that they will not cause persistent settings in the registry When the GPO That Applies The NO LONGER IN Effect.
By Default, ONLY TRUE Policy Settings Are Displayed in The Group Policy Object Editor. The Following .adm Files Are Loaded:
· System.adm: Contains Operating System Settings
· Inets.adm: Contains Internet Explorer Restrictions
Conf.adm: Contains Netmeeting Settings
· WMPLAYER, ADM: Contains Windows Media Player Settings
· Wuau.adm: Contains Windows Update Settings
Note Because of the persistent nature of non-policy settings, they should be avoided.It is still possible for administrators to add an additional .adm file that sets registry values outside of the Group Policy trees mentioned previously. These settings might be more appropriately referred to as preferences because the user, application, or other parts of the system can also change them. in this case, the administrator is ensuring that this registry key or value is set in a particular way. Although it is possible to add any .adm file to the namespace, if you use an .adm file from a previous version of Windows, the registry keys are unlikely to have an effect; or they actually set preference settings and mark the registry with these settings; that is, the registry settings persist .CREATING CUSTOM .ADM FILES
It is possible to create new .adm files. For example when an application adds Group Policy support, a new .adm file may be necessary to describe the location of the appropriate registry keys and the UI exposed by the Group Policy Object Editor. Through the GROUP Policy Object Editor, The Administrator Can Optionally Add in Additional .adm files to the gpo which, by default, Will the be copied to the domain controller INTO The GPO DIRECTORY.
To View Custom .adm Files in The Group Policy Object Editor:
Right Click Any Administrative Template Node, Select View and the Click Filtering. In The Filtering Dialog Box, Clear The CHECK BOX for Only Show Policy Settings That Can Be Fully Managed and Click OK.
Viewing Group Policy Preferences
By default only the settings that are contained in the genuine Group Policy trees (the trees that correspond to the reserved Group Policy registry areas) are visible in the console.To eliminate use of non-policies, you can enable the policy setting, Enforce Show Policies Only, Available IN User Configuration / Administrative Templates, Under The System / Group Policy Nodes.
If you enable this setting, the Show Policies Only command is turned on, and administrators can not turn it off As a result, Group Policy displays only true settings;.. Preferences do not appear If you disable this setting or do not configure it, the SHOW Policies Only Command IS Turned on by Default, But Administrators Can View Preferences by Turning Off The show policies online.
In group policy, preferences are indeed by a red icon to distinguish the from True Policy Settings, Which Are Indicated By a blue icon.
Impact of GPO Replication
By default, when you add a new domain to the console, GPMC uses the PDC emulator in that domain to help ensure that all administrators are using the same domain controller. For managing sites, GPMC uses the PDC emulator in the user's domain by default. you can change the default choice of domain controller using the Change Domain Controller dialog box in GPMC. If you are located at a remote site with a slow connection to the default domain controller, you may want to do this.
It is important for administrators to consider the choice of domain controller in order to avoid replication conflicts particularly because both Active Directory and FRS use multi-master replication. This is especially important to consider because GPO data resides in both Active Directory and on Sysvol, and two independent replication mechanisms must be used to replicate GPO data to the various domain controllers in the domain. If two administrators are simultaneously editing the same GPO on different domain controllers, it is possible for the changes written by one administrator to be overwritten by another administrator , Depending on Replication Latency.Important
IF Multiple Administrators Manage A Common GPO, IT IS Recommended That ADMINISTRATORS Use The Same Domain Controller When Editing a Particular GPO, To Avoid Collisions In FRS.
Because the Group Policy template is replicated to all domain controllers, the size of the .adm files can have an impact on network bandwidth, particularly where domain controllers are separated by slow links.
Security settings
You can define a security configuration within a GPO. A security configuration consists of settings applied to one or more security areas supported on Windows 2000 Professional, Windows XP Professional or Windows Server 2003. The specified security configuration is then applied to computers as part of the Group policy application.
The Security Settings extension of the Group Policy Object Editor complements existing system security tools such as the Security tab on the Properties page (of an object, file, directory, and so on), and Local Users and Groups in Computer Management. You can continue To Use existing tools to change specific settings, WHENEVER Necessary.the Security Areas That Can Be configured for Computers include The Following:
· Account Policies. These is Computer Security, Lockout Policy, And Kerberos Policy In Domains on Windows 2000 and Windows Server 2003.
· Local Policies. These include security settings for audit policy, user rights assignment, and security options. Local policy allows you to configure who has local or network access to the computer and whether or how local events are audited.
· Event log. This Controls Security Settings for the application, security, and system event logs. You can access these logs using the event viewer.
· Restricted Groups. This allows you to control who should and should not belong to a restricted group, as well as which groups a restricted group should belong to. This allows administrators to enforce security policy settings regarding sensitive groups, such as Administrators or Payroll. for example, it may be decided that only Joe and Mary should be members of the Administrators group. Restricted groups can be used to enforce that policy. If a third user is added to the group (for example, to accomplish some task in an emergency Situation), The Next Time Policy Is Enforced, That Third User is Automatic Removed from the Administrators Group.
· System Services. These control startup mode and security options (security descriptors) for system services such as network services, file and print services, telephone and fax services, Internet and intranet services, and so on. · Registry. This is used to configure security settings for registry keys including access control, audit, and ownership. When you apply security on registry keys, the Security Settings extension follows the same inheritance model as that used for all tree-structured hierarchies in Windows 2000 and Windows Server 2003 (such as Active Directory and NTFS). Microsoft recommends that you use the inheritance capabilities to specify security only at top-level objects, and redefine security only for those child objects that require it. This approach greatly simplifies your security structure and reduces the administrative overhead that results From a nesedless mix access-control structure.
File System. This is buy to configure security settings for file-system objects, incruding access control, audit, and ignerstad.
Public Key Policies. You Use these settings TO:
· Specify That Computers Automatically Submit a Certificate Request to an Enterprise Certification Authority and Install The Issued Certificate.
· Create and distribute a certificate trust list.
· Establish Common Trusted Root Certification Authorities.
Add Encrypted Data Recovery Agents and change the Encrypted Data Recovery Policy Settings.
· IP Security Policies on Active Directory. IP Security (IPSec) policy can be applied to the GPO of an Active Directory object. This propagates that IPSec policy to any computer accounts affected by that GPO.
· Wireless Networking. This lets you configure wireless network settings that are part of Group Policy for Computer Configuration. Wireless network settings include the list of preferred networks, WEP settings, and IEEE 802.1X settings. These settings are downloaded to targeted domain members, making it much easier to deploy a specific configuration for secure wireless connections to wireless client computers. · Software Restriction Policies. This lets you protect your computer environment from untrusted code by identifying and specifying which applications are allowed to run. With software restriction policies, you can :
· Control the ability of programs to run on your system. For example, if you are concerned about users receiving viruses through e-mail, you can apply a policy setting that does not allow certain file types to run in the e-mail attachment directory Of your e-mail program.
· Permit users to run only specific files on multi-user computers. For example, if you have multiple users on your computers, you can set up software restriction policy settings in such a way that users do not have access to any software but those specific FILES THAT ARE Necessary for their work.
· Decide Who Can Add Trusted Publishers to your Computer.
· Control WHether Software Restriction Policy Settings Affect All Uses OR Just Certain Users on a computer.
· Prevent any files from running on your local computer, organizational unit, site, or domain. For example, if your system has a known virus, you can use software restriction policy settings to stop a computer from opening the file that contains the virus.
Note Software restriction policy settings should not be used as a replacement for antivirus software. · You can configure security settings policies in Computer Configuration / Windows Settings / Security Settings in the Group Policy Object Editor.
Default Security Templates
Windows 2000 and Windows Server 2003 include three default security templates called Basic. These new default security settings are applied to Windows 2000 or Windows Server 2003 systems that have been installed onto an NTFS partition. When Windows 2000 or Windows Server 2003 is installed onto a FAT File System, Security Cannot Be Applied.
The Following Basic Security Templates Are Used:
· Basicwk.inf for workstations.
· Basicsv.inf for member servers.
· BasicDc.inf for domain controller.
The Basic security templates specify default Windows 2000 or Windows Server 2003 security settings for all security areas, with the exception of User Rights and Groups. These templates can be applied to Windows 2000 or Windows Server 2003 systems using the Security Configuration and Analysis MMC snap- IN or by using the selfduc.exe command-line tool.
Incremental Security Templates
Windows 2000 and Windows Server 2003 include several incremental security templates. By default, these templates are stored in% systemroot% / Security / Templates. These predefined templates can be customized using the Security Templates MMC snap-in and can be imported into the Security Settings Extension of the group policy object editor.
These security templates were constructed based on the assumption that they would be applied to computers running Windows 2000 or later and that are configured with Windows 2000 or later default security settings. In other words, these templates incrementally modify the default security settings. They do not Include The Default Security Settings Plus The Modifications.The Following Table Lists The Incremental Security Templates Included in Windows 2000 And Windows Server 2003.
Security Configuration Computer Templates Description Compatible Workstation, and server Compatws.inf For customers who do not want their users to run as Power Users (by default all users are Power Users on Windows 2000 Professional and Windows XP Professional), the Compatible configuration opens up the default permissions for the Users group so that legacy applications are more likely to run. for example, Office 97 should run successfully when users are logged on as a User to a computer running Windows 2000, Windows XP, or Windows Server 2003 that has had the Compatible security template applied over the default settings. Note that is not considered a secure environment. Secure Workstation, server, and domain controller Securews.inf and Securedc.inf The Secure configuration provides increased security for areas of the operating system that are not covered this By permissions. this incrudes increased security settings for account policy, auditing, and so me well-known security-relevant registry keys. Access control lists are not modified by the secure configurations because the secure configurations assume that default Windows 2000, Windows XP, or Windows Server 2003 security settings are in effect.
Highly Secure Workstation, server, and domain controller Hisecws.inf and Hisecdc.inf The Highly Secure configuration is provided for Windows 2000, Windows XP, or Windows Server 2003-based computers that operate in native (or pure) Windows 2000 or Windows Server 2003 environments only. In this configuration, it is required that all network communications be digitally signed and encrypted at a level that can only be provided by Windows 2000 or later. Thus, a Windows 2000 highly secure computer can not communicate with a client running Windows 95, Windows 98, or Windows NT.For information on the default security settings contained in the default Domain Policy GPO and default Domain Controller Policy GPO, see Appendix A: Security Settings and User Rights later in this paper.
Using Software Installation and Maintenance
You can use the software installation and maintenance feature to install software applications at computer startup, user logon, or on demand. You can also use this feature to upgrade deployed applications, remove earlier applications that are no longer required, and deploy service packs and operating System Upgrades. They Can Ensure That a Person Cannot Install Any Software from Local Media, Such As a CD-ROM or disk.
This Feature Also Provides for the Following Situations:
· IF Users INADVERTLY Delete Files from an Application IT Will Repair Itself.
· IF Users Move from One Computer To Another Their Software Will Always Be Available To Them.
· IF Users do not have an application installed on their computer and the try to open a document associated with That Application, The Application Will Automatically Be Installed and The Document Will Open.
Deploying software through Group Policy requires applications to use the Windows Installer service, which provides much more than just the capability to install applications. It also protects the integrity of the application against inadvertent mishaps with local files. For example, if a user attempted to use a copy of Microsoft Word that was missing some essential files, the Windows Installer service would reinstall the files from the install point, the next time that the application is launched.In addition, Windows Installer-based applications that are deployed using Group Policy can install With elevated privileges, meaning users don't have to be administratrs on their local machine, as a network administrator, want the to have.
Application repair follows the same logic as on-demand installation Whenever an application authored by Windows Installer is invoked, the Windows Installer service checks to ensure that the appropriate files are available;. If required, files or settings are repaired automatically.
You use Group Policy to define software installation options that specify which applications are to be deployed, upgraded, or removed from a computer. You can apply software installation policies to groups of users or to groups of computers, depending on your organization's needs. There are Two methods by Which You can install Applications on Users' Computers: Assigning and Publishing.
Assigning Applications
You can assign applications to either a user or a computer using Group Policy. When you assign applications to a computer, the application is automatically installed the next time the computer is started. When you assign applications to a user with Group Policy, the administrator can choose to either have the application installed on-demand when the user selects the application or in-full when the user next logs on: · On Demand If the application is installed on demand, the user's computer is set up with a Start menu shortcut. , and the appropriate file associations are created in the registry. to the user, it looks and feels as if the application is already present. However, the application is not fully installed until the user needs the application. When the user attempts to open the Application OR a File Associated with That Application, Windows Installer Checks To make Sure That All The Files and Parameters of the Application Arefut for the application to prot @ @ e. if They is not present, Windows Installer RetrieveS and Installs The Application Opens.
· Full Install. The full-install option is useful for specific groups of users such as frequent travelers who might require all available applications to be fully installed before they travel. With full install, a user's applications are installed at logon.
Assigning Applications Makes Them Resilient - The User Does; for Example, IF The User Removes An Application, It Will Automatical BE Reinstalled On Demand.
Publishing Applications
When you publish an application, it appears in Add or Remove Programs in Control Panel. Users can choose to install published applications. Installation can also be configured to occur automatically when a user attempts to open a file that requires a specific published application. You publish applications when the software is not absolutely necessary for users to perform their jobs.In order to obtain the full benefits of publishing technology, all published applications should be authored to install using the Windows Installer service. Although you can still publish non-Windows Installer service Applications Using .zap Files, You Won't get the benefited ytled privileges as expenever
.
For more information, see the "Software Installation and Maintenance" white paper at http://www.microsoft.com/windows2000/library/operations/management/siamwp.asp and the Step-by-Step Guide to Software Installation and Maintenance at Http://www.microsoft.com/windows2000/techinfo/planning/management/swinstall.asp.
Scripts
With the Scripts extensions, you can assign scripts to run when the computer starts or shuts down or when users log on or off their computers. For this purpose, you can use Windows Script Host to include both Visual Basic? Scripting Edition (VBScript) and JScript? Development software Script Types.
Windows 2000 and later include Windows Script Host, a language-independent scripting host for 32-bit Windows platforms. For more information about Windows Script Host, see the Microsoft Windows Script Web site at http://www.microsoft.com/scripting. .................... ..
Types of scripts
The Five Script Types Are As Follows:
· Group Policy Logon Scripts.
· Group Policy logoff scripts.
GROUP Policy Startup Scripts.
· Group Policy Shutdown Scripts.
· Legacy logon scripts (those specified on the User object). This includes support for Windows Script Host scripts. Windows Script Host supports scripts written in VBScript or JavaScript. This means that you can now enter a command line like sample.vbs in the logon Script path of the user object.
Note Windows XP Professional, Windows 2000, and the Windows 98-based clients will properly run .vbs and .js scripts. To run .vbs and .js scripts on Windows NT 4.0 and Windows 95 clients, you must embed the scripts in batch ( . Bat) Files. The Scripts Continue to Run in a Normal window. There is a policy trip....................
Specifying Policy Settings for Script Behavior
The Following Table Lists The Group Policy Options That Are Available To Control The Behavior of Scripts.
Policy in Computer Configuration / Administrative Templates / System / Logon Description Run logon scripts synchronously When this option is enabled, the system waits until the script finishes running before it starts Windows Explorer. Note that an equivalent option for this is available under the User Configuration node . The policy setting you specify in the Computer Configuration node has precedence over that set in the User Configuration node. Run startup scripts asynchronously By default, startup scripts run synchronously and hidden, which means the user can not logon until the scripts complete. in some corporations , the administrator might want the scripts to run asynchronously since they could take a long time to complete. This policy allows the administrator to change the default behavior. Run startup scripts visible If this option is enabled, startup scripts run in a command window. Run SHUTDOWN Scripts Visible IF this Option IS Enabled, Shutdown Scripts Run in A Command window. Maximum wait time for Group Policy scripts This policy setting lets you change the default script time out period. (By default, scripts will time-out after 600 seconds). The range is 0 to 32000 seconds.Policy in User Configuration / Administrative Templates / System / Logon / Logoff
Description Run logon scripts synchronously When you enable this option, Windows waits for the scripts to finish running before it starts Windows Explorer. Note that an equivalent option for this is available under the Computer Configuration node. The policy setting you specify in the Computer Configuration node has precedence over that set in the User Configuration node. Run legacy logon scripts hidden If this option is enabled, legacy logon scripts will run in hidden mode. Run logon scripts visible If this option is enabled, logon scripts run in a command window. Run logoff scripts visible If this option is enabled, logoff scripts run in a command window.Note:. scripts that run hidden (and to a lesser degree minimized) can cause an errant script or one that prompts for user input to wait for 600 seconds This Is The Default Wait-Time Value and May Be Changd Using A Group Policy. During this time, The System Appears To Be Hung Up. in The Case of A Script Running In A Minimized W- W, IF the user selects the window, its processing can be stopped.
Best Practice: For easier manageability, it is a good idea to use Group Policy scripts and to avoid using legacy logon scripts, if at all possible Rather than using a single monolithic script with lots of internal logic branching, Group Policy-based logon scripts. Allow for use of tiered and modular scripts targeted to the desired set of users.
Folder Redirection
The Folder Redirection Extension IS Used To Redirect Any of The Following Special Folders in a User Profile To An Alternate Location:
Application Data
· Desktop
· My Documents
· My Pictures
· Start Menu
For example, you could redirect a user's My Documents directory to // Server / Share /% username% By redirecting the My Documents directory, you can provide the following advantages:. · Ensure that users' documents are available when they roam from one computer To another.
· Reduce the time it takes to log on to and log off from the network. The My Documents folder is part of the Roaming User Profile (RUP), which means that the My Documents folder and its contents are copied back and forth between the client COG OTER AND LOG OFF. Relocating the My Documents Folder Outside of the user profile can sign.
· Store User Data on The Network (Rather Than on The Local Computer). The data can the be managed and protected by the information technology.
Make Users' NetWork-Based My Documents Folder Available to Users When Are Disconnected from The Corporate Network by Using Offline Folder Technologies.
Folder Redirection Improvements for Windows XP and Windows Server 2003
This Section Provides Information on The Differences Between Windows 2000 and Windows Server 2003.
User Interface Changes
The Folder Redirection user interface has been simplified for Windows Server 2003. The main goals of these changes were to simplify the use of Folder Redirection by removing the requirement that administrators be familiar with environment variables such as% USERNAME%.
