IT tutorials
 
Technology
 

Active Directory 2008 : Implementing Group Policy (part 4) - Registry Policies in the Administrative Templates Node

8/23/2013 9:27:07 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

5. Registry Policies in the Administrative Templates Node

The Administrative Templates node contains thousands of settings that allow you to control many aspects of Windows.

In Figure 2, you can see the Properties dialog box for the Prevent Access To Registry Editing Tools policy setting. If this setting is enabled and the user tries to start a registry editor, a message appears, explaining that a setting prevents the action.

Tip

RESTRICTING APPLICATIONS

Policies in the Administrative Templates node make changes to the registry. Settings in the Computer Configuration node modify registry values in the HKEY_LOCAL_MACHINE (HKLM) key. Settings in the Administrative Templates node in the User Configuration node modify registry values in the HKEY_CURRENT_USER (HKCU) key.

In the case of the registry editing policy setting, the following registry value is modified:

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegeditMode

If you choose to restrict Regedit from running silently, that value is set to 2. If you choose to restrict only the Registry Editor UI tool, the value is set to 1. This section explores the features and workings of the policy settings in the Administrative Templates node.

Filtering Administrative Template Policy Settings

With thousands of policies to choose from, it can be difficult to locate exactly the setting you want to configure. The GPME introduced in Windows Server 2008 solves this problem for Administrative Template settings: You can now create filters to locate specific policy settings.

To create a filter:

  1. Right-click Administrative Templates and choose Filter Options.

  2. To locate a specific policy, select Enable Keyword Filters, enter the words with which to filter, and select the fields within which to search. Figure 5 shows an example of a search for policy settings related to the screen saver.

Filtering the Administrative Templates policy settings

Figure 5. Filtering the Administrative Templates policy settings

In the top section of the Filter Options dialog box shown in Figure 5, you can filter the view to show only policy settings that are configured. This can help you locate and modify settings that are already specified in the GPO.

You can also filter for Group Policy settings that apply to specific versions of Windows, Internet Explorer, and other Windows components.

Unfortunately, the filter applies only to settings in the Administrative Templates nodes.

Managed and Unmanaged Policy Settings

There is a nuance to the registry policy settings configured by the Administrative Templates node that is important to understand: the difference between managed and unmanaged policy settings.

A managed policy setting has the following characteristics:

  • The user interface (UI) is locked so a user cannot change the setting. Managed policy settings result in the appropriate UI element being disabled. For example, if you configure the Screensaver Timeout policy setting, a user cannot change the timeout delay in the UI.

  • Changes are made in one of four keys in the registry reserved for managed policy settings:

    • HKLM\Software\Policies (computer settings)

    • HKCU\Software\Policies (user settings)

    • HKLM\Software\Microsoft\Windows\Current Version\Policies (computer settings)

    • HKCU\Software\Microsoft\Windows\Current Version\Policies (user settings)

    These keys are secured so that only administrators can make a change. Together with UI lockout, this means that non-administrative users receive the change specified by the policy setting and cannot modify the setting on their computer.

  • Changes made by a Group Policy setting, and the UI lockout, are “released” if the user or computer falls out of scope of the GPO. For example, if you delete a GPO, managed policy settings that had applied to a user are released. This means that the setting reverts back to its previous state. Additionally, the UI interface for the setting is enabled.

 A managed policy setting causes a configuration change of some kind when the setting is applied by a GPO. When the user or computer is no longer within the scope of the GPO, the configuration is released automatically.

For example, if a GPO prevents access to registry editing tools, and then the GPO is deleted, disabled, or scoped so that it no longer applies to users, those users regain access to registry editing tools at the next policy refresh (which is Windows’ default behavior) unless you have implemented a restriction at some other level.

In contrast, an unmanaged policy setting makes a change that is persistent in the registry. If the GPO no longer applies, the setting remains. This is often called tattooing the registry—making a permanent change. To reverse the effect of the policy setting, you must deploy a change that reverts the configuration to the desired state. Additionally, an unmanaged policy setting does not lock the UI for that setting.

