30
Implementing Group Policies in Windows Server 2003

Chapter 6: Implementing Group Policy (Presentation)

Embed Size (px)

Citation preview

Page 1: Chapter 6: Implementing Group Policy (Presentation)

Implementing Group Policies in Windows Server 2003

Page 2: Chapter 6: Implementing Group Policy (Presentation)

Group policies are collections of user and computer configuration settings that specify how programs, network resources, and the operating system work for users and computers in an organization.

Group Policy can be set up for computers, sites, domains, and OUs.

Page 3: Chapter 6: Implementing Group Policy (Presentation)

Example: Using group policies, you can determine the programs that are available to users, the programs that appear on the user's desktop, and Start menu options.

In general Group Policy is groupings of policy settings that are linked to computers, sites, domains, and OUs.

Page 4: Chapter 6: Implementing Group Policy (Presentation)

Through Group Policy, administrators can take advantage of policy-based management to do the following: Enable one-to-many management of users and

computers throughout the enterprise. Automate enforcement of IT policies. Simplify administrative tasks, such as system updates

and application installations. Consistently implement security settings across the

enterprise. Efficiently implement standard computing

environments for groups of users.

Page 5: Chapter 6: Implementing Group Policy (Presentation)

Administrators use Group Policy to define specific configurations for groups of users and computers by creating Group Policy settings.

These settings are specified through the Group Policy Object Editor tool and contained in a Group Policy object (GPO), which is in turn linked to Active Directory containers, such as sites, domains, or OUs

Page 6: Chapter 6: Implementing Group Policy (Presentation)

Site

Domain

OU1 OU2

GPO1

GPO2

GPO3

GPO4

Page 7: Chapter 6: Implementing Group Policy (Presentation)

Registry-based Policy Security Settings Software Restrictions Software Distribution and Installation Computer and User Scripts Roaming User Profiles and Redirected Folders Offline Folders Internet Explorer Maintenance

Page 8: Chapter 6: Implementing Group Policy (Presentation)

The most common and the easiest way to provide policy for an application or operating system components is to implement registry-based policy.

With the new Group Policy Management Console (GPMC) and the Group Policy Object Editor, administrators can define registry-based policies for applications, the operating system, and its components.

Page 9: Chapter 6: Implementing Group Policy (Presentation)

Example: an administrator can enable a policy setting that removes the Run command from the Start menu for all affected users.

Registry based policy edit the operating system registry setting.

Page 10: Chapter 6: Implementing Group Policy (Presentation)

Group Policy provides options for administrators to set security options for computers and users within the scope of a GPO.

Local computer, domain, and network security settings can be specified.

Page 11: Chapter 6: Implementing Group Policy (Presentation)

For added protection, administrators can apply software restriction policies that prevent users from running files based on the path, URL zone, or publisher criteria.

Administrators can make exceptions to this default security level by creating rules for specific software.

Page 12: Chapter 6: Implementing Group Policy (Presentation)

To defend against viruses, unwanted applications, and attacks on computers running Windows XP and Windows Server 2003, Group Policy includes new software restriction policies.

Administrators can use policies to identify software running in a domain and control its ability to execute.

Page 13: Chapter 6: Implementing Group Policy (Presentation)

Administrators can manage application installation, updates, and removal centrally with Group Policy.

Because organizations can deploy and manage customized desktop configurations, they spend less money supporting users on an individual basis.

Page 14: Chapter 6: Implementing Group Policy (Presentation)

Software can be either assigned to users or computers (mandatory software distribution) or published to users (allowing users to optional install software through Add/Remove Programs in the Control Panel).

Users get the flexibility they need to do their jobs without having to spend time configuring their system on their own.

Page 15: Chapter 6: Implementing Group Policy (Presentation)

Administrators can use scripts to automate tasks at computer startup and shutdown and user logon and logoff.

Any language supported by Windows Scripting Host can be used, including the Microsoft Visual Basic® development system, Scripting Edition (VBScript); JavaScript; PERL; and MS-DOS®-style batch files (.bat and .cmd).

Page 16: Chapter 6: Implementing Group Policy (Presentation)

Roaming user profiles provide the ability to store user profiles centrally on a server and load them when a user logs on.

Through folder redirection, important user folders, such as the My Documents and Start menu, can be redirected to a server-based location.