In Addition to the Simplified Ui, Several New Redirection Options Have Been Added:
· Create a directory for each user under the root path. Rather than having to enter a UNC path such as // server / share /% username% / MyDocuments, the administrator can simply type in the path to the file share such as // server / share, and Folder Redirection will automatically append the username and the directory name when the policy is applied. This removes the need for administrators to be familiar with environment variables, and minimizes the chances of errors and spelling mistakes. · Redirect to home directory (My Documents only). Windows Server 2003 and Windows XP allow you to redirect a user's My Documents folder to their home directory. This option is intended only for organizations that have a legacy deployment of home directories and want to transition users to the My Documents Metaphor While MAINTAING COMPATIBILITY WIRER EXISTING HOULD INLY SELECT This Option IF you have already deployed home directories in Your Organization.
· Folder Redirection Treats Redirection to the Home Directory as a Special Case and Certain Checks Are Skipped:
· Redirection to the home directory is onfire supported on window Windows XP and Windows Server 2003 Computers. Redirection to the Home Directory Policy Will Fail To Apply on Windows 2000 Compute.
· No security check is performed and no setting of access permissions is done. The administrator must set restrictive permissions on the directory to ensure that proper access is granted. The Grant the user exclusive rights to My Documents check box on the settings page of the property Sheet is disabled.
· No ownership checks are made. Normally folder redirection will fail if a user is not the owner of the directory they are being redirected to. Because redirection to the home directory is intended for use in a legacy environment, this ownership check is skipped. · Users must have the home folder property correctly set on their user object. The folder redirection client side extension retrieves the actual path for the user's home directory from the user object at logon time. Users affected by Folder Redirection Policy must have this path correctly set or Folder Redirection Will NOT APPLY.
· Redirect to a specific path. This option is intended to allow an administrator to redirect folders to an alternate local drive / partition, or to enter unusual configurations not anticipated by the new user interface. Functionally it works in exactly the same way as the Windows 2000 Folder Redirection User Interface.
· Redirect to the local user profile This option is intended to allow an administrator to redirect the selected folder to the default location in the local user profile, for example:..% Userprofile% /
My Pictures no longer shown in the Folder Redirection NodeTo simplify the user interface and to help support the best practice that the My Pictures folder should always follow the My Documents folder, the My Pictures folder is not shown in the Folder Redirection node for new GPO's. IF you have previously redirected the my pictures folder separately, The My Pictures Node Will STILL APPEAR.
Redirected Folders Automatic or Made Available Offline
By default in Windows XP and Windows Server 2003, any redirected shell folders such as My Documents, Desktop, Start Menu, and Application Data are automatically made available offline. This is in contrast to Windows 2000, which required administrators to configure the "Administratively assigned offline files "policy setting to ensure all files in the redirected folders were always available offline. This setting was difficult to use with advanced folder redirection, and involved extra administrative overhead.
The default behavior can be overridden by enabling the Do not automatically make redirected folders available offline policy. This setting can be found in the Group Policy Object Editor in the User Configuration / Administrative Templates / Network / Offline Files section.
Note That on Windows Server 2003 Offline Files Are Disabled by Default.
"User Data and settings management" at http://www.microsoft.com/grouppolicy.
Internet Explorer Maintenance
The Internet Explorer Maintenance Extension Snap-in Includes Policy Settings To Manage The Following:
· Browser User Interface. You use these options to customize the browser's appearance. For example, you can specify settings for the browser title bar, toolbar button options, and so on. · Connection Settings. You can preset and manage the connection settings, such AS LOCAL AREA NETWORK (LAN) and Dial-Up Options.
Custom Urls. You Can Specify Which Urls Are Displayed by The Browser, for Example, For The Home Page, Those on The Favorites List, And for The Search Page.
. · Security You can preset security settings such as security zones, content ratings, and Authenticode (A browser can be configured to allow only signed code to be downloaded Authenticode is the Microsoft version of object signing;.. It provides a basis for verifying the Origin and Integrity of An Object, As Well As Links To Policies of a Certification Authority.
................... ..
Exporting Internet Explorer Settings for Earlier Clients
Administrators can export Internet Explorer policy settings into an auto-configuration package (an .ins file and its associated .cab files) to be used to apply these settings to Windows 95, Windows 98, and Windows NT 4.0 clients. The exported packages are auto -configuration packages. Before the original Group Policy Object Editor was created in Windows 2000, Internet Explorer settings were applied to Internet Explorer clients using auto-configuration packages after Internet Explorer installation. Using GPOs is the preferred method of applying Internet Explorer policy settings on clients Running Windows 2000 or Later, Although Windows 2000 And Windows Server 2003 Support Auto-Configuration Packages.Managing Internet Explorer Maintenance Advanced Settings
You can manage advanced settings for Internet Explorer such as setting a size limit for users' Temporary Internet files. In order to do this, you need to first enable Preference Mode for Internet Explorer Maintenance. By default, the Preference Mode option is hidden. You Access this option by Right-Clicking Internet Explorer Maintenance Node and Selecting Preference Mode on The Shortcut Menu.
This adds an Advanced node to the results pane. This node contains settings for managing Temporary Internet files and other UI features. Note that switching to Preference Mode disables some of the Internet Explorer Maintenance nodes. If a setting name has Preference Mode appended to it, it can be used in that mode; otherwise, it means that setting is disabled For example, the Connection Settings (Preference Mode) option under the Connection node can be used in Preference Mode as indicated by its labeling in the UI, whereas the User. Agent String option (note the exclusion of Preference Mode) can not be used in Preference Mode and this is reflected in its labeling.For more information, see this Microsoft Knowledge Base article, How to Set Advanced Settings in Internet Explorer by Using Group Policy Objects.
Using Internet Explorer Customization Wizard and Internet Explorer Profile Manager
Besides the Internet Explorer Maintenance Group Policy options mentioned above, it is also possible to customize Internet Explorer before deployment and to manage Internet Explorer on other operating systems by using the Internet Explorer Administration Kit (IEAK) at http://www.microsoft.com / Windows/ieak/default.asp.these Tools Provide Options for System Policies and Restrictions That Administrators Can Use to Specify Desktop, Shell, And Security Settings, for Example.
Remote Installation Services
Remote Installation Services is an optional component that is included in the Windows Server operating system and works with other Windows Server 2003 technologies to implement the Remote Operating System Installation feature. Administrators use Remote Operating System Installation to remotely install a copy of the Windows XP Professional operating system on supported computers. (Computers that are PC98-compliant ship with a PXE Remote Boot ROM.) Administrators use the Remote Installation Services extension of Group Policy to specify which options are presented to users by the Client Installation Wizard, for example, Automatic Setup , Custom Setup, and Restart Setup.Client computers that are enabled with Pre-boot Execution Environment (PXE) remote-boot technology access the RIS server to install the operating system, and then the Remote Installation Services server checks for Group Policy that affects remote Installation options defined for the user. The Boot Information NEGOTITION LA yer (BINL) service running on the RIS server performs this work. It impersonates the user who logs on to the RIS client-side pre-boot user interface, and evaluates the GPOs to determine the resulting policy. Based on the resulting policy, it DETERMINES which screens to send to the pre-boot risclient code for display to the user.
Group Policy Modeling and Results
Introduction
Group Policy Modeling and Group Policy Results is a feature of Group Policy that makes implementation, troubleshooting, and planning of Group Policy easier. When multiple GPOs apply to a given user or computer, they can contain conflicting policy settings. For most policy settings, the final value of the policy setting is set only by the highest precedence GPO that contains that setting. Group Policy Modeling and Group Policy Results uses the Resultant Set of Policy (RSoP) infrastructure, available on Windows XP and Windows Server 2003, to present the final SET OF Policy That Is Applied AS Well AS Settings That Did NOT APPLY ASPECIFICLY, RSOP Helps You Determine The FOLLOWING:
· The final value of the setting this applied as a result of all the gpos.
· The final GPO That The Value of this Setting (Also Known As The Winning GPO).
.............................. ...Claizestebiz.cn.
Group Policy Results
This represents the actual policy data that is applied to a given computer and user. It is obtained by querying the target computer and retrieving the RSoP data that was applied to that computer. The Group Policy Results capability is provided by the client operating system and requires Windows XP, Windows Server 2003 or Later. Outside of GPMC, Group Policy Results Is Referred To As Rsop - Logging Mode.
Group policy model
This is a simulation of what would happen under circumstances specified by an administrator. Group Policy Modeling requires that you have at least one domain controller running Windows Server 2003 because this simulation is performed by a service running on a domain controller that is running Windows Server 2003 . With Group Policy Modeling, you can either simulate the RSOP data that would be applied for an existing configuration, or you can perform "what-if" analyses by simulating hypothetical changes to your directory environment and then calculating the RSOP for that hypothetical configuration. For example, you can simulate changes to security group membership, or changes to the location of the user or computer object in Active Directory Outside of GPMC, Group Policy Modeling is referred to as RSoP -.. planning mode Note that although Windows 2000 does not Provide The Rsop Infrastructure, Group Policy Modeling Can Be Used As An Effective Way To Simulate The Affect of Group Policy ON Windows 2000 Computers.Using GPMC Reports
In GPMC, resultant set of policy data is obtained using Group Policy Modeling or Group Policy Results wizards. GPMC provides an HTML report of the RSoP data. This report shows the final value of the winning settings and the winning GPO that set that value. When you create a Group Policy Modeling or Group Policy Results report, the report is shown in GPMC under the appropriate node. Right-clicking this report and choosing Advanced View opens the RSoP snap-in, which provides additional information, enabling you to verify precedence for a policy setting. in the RSoP snap-in, the dialog box for a policy setting contains a Precedence tab, which shows all GPOs that attempted to set a particular setting and the value for each GPO.RSoP Architecture
Figure 2 Below Shows The High-Level Architecture of Rsop for Group Policy Results and Group Policy Modeling.
Figure 2. RSOP High-Level Architecture
Take for example, a standard logon procedure in Windows 2000:. A client computer logs onto the network and Winlogon runs The domain controller passes a list of pointers to the GPOs that are to apply This list is passed to each of the client-side. Extensions (CSES) Such As Software Installation, Scripts, Security, Administrative Templates, And So on. Each Cse Processes this List of gpos.
Windows Server 2003 uses the same process but improves on Windows 2000 by collecting all the Group Policy processing information and storing it in a Common Information Model Object Management (CIMOM) database on the local computer. This information, such as the list, content and logging .
In Group Policy Results, RSoP queries the CIMOM database on the target computer, receives information about the policies and displays it in GPMC. In Group Policy Modeling, RSoP simulates the application of policy using the Group Policy Directory Access Service (GPDAS) on a Domain Controller. GPDAS simulates the application of GPOs and passes them to virtual client-side extensions on the Domain Controller. The results of this simulation are stored to a local CIMOM database on the domain controller before the information is passed back and displayed in GPMC.Security And RSOP
By default, access to Group Policy Results is restricted to enterprise, domain, and local administrators although users can still perform logging on their own computer In Windows XP, non-administrators can run Group Policy Results for their computer and user account;. In Windows Server 2003 non-administrators can only run Group Policy Results for their own user account. Group Policy Modeling is restricted to enterprise and Domain Admins. However, organizations can delegate access to Group Policy Results and Modeling using GPMC. for step-by-step instructions , SEE GROUP Policy Help.
Group Policy Results and Modeling Examples
Group Policy Results and Modeling Allow Administrators to Solve Problems for Specific Scenarios. Some Examples Are Included Below.
Group Policy Results
What is The Current State of Folder Redirection for The Current User?
Example: User Paul has four computers, and contacts help desk because they can not find files on computer D that are on computer A, even though Paul is set up to use folder redirection The administrator runs Group Policy Results and sees that on computer D,. REDIRECTION IS DIFFERENT THEN THE OTHERS BECAUSE A DIFFERENT GPO Applies.What Is The Current State of Folder Redirection for A Sampling of Users?
Example:. An administrator wants to profile different sets of users Using Group Policy Results, the administrator picks a sample user from each user group and uses the RSoP information to model redirection within the organization.
Why Did this happen?
Example: An administrator is confused as to why Paul's documents are being redirected to the SuperUsers server The administrator uses Group Policy Results to look at the current redirection path, and the GPO and security group that caused the redirection..
The administrator notices that of the three GPOs specifying folder redirection policy, the winning GPO has the advanced option set to redirect users in different security groups to different locations. The administrator notices that Paul is a member of both the VanillaUsers group and the SuperUsers group and Realizes That this caused paul's folders to be redirected to the superusers server.
Group policy model
Precedence Details
In Processing Group Policy, Administrators Determine Which GPOS WERE IN Conflict To Configure Folder Redirection for this user.
Change of site
Example: An administrator can model site and domain changes for individual users or using a sample target to assess what would happen to an entire group of users under different combinations of sites, domains, and so forth By comparing what should be seen, by what. actually exists under the new GPO structure, the administrator can avoid problems before the move actually takes place.Example: User Jane is going to move from one department to another The administrator uses Group Policy Modeling to model the move under the different site condition and. FINDS OUT THAT A GPO Conflict Exists That Redirects Jane's folder to an alternate location.
Change of folder redirection mode
An Administrator wants to configure folder redirection to use the advanced options to redirect users to alternate locations based on their security group membership. The administrator uses Group Policy Modeling to configure Group Policy for the desired folder redirection behavior.
............................................................... ...CRIPLIED box.
RSOP Schema
For Information About The RSOP Schema, See The Rsop SDK, Available As Part of The Microsoft Windows Platform SDK At http://www.microsoft.com/msdownload/platformsdk/sdkupdate/.
Group policy processing
As described earlier in this paper, Group Policy is processed in the following order: Local Group Policy Object (Local GPO), then GPOs linked to containers in this order: site, domain, and organizational units, including any nested organizational units (starting with the organizational unit further from the user or computer object). This means that the local Group Policy Object is processed first, and the organizational unit to which the computer or user belongs (the one that it is a direct member of) is processed last. All of this is Subject to the Following Conditions: • WMI OR Security Filtering That Has Been Applied To GPOS.
· Any domain-based GPO (not local GPO) may be enforced by using the Enforce option so that its policies can not be overwritten. When more than one GPO has been marked as enforced, the GPO that is highest in Active Directory hierarchy takes precedence.
· At any domain or organizational unit, Group Policy inheritance may be selectively designated as Block Inheritance However, blocking inheritance does not prevent policy from enforced GPOs from applying;. This is because enforced GPOs are always applied, and can not be blocked.
Note:.. Every computer has a single local GPO that is always processed regardless of whether the computer is part of a domain or is a stand-alone computer The Local GPO can not be blocked by domain-based GPOs However, settings in domain GPOS ALWAYS Take Precedence Since The Local GPO.
Initial Processing of Group Policy
Group Policy for computers is applied at computer startup. For users, Group Policy is applied when they log on. By default, the processing of Group Policy is synchronous, which means that computer Group Policy is completed before the CTRL ALT DEL dialog box is presented, and user Group Policy is completed before the shell is active and available for the user to interact with it. (As explained below, Windows XP with Fast Logon enabled lets users logon while Group Policy is processed in the background.) Synchronous and Asynchronous Processing
Synchronous processes can be described as a series of processes where one process must finish running before the next one begins. Asynchronous processes, on the other hand, can run on different threads simultaneously because their outcome is independent of other processes.
You can change the default processing behavior by using a policy setting for each GPO so that processing is asynchronous instead of synchronous. However, this is not recommended because it can cause unpredictable or undesirable side effects. For example, if the policy has been set to remove the Run command from the Start menu, it is possible under asynchronous processing that a user could logon prior to this policy taking effect, so the user would initially have access to this functionality. to provide the most reliable operation, it is recommended that you Leave the processing as synchronous.
Fast Logon in Windows XP Professional
By default in Windows XP Professional, the Fast Logon Optimization feature is set for both domain and workgroup members. This results in the asynchronous application of policies when the computer starts and when the user logs on. This application of policies is similar to a background refresh process and can reduce the length of time it takes for the Logon dialog box to display and the length of time it takes for the shell to be available to the user. An administrator can change the default by using the Group Policy Object Editor. Fast Logon .
.
· WHEN a User Has Synchronous logon scripts.
Note That Under The Preceding Conditions, Computer Startup Can Still Be aske.
The Following Table Summarizes The Default Processing of Policy On Windows XP.
Client
Application At Startup / Log On
Application At Refresh
WINDOWS 2000
SYNCHRONOUS
Asynchronous
Windows XP Professional
Asynchronous
Asynchronous
Windows XP Clients Support Fast Logon Optimization In Any Domain Environment. To Turn Off Fast Logon Optimization, You CAN Use The Following Policy:
Computer Configuration / Administrative Templates / System / Logon / ALWAYS WAIT for The Network At Computer Startup and Logon
Note Fast Logon Optimization IS Not a Feature Of Windows Server 2003.
Folder Redirection and Software Installation Policies
Note that when logon optimization is on, a user may need to log on to a computer twice before folder redirection policies and software installation policies are applied. This is because application of these types of policies require the synchronous policy application. During a policy refresh ( which is asynchronous), the system sets a flag that indicates that the application of folder redirection or a software installation policy is required. The flag forces synchronous application of the policy at the user's next logon.Time Limit for Processing of Group Policy
Under synchronous processing, there is a time limit of 60 minutes for all of Group Policy to finish processing on the client. Any client-side extensions that are not finished after 60 minutes are signaled to stop, in which case the associated policy settings may not . be fully applied An errant extension may not be able to respond; in either case the Group Policy engine goes into asynchronous processing mode This means that the Group Policy engine is no longer blocked while waiting for a running (likely errant) extension and continues. To Process; IT Leaves The Extension (s) Running and does NOT TERMINATE IT (THEM). There is no setting to control this time-out time period or behavior.
Background Refresh of Group Policy
In Addition to the Initial Processing of Group Policy At Startup and Logon, Group Policy Is Applied Subsequently in The Background on a Periodic Basis, And Can Also Be Triggered on Demand from the Command Line.
During a background refresh, a client side extension will by default only reapply the settings if it detects that a change was made on the server in any of its GPOs or its list of GPOs. This is done for performance reasons.
