GROUP POLICY An overview of Microsoft Windows Group Policy.

Slides:



Advertisements
Similar presentations
Understanding Group Policy Part 1 of 3 Rick Claus IT Pro Advisor Microsoft Canada
Advertisements

Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
Understanding Group Policy on Windows Server 2003.
Module 5: Creating and Configuring Group Policy
Managing User Settings with Group Policy
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
11.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Module 8: Implementing Administrative Templates and Audit Policy.
Understanding Group Policy on Windows Server 2003 John Howard, IT Pro Evangelist, Microsoft UK
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Corso referenti S.I.R.A. – Modulo 2 07 – Group Policy 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
Section 2: Using Group Policy Management Tools Local vs. Domain Policies Editing Local Policies Managing Domain Policies Understanding Group Policy Refresh.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Managing User Desktops with Group Policy
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Overview Introduction to Managing User Environments Introduction to Administrative Templates Using Administrative Templates in Group Policy Assigning Scripts.
Module 6: Implementing Group Policy. Overview Implementing Group Policy Objects Implementing GPOs in a Domain Managing the Deployment of Group Policy.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
Module 6: Configuring User Environments Using Group Policy.
Module 7 Configure User and Computer Environments By Using Group Policy.
Implementing Group Policy. Overview What is Group Policy Introduction to Group Policy Group Policy Structure How Group Policy Settings Are Applied in.
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
4. Managing the Desktop Thomas Lee Chief Technologist – QA plc.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Page 1 System and Group Policies Lecture 7 Hassan Shuja 11/02/2004.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Module 5: Creating and Configuring Group Policies.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Microsoft Management Seminar Series SMS 2003 Change Management.
1 Group Policies (Week 11, Monday 3/19/2007) © Abdou Illia, Spring 2007.
Administering Group Policy Chapter Eleven. Exam Objectives in this Chapter  Plan a Group Policy strategy using Resultant Set of Policy Planning mode.
Implementing Group Policy
Week 4 Objectives Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates.
Implementing a Group Policy Infrastructure
Module 10: Implementing Administrative Templates and Audit Policy.
11 INTRODUCTION TO GROUP POLICY Chapter 7. Chapter 7: INTRODUCTION TO GROUP POLICY2 WHAT CAN YOU DO WITH GROUP POLICY?  Control the user environment.
Module 6 Creating and Configuring Group Policy. Module Overview Overview of Group Policy Configuring the Scope of Group Policy Objects Evaluating the.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
Windows Server 2003 群組原則設定與管理 林寶森
GROUP POLICY. Group Policy is a hierarchical infrastructure which allows systems administrators to configure computer and user settings from a central.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
1.1 Microsoft® Windows® 2003 Server Group Policy Management Prof. Abdul Hameed.
Module 8: Implementing Group Policy. Overview Multimedia: Introduction to Group Policy Implementing Group Policy Objects Implementing GPOs on a Domain.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Introduction to Group Policy Lesson 7. Group Policy Group Policy is a method of controlling settings across your network. – Group Policy consists of user.
Managing User Desktops with Group Policy
HARDENING CLIENT COMPUTERS
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
Introduction to Group Policy
Module 8: Implementing Group Policy
Presentation transcript:

GROUP POLICY An overview of Microsoft Windows Group Policy

MY CREDENTIALS  B.S Computer Science  M.S. Information Technology (2012)  Certified Information Systems Security Professional (CISSP)  Network Admin at BCG  Early NT 3.51 and 4.0 days  Network Admin and Instructor at Hilbert College  Transition from NT4 to 2000  Accounts and Profiles for all students (GPO Based)  Taught Networking, Databases, Programming in the Computer Security program there  An admins perspective who learned it on the job

WHAT IS GROUP POLICY  Microsoft NT Technology  Other NOS have their own versions  Centralized management of clients  Security management  Application management  Profile management  Can be pushed from domain  Can be modified locally for individual clients  Local policy objects not as in depth  Can be pushed as part of disc imaging

WHAT CAN IT DO FOR ME  Manage security  Firewall and Networking  OS configuration restrictions  Reduce workstation downtime  Can restrict users from modifying potentially damaging settings  Manage applications  Whitelist available applications  Control which applications are visible  Roaming profiles  Centralized data storage  Full or partial

NOT A SILVER BULLET  Only as effective as the Information Security Policies it is enforcing  Needs to be a part of security in depth  Can be complex to implement and manage  Improper management can interfere with business goals  Easy to lock down a machine tighter than it needs to be  Applications typically use voluntary enforcement  Possible to modify or interfere an application reading its policy

