IT tutorials
 
Technology
 

Active Directory 2008 : Implementing Group Policy (part 1) - An Overview and Review of Group Policy

8/23/2013 9:22:25 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

1. What Is Configuration Management?

If you have only one computer in your environment (at home, for example) and you need to make a change (modify the desktop background, for example), you have several choices. Most people would probably open Personalization from Control Panel and make the change using the Windows interface. That works well for one user, but it becomes tedious if you want to make the change across multiple users. Say, for example, that you want the same background for yourself and your family. You have to make the change multiple times, and then if you ever change your mind and want to change the background yet again, you have to return to each user’s profile and make the change. Implementing the change, and maintaining a consistent environment, becomes even more difficult across multiple computers.

Configuration management is a centralized approach to applying one or more changes to one or more users or computers. If you keep that in mind, everything else will be easier to understand. The key elements of configuration management are:

  • A centralized definition of a change, also called a setting. The setting brings a user or a computer to a desired state of configuration.

  • A definition of the users or computers to whom the change applies, called the scope of the change.

  • A mechanism that ensures that the setting is applied to users and computers within the scope. This process is called the application.

2. An Overview and Review of Group Policy

Group Policy is a framework within Windows—with components that reside in Active Directory, on domain controllers, and on each Windows server and client—that allows you to centrally manage configuration in an AD DS domain. As we turn our attention to Group Policy, which can become very complex, always remember that everything boils down to these few basic elements of configuration management.

Policy Settings

The most granular component of Group Policy is an individual policy setting, also known simply as a policy, that defines a specific configuration change to apply. For example, a policy setting exists that prevents a user from accessing registry editing tools. If you define that policy setting and apply it to the user, the user will be unable to run tools such as Regedit.exe. Another policy setting is available that allows you to rename the local Administrator account. You can use this policy setting to rename the Administrator account on all user desktops and laptops, for example.

Thousands of policy settings can be managed by Group Policy, and the framework is extensible, so you can manage just about anything with Group Policy. You configure policy settings by using the Group Policy Management Editor (GPME), shown in Figure 1, or by using Windows PowerShell.

Group Policy Management Editor

Figure 1. Group Policy Management Editor

Policy settings such as the setting that prevents access to registry editing tools affect a user, regardless of the computer to which the user logs on. Such policy settings are often referred to as user configuration settings or user settings. Other policy settings—such as the one that renames the Administrator account—affect a computer, regardless of which user logs on to that computer. Such policy settings are referred to as computer configuration settings or computer settings. You will also hear policy settings categorized as either “user policies” or “computer policies.” The terminology used in the industry is not exact. You can see in Figure 1 that policy settings are grouped into Computer Configuration and User Configuration collections in the left navigation pane.

Configuring Policy Settings

To define a policy setting, double-click the policy setting in the GPME. The policy setting’s Properties dialog box appears. An example is shown in Figure 2.

The Properties dialog box of a policy setting

Figure 2. The Properties dialog box of a policy setting

A policy setting can have one of three states: Not Configured, Enabled, and Disabled. In a new GPO, every policy setting is Not Configured, as you can see in Figure 1. This means that the GPO will not modify the existing configuration of that particular setting for a user or computer. If you enable or disable a policy setting, a change is made to the configuration of users and computers to which the GPO is applied. The effect of the change depends on the policy setting itself. For example, if you enable the Prevent Access To Registry Editing Tools policy setting, users will be unable to launch Regedit.exe—the Registry Editor. If you disable the policy setting, you ensure that users can launch the Registry Editor. Notice the double negative in this policy setting: You disable a policy that prevents an action, so you allow the action.

Some policy settings bundle several configurations into one policy and might require additional parameters. In Figure 2, you can see that by enabling the policy to restrict registry editing tools, you can also define whether registry files can be merged into the system silently, using Regedit /s.

Note

UNDERSTAND AND TEST ALL POLICY SETTINGS

Many policy settings are complex, and the effect of enabling or disabling them might not be immediately clear. Also, some policy settings affect only certain versions of Windows. Be sure to review a policy setting’s explanatory text in the Group Policy Management Editor details pane, shown in Figure 1, or in the Help box of the policy setting’s Properties dialog box seen in Figure 2. Additionally, always test the effects of a policy setting, and its interactions with other policy settings, before deploying a change in the production environment.

Group Policy Objects

Policy settings are defined and exist within a Group Policy object (GPO). A GPO is an object that contains one or more policy settings and thereby applies one or more configuration settings for a user or computer.

