IT tutorials
 
Windows
 

Structural Overview of a Group Policy object : Computer Configuration & User Configuration

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
2/6/2012 5:50:36 PM

Group Policy Defined

Many technology terms can be confusing, especially when the terms are very similar to each other. Examples include Group Policy, Group Policy objects, policies, policy settings, and so on.

Group Policy is a technology that is built into Windows 2000 and later operating systems. Group Policy—broken down to the rawest form and definition—is defined as a mechanism for centralizing configurations for computers and user accounts.

Understand that Group Policy objects are the objects that the Group Policy technology uses to centralize the configurations. GPOs contain collections of policy settings, which the GPOs are in turn linked to Active Directory nodes (such as the domain, organizational units, or sites). The objects contained within the nodes receive the settings contained within the Group Policy Objects.

Policy settings are used in many different forms and definitions. Many administrators use policy settings to refer to any setting within a GPO. Others use the term to refer to those special settings in the registry that users do not have permission to modify.

Preference settings is a term that is not used often, but it is important. It is used in conjunction with the preceding term, policy settings. Preferences are registry settings that are not volatile. Preference settings “tattoo” the registry with settings. There is an entirely new section in a GPO within the Group Policy Management Editor that involves preferences, as shown in Figure 1.

Figure 1. Windows Server 2008 GPOs have a new section in a GPO named Preferences.




Structural Overview of a GPO

Most administration of GPOs occurs with those that are stored in Active Directory.

Active Directory–based GPOs use a common format and structure. First, all GPOs are accessed and administered in the same way. There are a few options here, but most use the Group Policy Management Console (GPMC) and the Group Policy Management Editor (GPME). For more information about the GPMC, where al aspects of using and working with the GPMC are discussed. When you use the GPME, the GPO always has a distinct structure, shown in Figure 2.

Figure 2. A standard GPO opened in the GPME has the same format and structure as all GPOs stored in Active Directory.

Notice that there are two sections to the GPO: Computer Configuration and User Configuration. These sections are very important to keep separate, because they configure different object types. The Computer Configuration section controls computer accounts. In a like manner, the User Configuration section controls user accounts. Although a few settings fall under both sections, they do not cross the boundary of the two sections. If you have a setting that falls under both sections, and you want them both configured, you must configure both settings for users and computers to receive the settings.

Keep in mind that settings located under the Computer Configuration section apply to computer objects, regardless of the user. In a like manner, settings located under the User Configuration section apply to user objects, regardless of the computer.

Computer Configuration

Breaking down the two sections of the GPO reveals a very consistent structure that will help you get around in the GPO in the future. First, if you expand the Computer Configuration section, you will see the nodes shown in Figure 3.

Figure 3. The Computer Configuration section of a GPO has a distinct structure that is similar to the User Configuration section.

Within this section, you have the following three primary nodes:

  • Software Settings

  • Windows Settings

  • Administrative Templates

The Software Settings node is rather straightforward; it allows you to distribute software via .msi or .zap files.

The Windows Settings node goes a bit deeper, including many subnodes, as shown in Figure 4.

Figure 4. The major subnodes of the Windows Settings node include Scripts and Security Settings.

Within this section of the GPO, you have plenty of options to choose from. Account Policies control all aspects of user account passwords. Local Policies offer extensive control over auditing and user rights, as well as a variety of security settings. The security settings section alone includes over 75 individual policy settings.

Other settings include Windows Firewall, public key infrastructure (PKI), and IP security. In the Software Restriction Policies node, you can establish black lists and white lists of software that users can run. These policies can be set for hash rules, path rules, or certificate rules, as well as network zone rules.

The Administrative Templates node is the final section of the Computer Configuration section, and the largest. This section covers a wide variety of settings for the computer, as shown in Figure 5.

Figure 5. The Administrative Templates node within the Computer Configuration section contains several subnodes.

Although there are only five major nodes within the Administrative Templates node, these nodes control over 1,250 individual settings. As you can see, the top-level nodes—including Control Panel, Network, Printers, System, and Windows Components—cover a wide range of areas for a computer.

User Configuration

The User Configuration section is similar to the Computer Configuration section. The main difference is that the settings target user account settings, not computer account settings. If you expand the User Configuration section, as shown in Figure 6, you will see that there are three primary nodes:

  • Software Settings

  • Windows Settings

  • Administrative Templates

Figure 6. The User Configuration section of a GPO has a distinct structure that is similar to the Computer Configuration section.

As in the Computer Configuration section, you can create a policy in the User Configuration section that distributes software to user accounts. Both .msi and .zap files can be distributed using Group Policy.

The Windows Settings node within the User Configuration section is distinctly different from the Windows Settings node in the Computer Configuration section. Immediately you see that there are policies related to Remote Installation Services and Microsoft Internet Explorer maintenance. Expanding the Security Settings node shows that only public key policies are available, as shown in Figure 7.

Figure 7. The Security Settings node of the User Configuration section of a GPO contains only Public Key Policies.

The final node is Administrative Templates. With so few settings in the other two nodes, it is no surprise that this node contains the majority of the settings that fall under the User Configuration section of a GPO. After expanding this node, you will see that it contains more top-level nodes than the Computer Configuration section. Some of the subnodes are the same as in the Computer Configuration section, but many are different, as you can see in Figure 8.

Figure 8. The Administrative Templates node within the User Configuration section of a GPO has more subnodes than it does in the Computer Configuration section.

The settings in the Administrative Templates node are intended for controlling the user profile. The user profile maintains and controls the user desktop and overall “look and feel” of the desktop environment. Therefore, it is not surprising that this node contains nodes called Shared Folders and Start Menu and Taskbar.

Although some of the nodes exist within both the User Configuration and Computer Configuration sections, the settings could not be more different. This is because each section controls a different portion of the registry. The Administrative Templates node and subnodes in the User Configuration section contain over 1,200 policy settings—almost as many as in the Computer Configuration section.

 
Others
 
- Installing or Upgrading to Windows 7 : Interactive Setup (part 2) - Upgrading
- Installing or Upgrading to Windows 7 : Interactive Setup (part 1) - Clean Install
- Windows Server 2008 R2 : Understand Active Directory Users and Groups (part 2) - Manage Users and Groups in Active Directory
- Windows Server 2008 R2 : Understand Active Directory Users and Groups (part 1)
- Windows Server 2003 : Configuring Hardware Devices and Drivers
- Windows Server 2003 : Installing Hardware Devices and Drivers
- Windows Vista : Automating Installation - Preparing the Environment
- Windows Vista : Automating Installation - Understanding Setup
- Windows Server 2008 R2 : Understand Local Users and Groups (part 2) - Understand Local User Rights & Work with Local Account Policies
- Windows Server 2008 R2 : Understand Local Users and Groups (part 1) - Administer Local Users and Groups
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us