Not all Group Policy extensions are processed during a background refresh. Software Installation and Folder Redirection processing occurs only during computer startup or when the user logs on. This is because processing periodically could cause undesirable results. For example, for Software Installation, if an application is no longer assigned, it is removed. If a user is using the application while Group Policy tries to uninstall it or if an assigned application upgrade takes place while someone is using it, errors would occur.Note The script's extension is processed during background refresh , HOWEVER THE Scripts Themselves is Only Ran At Startup, Shutdown, Logon, And Logoff, As Appropriate.
Periodic Refresh Processing
Group Policy is processed periodically. By default, this is done every 90 minutes with a randomized offset of up to 30 minutes. You can change these default values by using a Group Policy setting in Administrative Templates. Setting the value to zero minutes causes the refresh Rate to be set to seven seconds.
Note Setting a short refresh interval in a production environment is not recommended. This is because a policy refresh causes the Windows shell to be refreshed, which in turn causes all open shortcut menus to close, a brief flicker of the screen, and so on. In Addition, IT Causes Computers To Contact Domain Controllers More Frequently, Increasing The Load on The Domain Controllers. However, Setting A Shorter Intervalness Scenarios.
To change the policy refresh interval setting, edit the Default Domain Controllers Group Policy object, which is linked to the Domain Controllers organizational unit. The Group Policy Refresh Interval for Computers setting is located under Computer Configuration / Administrative Templates / System / Group Policy node. for domain controllers, the default period is every five minutes. Group Policy Refresh Interval for Domain Controllers setting is available under Computer Configuration / Administrative Templates / System / Group Policy node.
On-Demand Processing
You Can Also Trigger A Background Refresh The Client. However, The Application of Group Policy Cannot Be Pushed To Clients on Demand from the Server.
Messages and Events
When Group Policy is applied, a WM_SETTINGCHANGE message is sent, and an event is signaled. Applications that can receive window messages can use it to respond to a Group Policy change. Those applications that do not have a window to receive the message (as with Can Wait for the Event.
Refreshing Policy from the Command Line
Gpupdate refreshes local Group Policy settings and Group Policy settings that are stored in Active Directory, including security settings. This command supersedes the now obsolete / refreshpolicy option for the secedit command.
Syntax
GPUPDATE [/ TARGET: {Computer | User}] [/ force] [/ wait: value] [/ logoff] [/ boot]
Parameters
/ Target: {Computer | user}
Processes ONLY The Computer Settings or The Current User Settings. By Default, Both The Computer Settings and The User Settings Are Processed.
/ force
Ignores All Processing Optimizations and reviews all settings.
/ WAIT: Value
Number of Seconds That Policy Processing Waits to Finish. The default is 600 seconds. 0 equals no wait, and -1 equals wait indefinitely./logoff
Logs off after the refresh has completed. This is required for those Group Policy client-side extensions that do not process on a background refresh cycle but that do process when the user logs on, such as user Group Policy Software Installation and Folder Redirection. This Option Has No Effect If The Require The User To Log OFF.
/ boot
Restarts the computer after the refresh has completed. This is required for those Group Policy client-side extensions that do not process on a background refresh cycle but that do process when the computer starts up, such as computer Group Policy Software Installation. This option has No Effect If The Require The Computer To BE Restarted.
/ SYNCH
Causes the next foreground policy application to be done synchronously. Foreground policy applications occur at computer boot and user logon. You can specify this for the user, computer, or both using the / Target parameter. The / Force and / Wait parameters will be ignored IF specified.
/?
Displays Help at the Command Prompt.
Slow Links and Remote Access Issues
Special Considances Apply When Processing Group Policy Over Slow Links Or Remote Access.
NOTE: Note that while these issues are related, they are distinct, and the processing of Group Policy is different for each In particular, remote access does not necessarily imply a slow link, nor does a LAN necessarily imply a fast link A slow.. link is by default based on the algorithm described in the section below Windows Server remote access is part of the integrated Routing and Remote Access Service;. it connects remote or mobile users to corporate networks, allowing users to work as if their computers are physically connected to the network. Users run remote access software to connect to a remote access server, which is a computer running Windows Server and the Routing and Remote Access Service. The remote access server authenticates the user and services sessions until terminated by the user or network administrator The Remote Access Connection Enables All Services Typically Available To A Lan-Connected Client, Such As File and Print Sharing, Messaging, And Web Server Access.g Roup Policy and Slow Links
When Group Policy detects a slow link, it sets a flag to indicate to client-side extensions that a policy setting is being applied across a slow link. Individual client-side extensions can determine whether or not to apply a policy setting over the slow link .
The Default Settings Are As Follows:
· Security settings-on (and cannot be turned off).
· Administrative Templates-on (and cannot be turned off).
Software Installation-OFF.
· Scripts-off.
Folder Redirection-OFF.
For All But The Administrative Templates Snap-in and Security Settings Snap-in, a Policy Is Provided For Switching The Slow Link Processing Settings.
Setting policy for solution-link definition
You can use Group Policy to set the definition of a slow link for computers and users, and for user profiles.For Group Policy, Windows 2000 and Windows Server 2003 use an IP ping algorithm to ping the server, rather than measuring the file system performance method that was used in Windows NT 4.0 Note:.. Slow link detection requires the Internet Control Message Protocol (ICMP) If ICMP can not be used to communicate with the domain controllers, policy processing will not work, in which case you should disable slow link Detection.
A Slow Link IS, by Default, Based On The Following Algorithm (where ms = milliseconds):
1. ping the server with 0 bytes of data and time the number of milliseconds. This value is time # 1. IF IS LESS THAN 10 MS, EXIT (Assume A Fast Link).
2. Ping The Server with 2 KB of Uncompressible Data, And Time The Number of MilliseConds. This value is time # 2. The algorithm uses a commitsed .jpg file for this.
3. Delta = Time # 2 - Time # 1. This Removes The overhead of session setup, with the result being equal to the time to move 2 kb of data.
4. Calculate delta Three Times, Adding to Total Each Delta Value.
5. Total / 3 = Average of delta, in MilliseConds.
6. 2 * (2 KB) * (1000 millisec / sec) / delta average millisec = x
7. x = (4000 kb / sec) / Delta average
8. Z Kilobits per second (kbps) = (4000 kb / sec) / delta average) * (8 bits / byte)
9. z kbps = 32000 kbps / delta avg.
Sikiş sikiş siki.
The resulting Z value is evaluated against the policy setting A default of less than 500 Kbps is considered a slow link;.. Otherwise it is a fast link This value may be set through Group Policy in the Administrative Templates node.To specify policy settings for Group Policy slow link detection for computers, you use the Computer Configuration / Administrative Templates / System / Group Policy node. To set this policy for users, you use the User Configuration / Administrative Templates / System / Group Policy node. The connection speed is set For Kilobits Per Second (Kbps).
For User Profiles, the Slow network connection time-out for user profiles policy is located in the Computer Configuration / Administrative Templates / System / Logon node. This policy has support for both pinging the server and checking the performance of the file system. This is because user profiles can be stored anywhere, and that server may or may not have IP support. Therefore, the user profile code first tries to ping the server. If the server does not have IP support, it falls back to measuring the file system's performance ................................
Application of Group Policy During a Remote Access Connection
Group Policy Is Applied During A Remote Access Connection As Follows:
When using the Logon using dial-up connection check box on the logon prompt, both User and Computer Group Policy is applied, provided the computer is a member of the domain that the remote access server belongs to or trusts. However, computer-based software installation settings are not processed. This is because normally computer policy would have been processed before the logon screen, but since no network connection is available until logon, the application of computer policy is done as background refresh at the time of logon.When the logon is done with cached credentials, and then a remote access connection is established, Group Policy is not applied during logon. For example, if users connecting through a VPN connection are logging in via cached credentials, folder redirection settings will not be processed, because folder Redirection Policy Can Only Be Processed At User Logon, Not in The Background Refresh.
Group Policy is not applied to computers that are members of a foreign domain or a workgroup. Although the connection may still be made, access to domain resources may be affected (because of mismatched IPSec security).
Client-Side Processing Of Group Policy
The client-side extensions are loaded on an as-needed basis when a client computer is processing policy. The client computer first gets a list of Group Policy objects. Next, it loops through all the client-side extensions and determines whether each client- side extension has any data in any of the GPOs. If a client-side extension has data in a GPO, the client-side extension is called with the list of Group Policy objects that it should process. If the client-side extension does not Have Any Settings in any of the gpos, it is not called.
Computer Policy for Client-Side ExtensionsA computer policy exists for each of the Group Policy client-side extensions (located in Computer Configuration / Administrative Templates / System / Group Policy). Each policy includes a maximum of three options (check boxes). Some of The Client-Side Extensions Include Only Two Computer Policy Options; In Those Cases, this is Because The Third Option IS Not Appropriate for That Extension.
The Computer Policy Options Are:
· Allow processing across a slow network connection. When a client-side extension registers itself with the operating system, it sets preferences in the registry, specifying whether it should be called when policy is being applied across a slow link. Some extensions move large amounts of data, so processing across a slow link can affect performance (for example, consider the time involved in installing a large application file across a 56 Kbps modem line). An administrator can set this policy to mandate that the client-side extension should run Across A Slow Link, Regardless of The Amount of Data.
· Do not apply during periodic background processing. Computer policy is applied at boot time, and then again in the background, approximately every 90 minutes thereafter. User policy is applied at user logon, and then approximately every 90 minutes after that. The Do not apply during periodic background processing option gives the administrator the ability to override this logic and force the extension to either run or not run in the background Note:. the Software Installation and Folder Redirection extensions process policy only during the initial run because it is risky to process policy in the background. For example, with Software Installation application upgrades, applications are installed during the initial run and not in the background. If it were done in the background, a user could be running an application, and then have it uninstalled and A New Version Installed. The Application Could Also Have A Shared Component That IN Use by Another Application. This Would PR Event the installation from completing successfully.
· Process even if the Group Policy Objects have not changed. By default, if the GPOs on the server have not changed, it is not necessary to continually reapply them to the client, since the client should already have all the settings. However, local administrators may be able modify the parts of the registry where Group Policy settings are stored. In this case, it may make sense to reapply these settings during logon or during the periodic refresh cycle to get the computer back to the desired state.For example, assume that you have used Group Policy to define a specific set of security options for a file. Then the user (with administrative credentials) logs on and changes it. The Group Policy administrator may want to set the policy to process Group Policy even if the GPOS Have Not Changd So That The Security Is Reapplied At Every Boot. This Also Applies To Application, But The End User Can Remove The Application Or delete the icon. The P rocess gives the administrator the ability to restore the application at the next user logon, even if the Group Policy objects have not changed option.Note that, by default, security settings are applied every 16 hours (960 minutes) even if a GPO has not Changed. it is possible to change this default period by using the folowing registry key:
HKLM / Software / Microsoft / Windows NT / CurrentVersion / WinLogon / GPEXTENTIONS / {82 ...} / MaxnogpolistChangesInterval, Reg_dword, in Number of Minutes.
.
Client-Side Extension
Missing Policy Check Box
REAON
Registry Slow link (Allow processing across a slow network connection) Registry policy is always applied because it controls the other client-side extensions. Security Settings Slow link (Allow processing across a slow network connection) To ensure that security settings are in effect, they must always be applied, even across a slow link. Folder Redirection background processing (Do not apply during periodic background processing) Users' files could be in use while they are logged on. Software Installation background processing (Do not apply during periodic background processing) Users' Software Could Be in Uses While Thei Logged On.Policy Settings for Group Policy
You can use administrative templates to configure how you use group policy. Policy Settings Are Located in The Following Areas of The Group Policy Object Editor:
· Computer Configuration / Administrative Templates / System / Group Policy
· User Configuration / Administrative Templates / System / Group Policy
For Details On these Policy Settings, Double-Click The Policy In The Details Pane, And The Policy Properties Dialog Box, Click The Explain Tab.
Group policy replication and domain controller selection
In a domain that contains more than one domain controller, Group Policy information takes time to propagate, or replicate, from one domain controller to another. Low bandwidth network connections between domain controllers slow replication. The Group Policy infrastructure has mechanisms to manage these issues.
Each GPO is stored partly in the Sysvol on the domain controller and partly in Active Directory. GPMC and Group Policy Object Editor present and manage the GPO as a single unit. For example, when you set permissions on a GPO in GPMC, GPMC is actually setting permissions on objects in both Active Directory and the Sysvol. It is not recommended that you manipulate these separate objects independently outside of GPMC and the Group Policy Object Editor. It is important to understand that these two separate components of a GPO rely on different replication mechanisms. The file system portion is replicated through File Replication Service (FRS), independently of the replication handled by Active Directory.Lack of synchronization between the Group Policy template (data stored on Sysvol) and Group Policy container (data stored in Active Directory) .
For those Group Policy extensions that store data in only one data store (either Active Directory or Sysvol), this is not an issue, and Group Policy is applied as it can be read. Such extensions include Administrative Templates, Scripts, Folder Redirection, and Most of the security settings.
For any Group Policy extension that stores data in both storage places (Active Directory and Sysvol), the extension must properly handle the possibility that the data is unsynchronized. This is also true for extensions that need multiple objects in a single store to be atomic in Nature, Since Neither Storage Location Handles Transactions.
An example of an extension that stores data in Active Directory and Sysvol is Software Installation. The script files are stored on Sysvol and the Windows Installer package definition is in Active Directory. If the script exists, but the corresponding Active Directory components are not present, then nothing is done. If the script file is missing, but the package is known in Active Directory, application installation fails gracefully and will be retried on the next processing of Group Policy.The tools used to manage Active Directory and Group Policy, such as GPMC, the Group Policy Object Editor, and Active Directory Users and Computers all communicate with domain controllers. If there are several domain controllers available, changes made to objects like users, computers, organizational units, and GPOs may take time to appear on other domain Controllers. The Administrator May See Different Data Depending On The Last Domain Controller On Which Changes WERE Made and Which Domain Controll Er They is currently viewing the data from.
For example, if you create a GPO on one domain controller and immediately attempt to link it on another domain controller, the operation could fail. In each domain, GPMC uses the same domain controller for all operations in that domain, in order to avoid any synchronization issues. This includes all operations on GPOs, organizational units, and security groups in that domain. in addition, when the Group Policy Object Editor is opened from GPMC, it will also use the same domain controller in use by GPMC. Finally, GPMC . uses the same domain controller for all operations on sites within a given forest This domain controller for sites is used to read and write information about the links to GPOs that exist on any given site; information regarding the GPO itself is obtained from the domain controller Of the domain hosting The gpo. this domain controller is buy t r t 中 中; ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, d from the domain controller of the domain hosting the GPO.By default, when you add a new domain to the console, GPMC uses the PDC emulator in that domain to help ensure that all administrators are using the same domain controller. For managing sites, GPMC uses the PDC emulator in the user's domain by default. you can change the default choice of domain controller using the Change Domain Controller dialog box in GPMC. If you are located at a remote site with a slow connection to the default domain controller, you May want to do this.
It is important for administrators to consider the choice of domain controller in order to avoid replication conflicts particularly because both Active Directory and FRS use multi-master replication. This is especially important to consider because GPO data resides in both Active Directory and on Sysvol, and two independent replication mechanisms must be used to replicate GPO data to the various domain controllers in the domain. If two administrators are simultaneously editing the same GPO on different domain controllers, it is possible for the changes written by one administrator to be overwritten by another administrator , Depending on Replication Latency.Important
IF Multiple Administrators Manage A Common GPO, IT IS Recommended That ADMINISTRATORS Use The Same Domain Controller When Editing a Particular GPO, To Avoid Collisions In FRS.
Options Governing Selection of a Domain Controller for GPMC
IN GPMC, WHEN You Right-Click A Domain or the Sites Container, you see a change Domain Controller Dialog Box. The Domain Controller Options for GPMC Are:
· The one with the operations master token for the pdc emulator. This is the default and preferred option.
· Use any Available Domain Controller. This is the least safe option.
· Use any available domain controller that is running Windows Server 2003 or later. This option is useful if you are restoring deleted GPOs that contain software installation settings. If possible, it is recommended to perform restoration of GPOs containing software installation settings on domain controllers running Windows Server 2003.
· This domain controller. This option allows you to choose a specific domain controller from a list of domain controllers in the domain.If you are changing the domain controller for a site, you can also choose any available trusted domain from the Look in this domain Drop-Down List Box in The Change Domain Controller Dialog Box.
WHEN You Open The Group Policy Object Editor From GPMC It Always Uses The Same Domain Controller That Is Targeted in GPMC for the domain where there
· All of these options may be overridden by a using policy setting, as described next. These settings are available in the User Configuration / Administrative Templates / System / Group Policy node of the Group Policy Object Editor.
Specifying a Domain Controller by Using GROUP Policy
Domain Admins can use a policy to specify how Group Policy chooses a domain controller-that is, they can specify which domain controller option should be used. In such cases, the option to choose a domain controller is unavailable since a policy is in place that Overrides any setting what the User Chooses. This Policy Allows Domain Admins To Mandate That All Administrators Must Use the PDC Emulator, for example.
The Group Policy Domain Controller Selection Policy Setting IS Available In The Administrative Templates Node for User Configuration, in The System / Group Policy Sub-Container.
Local Group Policy
You can set local Group Policy for any computer, whether or not it participates in a domain. To set local Group Policy, you use the Group Policy Object Editor focused on the local computer. You can access the Group Policy Object Editor tool by typing mmc at the command prompt, adding the Group Policy Object Editor to MMC console, and focusing the Group Policy Object Editor on the local computer Group Policy is processed in this order:. local GPO first, followed by Active Directory linked GPOs (site, domain, Organizational Unit, And Any Nested Organizational Units .local Group Policy Object
On all computers, an Local GPO exists-this is just the Group Policy template portion. The location of the Local GPO is /% SystemRoot% System32 / GroupPolicy. Each Group Policy extension snap-in queries the Group Policy engine to get the GPO type And the Decides if it will be displayed.
.