Creating and Managing GPOs

You can manage GPOs in Active Directory by using the Group Policy Management console (GPMC), shown in Figure 3. GPOs are displayed in a container named Group Policy Objects.

To create a new GPO in a domain, right-click the Group Policy Objects container, and then click New.

Editing a GPO

To modify the configuration settings in a GPO, right-click the GPO and choose Edit. The GPO opens in the Group Policy Management Editor (GPME) snap-in, formerly known as the Group Policy Object Editor (GPO Editor), in Figure 1.

The GPME displays the thousands of policy settings available in a GPO in an organized hierarchy that begins with the division between computer settings and user settings: the Computer Configuration node and the User Configuration node. The next levels of the hierarchy are two nodes called Policies and Preferences. You will learn about the difference between these two nodes as this lesson progresses. Deeper in the hierarchy, the GPME displays folders, also called nodes or policy setting groups. Within the folders are the policy settings themselves. The Prevent Access To Registry Editing Tools policy setting is selected in Figure 1.

The Group Policy Management console

Figure 3. The Group Policy Management console

GPO Scope

Configuration is defined by policy settings in Group Policy objects. However, the configuration changes in a GPO do not affect computers or users in your enterprise until you have specified the computers or users to which the GPO applies. This is called scoping a GPO. The scope of a GPO is the collection of users and computers that will apply the settings in the GPO.

You can use several methods to manage the scope of GPOs. The first is the GPO link. GPOs can be linked to sites, domains, and OUs in Active Directory. The site, domain, or OU then becomes the maximum scope of the GPO. All computers and users within the site, domain, or OU, including those in child OUs, are affected by the configurations specified by policy settings in the GPO. A single GPO can be linked to more than one site or OU.

You can further narrow the scope of the GPO with one of two types of filters: security filters that specify global security groups to which the GPO should or should not apply, and Windows Management Instrumentation (WMI) filters that specify a scope, by using characteristics of a system such as operating system version or free disk space.

Windows Server 2008 introduced a new component of Group Policy: Group Policy Preferences. Settings that are configured by Group Policy Preferences within a GPO can be filtered, or targeted, based on several criteria. Targeted preferences allow you to further refine the scope of Preferences within a single GPO.

Group Policy Client and Client-Side Extensions

And how, exactly, are the policy settings applied? When a Group Policy refresh begins, a service running on all Windows systems (called the Group Policy Client) determines which GPOs apply to the computer or user. It downloads any GPOs that it does not already have cached. Then a series of processes called client-side extensions (CSEs) do the work of interpreting the settings in a GPO and making appropriate changes to the local computer or the currently logged-on user. Each major category of policy setting has CSEs, such as a Security CSE that applies security changes, a CSE that executes startup and logon scripts, a CSE that installs software, and a CSE that makes changes to registry keys and values. Each version of Windows has added CSEs to extend the functional reach of Group Policy. Several dozen CSEs are now in Windows.

One of the more important concepts to remember about Group Policy is that it is client driven. The Group Policy Client pulls the GPOs from the domain, triggering the CSEs to apply settings locally. Group Policy is not a “push” technology.

You can configure the behavior of CSEs by using Group Policy. Most CSEs apply settings in a GPO only if that GPO has changed. This behavior improves overall policy processing by eliminating redundant applications of the same settings. Most policies are applied in such a way that standard users cannot change the setting on their system—they are always subject to the configuration enforced by Group Policy. However, some settings can be changed by standard users, and many can be changed if a user is an administrator on that system. If users in your environment are administrators on their computers, consider configuring CSEs to reapply policy settings even if the GPO has not changed. That way, if an administrative user changes a configuration so that it is no longer compliant with policy, the configuration will be reset to its compliant state at the next Group Policy refresh.

Note

CONFIGURE CSES TO REAPPLY POLICY SETTINGS EVEN IF THE GPO HAS NOT CHANGED

You can configure CSEs to reapply policy settings, even if the GPO has not changed, at a background refresh. To do so, configure a GPO scoped to computers and define the settings in the Computer Configuration\Policies\Administrative Templates\System\Group Policy node. For each CSE you want to configure, open its policy processing setting—for example, Registry Policy Processing for the Registry CSE. Click Enabled and select the check box labeled Process Even If The Group Policy Objects Have Not Changed.

Settings managed by the Security CSE are an important exception to the default policy processing settings. Security settings are reapplied every 16 hours even if a GPO has not changed.

