6. Group Policy Processing
Now that you have learned more about the concepts, components,
and scoping of Group Policy, you are ready to examine Group Policy processing closely. As you read this
section, keep in mind that Group Policy is all about applying
configurations defined by GPOs, that GPOs are applied in an order (site, domain,
and OU), and that GPOs applied later in the order have higher
precedence; their settings, when applied, override settings applied
earlier. The following sequence describes the process through which
settings in a domain-based GPO are applied to affect a computer or
user:
-
The computer starts, and the network starts. Remote
Procedure Call System Service (RPCSS) and Multiple Universal
Naming Convention Provider (MUP) are started. The Group Policy
Client is started. -
The Group Policy Client obtains an ordered list of GPOs
scoped to the computer.
The order of the list determines the order of GPO
processing, which is, by default, local, site, domain, and OU:
-
Local GPOs. Each computer running Windows Server 2003,
Windows XP, and Windows 2000 has exactly one GPO stored
locally. Computers running Windows Vista, Windows Server 2008,
and later versions of Windows have multiple local GPOs.
-
Site GPOs. Any GPOs that have been linked to the site
are added to the ordered list next. When multiple GPOs are
linked to a site (or domain or OU), the link
order, configured on the Scope tab, determines the
order in which they are added to the list. The GPO that is
highest on the list, with the number closest to 1, has the
highest precedence and is added to the list last. It is,
therefore, applied last, and its settings override those of
GPOs applied earlier. -
Domain GPOs. Multiple domain-linked GPOs are
added as specified by the link order.
Note
DOMAIN-LINKED POLICIES ARE NOT
INHERITED BY CHILD DOMAINS
Policies from a parent domain are not inherited by a
child domain. Each domain maintains distinct policy links.
However, computers in several domains might be within the
scope of a GPO linked to a site.
-
OU GPOs. GPOs linked to the OU highest in the Active
Directory hierarchy are added to the ordered list, followed by
GPOs linked to its child OU, and so on. Finally, the GPOs
linked to the OU that contains the computer are added. If
several group policies are linked to an OU, they are added in
the order specified by the link order. -
Enforced GPOs. These are added at the end of the
ordered list, so their settings are applied at the end of the
process and therefore override settings of GPOs earlier in the
list and in the process. As a point of trivia, enforced GPOs
are added to the list in reverse order: OU, domain, and then
site. This is relevant when you apply corporate security
policies in a domain-linked, enforced GPO. That GPO will be at
the end of the ordered list and applied last, so its settings
will take precedence.
-
The GPOs are processed synchronously in the order specified
by the ordered list. This means that settings in the local GPOs
are processed first, followed by GPOs linked to the site, the
domain, and the OUs containing the user or computer. GPOs linked
to the OU of which the computer or user is a direct member are
processed last, followed by enforced GPOs.
As each GPO is processed, the system determines whether its
settings should be applied based on the GPO status for the
computer node (enabled or disabled) and whether the computer has
the Allow Group Policy permission. If a WMI filter is applied
to the GPO, and if the computer is running Windows XP or later, it
performs the WQL query specified in the filter. -
If the GPO should be applied to the system, CSEs trigger to
process the GPO settings. Policy settings in GPOs overwrite
policies of previously applied GPOs in the following ways:
-
If a policy setting is configured (set to Enabled or
Disabled) in a GPO linked to a parent container (OU, domain,
or site), and the same policy setting is Not Configured in
GPOs linked to its child container, the resultant set of
policies for users and computers in the child container will
include the parent’s policy setting. If the child container is
configured with the Block Inheritance option, the parent
setting is not inherited unless the GPO link is configured
with the Enforced option. -
If a policy setting is configured (set to Enabled or
Disabled) for a parent container, and the same policy setting
is configured for a child, the child
container’s setting overrides the setting inherited from the
parent. If the parent GPO link is configured with the Enforced
option, the parent setting has precedence. -
If a policy setting of GPOs linked to parent containers
is Not Configured, and the child OU setting is also Not
Configured, the resultant policy setting is the setting that
results from the processing of local GPOs. If the resultant
setting of local GPOs is also Not Configured, the resultant
configuration is the Windows default setting.