Group Policy Object Editor extension Loaded when Group Policy Object Editor focused on Local GPO Security Settings Yes Administrative Templates Yes Software Installation No Scripts Yes Folder Redirection No Internet Explorer Maintenance Yes
Local Group Policy Object and Dacls
There is no Apply Group Policy ACE for the local GPO;. Therefore, if you have Read access to the Local GPO, the local GPO applies to you The implication is that it's difficult to have to choose whom the Local GPO should apply to (for example, the Local GPO also applies to the administrator). Everyone with Read access to the Local GPO who logs on gets the Local GPO. If this is not what you want, a work-around exists. you can set the Read ACE to Deny for a specific user, and then the Local GPO does not apply to that user. This is useful for administrators who do not want to be subject to the Local GPO settings. However, without Read access, administrators can not see the contents of the Local gpo.viewing policy settings when group policy Object Editor is Focused on the local computer
When administrators run the Group Policy Object Editor focused on a local computer, this shows the information in the local GPO, not the cumulative effect of what has been applied to the computer or user. For Windows Server 2003, it shows the settings that a local administrator has set for that computer and all users of that computer. in the evaluation process, when the computer is joined to a domain, all the policy settings are subject to being overwritten by domain-based policy (any policy set in the site, domain Organizational unit).
Local Group Policy Object Processing
When a computer is joined to a domain with Active Directory and Group Policy implemented, a local Group Policy Object is processed. Note that Local GPO policy is processed even when the Block Policy Inheritance option has been specified.
Local Group Policy objects are always processed first, and then domain policy is processed. If a computer is participating in a domain and a conflict occurs between domain and local computer policy, domain policy prevails. However, if a computer is no longer participating in a Domain, Local GPO Policy is Applied.group Policy Loopback Support
Group Policy is applied to the user or computer, based upon where the user or computer object is located in Active Directory. However, in some cases, users may need policy applied to them, based upon the location of the computer object, not the location .
To Describe The Loopback Feature, We'll Use An Example. In this Scenario, you have ful.
The Following Illustration Shows The Reskit Domain, Which is buy to work through this example.
Figure 3. The Reskit Domain
Normal user Group Policy processing specifies that computers located in the Servers organizational unit have the GPOs A3, A1, A2, A4, and A6 applied (in that order) during computer startup. Users of the Marketing organizational unit have GPOs A3, A1, A2 And A5 Applied (In That Order), Regardless of Which Computer The Log on To.
In some cases this processing order may not be what you want to do, for example, when you do not want applications that have been assigned or published to the users of the Marketing organizational unit to be installed while they are logged on to the computers in the Servers organizational unit With the Group Policy loopback feature, you can specify two other ways to retrieve the list of GPOs for any user of the computers in the Servers organizational unit:.. · Merge mode in this mode, the computer's GPOs have higher precedence THAN THE User's GPOS. in this Example, The List of Gpos for the Computer IS A3, A1, A2, A4, AND A6, WHICH IS ADED TO The User's List of A3, A1, A2, A5, Resulting In A3, A1, A2, A5, A3, A1, A2, A4, AND A6 (Listed in Lowest to Highest Priority).
Replace Mode. In this mode, The user's list of gpos is not gathered. Only the list of gpos based Upon The Computer Object is buy. In this Example, The List IS A3, A1, A2, A4, And A6.
You can set the loopback feature by using the user group policy loopback processing mode policy under computer settings / administrative settings / system / group policy.
The processing of the loopback feature is implemented in the Group Policy engine, which is the part of Group Policy that runs in the Winlogon process. When the Group Policy engine is about to apply user policy, it looks in the registry for a computer policy, Which Specifies Which Mode User Policy Should Be Applied in.
Using Loopback for Terminal Services
You can apply GPOs to Terminal Servers exclusively with the use of a GPO Loopback policy. This policy directs the system to apply the set of GPOs for the computer to any user who logs on to the computer affected by this policy. This policy is intended for special-use computers, such as those in public places, laboratories, and classrooms, where you must modify the user policy based on the computer that is being used. Without Loopback, the user's GPOs determine which user policies apply. If this policy is enabled , the location of a user's computer object is the main factor in determining which set of GPOs are to be applied.Loopback Processing and Security Filtering
In security filtering, if you have used the Deny ACL to explicitly prevent a policy setting from applying to a computer, the setting could still apply in loopback replace mode because the user's security principal remains unaffected by the Deny ACL computer settings.
Design Considerations for Organizational Unit Structure and Use of Group Policy Objects
This section is...
Organizational Unit Structure
. The Group Policy architecture is flexible and allows for many types of design The guiding principle as you design your organizational unit structure should be to create a structure that is easy to manage and troubleshoot There are two key reasons to create an organizational unit.:
· To enable delegation of administration.
· To scope the application of gpos.
In general, do not try to model your organizational unit structure based on your business organization. Rather, design your organizational unit structure based on how you administer your business. Information on planning for Active Directory is available in Best Practice Active Directory Design for Managing Windows Networks at http://www.microsoft.com/technet/prodtechnol/ad/windows2000/plan/bpaddsgn.asp.In most organizations, organizational unit structure is likely to fall into one of the following categories:
· Flat Organizational Unit Structure: 1 Or 2 Levels
· Narrow Organizational Unit Structure: 3 to 5 Levels
· Deep Organizational Unit Structure: More Than 5 Levels
For organizations with simple administration requirements, it is recommended that administrators use a simple model in which a flat organizational unit structure is used and GPOs are linked at the domain or organizational unit level. Limited use of security groups or WMI filtering to filter GPOs is recommended . If NEED Additional Flexibility, IT IS SUGGESTED That You Reconsider Your Organizational Unit Structure.
For organizations with moderate administration requirements, it is recommended that administrators use a narrow organizational unit structure and GPOs are linked at the site, domain, or organizational unit level as necessary. Limited use of the Block Policy Inheritance options, the Enforce Policy options, security Groups or WMI Filtering to filter gpos is recommended.
For organizations with complex administration requirements, the Active Directory namespace may use flat, narrow, or deep organizational unit structures In such cases, administrators should consider the following issues.:
· Flat organizational unit model: use security groups and DACLs or WMI filtering to filter effects of GPOs as a primary method, and Block Policy Inheritance and Enforce Policy options as secondary methods · Narrow organizational unit model:. Link to GPOs at site, domain, And Organizational Unit. AS A Secondary Method, Use Block Policy Inheritance and Enforce Policy Options, And Security Groups and Dacls, or WMI Filtering for Filtering Effects of GPOS.
· Deep organizational unit model: link to GPOs at site, domain, and organizational unit with security groups filtering and DACLs or WMI filtering As a secondary method, use Block Policy Inheritance and Enforce Policy options..
Design Principles
......................
Administration of Group Policy Objects
Delegation of authority, separation of administrative duties, central versus distributed administration, and design flexibility are important factors you'll need to consider when designing Group Policy and selecting which scenarios to use for your organization.
How you design your organizational unit structure and GPOs will depend on the administrative requirements and roles in your corporation. For example, if administrators are organized according to their duties (such as security administrators, logon administrators, and so on), you may find it Useful to define these policy settings in separate group policy objects.
Delegation of authority will depend largely on whether you use centralized or distributed administration in your corporation. Based on their particular corporate requirements, network administrators can use security groups and Discretionary Access Control List permissions to determine which administrator groups can modify policy settings in GPOs. Network administrators can define groups of administrators (for example, Software Installation administrators), and then provide them read and write access to selected GPOs, allowing the network administrator to delegate control of the GPO settings. Administrators who have read and write access to a Group Policy Object can by default control all of the contents of that Group Policy Object; however, you can restrict access by setting policy to control which MMC snap-ins can be loaded by that user, as described earlier in the Delegating Group Policy section.Separate Users And Computers Into Different Organizational Units
IT's Recommended That You Separate Users and Computers Into Separate Organizational Units. This is useful for these reasons:
.
· Typically Users and Computers Are Administered Differently, Perhaps by DiffERENT Groups WITHIN YOUR ORGANIZATION, Which Facilitates Administration.
· You can reduce Group Policy processing time because you can disable the unused half of the GPO. It is possible to disable only the User or Computer portion of the GPO. To do this, right-click the GPO, click Properties, click either Disable Computer Configuration settings or Disable User Configuration settings, and then click OK. These options are available on the GPO Properties page, on the General tab. · This type of design is required to enable loopback processing. See the Group Policy Loopback Support section for more Information.
· For Increased Security and Ease of Administration, You Should Specify Different Organizational Units for All New User and Computer Accounts When are created, as evlained BELOW.
Redirecting The Users and Computers Containers in Windows Server 2003 Domains
New user and computer accounts are created in the CN = Users and CN = Computers containers by default. It is not possible to apply Group Policy directly to these containers, although they inherit GPOs linked to the domain.
Redirusr.exe (for user accounts) and Redircomp.exe (for computer accounts) are two new tools included with Windows Server 2003 that enable you to change the default location where new user and computer accounts are created so you can more easily scope GPOs directly to newly created user and computer objects. These tools are located in% windir% / system32. By running Redirusr.exe and Redircomp.exe once for each domain, the domain administrator can specify the organizational units into which all new user and computer accounts are placed at the time of creation. This allows administrators to manage these unassigned accounts by using Group Policy before the administrators assign them to the organizational unit in which they are finally placed. You might want to consider restricting the organizational units used for new user and computer Accounts by Using Group Policy To Increase Security Around these Accounts.for More Information About Redirecting Users and Computers, See Article 324949, "Re directing the Users and Computers Containers in Windows Server 2003 Domains, "in the Microsoft Knowledge Base. To find this article, see the Microsoft Knowledge Base link on the Web Resources page at http://www.microsoft.com/windows/reskits/ WebResources.
For more information about the redirusr.exe and redircomp.exe tools, see the Redirecting Users and Computers link on the Web Resources page at http://www.microsoft.com/windows/reskits/webresources.
BEST Practice Organizational Unit Structure
Because you can not apply Group Policy directly to the CN = Users and CN = Computers containers, if you wanted to define policy settings for users and computers to be stored in their default container you needed to do so on the root of the domain. To prevent policy settings that are defined on a superior container (the root of the domain) from applying to users, computers, and groups in subordinate CN and organizational unit containers, you needed to define complex ACLs on the policy setting in the root of the domain. The solution for Windows 2000 and Windows Server 2003 domains is to deploy the best-practice organizational unit structure where Users, Computers, Groups, Service Accounts and Admin accounts are each in their own organizational unit.The following list describes the benefits of using the best -Practice Organizational Unit Structure:
· IT permits administrators to link gpos directly to the contact with computers.
· IT Permits Administrators to match GPOS to Objects of A Common Object Class. For Example, User Or Computer Policy Settings Can Be Linked Directly To Organizational Units That Are Hosting User Or Computer Accounts.
· IT Permits Non-Administrators to Apply Policy on Containers That Area, Hosting Security-Sensitive Users and Groups Such As Domain Admins, Schema Admins, or Enterprise Admins.
· It can minimize the effect if an ortholizational unit is account.
· It permits you to restore users and groups independently of each other in recovery scenarios. User accounts must exist before the restoration of the group. Having users and groups reside in different containers permits you to restore them and mark them as authoritative independently of each other .Note That the cn = users and cn = computers containers are computer-protected objects. You canNot (and Must NOT) Remove The for Backward Compatibility Purposes although the can be renamed.
The best-practice organizational unit structure works well for storing existing users, computers, and groups in Active Directory because those objects can be moved into the appropriate organizational unit container on Windows 2000 and Windows Server 2003 domains regardless of its domain or forest functional level. New user accounts, computer accounts, and security groups that are created with earlier-version APIs used by GUI and command-line management tools do not allow administrators to specify a target organizational unit. As a result, these objects will initially be created in the .
For more information about best-practice organizational unit structure see the "Creating an Organizational Unit Design" section of the Best Practice Active Directory Design for Managing Windows Networks at http://www.microsoft.com/technet/prodtechnol/ad/windows2000/ Plan / BPADDSGN.ASP
Functional Compared with Geographical Organizational Unit Structure
When organizing organizational units, there are two basic models to start with:. Functional and then geographical, or geographical and then functional The key is never to implement a structure that forces an artificial layering, which means that the organizational unit structure for computers may be Very Different Than That for Uses-it all depends on how the name administered.minimize the number of group policy objects associated with users or completes
You should note that the number of GPOs that are applied to a user affects the logon processing time. (Similarly, the number of GPOs applied to a computer affects boot time). The greater the number of associated GPOs, the longer logon will take to process them. During logon time, each GPO from the user's site, domain, and organizational unit hierarchy is applied, provided the user has both the Read ACE and the Apply Group Policy ACE. Note that if the Apply Group Policy ACE is not set, but the Read ACE is, the GPO will still be processed (although not applied), thus impacting logon time. Therefore, if you implement filtering based on security groups, you should also clear Read Access for those users that you clear Apply Group Policy for .
Minimize the use of the block block policy inheritance feature
As mentioned previously, you can prevent Group Policy settings of parent Active Directory containers from affecting users and computers in lower-level parent Active Directory containers. This is a useful and powerful feature that you should use judiciously only when a particular situation requires it. Blocking The Inheritance of Policy from Parent Active Directory Containers CAN Complicate Troubleshooting Policy.
Minimize the use of the enforce feature
You can also ensure that the policy settings you specify in a given GPO at a higher-level parent Active Directory container are enforced on lower-level parent Active Directory containers by using the Enforce option. Only use this powerful feature when circumstances require it. Overuse Other Related Features, Such As Block Policy Inheritance, CAN Complicate Trouicy, Orne, Loopback Processing Only When Nessary
You can set User Configuration per computer and thus override user-specific policy settings with computer-specific policy settings. This is useful when you want to provide a specific desktop configuration regardless of which users log on to the computer, such as a kiosk or other public terminal. To set User Configuration per computer, you would use the Administrative Templates node under Computer Configuration in the Group Policy Object Editor. For more information on this feature, see Group Policy Loopback Support.
Avoid Using Cross-Domain GPO Assignments
Although you can assign GPOs from different domains to a single Active Directory container if a particular situation requires it, you should note that in such cases Group Policy processing would be slower. This is because domain boundaries are crossed.
Avoid Editing the Default Domain GPO
INSTEAIN GPO, CREATE A New GPO, LINK It to the Domain GPO, AND SET The New GPO to Have Precedence over the default domain gpo.
Design Examples
This section presents several models of GPO design. These examples are not intended as guidelines, but they do illustrate various ways to approach GPO design. In most corporate environments, administrators may use a combination of these or similar models, tailored to their business requirements. The Key Overriding Approaches Are Either Functional or Geographic Models. The rest is usually variants of those.
Layered GPO Design Model
The Objective of this Design Model is to create gpos based on a dayred approach. This approach optimizes maintenance of gpos and facilitates delegation.
The Following Graphic Illustrates An Example of this Model.
Monolithic GPO Design Model
................ ..
The Following Graphic Illustrates An Example of The Monolithic GPO Model.
SINGLE Policy Type GPO Design Model
The objective of this design is to create GPOs that deliver a single type of Group Policy, for example, policy for security settings Such a design optimizes separation of duties for administrators;. However, it may increase the number of GPOs that are applied to a Given User or Computer.
Each GPO delivers only one type of policy (security GPOs are different from script Group Policy objects, for example) Large corporations often create separate administrator groups based on administrative duties;. This scenario would be useful in such corporate environments.
...............
Multiple Policy Types GPO Design Model
The objective of this design is to create GPOs that deliver multiple types of policy. This is a hybrid of the single policy and monolithic models. Each GPO delivers several types of policy settings.For example, you can create a GPO that includes Group Policy settings for software settings and application deployment and create another GPO that includes security and scripts settings, and so on. A GPO design that supports multiple policy types is useful in delegating administration environments and can reduce the number of GPOs that apply to a user and / or Computer.
.
Teams Or Matrix Organizations GPO Model
This model applies to organizations that leverage the virtual team concept. Individuals within the organization form teams to perform a task or project and each individual is a member of multiple teams. Each team has specific Group Policy requirements. The organizational unit architecture does not reflect the Team structure. this model filters by using security filtering.
The Following Graphic Illustrates An Example of The Team GPO Design Model.
Public Computing Environment GPO Model
This scenario applies to environments were you want the computer Group Policy settings to always have precedence over the user Group Policy settings. This scenario is useful for training classes and kiosk-type environments in which you want to provide the same desktop environment regardless of which user Logs on to the computer.
The following graphic illustrates an example of the GPO design for a public computing environment. The loopback policy feature with Replace mode is used in this example. See Group Policy Loopback Support in this document for more information.Normal Group Policy processing specifies that users in the Sales organizational unit get these GPOs:. Domain Policy GPO, Accounting GPO, and Sales GPO With the loopback policy enabled in Replace mode, when users from the Sales organizational unit log on to a computer in the Kiosks organizational unit, the user will process only these GPOs: Domain Policy GPO, Accounting GPO, Resources GPO, and Kiosks Loopback Policy GPO-the users' list of GPOs is not gathered in this case More specifically, the user settings specified in the Kiosks organizational unit (and those inherited) are. ............................. ..
Delegation with Central Control
This Model Applies To Organization Of GPOS, But Would Would I Enforce Certain Group Policy Settings Throughout The Domain (for Example, Specific Security Policy Settings).
.
Delegation with distributed control
This scenario applies to organizations that want to allow administrators of organizational units to prevent Group Policy settings from being applied to their organizational unit. Administrators of an organizational unit can block Group Policy settings that have been assigned at higher levels in the hierarchy from applying to his Or Her Organizational Unit. HoWever, Administrators Cannot Block Group Policy Settings That Are Marked As Enforce.This Featureows Organization to Minimize The Number of Domains without Sacrificing Autonomy.
Deployment Considances
Administering a Mix of Windows 2000 and Windows Server 2003 Domains
GPMC exposes features that are available in the underlying operating system. Because new features have been added to Group Policy since Windows 2000, certain features will only be available in GPMC depending on the operating system that has been deployed on the domain controllers. This section describes In General, There Are Three Key Issues That Determine WHETHER A Feature IS Available In GPMC:
· Whether the forest supports the Windows Server 2003 schema for Active Directory. Certain features are only available once the schema is upgraded. This is the first step that must be taken before any Windows Server 2003 domain controller can be deployed in an existing Windows 2000 forest . The schema is a forest-wide configuration and is upgraded by running ADPrep / ForestPrep. ADPrep is a utility included on the Windows Server 2003 CD. Note that it is possible to have the Windows Server 2003 schema in a forest with all Windows 2000 domain CONTROLLEERS.