By default, the GPME hides unmanaged policy settings to discourage you from implementing a configuration that is difficult to revert. However, you can make many useful changes with unmanaged policy settings, particularly for custom administrative templates to manage configuration for applications.

To control which policy settings are visible, right-click Administrative Templates and choose Filter Options. Make a selection from the Managed drop-down list, shown in Figure 5.

When a change is made by a preference, the change tattoos the system. However, some preferences include an option to remove the preference when it no longer applies to the user or computer. This is not the same as a managed policy setting, which is released and often returned to its original value. Instead, when a preference is removed, the setting is actually deleted entirely.

Templates

Why are these nodes of the GPME labeled as “Administrative Templates”? An administrative template is a text file that specifies the registry change to be made and that generates the user interface to configure the Administrative Templates policy settings in the GPME. Figure 2 shows the properties dialog box for the Prevent Access To Registry Editing Tools policy setting. The fact that the setting exists, and that it provides a drop-down list with which to disable Regedit.exe from running silently, is determined in an administrative template. The registry setting that is made based on how you configure the policy is also defined in the administrative template.

You can add administrative templates to the GPME by right-clicking the Administrative Templates node and choosing Add/Remove Templates. Some software vendors provide administrative templates as a mechanism to manage the configuration of their application centrally. For example, you can obtain administrative templates for all recent versions of Microsoft Office from the Microsoft Download Center. You can also create your own custom administrative templates. A tutorial on creating custom administrative templates is beyond the scope of this training kit.

In versions of Windows prior to Windows Vista, an administrative template had an .adm extension. ADM files have several drawbacks. First, all localization must be performed within the ADM file. That is, if you want to create an ADM file to help deploy configuration in a multilingual organization, you need separate ADM files for each language to provide a user interface for administrators who speak that language. If you were to decide later to make a modification related to the registry settings managed by the templates, you would need to make the change to each ADM file.

The second problem with ADM files is the way they are stored. An ADM file is stored as part of the GPT in the SYSVOL. If an ADM file is used in multiple GPOs, it is stored multiple times, contributing to SYSVOL bloat. Maintaining version control over ADM files also presented challenges.

To add classic administrative templates to the GPME, right-click the Administrative Templates node and then click Add/Remove Templates.

In Windows Vista, Windows Server 2008, and later versions of Windows, an administrative template is a pair of XML files, one with an .admx extension that specifies changes to be made to the registry, and the other with an .adml extension that provides a language-specific user interface in the GPME. When changes must be made to settings managed by the administrative template, they can be made to the single ADMX file. Any administrator who modifies a GPO that uses the template accesses the same ADMX file and calls the appropriate ADML file to populate the user interface.

To add ADMX/ADML administrative templates to the GPME, copy the ADMX file into the %SystemRoot%\PolicyDefinitions folder on your client, or in the central store. Copy the ADML file into the language-and-region-specific subfolder, such as en-us, of %SystemRoot%\PolicyDefinitions on your client, or in the central store. The central store is discussed in the next section.

Note

NO NEED TO TAKE SIDES

ADM and ADMX/ADML administrative templates can coexist. Settings generated by ADM files appear under the Administrative Templates node in a node labeled Classic Administrative Templates (ADM).

Central Store

As previously stated, ADM files are stored as part of the GPO itself, in the GPT. When you edit a GPO that uses administrative templates in the ADM format, the GPME loads the ADM from the GPT to produce the user interface. When ADMX/ADML files are used as administrative templates, the GPO contains only the data that the client needs for processing Group Policy, and when you edit the GPO, the GPME pulls the ADMX and ADML files from the local workstation.

This works well for smaller organizations, but for complex environments that include custom administrative templates or require more centralized control, Windows Server 2008 and Windows Vista introduced Central Store. Central Store is a single folder in SYSVOL that holds all the ADMX and ADML files that are required. After you have set up Central Store, the GPME recognizes it and loads all administrative templates from Central Store instead of from the local computer.

To create a central store:

  1. Create a folder called PolicyDefinitions in the \\fqdn\SYSVOL\fqdn\Policies path, where fqdn is the fully qualified domain name of the AD DS domain.