-
When the user logs on, steps 2, 3, and 4 are repeated for
user settings. The client obtains an ordered list of GPOs scoped
to the user, examines each GPO synchronously, and hands over GPOs
that should be applied to the appropriate CSEs for processing.
This step is modified if User Loopback Group Policy Processing is enabled. Loopback policy
processing is discussed in the next section.
Note
POLICY SETTINGS IN BOTH THE COMPUTER
CONFIGURATION AND USER CONFIGURATION NODES
Most policy settings are specific to either the User
Configuration or Computer Configuration node. A small handful of
settings appear in both nodes. Although in most situations the
setting in the Computer Configuration node overrides the setting
in the User Configuration node, it is important to read the
explanatory text accompanying the policy setting to understand
the setting’s effect and its application.
-
Every 90 to 120 minutes after computer startup, computer policy refresh occurs,
and steps 2, 3, and 4 are repeated for computer settings. -
Every 90 to 120 minutes after user logon, user policy
refresh occurs, and steps 2, 3, and 4 are repeated for user
settings.
Note
SETTINGS MIGHT NOT TAKE EFFECT
IMMEDIATELY
Although most settings are applied during a background policy
refresh, some CSEs do not apply the setting until the next startup
or logon event. Newly added startup and logon script policies, for
example, will not run until the next computer startup or logon.
7. Loopback Policy Processing
By default, a user’s settings come from GPOs scoped to the user
object in Active Directory. Regardless of which computer the
user logs on to, the resultant set of policies that
determine the user’s environment is the same. There are situations,
however, in which you might want to configure a user differently,
depending on the computer in use. For example, you might want to lock
down and standardize user desktops when users log on to computers in
closely managed environments such as conference rooms, reception
areas, laboratories, classrooms, and kiosks. It is also important for
virtual desktop infrastructure (VDI) scenarios,
including remote virtual machines and Remote Desktop Services (Terminal Services).
Imagine a scenario in which you want to enforce a standard
corporate appearance for the Windows desktop on all computers in
conference rooms and other public areas of your office. How could you
centrally manage this configuration, using Group Policy? Policy settings that configure desktop appearance are located in the User Configuration
node of a GPO. Therefore, by default, the settings apply to users
regardless of which computer they log on to. The default policy
processing does not give you a way to scope user settings to apply to
computers, regardless of which user logs on. That’s where loopback
policy processing comes in.
Loopback policy processing alters the default algorithm used by
the Group Policy client to obtain the ordered list of GPOs that should
be applied to a user’s configuration. Instead of user configuration
being determined by the User Configuration node of GPOs that are
scoped to the user object, user configuration can be determined by the
User Configuration node policies of GPOs that are scoped to the
computer object.
The User Group Policy Loopback Processing Mode policy, located in the Computer
Configuration\Policies\Administrative Templates\System\Group Policy
folder in GPME, can be, like all policy settings, set to Not
Configured, Enabled, or Disabled.
When enabled, the policy can specify Replace or Merge
mode:
-
Replace In this case, the GPO
list for the user is replaced in its entirety by the GPO
list already obtained for the computer at computer startup (during
step 2). The settings in the User Configuration policies of the
computer’s GPOs are applied to the user. Replace mode is useful in
a situation such as a classroom, where users should receive a
standard configuration rather than the configuration applied to
those users in a less managed environment. -
Merge In this case, the GPO
list obtained for the computer at computer startup is appended to
the GPO list obtained for the user when logging on (step 5).
Because the GPO list obtained for the computer is applied later,
settings in GPOs on the computer’s list have precedence if they
conflict with settings in the user’s list. This mode would be
useful for applying additional settings to users’ typical
configurations. For example, you might allow a user to receive his
or her typical configuration when logging on to a computer in a
conference room or reception area but replace the wallpaper with a
standard bitmap and disable the use of certain applications or
devices.