· Whether there is at least one domain controller in the forest that is running Windows Server 2003. Group Policy Modeling must be performed on a domain controller running Windows Server 2003. · Whether a domain contains the Windows Server 2003 domain configuration. This is implemented once Adprep / DomainPrep is Run In That Domain. This is the first step triame......................
Note That there is no dependency from the group policy.
Delegation of Group Policy Results and Group Policy Modeling
In order to delegate either Group Policy Modeling or Group Policy Results, the Active Directory schema in the forest must be the Windows Server 2003 schema. Note that you can use Group Policy Results even without this schema, but only users with local administrative credentials on the target computer can remotely access Group Policy Results data. Thus, if the forest does not have the Windows Server 2003 schema, the delegation pages in GPMC for organizational units and domains will not show these permissions.
Group policy model
Group Policy Modeling is a simulation that is performed by a service that can only run on a domain controller running Windows Server 2003 or later. As long as there is at least one domain controller running Windows Server 2003 in the forest, you can use Group Policy ................ ..
WMI Filtering
WMI filters are only available in domains that have the Windows Server 2003 configuration. Although none of the domain controllers need to be running Windows Server 2003, you must have run ADPrep / DomainPrep in this domain. Also note that WMI filters are only evaluated by clients running Windows XP, Windows Server 2003, or later. WMI filters associated with a GPO will be ignored by Windows 2000 clients and the GPO will always be applied on Windows 2000.If ADPrep / DomainPrep has not been run in a given domain, the WMI Filters Node Will NOT BE PRESENT, AND THE GPO Scope Tab Will Not Have A WMI Filters Section.
Upgrading Windows 2000 Domains To Windows Server 2003 Domains and Interaction with Group Policy Model
Group Policy Modeling is a new feature of Windows Server 2003 that simulates the resultant set of policy for a given configuration. The simulation is performed by a service that runs on Windows Server 2003 domain controllers. In order to perform the simulation in cross-domain scenarios , The Service Must Have Read Access To All Gpos in The Forest.
In a Windows Server 2003 domain (whether it is upgraded from Windows 2000 or installed as new), the Enterprise Domain Controllers group is automatically given read access to all newly created GPOs. This ensures that the service can read all GPOs in the forest.
However, if the domain was upgraded from Windows 2000, any existing GPOs that were created before the upgrade do not have read access for the Enterprise Domain Controllers group. When you click a GPO, GPMC detects this situation and notifies the user that Enterprise Domain Controllers do not have read access to all GPOs in this domain. to solve this problem, you can use one of the sample scripts provided with GPMC, GrantPermissionOnAllGPOs.wsf. This script can update the permissions for all GPOs in the domain. to use this script ..................... ..
Open a commnd prompt and navigate to the% ProgramFiles% / GPMC / Scripts folder by Typing:
CD / D% ProgramFiles% / GPMC / Scripts
TYPE The FOLLOWING:
Cscript grantpermissiononAllgpos.wsf "Enterprise Domain Controllers" / permission: Read / Domain: Value
The value of domain parameter is the dns name of the domain.
USING GROUP Policy Features Across Forests
The Windows Server 2003 family introduces a new feature called Forest Trust that enables you to authenticate and authorize access to resources from separate, networked forests. With trusts established between forests, you can manage Group Policy throughout your enterprise, which provides greater flexibility especially in large Organizations. This Section Describes Group Policy Behavior in An Environment WITH Forest Trust Enabled:
· IT is not Possible to Link A GPO to a Domain in Another Forest.
· With Forest trust, it is possible that a user in Forest B could log onto a computer in Forest A. In this case, when the computer starts up, it will process policy for the computer configuration from Forest A, as usual. When a user from Forest B logs on, where they receive their policy settings from depends on the value of the Allow Cross-Forest User Policy and Roaming Profiles policy setting. · When this setting is Not Configured, no user-based policy settings are applied from the User's Forest. INSTEAD, LOOPBACK Group Policy Processing Will Be Applied, Uses SCOPED TO The Computer. Users Will Receive A Local Profile INSTEAD OF THEIR ROAMING PROFILE.
.................................................................................... ...
· When this setting is disabled, The Behavior Is The Same As Not Configured.
This Setting is Available On Windows Server 2003 Located At: Computer Configuration / Administrative Templates / System / Group Policy / Allow Cross-Forest User Policy and Roaming Profiles.
· It is possible to deploy Group Policy settings to users and computers in the same forest, but have those settings reference servers in other trusted forests. For example, the file shares that host software distribution points, redirected folders, logon scripts, and roaming user Profiles Could Be in Another Trusted Forest.
. · Group Policy Modeling requires that both the user and the computer be in the same forest If you want to simulate a user from Forest A logging on to a computer in Forest B, you must perform two separate Group Policy Modeling simulations: one for the user configuration and the other for the computer configuration. · Delegation across forests is supported for managing Group Policy. for example, you can delegate to someone in Forest B the ability to perform Group Policy Modeling simulations on objects in Forest A.
Group policy and active directory Sites
GPOs that are linked to site containers affect all computers in a forest of domains. Site information is replicated and available between all the domain controllers within a domain and all the domains in a forest. Therefore, any GPO that is linked to a site container is Applied to All Computers in That Site, Regardless of the Domain (in the forest) to which the belong. this has the folload implicity:
· It allows multiple domains (within a forest) to get the same GPO (and included policy settings), although the GPO only lives on a single domain and must be read from that domain when the affected clients read their site policy.
· IF Child Domains Area NetWork (WAN) Boundaries, The Site Setup Should Reflect this. If it does Not, The Computers IN a child Domain Could Be Accessing A Site GPO Across A Wan Link.
· To Manage Site GPOS, you need to be each estuel.
· You May Want to Consider Using Site-Wide Gpos for Specifying Policy for Proxy Settings and Network-Related Settings.
In General, IT IS Recommended That You Link Gpos To Domains and Organizational Units Rather Than Sites.Using Group Policy and Internet Explorer Enhanced Security Configuration
Windows Server 2003 include Configuration for Internet Explorer, Called Internet Explorer Enhanced Security Configuration, Also Known AS Internet Explorer Harden.
You can manage Internet explorer enhanced security configuration by:
· Enabling or disabling Internet Explorer Enhanced Security Configuration. This is commonly used in situations where you want to ensure that Internet Explorer Enhanced Security Configuration is always enabled. For example, Internet Explorer Enhanced Security Configuration might need to be reapplied on a specific computer if the Local Administrator On That Computer Disables It Using The Optional Component Manager in The Windows Components Wizard (Available from Add or Remove Program).
· Restricting who can manage trusted sites and other Internet Explorer security settings on a server. This is commonly used when you want to ensure that all servers have the same Internet Explorer Enhanced Security Configuration settings. For example, you might want to configure Internet Explorer Enhanced Security Configuration So That Machined-Based Security Settings Are Applied to Each Server Rather Than User-based security settings.
· Adding trusted Web sites and UNC paths to one of the trusted security zones. This is commonly used when you want to allow users access to specific Web sites and corporate resources, but still reduce the risk of users downloading or running malicious content.
Enhanced Security Configuration impacts the Security Zones and Privacy settings within the Internet Explorer Maintenance settings of a GPO. The Security Zones and Privacy settings can either be enabled with Enhanced Security Configuration or not.When you edit settings for Security Zones and Privacy settings in a GPO from a computer where Enhanced Security Configuration is enabled, that GPO will contain Enhanced Security Configuration-enabled settings. When you look at the HTML report for that GPO, the Security Zones and Privacy heading will be appended with the text (Enhanced Security Configuration enabled) .
When you edit settings for Security Zones and Privacy settings in a GPO from a computer where Enhanced Security Configuration is not enabled, that GPO will contain Enhanced Security Configuration-disabled settings. ESC is not enabled on any computer running Windows 2000 or Windows XP, nor On Computers Running Windows Server 2003 WHERE ESC HAS BEEN EXPLICITLY DISABLED.
Enhanced Security Configuration settings deployed through Group Policy will only be processed on and applied by computers where Enhanced Security Configuration is enabled. Enhanced Security Configuration settings will be ignored on computers where Enhanced Security Configuration is not enabled (all computers running Windows 2000 and Windows XP, . and Windows Server 2003 computers where Enhanced Security Configuration has been explicitly disabled) The converse is also true: A GPO that contains non- Enhanced Security Configuration settings will only be processed on and applied by computers where Enhanced Security Configuration is not enabled.
For more information, see Managing Internet Explorer Enhanced Security Configuration, available from the Microsoft Group Policy Web site at http://www.microsoft.com/grouppolicy.IntelliMirror Features without Active Directory
The full functionality of IntelliMirror? Management technologies requires Active Directory and Group Policy. However, in an environment without Active Directory and Group Policy, some of the capabilities are available. You can still implement the following IntelliMirror features to manage clients running Windows 2000 or later :
Roaming User Profiles and Logon Scripts
· Folder Redirection
· Internet Explorer Maintenance
· Administrative Templates (Registry-based Policy)
ROAMING User Profiles and Logon Scripts
.
Folder Redirection
You Can Redirect Special Folders to Alternate Locations, Either to a local or network location. You do this by modifying the value:
HKCU / Software / Microsoft / Windows / CurrentVersion / Explorer / Shell Folders
.
Folder Name My Documents Personal My Pictures My Pictures Application Data Appdata Desktop Desktop Start Menu Start Menu
Internet Explorer Maintenance
Instead of using Group Policy to control Internet Explorer settings, administrators can use the Internet Explorer Administration Kit (IEAK) to apply settings to Internet Explorer clients using auto-configuration packages The IEAK can be downloaded from the Microsoft IEAK Web site at http:. / / www.microsoft.com/windows/ieak.applying administrative templates (registry-based policy)
Domain-based Group Policy processing requires that the User and / or Computer objects be located in Active Directory. If the User or Computer objects are located in a Windows NT 4.0 domain, then Windows NT 4.0 System Policy will be processed for whichever of these objects is located in that domain-this could be the Computer or User object, or both System Policy is defined as the policy mechanism used natively in Windows NT 4.0;. it is a set of registry settings that together define the computer resources available to a group Of Users or An Individual. (Also Be aware That The Local GPO is always process)
Setting Registry-Based Policy In A Windows NT 4.0 Domain
A client running Windows 2000 or Windows XP Professional will process System Policy if either the user or computer account are in a Windows NT 4.0 domain. The client looks for the Ntconfig.pol file used by Windows NT 4.0-style System Policy. By default, IT Looks for this File in The Netlogon File Share of The Authenticating Windows NT 4.0 Domain Controller.
MIGRATING Policy-Enabled Clients from Windows NT 4.0 To Windows 2000 or Windows Server 2003
This Section Discusses Behavior of Group Policy and System Policy In Relation To Migration To Windows 2000 Or Windows Server 2003.
Windows NT 4.0 and Windows 2000 Policy Setting Comparison
Group Policy differs greatly from System Policy in Windows NT 4.0. Although Group Policy does include the functionality from Windows NT 4.0 System Policy, it also provides policy settings for scripts, software installation, security settings, Internet Explorer maintenance, folder redirection, and Remote Installation Services.in Windows NT 4.0 (And Windows 95 and Windows 98), System Policies:
· Are Applied to Domains.
· May Be Further Controlled by User Membership In Security Groups.
.
· Persist in users' profiles (this is sometimes referred to as tattooing the registry), as explained earlier in this paper This means that after a registry setting is set using Windows NT 4.0 System Policies, the setting persists until the specified policy is reversed or The User Edits The Registry.
· Are Limited to Desktop LockDown.
In Windows 2000 and Windows Server 2003, Group Policy:
· Represents the primary method for enabling centralized Change and Configuration Management. You can use Group Policy to manage registry-based policy, software installation options, security settings, scripts (for computer startup and shutdown, and for user logon and logoff), Internet Explorer Maintenance, Folder Redirection, And Remote Installation Services.
· Can Be Linked to Sites, Domains, And ORGATIONAL Units.
· Affects All Users and Computers in the specified active Directory Container (Site, Domain, or Organization) by Default.
· May Be Further Controlled by User Or Computer Membership in Security Groups.
MAY Be further controlled by use of wmi filtering.
· Settings are second.
........................ ..
The Windows NT 4.0 effect of persistent registry settings can be problematic when a user's group membership is changed. An advantage of Windows 2000Group Policy is that this does not occur. When a GPO no longer applies, registry settings written to the following secure registry locations are REMOVED:
· HKLM / Software / Policies
· HKLM / Software / MS / Windows / CurrentVersion / Policies
· HKCU / Software / Policies
· HKCU / Software / MS / Windows / CurrentVersion / Policies
Migrating to windows 2000 or windows server 2003
Migrating Windows NT 4.0-based clients and servers to Windows 2000 or Windows Server 2003 in various combinations causes different behavior for Group Policy. In a pure Windows 2000 or later environment where both the user and computer accounts are in a Windows 2000 or later domain, Windows 2000 or later clients process only Group Policy. System Policy is not processed. However, Windows 2000 or Windows XP clients can process System Policy in cases where either the user account and / or the computer account is not located in a Windows 2000 or Windows Server 2003 Domain.
In many organizations it may be impractical to upgrade all Windows NT 4.0-based servers and client computers simultaneously to Windows Server 2003 and Windows XP. In this case, it is important that you know how Group Policy and Windows NT 4.0 System Policy are affected during THIS Section Presents Information on The Effects of Migration On Group Policy.
Client Computers
Group Policy applies only to computers running Windows 2000 or later. There is no mechanism to process Group Policy on clients running Windows NT 4.0, Windows 95, Windows 98, and Windows Millennium Edition.Upgrading Computer or User Accounts from Windows NT 4.0 to Windows Server 2003
When migrating from Windows NT 4.0, it's recommended to perform a clean installation of Windows Server 2003. To facilitate a clean installation, you can use the User State Migration Tool to migrate the users' data and settings to the new installation.
For More Information About Migrating from Windows NT 4 System Policy, See Windows 2000 Group Policy White Paper At http://www.microsoft.com/windows/tructionment/grouppolwp.asp.
Using Group Policy In a Mixed Environment of Windows 2000 and Windows XP Clients
Active Directory with Windows 2000 and Windows XP Clients
......................... ..
Comparing Intellimirror Features on Windows 2000 and Windows XP
.
Comparing Clients Under Windows Server 2003 Active Directory
FEATURE
Supported in Windows 2000 Client
Supported in Windows XP Client
Group Policy Yes Yes GPMC No. But Windows 2000 clients can be managed with GPMC running on Windows Server 2003 Yes Local Group Policy Yes Yes System policy Yes Yes Roaming profiles Yes Yes Folder redirection Yes (No home directory redirect) Yes Software installation Yes Yes Internet Explorer Maintenance Yes Yes Security Settings Yes Yes Software Restriction Policies No YesComparing Clients Under Windows 2000 Active Directory
Feature Supported in Windows 2000 Supported in Windows XP Group Policy Yes Yes GPMC No. But Windows 2000 clients in a Windows 2000 domain can be managed with GPMC installed on a computer running Windows XP or a member server running Windows Server 2003. Yes Local Group Policy Yes Yes System policy Yes Yes Roaming profiles Yes Yes Folder redirection Yes (No home directory redirect) Yes Software installation Yes Yes Internet Explorer Maintenance Yes Yes Security Settings Yes Yes Software restriction policies No Yes (via Local Group Policy Object)
Comparing Clients Under Windows NT Server 4.0
Feature Supported in Windows 2000 Supported in Windows XP System policy Yes Yes Group Policy No No Local Group Policy Yes Yes Roaming profiles Yes Yes Folder redirection No No Software installation No No Internet Explorer Maintenance Yes, with Internet Explorer Administration Kit (IEAK) Yes, with IEAK. Security Settings No No Software Restriction Policies No No NO
Folder Redirection and Software Installation
Because Background Refresh Is The Default Behavior in Windows XP, Folder Redirection and Software Installation May Require AS Many As Three Logons To Apply Changes.
This behavior exists because Folder Redirection and Software Installation can not apply during an asynchronous or background application of policy Folder Redirection can only apply when processed synchronously.Here is a sample scenario showing how polices are applied.:
1. An Administrator Deploys a Software Package to User A.
2. User A Logs on Fast and Receives A Background (asynchronous) Application of Policy.
3. Because The Policy Application Was asynchronous
4. The next time the user logs on, the machine instead logs on the user synchronously to allow the software package to be installed. (This is the same behavior as Windows 2000). This results in one extra logon for the software to be installed .
In the case of Advanced folder redirection, because policy is evaluated based on security group membership three logons will be required: the first logon to update the cached user object (and security group membership), the second logon for policy to detect the change in security Group Membership and Require A Foreground Policy Application, and The Third Logon to Actually Apply ForeGround.
Note When a client running Windows XP logs onto a Windows 2000 or Windows Server 2003 Active Directory, all Software Installation policy settings for Windows 2000 clients will be applied and work successfully on the Windows XP client.
Internet Explorer Maintenance
There Are No Changes in Internet Explorer Maintenance Across Windows XP and Windows 2000.
Roaming Profiles
Users with roaming profiles can roam between Windows 2000 and Windows XP-based workstations without any changes in behavior. The new profile registry policy settings only work on Windows XP. If you apply these settings to a client running Windows 2000, they will have no effect .Security settings
Software Restrictions Policies were introduced in Windows XP. If you apply software restriction policy to a client running Windows 2000 it will have no effect. The software restriction policy registry settings will be written to the registry, but the Windows 2000 client will not know how to Interpret them.
64 Bit Integration Issues
If you apply a 64-bit package to Windows 2000 or a 32-bit version of Windows XP, it will not be advertised by default; however, you can override this behavior using the 64-bit deployment options in the Application Deployment Editor (ADE ). If you apply a 64-bit package to a 64-bit version of Windows XP, IT Will Be SuccessFully Advertise.
Appendix A: Security Settings and User Rights
This appendix lists the Security Settings that are defined by default in the Default Domain Policy GPO. This GPO is created when the first domain controller in the domain is installed by the Active Directory Installation Wizard. If this first domain controller is upgraded from a Windows NT 4.0 Domain Controller, The Values Defined for The Windows NT 4.0 Domain Are Used Instead.
These domain-wide account policy settings (Password Policy, Account Lockout Policy and Kerberos Policy) are enforced by the domain controller computers in the domain; therefore, all domain controllers always retrieve the values of these account policy settings from the Default Domain Policy GPO.