Folder redirection allows centralized management and the capability to easily backup and restore these folders.

Page 17: Chapter 6: Implementing Group Policy (Presentation)

When a network is unavailable, the Offline Folders feature provides access to network files and folders from a local disk.

Users are assured access to critical information even when network connections are unstable or nonpermanent or when using a mobile computer.

When users reconnect to their network, the client files and server files are synchronized, thereby keeping versions consistent and up-to-date.

Page 18: Chapter 6: Implementing Group Policy (Presentation)

Administrators can manage and customize the configuration of Microsoft Internet Explorer on computers that support Group Policy.

The Group Policy Object Editor includes the Internet Explorer Maintenance node, which administrators use to edit Internet Explorer security zones, privacy settings, and other parameters on a computer.

Page 19: Chapter 6: Implementing Group Policy (Presentation)

Group Policy Operations are collection of Group Policy settings.

To create a specific desktop configuration for users, you create Group Policy Operations.

Each computer running Microsoft Windows Server 2003 has:

One Local GPO

Any number of Non-Local GPOs

Page 20: Chapter 6: Implementing Group Policy (Presentation)

One local GPO is stored on each computer (regardless of the condition that it is on a network or not).

A local GPO affects only the computer on which it is stored.

The local GPO settings can be overridden by nonlocal GPOs in networked environment and vice versa.

Default store location: %Systemroot%\System32\GroupPolicy.

Page 21: Chapter 6: Implementing Group Policy (Presentation)

Nonlocal GPOs are created in Active Directory and must be linked to a site, domain, or OU in order to be applied to either users or computers.

By Default two nonlocal GPOs are created:

Default Domain Policy

Default Domain Controllers Policy

Page 22: Chapter 6: Implementing Group Policy (Presentation)

Default Domain Policy

This GPO is linked to the domain.

it affects all users and computers in the domain

Default Domain Controllers Policy

This GPO is linked to the Domain Controllers OU.

It generally affects only domain controllers

Page 23: Chapter 6: Implementing Group Policy (Presentation)

You use the Group Policy Object Editor to organize and manage the Group Policy settings in each GPO.

Page 24: Chapter 6: Implementing Group Policy (Presentation)

Group Policy settings are contained in a GPO and determine the user's desktop environment.

You can view the Group Policy settings for a GPO in the Group Policy Object Editor.

There are two types of Group Policy settings: Computer Configuration Settings

User Configuration Settings. They are contained in the Computer

Configuration and the User Configuration nodes in a GPO.

Page 25: Chapter 6: Implementing Group Policy (Presentation)

The Computer Configuration node contains the settings used to set group policies applied to computers, regardless of who logs on to them.

Computer configuration settings are applied when the operating system initializes.

Page 26: Chapter 6: Implementing Group Policy (Presentation)

The User Configuration node contains the settings used to set group policies applied to users, regardless of which computer the user logs on to.

User configuration settings are applied when users log on to the computer.

Both these nodes include settings for installing software, settings for installing and accessing the Windows Server 2003 operating system, and registry settings.

Page 27: Chapter 6: Implementing Group Policy (Presentation)

In both the Computer Configuration and the User Configuration nodes, the Software Settings node contains only the Software Installation extension by default.

The Software Installation extension helps you specify how applications are installed and maintained within your organization.

It also provides a place for independent software vendors to add settings.

Page 28: Chapter 6: Implementing Group Policy (Presentation)

In both the Computer Configuration and the User Configuration nodes, the Windows Settings node contains the Scripts extension and the Security Settings node.

The Scripts extension allows you to specify two types of scripts: startup/shutdown (in the Computer Configuration node) and logon/logoff (in the User Configuration node).

Page 29: Chapter 6: Implementing Group Policy (Presentation)

In both the Computer Configuration and the User Configuration nodes, the Administrative Templates node contains registry-based Group Policy settings.

There are more than 550 of these settings available for configuring the user environment.

As an administrator, you might spend a significant amount of time manipulating these settings.

Page 30: Chapter 6: Implementing Group Policy (Presentation)

Each of the settings in the Administrative Templates node can be:

Not Configured: The registry is not modified.

Enabled: The registry reflects that the policy setting is selected.

Disabled: The registry reflects that the policy setting is not selected.