Note
LOOPBACK AND FILTERING
It is an underdocumented fact that when you combine loopback processing with security group filtering, the
application of user settings during policy refresh uses the
credentials of the computer to determine which GPOs to apply as part
of the loopback processing, but the logged-on user must also
have the Apply Group Policy permission for the GPO to be
successfully applied.
Practice Configuring Group Policy Scope
Practice Configuring Group Policy Scope
In this practice, you follow a scenario that builds upon the
GPO you created and configured in Lesson 1. In each vignette, you
refine your application of Group Policy scoping. Before performing
these exercises, complete the exercises in Lesson 1.
EXERCISE 1 Create a GPO with a Policy
Setting That Takes Precedence over a Conflicting
Setting
Imagine you are an administrator of the contoso.com domain.
The CONTOSO Standards GPO, linked to the domain, configures a
policy setting that requires a 10-minute screen saver timeout. An
engineer reports that a critical application that performs lengthy
calculations crashes when the screens saver starts, and the
engineer has asked you to prevent the setting from applying to the
team of engineers that use the application every day.
-
Log on to SERVER01 as Administrator. -
Open the Active Directory Users And Computers snap-in
and create a first-level OU called User Accounts (if one does
not already exist) and a child OU called Engineers. -
Open Group Policy Management. -
Expand the console tree so that you can see the
Engineers OU. Right-click the Engineers OU and choose Create A
GPO In This Domain, And Link It Here. -
Enter the name Engineering
Application Override and click OK. -
Expand the Engineers OU, right-click the GPO, and choose
Edit. -
Expand User Configuration\Policies\Administrative
Templates\Control Panel and then click the Personalization
folder. -
Double-click the Screen Saver Timeout policy
setting. -
Click Disabled, and then click OK. -
Close the GPME. -
In Group Policy Management, click the Engineers OU,
and then click the Group Policy Inheritance tab. -
Notice that the Engineering Application Override GPO has
precedence over the CONTOSO Standards GPO.
The setting you configured, which explicitly disables
the screen saver, overrides the setting in the CONTOSO
Standards GPO.
EXERCISE 2 Configure the Enforced
Option
You want to ensure that all systems receive changes to Group
Policy as quickly as possible. To do this, you want to enable the
Always Wait For The Network Group Policy setting . You do not
want any administrators to override the policy; it must be
enforced for all systems.
-
In the GPMC, right-click the contoso.com domain and
choose Create A GPO In This Domain, And Link It Here. -
Enter the name Enforced Domain
Policies and click OK. -
Right-click the GPO and choose Edit. -
Expand Computer Configuration\Policies\Administrative
Templates\System and then click the Logon folder. -
Double-click the Always Wait For The Network At Computer
Startup And Logon policy setting. -
Select Enabled and click OK. -
Close the GPME. -
Right-click the Enforced Domain Policies GPO and choose
Enforced. -
Select the Engineers OU, and then click the Group Policy Inheritance tab.
Note that your enforced domain GPO has precedence even
over GPOs linked to the Engineers OU. Settings in a GPO such
as Engineering Application Override cannot successfully
override settings in an enforced GPO.
EXERCISE 3 Configure Security
Filtering
As time passes, you discover that a small number of users
must be exempted from the screen saver timeout policy configured
by the CONTOSO Standards GPO. You decide that it is no longer
practical to use overriding settings. Instead, you will use
security filtering to manage the scope of the GPO.
-
Open the Active Directory Users And Computers snap-in
and create an OU called Groups, if it does not already exist.