Policy Default Value Comment Password Policy Enforce Password History 1 Password RemembedMaximum Password Age 42 Days
Minimum Password Age 0 Days
Minimum Password Length 0 Characters
Passwords Must Meet Complexity Requirements Disabled
Store Password Using Reversible Encryption for All Users in The Domain Disabled
Account Lockout Policy Account Lockout Threshold 0
Kerberos Policy
Since Kerberos support was not available in previous versions of Windows NT, the following Kerberos policy settings are always defined for the first domain controller of a Windows 2000 or Windows Server 2003 domain, regardless of whether it was upgraded or not.
Enforce User Logon Restrictions. Enabled
Maximum Lifetime That A User Ticket Can Be Renewed 7 Days Maximum User Ticketime 10 Hours
Maximum Service Ticket Lifetime 60 Minutes
Maximum Tolerance for Synchronization of Computer Clocks 5 minutes
SECURITY OPTION AUTIN TIME EXPIRES DISAIN TIME EXPIRES DIS A DOMAIN-WIDE SETTING EVEN THOUGH IT APPEARS Under The Security Options Area.
Security Settings in the default domain controller
This section lists the Security Settings that are defined by default in the Default Domain Controller Policy GPO. This GPO is created when the first domain controller in the domain is installed via the Active Directory Installation Wizard. If this first domain controller is upgraded from a Windows NT 4.0 Domain Controller, The Values Defined for The Windows NT 4.0 Domain Are Used Instead.
By Default, Thase Settings Apply To All Domain Controllers in the domain.
Policy
Default Value
Comment
Security Options
DIGITALLY SIGN Server-Side Communication When Possible
Enabled
Audit Policy
Audit Account Logon Eventsno Auditing
Audit Account Management
No auditing
Audit Directory Service Access
No auditing
Audit Logon Events
No auditing
Audit Object Access
No auditing
Audit Policy Change
No auditing
Audit privilege us
No auditing
Audit Process Tracking
No auditing
Audit System Events
No auditing
User Rights Policy
Access this computer from the network
Administrators, Authenticated Users, Everyone
IF The Following Groups Were Given this Right Prior To Running The Active Directory Installation Wizard, THEY ARE Removed: Backup Operators, Guests, Guest, and users.
IF A Windows NT 4.0 Domain Controller IS Upgraded As The First Windows Server 2003 Domain Controller, The Authenticated Users Group is Automatic Given this Right.
Act As Part of the Operating System
Add Workstations to the Domain
Authenticated users
. L a.
Back Up Files and Directories
Administrators, Backup Operators, Server Operators
Bypass traverse checking
Administrators, Authenticated Users, Everyone
IF The Following Groups Were Given this Right Prior To Running The Active Directory Installation Wizard, THEY Are Removed: Backup Operators, Users.
Change the system time
Administrators, Server Operators
Create a Pagefile
Administrators
Create a token Object
Create Permanent Shared Objects
Debug Programs
Administrators
Force Shutdown from a Remote System
Administrators, Server Operators
Generate Security Audits
INCREASE quotas
Administrators
Increase Scheduling Priority
Administrators
Load and Unload Device DriversAdministrators
LOCK PAGES IN MEMORY
LOG ON as a batCh job
LOG ON AS A Service
Log on locally
Account Operators, Administrators, Backup Operators, Server Operators, Print Operators
IF The Following Groups Were Given this Right Prior To Running The Active Directory Installation Wizard, THEY Are Removed: Authenticated Users, Guests, Guest, Users, and Everyone.
Manage Auditing and Security Log
Administrators
Modify Firmware Environment Variables
Administrators
PROFILE SINGLE Process
Administrators
Profile System Performance
Administrators
Replace a Process-Level Token
RESTORE Files and Directories
Administrators, Backup Operators, Server Operators
Shut down the system
Account Operators, Administrators, Backup Operators, Server Operators, Print Operators
IF The Following Groups Were Given this Right Prior To Running The Active Directory Installation Wizard, THEY Are Removed: Authenticated Users, Guests, Guest, Users, and Everyone.
Take Ownership of Files Or Other Objects
Administrators
Deny Logon LOCALLY
Deny logon as a batCh job
Deny Logon as a service
Deny Access to this Computer from network network
REMOVE COMPUTER from Docking Station
Administrators
IF The Following Groups Were Given this Right Prior To Running The Active Directory Installation Wizard, THEY Are Removed: Users.
SYNCHRONIZE DIRECTORY Service Data
ENABLE COMPUTER AND User Accounts To Be Trusted for Delegation
Administrators
IF The Following Groups Were Given this Right Prior To Running The Active Directory Installation Wizard, THEY Are Removed: Users.
Help for Windows NT 4.0 Administrators
This section provides information to help administrators who have been using User Manager to configure security policy settings in the past move to the new model of Group Policy for editing and configuring security policy settings.Changing Password Policy for the Domain
To change Password Policy for the domain, Open the Default Domain GPO from The Administrative Tools Menu:
1. Click Start, Point To Programs, Click Administrative Tools, And The Click Domain Security Policy.
2.IN The Domain Security Policy Console, Expand Security Settings, Expand Account Policies, Expand Password Policy, and the Select The Policy You Want To Modify In The Results Pane. You can the make change.
Changing Auditing Policy or User Rights for Domain Controllers
To change the audit policies or usr rights defined for Domain Controllers, Open the default domain
Controllers GPO from The Administrative Tools Menu:
1. Click Start, Point To Programs, Click Administrative Tools, And The Click Domain Controller Security Policy.
2.In the Domain Controller Security Policy console, expand Security Settings, expand Local Policies, click either Audit Policy or User Rights Assignment, and then select the policy you want to modify in the results pane.
Changing Local Password Policy On Member Workstations Or Servers (Non-Domain Controllers)
Because the Default Domain Policy GPO applies to all computers in the domain and because domain-level policy settings override local policy settings, member workstations and servers apply the Default Domain password policy settings to their local account databases by default. If this does not meet your requirements, then the permissions on the Default Domain GPO have to be reconfigured so that member computers that you do not want to receive this policy do not have the Apply Group Policy permission on the Default Domain GPO. After the permissions are configured so that the member computer does not have access to the default domain policy, local policy settings will no longer be overridden by the password policy settings defined in the default Domain GPO.To modify local password Policy security settings using the local Security Policy UI:
1. Click Start, Point To Programs, Click Administrative Tools, And The Click Local Security Policy.
2.IN The Local Security Settings Console, Expand Security Settings, Expand Accent Policy, Click Password Policy, And The Policy You Want to Edit.
FREQUENTLY Asked Questions about Security Settings
IS IT POSSIBLE TO Define Different ACCOUNT Policies (Password, Lockout, or Kerberos Policies for Different Organizational Units?
No. All domain controllers for a domain enforce the account policy settings that are defined in the Default Domain Policy. Domain controllers ignore password, lockout, or Kerberos policy settings defined at an organizational unit or Local GPO level.
After Modifying a Local Security Setting, The Change Does Not Take Effect. What is happens?
The Group Policy model specifies that any policy settings configured locally may be overridden by like policy settings specified in the domain. The Local Security Settings UI lists the local security setting and the effective security setting for each policy item. (You can access the Local Security Settings UI by clicking Start, pointing to Programs, clicking Administrative Tools, and selecting local Security Policy). If the effective security setting is different from the local security setting, it implies that there is a policy from the domain that is overriding your setting. After Modifying a Domain-Level-Policy Security Setting, The Change Does Not Take Effect. What is happening?
The Group Policy model applies domain-level policy changes periodically;. Therefore, it is likely that the policy changes made in the directory have not been made to your computer yet To trigger a policy propagation on a local computer, type the following at the command Line:
SECEDIT / RefreshPolicy Machine_Policy
This will cause any changes made to domain-level policy settings to be applied to the local computer. To force a reapplication of policy to domain-level policy settings, regardless of whether there has been a change or not, type the following at the command Line:
SECEDIT / RefreshPolicy Machine_Policy / Enforce
You can determine whether or not security was applied successfully by viewing the Application Event Log If an error occurred during the process of applying security policy, you can get detailed information by setting the following REG_DWORD to 0x02.:
HKEY_LOCAL_MACHINE / Software / Microsoft / Windows NT / CurrentVersion / WinLogon / GPEXTensions / {827D319E-6EAC-11D2-A4EA-00c04F79F83A} / ExtensionDebuglevel
When this value is set, the Security Configuration Engine (SCE) will log policy-processing information in the Winlogon.log file at% windir% / Security / Logs / Winlogon.log.What is the Add Workstation to Domain Logon right, and how Does it Release to DELGATING SIMILAR Permissions on the Directory?
The Add Workstation to Domain user right is supported for applications that use earlier SAM (Security Accounts Manager) NET APIs to create computer accounts. Users that have this right are allowed to create 10 computer accounts in the Active Directory Computers container using these earlier APIs. WHEN A User Creates A Computer Account Uns User Right, The Domain Admins Group Becomes The Owner of The Computer Object. Note That Right Is Not Recognized When LDAP IS Used To Create Computer Accounts.
In Windows 2000 and later, the recommended way to allow a user or group to create computer accounts is by granting that user or group the permission to Create Computer Objects on the desired container. This can be accomplished in GPMC. When a computer account is created Using Access Control Permissions, The Actual Creator of The Object Becomes The Owner of That Object.
Note:.. The create-computer-object permission should not be granted indiscriminately Allowing users to create computers in the domain is similar to allowing users to create user accounts in the domain Unlike Windows NT 4.0, Windows Server 2003 computer objects can be used to do network authentication and, hence, to access resources over the network. Users that have access permissions to create computer objects are also not subject to any quota restrictions. that is, they can create any number of computer accounts.
The best security practice would be to grant only trusted users (by using a group) the permission to create computer objects. At the time the computer object is created, the creator can define which users are allowed to use that computer object to join their physical Computer to the domain.appendix b: group policy storage
GROUP Policy Objects Store Information In Two Locations: a Group Policy Template.
Group Policy Container
The Group Policy container is an Active Directory container that stores GPO properties; it includes sub-containers for computer and user Group Policy information The Group Policy container has the following properties.:
.......................
· Status Information. This Indicates WHETHER THE GPO is enabled or disabled.
· List of components (extensions) That has settings in the gpo.
· File System path. The UNC path to the sysvol folder.
· Functionality Version. This is the version of the Tool That created The gpo. Currently, this is version 1.
For example, the Group Policy container stores information used by the Software Installation snap-in to describe the state of the software available for installation. This data repository contains data for all applications, interfaces, and APIs that provide for application publishing and assigning.
Group policy template
Group Policy objects also store Group Policy information in a folder structure called the Group Policy template that is located in the System Volume folder of domain controllers (Sysvol) in the / Policies sub-folder. The Group Policy template is the container where Security Settings, Administrative Template-based policy settings, applications available for Software Installation, and script files are stored.When you modify a GPO, the directory name given to the Group Policy template is the GUID of the GPO that you modified. for example, assume that you Modified a gpo associated with a domain called seattle. The resulting group policy template folder Would Be named As Follows (The Guid IS An Example):
% systemroot% / sysvol /
Where the second sysvol is shared as sysvol. (The Default Location of The Sysvol Folder IS% SystemRoot%).
Gpt.ini file
At The Root of Each Group Policy Template Folder IS A File Called GPT.INI. For local group policy objects, the gpt.ini file stores information indecent the fol
· Which Client-Side Extensions of The Group Policy Object Editor Contain User Or Computer Data in The GPO.
· WHETHER THE User or Computer Portion is disabled.
· Version Number of the GROUP Policy Object Editor Extension That Created The Group Policy Object.
For The Local GPO, The Gpt.ini File Contains The Following Information:
[General]
gPCUserExtensionNames // Includes a list of GUIDs that tells the client side engine which Client Side Extensions have User data in the GPO.The format is: [{GUID of Client Side Extension} {GUID of MMC extension} {GUID of second MMC extension if ApproPriate}] [Repeat First Section As Appropriate] .GpcmachineextensionNames // Includes a list of guids Tells The Client Side Engine Which Client Side Extensions Have Machine Data In The GPO.
Options ..// refers to GPO OPTIONS Such As User Portion Disabled.
GPCFunctionArationVersion // The Version Number of The Group Policy Extension Tool That Created The Group Policy Object.
GPT.INI for Active Directory GPOS
The GPT.INI File for Active Directory GPOS Contains The Following Entries, Which Are Stored In Active Directory:
Version = 0 // Version Number of the Group Policy Object
DisplayName // Display Name of the GPO
Local Group Policy Objects
A local Group Policy Object exists on every computer, and by default it contains only security policy (that is, other types of policy settings are not configured by default). The local GPO is stored in% systemroot% / System32 / GroupPolicy, and it HAS The Following ACL Permissions:
· Administrators: Full Control
· Operating System: Full Control
User: Read
Group Policy Template Subfolders
The Group Policy Template Folder Contains The Following Subfolders:
· User. Includes a Registry.pol file that contains the registry settings to be applied to users. When a user logs on to a computer, this Registry.pol file is downloaded and applied to the HKEY_CURRENT_USER portion of the registry.
The User Folder May Contain The Following Subfolders:
· Applications. Contains the advertisement files (.aas files) used by the Windows installer. These are applied to users. · Documents and Settings. Contains the Fdeploy.ini file, which includes status information about the Folder Redirection options for the current user's special Folders.
· Microsoft / RemoteInstall. Contains the OSCFILTER.INI File, Which Holds User Options for OPERATING SYSTALLATION THROUGH Remote Installation Services.
· Microsoft / IEAK. Contains Settings for the Internet Explorer Maintenance Snap-in.
· Scripts all the user logon scripts all the user logs.
Scripts all the user logoff scripts all the user logoff scripts all the user logoff scripts all the user logoff scripts and related files for this gpo.
· Machine. Includes a Registry.pol file that contains the registry settings to be applied to computers. When a computer initializes, this Registry.pol file is downloaded and applied to the HKEY_LOCAL_MACHINE portion of the registry.
The Machine Folder May Contain The Following Subfolders (Depending On The GPO):
· Scripts / startup. Contains The Scripts That Are To Run WHEN The Computer Starts Up.
· Scripts the scripts That area to run..............
Applications. Contains The Advertisement Files (.aaS files) Used by the Windows Installer. The Windows Installer...................
· Microsoft / Windows NT / SECEDIT. Contains The GPTTMPL.INF File, Which Includes The Default Security Configuration Settings for A Windows 2000 Domain Controller.
· ADM. Contains all of the .adm files for this gpo.
The User and Machine Folders Are Created Atall Time, And The Other Folders Are Created As Needed When Policy Is Set.Registry.Pol Files
The Administrative Templates snap-in extension of Group Policy saves information in the Group Policy template in Unicode files referred to as Registry.pol files; they are stored in the Group Policy template These files contain the customized registry settings that you specify (by using. THE Group Policy Object Editor) To be Applied to the Computer (HKEY_CAL_MACHINE) or user (HKEY_CURRENT_USER) Portion of the registry.
Two Registry.pol files are created and stored in the Group Policy template, one for Computer Configuration, which is stored in the / Machine subdirectory, and one for User Configuration, which is stored in the / User subdirectory.
When you use the Administrative Templates extension of the Group Policy Object Editor to define customized registry settings, two Registry.pol files are created and stored in the Group Policy template. One Registry.pol file is for Computer Configuration-related registry settings and is stored In the / Machine Sub-Directory, and The Other Is for User Configuration Settings and is Stored in The / User Sub-Directory.
The Registry.Pol File Consists of a header and registry values.
The Header Contains Version Information and Signature Data, Both DWORD VALUES:
Regfile_signature 0x67655250
Registry_file_version 00000001 (Increments Each Time The File Format Changes)
The Registry Values Begin with an opening bracket ([) and end with a closing bracket (]:
[key; value; size; data]
WHERE:
Key is the path to the registry key to use for the category Do not include HKEY_LOCAL_MACHINE or HKEY_CURRENT_USER in the registry path The location of the file determines which of these keys is used.The following value has special meaning for this field..:
** deleteKeys-a semi-colon-delimited list of values to delete. For example: ** deleteKeys norun; nofind.
Value is the name of the registry value. The Following Values Have Special Meaning for this field:
· ** Deletevalues-a semi-colon-delimited list of values to delete. Use as a value of the associated key.
· ** DEL.VALUENAME-DELETES A SINGLE VALUE. Uses as a value of the associated key.
· ** Delvals-deletes all values in a key. Use as a value of the associated key.
TYPE IS A DATA TYPE. The Field Can Be Any The Standard Registry Value Types, for example:
· REG_DWORD
· REG_EXPAND_SZ
· REG_SZ
Note That Although The File Format Supports All The Registry Data Types (Such As REG_MULTI_SZ), The Administrative Templates Node Does NOT Support these Registry Types: reg_binary, reg_multi_sz.
Size is the size of the data field in bytes. For example, 4.
Data is The Raw Information. For Example, 4 bytes of data 0x00000001.
IT IS Possible That The Valuename, Type, Data, And Size Could Be Missing OR 0. In this case, Only the key shouth be created.
This pattern of [] entries continues untric the end of the file.
The Following Special Values Are Used for Deleting Keys and Values:
· ** DeleteKeys // Semi-Colon-Delimited List of Keys to Delete.for Example: ** DeleteKeys REG_SZ NORUN; NOFIND.
** deletevalues // semi-colon-delimited list of values to delete.used as a value of the designated Key.
· ** DEL.VALUENAME // DELETES A SINGLE VALUE NAME.USED AS A Value of The Designated Key. ** Delvals // DELETES All Values IN a KEY. Used as a value of the designated key.
The Registry.pol file contains data to be written to the registry based on the settings specified with the Group Policy Object Editor, and the names of any scripts and their command lines (in the form of registry keys and values).
How registry.pol files area created
The Following Section Outlines How To Form Registry.pol Files:
· WHEN You Start The Group Policy Object Editor, a Temporary Registry Tree Is Created That Consists of Two Nodes: user and machine.
· As you navigate the Administrative Templates node of the Group Policy Object Editor, .adm file nodes are displayed. The .adm files within the Group Policy Object Editor nodes are loaded dynamically when a particular node is selected, and the .adm file is then Cached.