Note

THE ALWAYS WAIT FOR THE NETWORK AT COMPUTER STARTUP AND LOGON POLICY SETTING

It is highly recommended that you enable the Always Wait For The Network At Computer Startup And Logon policy setting for all Windows clients. Without this setting, by default, Windows clients perform only background refreshes, meaning that a client might start up and a user might log on without receiving the latest policies from the domain. This setting is located in Computer Configuration\Policies\Administrative Templates\System\Logon. Be sure to read the policy setting’s explanatory text.

Group Policy Refresh

When are policies applied? Policy settings in the Computer Configuration node are applied at system startup and every 90 to 120 minutes thereafter. User Configuration policy settings are applied at logon and every 90 to 120 minutes thereafter. The application of policies is called Group Policy refresh.

You can also force a policy refresh by using the GPUpdate command.

Manually Refreshing Group Policy with GPUpdate

When you are experimenting with Group Policy or trying to troubleshoot Group Policy processing, you might need to initiate a Group Policy refresh manually so that you do not have to wait for the next background refresh.

The Gpupdate.exe command can be used to initiate a Group Policy refresh. Used on its own, Gpupdate.exe triggers processing identical to a background Group Policy refresh. Both computer policy and user policy is refreshed. Use the /target:computer or /target:user parameter to limit the refresh to computer or user settings, respectively. During background refresh, by default, settings are applied only if the GPO has been updated. The /force switch causes the system to reapply all settings in all GPOs scoped to the user or computer. Some policy settings require a logoff or reboot before they actually take effect. The /logoff and /boot switches of Gpupdate.exe cause a logoff or reboot, respectively, if settings are applied that require one.

Resultant Set of Policy

Computers and users within the scope of a GPO apply the policy settings specified in the GPO. An individual user or computer is likely to be within the scope of multiple GPOs linked to the sites, domain, or OUs in which the user or computer exists. This leads to the possibility that policy settings might be configured differently in multiple GPOs. You must be able to understand and evaluate the Resultant Set Of Policy (RSOP), which determines the settings that are applied by a client when the settings are configured divergently in more than one GPO.

Slow Links and Disconnected Systems

One of the tasks that can be automated and managed with Group Policy is software installation. Group Policy Software Installation (GPSI) is supported by the software installation CSE. You can configure a GPO to install one or more software packages. Imagine, however, if a user were to connect to your network over a slow connection. You would not want large software packages to be transferred over the slow link because performance would be problematic.

The Group Policy Client addresses this concern by detecting the speed of the connection to the domain and determining whether the connection should be considered a slow link. That determination is then used by each CSE to decide whether to apply settings. The software extension, for example, is configured to forgo policy processing so that software is not installed if a slow link is detected. By default, a link is considered slow if it is less than 500 kilobits per second (kbps).

If a user is working while disconnected from the network, the settings previously applied by Group Policy continue to take effect, so a user’s experience is identical whether he or she is on the network or working away from the network. This rule has exceptions, most notably that startup, logon, logoff, and shutdown scripts will not run if the user is disconnected.

If a remote user connects to the network, the Group Policy Client wakes up and determines whether a Group Policy refresh window has been missed. If so, it performs a Group Policy refresh to obtain the latest GPOs from the domain. Again, the CSEs determine, based on their policy processing settings, whether settings in those GPOs are applied. This does not apply to Windows XP or Windows Server 2003 systems—only to Windows Vista, Windows Server 2008, and later operating systems.

 
Others
 
- Microsoft Lync Server 2010 : Front End and User Migration to Lync Server 2010 (part 2) - Automatic Client Upgrade , Decommission Process
- Microsoft Lync Server 2010 : Front End and User Migration to Lync Server 2010 (part 1)
- Microsoft Lync Server 2010 : Migrating from LCS and OCS - Edge Server Migration to Lync Server 2010
- Microsoft Lync Server 2010 : Migrating from LCS and OCS - Office Communications Server 2007 R2
- Windows 8 : Managing Content - Libraries - To add a folder to a library
- Windows 8 : Managing Content - The Picker (part 2) - To open a file or files, To view an alphabetical directory of your folders
- Windows 8 : Managing Content - The Picker (part 1) - To select a file in the Picker, To navigate the Picker
- Windows 8 : Managing Content - Media Types
- UNDERSTANDING THE THREE APPS FOR SHAREPOINT DEPLOYMENT MODELS (part 3) - Provider-Hosted
- UNDERSTANDING THE THREE APPS FOR SHAREPOINT DEPLOYMENT MODELS (part 2) - Autohosted
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us