In the Groups OU, create a global security group named
GPO_CONTOSO Standards_Exceptions. -
In the GPMC, expand the Group Policy Objects container. -
Right-click the Engineering Application Override GPO and
choose Delete. Click Yes to confirm your choice. -
In the console tree, select the CONTOSO Standards GPO in
the Group Policy Objects container. -
On the Delegation tab, click Advanced. -
In the Security Settings dialog box, click Add. -
Type the name of the group, GPO_CONTOSO Standards_Exceptions, and
click OK. -
In the permissions list, scroll down and select the Deny
permission for Apply Group Policy. Then click OK. -
Click Yes to confirm your choice. -
Note the entry shown on the Delegation tab in the
Allowed Permissions column for the GPO_CONTOSO
Standards_Exceptions group. -
Click the Scope tab and examine the Security Filtering
section.
The default security filtering of the new GPO is that
the Authenticated Users group has the Allow Apply Group Policy
permission, so all users and computers within the scope of the
GPO link will apply the settings in the GPO. Now you have
configured a group with the Deny Apply Group Policy
permission, which overrides the Allow permission. If any user
requires exemption from the policies in the CONTOSO Standards
GPO, you can simply add the user to the GPO_CONTOSO
Standards_Exceptions group.
EXERCISE 4 Implement Loopback Policy
Processing
Recently, a salesperson at Contoso, Ltd., turned on his
computer to give a presentation to an important customer, and the
desktop wallpaper was a picture that exhibited questionable taste
on the part of the salesperson. The management of Contoso, Ltd.,
has asked you to ensure that the laptops used by salespeople will
have no wallpaper. It is not necessary to manage the wallpaper of
salespeople when they are logged on to desktop computers at the
office. Because policy settings that manage wallpaper are user
configuration settings, but you need to apply the settings to
sales laptops, you must use loopback policy processing. In
addition, the computer objects for sales laptops are scattered
across several OUs, so you will use security filtering to apply
the GPO to a group rather than to an OU of sales laptops.
-
Open the Active Directory Users And Computers snap-in
and create a global security group called Sales Laptops in the
Groups OU. Also create an OU called Clients for client
computer objects, if the Clients OU does not already
exist. -
In the GPMC, right-click the Group Policy Objects container and choose
New. -
In the Name box, type Sales Laptop
Configuration and click OK. -
Right-click the GPO and choose Edit. -
Expand User Configuration\Policies\Administrative
Templates\Desktop and then click the Desktop subfolder. -
Double-click the Desktop Wallpaper policy
setting. -
Review the explanatory text in the Help box. -
In the Comment box, type Corporate
standard wallpaper for sales laptops. -
In the Supported On box, review the supported versions
of Windows. -
Select Enabled. -
In the Wallpaper Name box, type c:\windows\web\Wallpaper\server.jpg. -
Click OK. -
Expand Computer Configuration\Policies\Administrative
Templates\System, and then click the Group Policy folder. -
Double-click the User Group Policy Loopback Processing Mode policy setting. -
Click Enabled and, in the Mode drop-down list, select
Merge. -
Click OK and close the GPME. -
In the GPMC, select the Sales Laptop Configuration GPO
in the Group Policy Objects container. -
On the Scope tab, in the Security Filtering section,
select the Authenticated Users group and click Remove. Click
OK to confirm your choice. -
Click Add in the Security Filtering section. -
Type the group name, Sales
Laptops, and click OK. -
Click Add in the Security Filtering section. -
Type the group name, Domain
Users, and click OK.
It is an underdocumented fact that when you combine the
loopback processing with security group
filtering, the application of user settings during policy
refresh uses the credentials of the computer to determine
which GPOs to apply as part of the loopback processing, but
the logged-on user must also have the Apply Group Policy permission for the GPO to be
successfully applied. -
Right-click the Clients OU and choose Link An Existing
GPO. -
Select Sales Laptop Configuration and click OK.
You have now filtered a GPO so that it applies only to
objects in the Sales Laptops group. You can add computer
objects for sales laptops as members of the group, and those
laptops will be within the scope of the GPO. The GPO
configures the laptops to perform loopback policy processing
in Merge mode. When any user in the domain logs on to one of
the sales laptops, user configuration settings scoped to the
user are applied and then user configuration settings in GPOs
scoped to the computer are applied, including the Sales Laptop
Configuration GPO.
|