· When a policy is selected in the details pane (the right side of MMC console window), the temporary registry is queried to determine whether the selected policy already has registry values assigned to it; if it does, those values are displayed in the Policy Dialog Box. if The Selected Policy Does Not Have A Registry Value Assigned To It, The Default Value from The .adm File or from The Associated MMC Snap-in Extension IS USED.
After you modify a policy, the registry value. You Specify Are Written to the appropriate Portion of the temporary registry.
· When You Close The Group Policy Object Editor, The Temporary Registry Hives Are Exported to The Registry.pol Files In The Appropriate Folders of The Group Policy Template.
· The next time you start the Group Policy Object Editor for the same Group Policy Object for which you have previously set Group Policy settings, the registry information from the corresponding Registry.pol files is imported into the temporary registry tree. Therefore, when you view The Policy Settings, They Reflect The Current State.Appendix C: WMI Filtering
HOW WMI Works
.............
When a filter is applied to a GPO, it will be evaluated on the client computer. The GPO will only be applied if the entire query results in TRUE. Note that a GPO will be processed if no WMI filter has been selected.
.
For example:
· IF NO WMI FILTER IS SELECTED, All WMI Filters Are Assumed to Evaluate To True; Therefore, All GPOS Will Apply.
· IF a filter specified in the RSOP Wizard Matches a Given GPO, The GPO WILL BE EVALUATED.
· In the RSoP wizard, the wizard will show all the filters based on the list of GPOs that apply to a computer or user. If a filter is removed from the filter list, it is assumed to evaluate to false and the GPO that is associated With the filter will not apply.
Active Directory Schema Additions
A New Property Called "GPCWQLFILTER" HAS BEEN ADDED TO The Properties of A GPO. It incduDes The names the WMI Filter.
USING WMI IN MIXED ENVIRONMENTS
Clients running Windows 2000 or earlier versions do not have support for WMI filters. They may however be affected by a GPO that has specified a WMI filter. In this case, the client will process the GPO as if the filter evaluated to TRUE because it has no way of knowing if it were FALSE.However, a mixed environment supports the schema changes required to enable WMI filters. Windows Server 2003-based servers with WMI filter-enabled GPOs will continue to handle Windows 2000 clients as they did previously.
WMI Filters are Only Available in Domains That Have at Least One Windows Server 2003 Domain Controller. In An Environment Consisting Only Of Windows 2000 Domains, The WMI Filter Node in GPMC is Not shown.
Examples of WMI Filters
This Section Illustrates Some Scenarios In Which Administrators Use WMI Filtering to Achieve a Specific Goal.
Software Inventory-based Targeting (ORED SET)
A company purchases a site license for a new bounds-checker tool that helps software developers write more reliable code. Because the bounds-checker only works with Visual Basic ?, Visual C, and Visual C ,? the administrator wants to assign the package only On Computers Running Any of these Programs.
The Administrator Chooses The Following Filter:
Root / Cimv2; Select * from win32_product where name = "msipackage1" or name = "msiPackage2" or name = "msipackage32"
Note: it may be more reliable to use identifyingnumber
Software Inventory-based Targeting (anded Set)
A software company discovers that the interaction of three software products causes instabilities on the system. The company develops a hot fix but only wants to install it on computers where this interaction is possible.
The Administrator Chooses The Following Filter: root / cimv2; select * from win32_product where name = "msiPackage1"
Root / cimv2; select * from win32_product where name = "msiPackage2"
Root / Cimv2; Select * from win32_product where name = "msiPackage3"
Note: It may be more reliable to use ideiffnumber.
Operating system-based targeting
.
The Administrator Chooses The Following Filter:
Root / Cimv2; Select * from win32_operatingsystem where caption = "Microsoft Windows 2000 Advanced Server" or CAPTION = "Microsoft Windows 2000 Server"
Hardware inventory-based targeting
. An administrator wants to deploy a new connection-manager but needs to avoid wasting space on desktop computers without modems where the connection manager would be useless An administrator can deploy the package across the enterprise with the following WMI-filter:
Root / Cimv2; SELECT * WIN32_POTSMODEM
Resource-based targeting
To encourage field engineers and consultants to use documentation, a company wants to make Help systems available directly on users' hard disks. But because users complain that the Help files consume too much space, a manager decides to only deploy the documentation on computers that have AT Least 600 Megabytes (MB) Available.
An Administrator CAN Accomplish this with the folloading wmi filter:
Root / Cimv2; SELECT * WIN32_LOGICALDISK Where FreeSpace> 629145600 and Description <> "NetWork Connection"
Computer-based Targeting
An administrator wants to set up a policy to encrypt all "My Documents" folders on notebook computers. The administrator determines that all the company's notebook computers are Toshiba Tecra models 800 and 810.To set up the policy, an administrator uses the following WMI filter :
Root / Cimv2; Select * from win32_computersystem where manufacture = "toshiba" and model = "TECRA 800" or model = "Tecra 810"
Ask Tag-Based Targeting
An Administrator Wants To Set Hardware Inventory Monitoring Policy for All Computers with an "asset tag" of 300,000-355555.
To set up the policy, An Administrator Uses The Following WMI FILTER:
Root / Cimv2; Select * from win32_systemenclosure where scbiosassettag> '300000' and Smbiosassettag <'355555'
Hardware Configuration-Based Targeting
An Administrator Wants to Target A Policy for All Computers That Have A Network Adapter on Interrupt Number 11. The Administrator Chooses The Following Filter:
Root / Cimv2; Associators of {Win32_IrqResource.irqNumber = 11} where resultclass = Win32_networkadapter
Configuration-based Targeting
An Administrator Wants To Avoid Turning On "Netmon" on Computers enabled with multicasting turned on. The Administrator Chooses The Following Filter:
Select * from win32_networkprotocol where supportsmulticasting = true
File attribute-based targeting
An Administrator Only Wants To Disable Sharing of Folders on Systems Where At Least One of "My Documents" Directories Are Not Encrypted. The Administrator Chooses The Following Filter:
Root / Cimv2; Select * from win32_directory where filename = 'my documents' and encrypted = false
Time zone-based targeting
An Administrator Needs to Target A Policy ON All Servers Located on The East Coast of The United States. The Administrator Chooses The Following Filter: Root / Cimv2; SELECT * WIN32_TIMEZONE WHERE BIAS = -300
Hot fix-based targeting
An Administrator Only Wants To Apply a Policy On Computers That Have A Specific Hot Fix Or Qfe. The Administrator Chooses The Following Filter:
Root / Cimv2; Select * from win32_quickfixengineering where hotfixid = 'Q147222'
Further Information
The WMI SDK has a tool called cimstudio. This allows users to find a class, searching by name, description, property name, and so forth. Users can then experiment with queries on the class and optimize it before creating a new filter. For more Information, See Windows Management Instrumentation in The Microsoft Platform SDK At http://msdn.microsoft.com/library/default.asp?url=/library/en-us/wmisdk/wmi/wmi_start_page.asp.
Appendix D: Frequently asked Questions
This Section Presents Frequently Asked Questions on Group Policy.
INFRASTRUCTURE - Server Side
Is IT Possible To Set Up Individual Computer or User Policy Settings?
You can not set up any Group Policy directly on a computer or user object; a GPO can only be associated with sites, domains, and organizational units To apply a GPO to a subset of users or computers (or even a single user or computer). Withnin a site, domain, or Organizational unit, you can use wmi or security filtering.
For Information on Filtering, See The Section Earlier in This Document, Filtering The Scope of The Group Policy Object.
What Are the inheritance rules for group policy and activ DIRECTORY?
Group Policy is processed in the following order: Local GPO, site, domain, organizational unit, and additional child organizational units This means that the Local GPO is processed first, and the organizational unit to which the computer or user belongs (the one that. it is a direct member of) is processed last All of this is subject to the following exceptions:. · Any domain-based GPO (not local GPO) may be enforced by using the Enforce option so that its policy settings can not be overwritten When. ......................
· At any site, domain, or organizational unit, Group Policy inheritance may be selectively designated as Block Inheritance However, blocking inheritance does not prevent policy from enforced GPOs from applying;. This is because enforced GPOs are always applied, and can not be blocked.
IF you apply policy sets orthol groups (of any kind) and no users, Are the policy settings applied to the members of the group?
NO, GPOS Are Applied Only to The Users and Compute Are Me Member of The Organizational Unit.
Can you apply a gpo Directly to a security group?
No, GPOs are applied only to the users and computers that are members of a site, domain, or organizational unit organizational unit. However, you can filter the scope of a GPO in one of two ways by using WMI filtering or security filtering based on MEMBERSHIP OF THOSE USERS IN A Security Group, by Adjusting The Dacl Permissions for That Group on The GPO. THIS Design Was Chosen for Performance Reasons.
You can also filter the scope of a GPO on a site, domain, or organizational unit by using the Security tab on the GPO Properties page to set DACL permissions and selecting an access control entry called Apply Group Policy.For information on filtering, see the Section earlier in this document, filtering the scope of the group policy object.
Why can't i delete the default gpo (default domain policy), No Matter Which Administrative Group I Belong TO?
By default, the Delete Access Control entry has not been allowed to the Administrators groups. Administrators do have all other rights. The reason for this is to prevent the accidental deletion of this GPO, which contains important and required settings for the domain. If it IS truly required That The GPO BE DELETED BECAUSE The Settings Have Been Set in Other GPOS, The Delete Access Control Entry Must Be Given Back to the appropriate group.
Why do i sometimes get the prompt "The Domain Controller for Group Policy Operations in NOT AVAILALAL. You May Cancel this Operation for this session or return!"?
The Group Policy Object Editor uses the primary domain controller emulator Operations Master token when editing a GPO. For information, see Group Policy Replication and Domain Controller Selection, and Group Policy Object Editor and the Operations Master earlier in this paper.
What is the best method of copying or replicating policy? Pages Between Domain
Use the copy feature in GPMC. A copy operation allows you to transfer settings from an existing GPO in Active Directory directly into a new GPO. The new GPO created during the copy operation is given a new GUID and is unlinked. You can use a copy operation to transfer settings to a new GPO in the same domain, another domain in the same forest, or a domain in another forest. Because a copy operation uses an existing GPO in Active Directory as its source, trust is required between the source and destination domains. Copy operations are suited for moving Group Policy between production environments, and for migrating Group Policy that has been tested in a test domain or forest to a production environment, as long as there is trust between the source and destination domains. for more information And Step-by-Step Instructions, See GPMC Help.infrastructure - Client Side
How Can I GET MORE INFARDING THE EVENT LOG OF A CLIENT COMPUTER?
You can set the folowing registry key for this by using the registry editor tool (regedit.exe):
HKLM / Software / Microsoft / Windows NT / CURRENTVERSION / DIAGNostics
RundiagnosticLoggingGroupPolicy Reg_dword 1
Setting this key causes additional information to be logged to the event log when group policy is running.
In what Order Are Policy Settings Processed DURING COMPUTER STARTUP AND USER LOGON?
The Policy Processing Sequence Is The Following:
· The Network Starts-Remote Procedure Call System Service (RPCSS) And Multipleal Naming Convention Provider (MUP) MUST Be Started.
Apply Computer Group Policy-this is done synchronously by default.
• Run STARTUP Scripts-these Are Run Hidden and synchronously by Default. This Means Time Out Before The Next ONE Starts. Ctrl Alt Del Is Pressed.
· After the user is value, the profile.
. · Apply user Group Policy-this is done synchronously by default Group Policy is processed in the following order: Windows NT 4.0, local, site domain, organizational unit, and so on The UI is displayed while policy settings are being processed..
NOTE: Windows NT 4.0 Style Policy Settings Process Both Computer and User Settings, PotentialLies Policy Active Directory-Based Group Policy Settings That Were Applied At Computer Startup.
· Run logon scripts-Group Policy-based logon scripts are run hidden (unlike in Windows NT 4.0) and asynchronously by default. The user object script, which is run in a normal window (like Windows NT 4.0), is run last.
Start the shell.
Note: Policy settings exist for reversing the synchronous or asynchronous defaults for running scripts and applying policy For more details on policy options for scripts see the Scripts section of this paper.By default, scripts time out after 600 seconds A policy setting exists that.. lets you change this default.Policy settings also exist for specifying whether scripts are run hidden, minimized, or in a normal window.You can specify a Group Policy to disable Windows NT 4.0-style policy settings.
Note:.. By default in Windows XP Professional, the Fast Logon Optimization feature is set for both domain and workgroup members This results in the asynchronous application of policies when the computer starts and when the user logs on For more information, see Fast Logon in Windows XP Professional Earlier in this Paper.how offen is group policy applied, and how do i change it?
For users and all computers (except domain controllers), policy is applied by default every 90 minutes with a variable offset of 30 minutes. For domain controllers, the default is every 5 minutes. You can change these defaults by setting a Group Policy within the Administrative Templates Node of the Group Policy Object Editor.
The application of Group Policy can not be scheduled or pushed to clients. Exceptions to this include the Software Installation and Folder Redirection snap-ins. The Scripts extension runs during the background refresh, but the scripts are actually run by Winlogon at the appropriate time.
How long does it take to process group policy settings?
This depends on the number of gpos being processed for a specified computer or user and on the number of policy settings set with each gpo.
Which Policy Settings Do I See WHEN VIEWING THE GROUP POLICY OBJECT Editor Is Run Focused On A Local Computer?
This shows the information in the Local GPO, but not the cumulative effect of what has been applied to the computer or user. This feature will be investigated for the next release of the product. For Windows 2000, it shows the settings that a local administrator has set for that computer and all users of that computer. in the evaluation process, when the computer is joined to a domain, all the policy settings are subject to being overwritten by domain-based policy (any policy set in the site, domain, Organizational Unit) .tools
What is the purpose of the various group policy tools available from Microsoft?
· Group Policy Management Console. A new MMC console to view and edit Group Policy properties, generate reports, copy, import, backup, restore, and to select GPOs for editing. GPMC is designed to be the single place where you can view and manage GPOS in Multiple Forests and Domains.
· Active Directory Users and Computers. An MMC Console To View and Edit Group Policy Properties and TO SELECT GPOS for Editing. Note: MOST FUNCTIONALITY IN THIS SNAP-IN IS NOW Contained in GPMC.
GROUP Policy Object Editor. An MMC Console for Editing Group Policy Settings. It is launched from gpmc; for example, by right-clicking a gposs...
· Active Directory Sites and Services. An MMC Console to Force Replication.
· Resultant Set of Policies An MMC snap-in to view a detailed analysis of Group Policy settings for the local computer Note:.. RSoP functionality is now optimized in GPMC as Group Policy Results and Group Policy Modeling It is used with GPMC to provide. Precedence Information.
· Secedit A command-line tool that configures and analyzes system security by comparing your current configuration to at least one template Note:.... Secedit / refreshpolicy does not work on Windows XP and later; use Gpupdate instead · Gpupdate On Windows XP and Windows Server 2003, a command-line tool that refreshes local Group Policy settings and Group Policy settings that are stored in Active Directory, including security settings. This tool replaces Secedit on Windows XP and Windows Server 2003.
· Local security policy. An MMC Snap-in To Verify Local Security Settings.
· DCDIAG / V and NETDIAG / V. COMMAND-LINE TOOLS THAT DNS ON EACH DOMAIN Controller and review the output to verify DNS name resolution.
· Nslookup and netdiag / v. Command-line Tools Test DNS on Member Servers To Verify That DNS is Working.
....................... ..
· GpResult. A command-line tool to display the policies applied to the local computer.
GPOTOOL. A Command Line Tool To Check The Health of The GPOS on Domain Controllers.
Group Policy Management Console
WHERE CAN I DOWNLOAD THE GROUP Policy Management Console?
GPMC is Available from The Microsoft GPMC Home Page At http://www.microsoft.com/windows.netserver/gpmc/.
What Are The System Requirements for GPMC?
GPMC can manage both Windows 2000 and Windows Server 2003 domains with Active Directory service. In either case, the computer on which the tool itself runs must be running Windows Server 2003 or Windows XP Professional (with Windows XP Service Pack 1 and the Microsoft .NET Framework) Note:.. When installing GPMC on Windows XP Professional with SP1, a post SP1 hotfix is required This hotfix (Q326469) is included with GPMC GPMC Setup prompts you to install Windows XP QFE Q326469 if it is not already present.Is. IT Necessary to install GPMC ON A DOMAIN Controller?
....
Can The Group Policy Management Console Be Run THROUGH A TERMINAL SERVICES session?
Yes, GPMC SHOULD WORK RELIABLY VIA TERMINAL Services Or Local Consoles.
How Can you compare the settings contained within two?
Microsoft does not currently provide any tools that allow you to easily compare two or more Group Policy settings. However, in GPMC, you can generate an XML report from Group Policy Results and then compare the reports for the GPOs.
Group Policy Object Editor
What happened to the policy settings such AS Logon Banner or Disable Ctrl Alt DEL That WERE AVAILALALALAILALALALALAILALALALALALALALAILALAILALAILALAIL IN WINDOWS NT 4.0?
The FoliTings Node, Under Local Policies / Security Options. This Includes The Following Policy Settings:
· Disable Ctrl Alt DEL.
· Do Not Display Last User Name in Logon Screen.
· Message Text, Caption, Title for Users Logging On (Legal NOTICE).
· Allow system to be shutdown without having to log on.Uncheck the filtering Only show policy settings that can be fully managed in the Group Policy Object Editor using the following procedure: right click any administrative template node and select View and then click Filtering In. .
General Issues
Can I Transfer System Policies To Group Policy Objects?
You can not migrate Windows NT 4.0 System Policies directly to Windows Server 2003. In Windows NT 4.0, System Policies were stored in one .pol file with group information embedded. One way to extract policy settings from Windows NT 4.0 .pol files is by using the Gpolmig.exe tool included in the Windows 2000 Server Resource Kit Tools. Gpolmig.exe is used to migrate settings from Windows NT policy files to the Windows Server GPO structure. For more information, see How to Use the Group Policy Migration Utility to Migrate Windows NT System Policy Settings at http://support.microsoft.com/default.aspx?scid=kb;n-us; 317367.
WITH Windows 2000 or Later, WHEN A Windows NT 4.0 Client IS Upgraded To Windows 2000 or Windows XP, IT Will Get Only Active Directory-based Group Policy Settings and NOT Windows NT 4.0-Style Policy Settings.