WHAT DO I NEED TO USE IT Domain Based PolicyLocal Policy  Active Directory Domain  Install Group Policy Management Objects  Server Roles vary by OS version  Can be managed using remote administration tools from Vista (2003 Domains) or Windows 7 (2008 Domains)  Windows NT based OS’s  No domain needed  Easily configured on XP and above  Can be used in conjunction with domain policies  Configured locally on the target client

MANAGEMENT TOOLS  Group Policy Management Console (GPMC)  Suite of tools in 2003  Unified tool in 2008  Cmdlets  Powershell extensions that allow scripting  Local Policy Editor  Pre Win 7 one user policy for all users  Gpupdate  Forces update of policy on machines (XP and later)

WHAT IS A GPO?  Collection of settings that can be used in a Group Policy  Most modify registry settings  Can also be processed by extending applications  Can be applied to users or computers  Can be inherited  Can be linked to multiple policies

POLICY OBJECT TYPES Computer PolicyUser Policy  Applies based on the Computer Account  Useful to configure settings on a specific workstation  Same for all users on that machine  Example: remove start menu on public machine  Applies based on the logged in User Account  Setting travel with the user  Roaming Profiles go here  Example: Password policy

HOW IT WORKS  Machine Boots up  Machine policy downloaded and applied  User Logs in  User Policy downloaded and applied  Settings may be cached  90 +/- 30 min for clients  gpupdate to refresh immediately

APPLYING MULTIPLE POLCIES  Local Group Policy objects - Computer's local policy (accessed by running gpedit.msc).  Site - Group policies that are applied to the AD Site  Lowest link order processed last, overrides higher links  Domain - Group policies specified for the AD Domain  Lowest link order processed last, overrides higher links  Organizational Unit - Policies for User or Computer OUs  Lowest link order processed last, overrides higher links  Inheritance - Inheritance can be blocked or enforced to control what policies  Use GPMC to see what will actually be applied

TYPICAL POLICY COMPONENTS  Administrative Templates  Security Settings  IP Security Policy  Software Restriction Policies  Wireless Network Policies  Public Key Policies  Software Installation  Remote Installation Services  Scripts  Internet Explorer Maintenance  Folder Redirection  Disk Quotas  QoS Packet Scheduler  Custom Registry Modifications

CREATING A POLICY  Demonstration

ROAMING PROFILES  Can redirect some or all user data  Can redirect different sections to different locations  Administrators do not have access to redirected profiles (by default)  Allows for centralized backup  User is no longer dependent on specific machine for user data  Typically redirected profile folders  My Documents,  Application Data,  Desktop,  Start Menu  Folder redirection is under User Settings, Windows Settings

TIPS AND TRICKS  Lock down Regedit  Be extremely careful when applying policy to admins and domain controllers  Calculate space requirements before trying to redirect folders  Consider implementing quotas  Gpanswers.com  Learn to use MSDN and Technet  Set up a lab environment and play

GETTING STARTED WITH COMMON DEPLOYMENT SCENARIOS  Lightly Managed  Mobile  Multi-User  App Station  Task Station  Kiosk  GPOs can be obtained for these from:  Implementing Common Desktop Management Scenarios with the Group Policy Management Console 

LIGHTLY MANAGED  Power Users and Developers  Is the least managed of all of the scenarios.  Allows users to customize most settings that affect them but prevents them from making harmful system changes.  Includes settings that reduce help desk costs and user downtime.  Full Roaming Profiles with local caching  speeds up login/logout  Core set of applications which are always available.  Users can also install applications

MOBILE  Laptop and Mobile User Support  disconnected user who frequently needs to work offline  Does not require high speed link  Offline files  Partial Roaming to support offline files  Allows users to disconnect from the network without logging off or shutting down.

MULTI-USER  Computer laboratory or library  Allows basic customization of the desktop environment.  Allows screen saver, background, etc. but no hardware or OS configuration  Full Roaming Profiles with no caching to protect privacy  Restricted write access to the local computer  Can only write data to their own profile  Highly secure.

APP AND TASK STATION  Highly restricted configurations with only a few applications.  Vertical applications such as marketing, claims, and customer-service scenarios.  Allows minimal customization by the user.  Allows users to access a small number of applications appropriate to their job role.  Does not allow users to add or remove applications.  Full Roaming Profiles with caching  Provides a simplified desktop and Start menu.  Restricted write access to the local computer  Can only write data to their user profile and to redirected folders.  Is highly secure.  Task Station  Only one app available and no start menu

KIOSK  Unattended machine in a public area, highly secure  Is a public workstation.  Runs only one application.  Uses only one user account and automatically logs on.  The system automatically resets to a default state at the start of each session.  Runs unattended.  Is highly secure.  Does not allow users to make changes to the default user or system settings.  Does not save data to the disk.  Is always on (no log off or shutdown).

Q & A  Questions, comments?  My contact info again:  Patrick Lupiani  or 