    For example, the central store for the contoso.com domain would be

    \\contoso.com\SYSVOL\contoso.com\Policies\PolicyDefinitions

    If you log on to a domain controller, locally or by using Remote Desktop, the local path to the PolicyDefinitions folder is:

    %SystemRoot%\SYSVOL\domain\Policies\PolicyDefinitions
  2. Copy all ADMX files from the %SystemRoot%\PolicyDefinitions folder of a computer running Windows Server 2008 or later to the new SYSVOL PolicyDefinitions folder.

  3. Copy the ADML files from the appropriate language-specific subfolder of %SystemRoot%\PolicyDefinitions into the language-specific subfolder of the new SYSVOL PolicyDefinitions folder.

    For example, English (United States) ADML files are located in %SystemRoot%\PolicyDefinitions\en-us. Copy them into \\fqdn\SYSVOL\fqdn \Policies\ PolicyDefinitions\en-us.

  4. If additional languages are required, copy the folder that contains the ADML files to Central Store.

After you have copied all ADMX and ADML files, the PolicyDefinitions folder on the domain controller should contain the ADMX files and one or more folders containing language-specific ADML files.

Note

CENTRAL STORE IN A MIXED ENVIRONMENT

You can use the Central Store in a mixed environment, with clients and servers running operating systems earlier than Windows Vista and Windows Server 2008. However, you must use a Windows Vista, Windows Server 2008, or later operating system to manage Group Policy. That is, your administrative workstation must be running a version of Windows that can work with the Central Store. The GPOs you create can be applied to previous versions of Windows.

Commenting

Windows Server 2008 and later versions allow you to add comments to policy settings in the Administrative Templates node. To do so, double-click a policy setting and add a comment in the Comment box.

It is a best practice to add comments to configured policy settings to document the justification for a setting and its intended effect. You should also add comments to the GPO itself. Windows Server 2008 and later versions allow you to attach comments to a GPO. In the GPME, right-click the root node in the console tree and choose Properties, and then click the Comment tab.

You can also search and filter based on policy-setting comments.

Starter GPOs

Another Group Policy feature introduced in Windows Server 2008 is starter GPOs. A starter GPO contains Administrative Template settings. You can create a new GPO from a starter GPO, in which case the new GPO is prepopulated with a copy of the settings in the starter GPO. A starter GPO is, in effect, a template. (Unfortunately, Microsoft was already using the term template in the context of administrative templates, so another name had to be found.) When you create a new GPO, you can choose to begin with a blank GPO or select one of the preexisting starter GPOs or a custom starter GPO.

After you create a GPO from a starter GPO, there is no “link” to the starter GPO. Changes to the starter GPO do not affect the GPOs that were previously created from the starter GPO.

Starter GPOs can contain only Administrative Templates policy settings. There are two other ways to copy settings from one GPO into another, new GPO:

  • You can copy and paste entire GPOs in the Group Policy Objects container of the GPMC so that you have a new GPO with all the settings of the source GPO.

  • To transfer settings between GPOs in different domains or forests, right-click a GPO and choose Back Up. In the target domain, create a new GPO, right-click it, and choose Import Settings to import the settings of the backed-up GPO.

 
Others
 
- Active Directory 2008 : Implementing Group Policy (part 3) - Policy Settings
- Active Directory 2008 : Implementing Group Policy (part 2) - Group Policy Objects
- Active Directory 2008 : Implementing Group Policy (part 1) - An Overview and Review of Group Policy
- Microsoft Lync Server 2010 : Front End and User Migration to Lync Server 2010 (part 2) - Automatic Client Upgrade , Decommission Process
- Microsoft Lync Server 2010 : Front End and User Migration to Lync Server 2010 (part 1)
- Microsoft Lync Server 2010 : Migrating from LCS and OCS - Edge Server Migration to Lync Server 2010
- Microsoft Lync Server 2010 : Migrating from LCS and OCS - Office Communications Server 2007 R2
- Windows 8 : Managing Content - Libraries - To add a folder to a library
- Windows 8 : Managing Content - The Picker (part 2) - To open a file or files, To view an alphabetical directory of your folders
- Windows 8 : Managing Content - The Picker (part 1) - To select a file in the Picker, To navigate the Picker
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us