Do Group Policy Settings Override User Profile Settings?
YES.
Is there a programmatic way to add, edit, or delete gpos?
Although scripted control of individual settings inside a GPO is not provided, GPMC provides a comprehensive set of COM interfaces for scripting many Group Policy-related operations. The interfaces are documented in the Group Policy Management Console SDK, which is located at% programfiles% / gpmc / scripts / gpmc.chm on any computer where you installed GPMC.When you install GPMC, a set of sample scripts illustrating the use of these interfaces are installed to the% programfiles% / gpmc / scripts directory.
The sample scripts address real-world administrative problems and scenarios. You can perform various tasks such as finding all GPOs in a domain that have duplicate names or generating a list of all GPOs in a domain whose settings are disabled or partially disabled.
Glossary
THIS Section Presents Terminology Used in this document.
Active Directory
The Windows 2000 Server and Windows Server 2003 directory service that stores information about all objects on the computer network and makes this information easy for administrators and users to find and apply. With Active Directory, users can gain access to resources anywhere on the network with a SILE LOGON. Similarly, Administratology for All Objects on The Network, Which Can Be Viewed in a Hierarchical Structure.
Administrative Templates (.adm files)
Template files that provide settings pertaining to Windows 2000, Windows NT 4.0, and Windows 95, Windows 98, and Windows Millennium Edition operating system and registry structure. The .adm file specifies the registry settings that can be modified through the Group Policy Object Editor user interface. The .adm file consists of a hierarchy of categories and subcategories that together define how the options are displayed through the Group Policy Object Editor user interface. It also indicates the registry locations where changes should be made if a particular selection is made, specifies Any Options Or Restrictions (In Values) That Are Associated with the Selection, And in Some Cases, Specifies a Default Value To Use if a selection is activated.administrative Templates Snap-in Extension
A Group Policy Object Editor extension that includes all registry-based Group Policy, which you use to define settings that control the behavior and appearance of the desktop, including the operating system and applications. The Administrative Templates snap-in extension includes functionality for managing disk Quotas.
Application Assignment
You can assign applications to either a user or a computer using Group Policy. When you assign applications to a computer, the application is automatically installed the next time the computer is started. When you assign applications to a user with Group Policy, the administrator can Choose to Either Have The Application Installed On-Demand When The User Selects The Application Or In-Full When The User Next Logs ON:
· On Demand. If the application is installed on demand, the user's computer is set up with a Start menu shortcut, and the appropriate file associations are created in the registry. To the user, it looks and feels as if the application is already present . However, the application is not fully installed until the user needs the application. When the user attempts to open the application or a file associated with that application, Windows Installer checks to make sure that all the files and parameters of the application are present for the application to properly execute. If they are not present, Windows Installer retrieves and installs them from a predetermined distribution point. Once in place, the application opens. · Full install. The full-install option is useful for specific groups of users such as FREQUENT TRAVELERS WHO Might Require All Available Applications to Be Fully Installed Before The Travel. With Full Install, A User's Applications Are Installed At Logon.
Application Publishing
In Windows 2000 and Windows Server 2003, you can use the Software Installation snap-in extension of the Group Policy Object Editor to publish applications to users. Published applications are those that the administrator makes available for on-demand use.
Published applications have no presence on the users' computers. That is, no shortcuts or Start menu references to the application are present on the desktop. A published application is advertised to Active Directory. The advertised attributes are used to locate the application and all the information required for installing it. After the application is advertised in Active Directory, users can activate it by document association, just as an assigned application. Users can also set up the program using the Add or Remove Programs Control Panel tool on their desktop .. Cab file
A .cab file contains one or more files, all of which are downloaded together in a single compressed cabinet file. Included in the cabinet is an .inf file that provides further installation information. The .inf file may refer to files in the .cab And to files at other URLs.
Discretionary Access Control List (DACL)
A Part of The Security Descriptor That Spectial The Groups OR User That CAN Access An Object, AS Well As The Types of Access (Permissions) granted to those groups or users. See Also Security Descriptor.
Disk quotas
Within the Administrative Templates node of the Group Policy Object Editor are policy options for managing disk quotas, which administrators can use to monitor and limit disk space use for NTFS volumes formatted as NTFS version 5.0. After you enable disk quotas, you can set options for Disk quota limits and warnings.
Domain
A grouping of servers and other network objects under a single name. Domains provide the folloading benefits:
· You Can Group Objects Into Domains to Help Reflect Your Company's Organization In your Computer Network.
· Each domain stores only the information about the objects located in that domain. By partitioning the directory information this way, Active Directory scales up to as many objects as you need to store information about on your network. · The administrator of a domain has absolute Rights to set policy settings within..
Domain trees
You can combine multiple domains into structures called domain trees. The first domain in a tree is called the root of the tree, and additional domains in the same tree are called child domains. A domain immediately above another domain in the same tree is referred to As The Parent of the Child Domain.
All domains within a single domain tree share a hierarchical naming structure. Domains that share a common root share a contiguous namespace. Domains in a tree are joined together through two-way, transitive trust relationships. These trust relationships are two-way and transitive, Therefore, A Domain Joinive a Tree Immedierately Has Trust Relationships Established With Every Domain in The Tree.
Folder Redirection Snap-in Extension
A Group Policy Object Editor extension that use to place the Windows 2000 or Windows Server 2003 special folders in network locations other than (% systemroot% / Documents and Settings /% userprofile%) you their default location on the local computer.
GLOBALLY UNIQUE Identifier (GUID)
A 128-bit integer that identifies a particular object class and interface. GUIDs are virtually guaranteed to be unique. A GUID can be generated using either the uuidgen.exe utility from the Platform Software Development Kit, or the GUIDgen tool included in the Microsoft Visual ? C development system For more information about GUIDs, see the OLE Programmer's Reference, Volume One;. the Platform Software Development Kit documentation; and Inside OLE, 2d ed by Kraig Brockschmidt, Redmond, Wash .: Microsoft Press, 1995.Group Policy.
A component used in Windows 2000 and Windows Server 2003 to define options for managed desktop configurations for groups of users and computers. To specify Group Policy options, you use GPMC in conjunction with the Group Policy Object Editor.
Group policy Engine
The Part of Group Policy That Runs in the Winlogon Process.
Group Policy Management Console (GPMC)
An MMC console to view and edit Group Policy properties, generate reports, copy, import, backup, restore, and to select GPOs for editing. GPMC lets administrators manage Group Policy for multiple domains and sites within a given forest, all in a simplified user Interface with Drag-and-Drop Support. Operations Are Fully Scriptable, Which Lets Administrators Customize and Automate Management.
Group policy object
The Group Policy settings that you create by using the Group Policy Object Editor are contained in a GPO, which is in turn associated with selected Active Directory containers: sites, domains, and organizational units (organizational units).
Group Policy Object Editor
To edit a specific desktop configuration for a particular group of users and computers, you use the Group Policy Object Editor, also known previously as the Group Policy snap-in, Group Policy Object Editor, or GPedit.You can specify Group Policy settings for the FOLLOWING:
· Registry-based policy settings-Includes Group Policy for the Windows 2000 and Windows Server 2003 operating systems and their components and for applications. To manage these settings, use the Administrative Templates node of the Group Policy Object Editor.
· Security Settings-Includes Options for Local Computer, Domain, and NetWork Security Settings.
· Software Installation and Maintenance Options-useed to Central Or ManagementAnage Application Installation, Updates, And Removal.
· Script Options-Includes Scripts for Computer Startup and Shutdown and User Logon and Logoff.
Folder Redirection Options-Allows Administrators to Redirect Users' Special Folders to the Network.
· Internet Explorer maintenance-use to manage and customize Internet Explorer On Windows 2000- and Windows Server 2003-based Computers.
· Remote Installation Services-Used to Control The Behavior of The Remote Operating System Installation Feature As Displayed to Client Computes
Group policy model
This is a simulation of what would happen under circumstances specified by an administrator. Group Policy Modeling requires that you have at least one domain controller running Windows Server 2003 because this simulation is performed by a service running on a domain controller that is running Windows Server 2003 . With Group Policy Modeling, you can either simulate the RSOP data that would be applied for an existing configuration, or you can perform "what-if" analyses by simulating hypothetical changes to your directory environment and then calculating the RSOP for that hypothetical configuration. For example, you can simulate changes to security group membership, or changes to the location of the user or computer object in Active Directory Outside of GPMC, Group Policy Modeling is referred to as RSoP -. planning mode.Group Policy Results
This represents the actual policy data that is applied to a given computer and user. It is obtained by querying the target computer and retrieving the RSoP data that was applied to that computer. The Group Policy Results capability is provided by the client operating system and requires Windows XP, Windows Server 2003 or Later. Outside of GPMC, Group Policy Results Is Referred To As Rsop - Logging Mode.
IntelliMirror
IntelliMirror refers to the ability to provide users with consistent access to their applications, application settings, roaming user profiles, and user data, from any managed computer-even when they are disconnected from the network. IntelliMirror is delivered via a set of Windows features that Enable IT Administrators to Implement Standard Computing Environments for Groups of Users and Computers.
IntelliMirror can significantly boost user productivity and satisfaction by doing the following: · Allowing users to continue working efficiently in intermittently connected or disconnected scenarios by enabling uninterrupted access to user and configuration data under these conditions.
· Delivering a consistent computing environment to users from any Computer IS UNVAILABLE OR IN SCENARIOS WHERE USERS ARE NOT ASSIGNED A Specific Computer.
MINIMIZING DATA LOSS by Enabling Centralized Backup of User Data And Configuration Files by the it orthization.
· Minimizing user downtime by enabling Automated Installation and Repair of Applications.
· Implementing Intellimirror Also Boosts Administrator Efficiency and Reduces It Costs by doing the fol::
· Eliminating the need to manually configure user settings, install application, or transcess tool files to provide access to their computing environments on any computer.
· Enabling Scenarios WHERE USERS DON't Have An Assigned Computer But Log in To Any Available Computer In a pool of computers. This Helps Reduce Hardware And Administration Costs.
· Easing the it task of usr files while satisfying need for these files to be available on the user's computer.
· Reducing support costs by using windows installer to automatically repair broker Broken Application Installations.
· IntelliMirror is implemented by means of a set of Windows features, including Active Directory, Group Policy, Software Installation, Windows Installer, Folder Redirection, Offline Folders, and Roaming User Profiles.
Internet Explorer Maintenance
A Group Policy Extension Snap-in That Includes Policy: Browser User Interface, Connection Settings, Custom Urls, Security, And Program Associations.
Microsoft Management Console (MMC)
A common console framework for system-management applications. The primary goal of the Microsoft Management Console is to support simplified administration and lower cost of ownership through tool integration, task orientation, support for task delegation, and overall interface simplification. MMC console hosts the administrative Tools (The console itself provides no management functionality.
MIGRATION TABLE
A migration table is a file that maps references to users, groups, computers, and UNC paths in the source GPO to new values in the destination GPO. A migration table consists of one or more mapping entries. Each mapping entry consists of a type, source reference, and destination reference. If you specify a migration table when performing an import or copy, each reference to the source entry will be replaced with the destination entry when writing the settings into the destination GPO. Migration tables store the mapping information as XML , and have their own file name extension, .migtable. You can create migration tables using the Migration Table Editor (MTE). The MTE is a convenient tool for viewing and editing migration tables without having to work in, or be familiar with, XML .. MigTable Extension SO That WHEN You Double Click A Migration Table, IT Opens in the mte. The mte is installed with gpmc.
MMC Snap-in
...........................
MMC EXTENSION SNAP-IN
.
Organizational Unit (Organizational Unit)
A Type of Directory Object Contained With Domains. Organizational Units Are Logical Conta Which You Can Place Uses, Groups, Computers, And Even Other Organizational Units.
Registry
A Database IN WHICH WINDOWS NT INTERNAL Configuration Information and Computer- and user-specific settings are stored.
Registry Hive
A section of the registry that is saved as a file. The registry subtree is divided into hives (named for resemblance their to the cellular structure of a beehive). A hive is a discrete body of keys, subkeys, and values.
Remote Installation Services
A component that administrators can use to remotely install a local copy of the Windows 2000 Professional or Windows XP Professional on supported computers throughout their organization. Administrators can deploy a new version of an operating system upgrade to large numbers of clients at one time from a centralized Location.
Administrators can use Group Policy to specify the client installation options that groups of users can access. These options are determined by the specific Remote operating system Installation Group Policy settings that administrators define for the site, domain, or organizational unit to which the users belong, IN Conjunction with the specific security group or user account.
Resultant Set of Policy (RSOP)
RSoP allows administrators to see the effect of Group Policy on a targeted user or computer. RSoP is an infrastructure leveraged by GPMC to enable Group Policy Results and Group Policy Modeling. In Group Policy Results, administrators assess what has applied to a particular target. In GROUP Policy Modeling, Administrators Can See How Policy Settings Would Be Applied To A Target and The Examine The Results Before Deploying a Chang To Group Policy.Roaming User Profile
A copy of the local user profile stored on a server share. This profile is downloaded every time that a user logs on to any computer on the network, and any changes made to a roaming user profile are synchronized with the server copy upon logoff. See Also User profile.
Schema
The formal definition of all object classes, and the attributes that make up those object classes, that can be stored in the directory. Active Directory includes a default schema, which defines many object classes, such as users, groups, computers, domains, organizational . units, and security policy settings The Active Directory schema is dynamically extensible; this means that you can modify the schema by defining new object types and their attributes and by defining new attributes for existing objects you can do this either programmatically with the Schema Manager. Snap-in Tool Included with Windows NT Server.
Scripts
Batch files (.bat) or executable (.exe) files that run when a computer starts up or shuts down or when a user logs on or off at any type of workstation on the network. Windows 2000 and Windows Server 2003 support Windows Script Host Visual Basic Scripting Edition (VBScript) and Jscript, While Continuing to Support MS-DOS Command Scripts and Executable Files.
security descriptorA set of access-control information attached to every container and object on the network. A security descriptor controls the type of access allowed to users and groups. Administrators assign security descriptors to objects stored in Active Directory in order to control access to resources or Objects on the network.
A security descriptor lists the users and groups that are granted access to an object (a file, printer, or service, for example), and the specific permissions assigned to those users and groups. See also discretionary access control list and system access control list .
Security Settings Extension Snap-in
A Group Policy extension snap-in that you use to define security configuration for computers within a GPO. A security configuration consists of settings applied to each security area supported for Windows 2000 or Windows XP Professional and Windows 2000 Server and Windows Server 2003. This configuration Is Included Withnin A GPO.
Site
In Windows 2000 and Windows Server 2003 you register your network's physical topology by defining sites. A site is defined as one or more IP subnets. Windows 2000 and Windows Server 2003 uses site information to direct requests from one computer to be fulfilled by another computer at the same site. For example, when a workstation logs on, Active Directory uses the TCP / IP address of the workstation, along with the site information you have entered, to locate a domain controller on the local site. This local controller is used to Service The Workstation's Requests.
Scripts extension Snap-in
.
Software Installation Extension Snap-in This use You Use to Centrally Manage Software Distribution in Your Organization.
System Access Control List (SACL)
Part of a security descriptor that specifies which user accounts or groups to audit when accessing an object, the access events to be audited for each group or user, and a Success or Failure attribute for each access event, based on the permissions granted in the object's DACL.
Tattooing
This Refers to a registry setting this is set using Windows NT 4.0 System Policies, The Setting Persists Until The Specified Policy Is Reverse Or The User Edits The Registry.
Total Cost of Ownership (TCO)
Refers to the Administrative Costs Associated With Computer Hardware and Software Purchases, Deployment and Configuration, Hardware and Software Updates, Training, Maintenance, And Technical Support.
User profile
A user profile describes the desktop computing configuration for a specific user, including the user's environment and preference settings. A profile is created the first time that a user logs on to a computer running Windows Server 2003, Windows XP, Windows 2000, or Windows NT Workstation. A user profile is a group of settings and files that defines the environment that the system loads when a user logs on. It includes all the user-specific configuration settings, such as program items, screen colors, network connections, printer connections, Mouse settings, and window size and position. Profiles Are Not User Policies and The User Has a profile evening. You don't use group policy.
Windows Installer Packages (.msi files)
Packages that contain all the information necessary to describe to the Windows Installer how to set up an application in every conceivable situation: various platforms, different sets of previously installed products, earlier versions of a product, and numerous default installation locations The Software Installation extension. Snap-in to the group policy Object Editor Uses .msi packages.windows Management Instrumentation (WMI)
A management infrastructure that supports monitoring and controlling system resources through a common set of interfaces and provides a logically organized, consistent model of Windows operation, configuration, and status. WMI Filtering in Windows Server 2003 allows you to create queries based on this data. These .
Related Links
· Microsoft.com Group Policy Home Page at http://www.microsoft.com/grouppolicy. Provides an entry point for Group Policy documentation on the Web. Includes links to documentation, knowledge base articles, support information, and newsgroups.
· Windows Server 2003 Deployment Kit, Designing a Managed Environment. At http://www.microsoft.com/grouppolicy. Available from the Microsoft Group Policy home page, this book describes the technologies in Windows Server 2003 associated with deployment of a managed environment HAS Significant Coverage of Group Policy and Related IntelliMirror Technologies. Includes Planning, Designing, And Implementation Guidance.
· Troubleshooting Windows Server 2003 Group Policy. At http://www.microsoft.com/grouppolicy. Available from the Microsoft Group Policy home page, this white paper provides a structured guide to troubleshooting Group Policy operations. Covers Group Policy processing itself, dependent technologies and relevant troubleshooting tools. · Group Policy Administration using the Group Policy Management Console. at http://go.microsoft.com/fwlink/?LinkID=14320. This white paper provides technical details of functionality in GPMC.
Migrating GPOS Across Domains with gpmc. At http://go.microsoft.com/fwlink/?Linkid=14321. This White Paper Explains How To Migrate GPOM from One Domain to another Using GPMC.
· Group Policy Management Console Software Development Kit (SDK). Provides information about how to use the COM interfaces of Group Policy Management, which support scripting many of the operations supported by Group Policy Management Console. This is available when you install GPMC. See " .
Feedback on this Paper
If you have any Comments About this paper, Contact mailto: gpdocs@microsoft.com.