Top Banner
293 Windows Server 2003 offers extensive control over system configuration and user environments through a feature called Group Policy. Group Policy settings may be applied to domain, site, and organizational unit (OU) Active Directory containers, giving the administrator more granular control over system configurations and user settings. The OS adds refinements to the group policies functions but does not substantially change the administrative interface or their basic nature in Windows 2000. More than 160 new policy settings are now available in Windows Server 2003. Among the affected functionality are settings for Control Panel, error reporting, Terminal Server, Remote Assistance, networking and dial-up connec- tions, Domain Name System (DNS), network logon, Group Policy, and roaming profiles. This chapter is divided into three main sections. The first reviews the concept of group policies; the second provides a number of implementation examples; and the third explores the underlying concepts of Microsoft’s IntelliMirror. Upon com- pleting this chapter, you should have the following: A working knowledge of group policies The ability to establish and modify group policy properties. The ability to apply group policies to user accounts An understanding of IntelliMirror technology and the ability to employ it UNDERSTANDING GROUP POLICIES Since group policies are designed to apply to a great number of users, they have the potential to reduce system administration support. Once a Group Policy setting Chapter 8 Group Policies 3930 P-08 3/12/03 10:26 AM Page 293
56
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Group Policies

293

Windows Server 2003 offers extensive control over system configuration and userenvironments through a feature called Group Policy. Group Policy settings may beapplied to domain, site, and organizational unit (OU) Active Directory containers,giving the administrator more granular control over system configurationsand user settings. The OS adds refinements to the group policies functions butdoes not substantially change the administrative interface or their basic nature inWindows 2000. More than 160 new policy settings are now available in WindowsServer 2003. Among the affected functionality are settings for Control Panel, errorreporting, Terminal Server, Remote Assistance, networking and dial-up connec-tions, Domain Name System (DNS), network logon, Group Policy, and roamingprofiles.

This chapter is divided into three main sections. The first reviews the conceptof group policies; the second provides a number of implementation examples; andthe third explores the underlying concepts of Microsoft’s IntelliMirror. Upon com-pleting this chapter, you should have the following:

• A working knowledge of group policies

• The ability to establish and modify group policy properties.

• The ability to apply group policies to user accounts

• An understanding of IntelliMirror technology and the ability to employ it

UNDERSTANDING GROUP POLICIES

Since group policies are designed to apply to a great number of users, they havethe potential to reduce system administration support. Once a Group Policy setting

Chapter

8 Group Policies

3930 P-08 3/12/03 10:26 AM Page 293

Page 2: Group Policies

is established on a user account, it is automatically applied to the desired admin-istrative unit. This facility is especially helpful when applying security policies, butit is also widely used to establish consistency in user environments. For example,through the use of group policies, an administrator can control the options avail-able on users’ desktops and the delivery of applications.

Group Policy also implements the bulk of the Microsoft IntelliMirror technol-ogy. This strategy capitalizes on the centralized management of client/server sys-tems while maintaining the flexibility and convenience of the distributed computingmodel. For example, users can log on from anywhere in the network and preserveuser profiles, application data, security requirements, application access, and backupoffline files. Microsoft’s IntelliMirror, as discussed in this chapter, provides moreexamples and details for this technology.

Group policies can be extended by third-party application vendors as well tomanage desktop settings for their applications.

NOTE A user planning to modify group policies must have administrative privileges forthe Active Directory and associated containers.

Group Policy Management and Active DirectoryGroup Policy management is accomplished by assigning Group Policy Objects(GPOs) to specific machines, sites, domains, and OUs from the Active Directory.Applying Group Policy involves determining which users and computers requirepolicy settings so that selected Active Directory containers can group users andcomputers accordingly. GPOs are then applied to the desired Active Directory con-tainers and are inherited by child containers. Windows Server 2003 follows theLSDOU model in which inheritance flows in this order: local computer (L) →site (S) → domain (D) → organizational unit (OU).

The LSDOU inheritance model may seem unnatural at first (Figure 8.1).Local computer GPOs are the first applied to any user who logs on to that par-ticular system. They can be overridden by the GPOs assigned to the user’s site,which are overridden by domain GPOs, which are overridden by relevant OUGPOs. This order gives the local administrator the first chance to set the com-puter’s policies.

When GPO policies are enforced, any child GPO settings applied to a systemare disabled. The local computer GPOs may not enforce policies. They are the firstto be set, but may be nullified by further policy inheritance.

294 CHAPTER 8 GROUP POLICIES

3930 P-08 3/12/03 10:26 AM Page 294

Page 3: Group Policies

NOTE The exception to the LSDOU model comes into play when using Windows NT 4.0policies that are set with the Policy System Editor. These are applied before thelocal GPOs. In other words, if the NTConfig.pol file exists, it will be used first toapply policies. These policies may be overwritten by GPOs applied to the domain,site, and OU containers.

The LSDOU model provides a reference point for determining the users andcomputers a GPO affects. A GPO can be applied to any of three container types:site, domain, and OU. In Figure 8.1, the Default Domain Policy GPO has been as-signed to the Entcert2.com domain, so the users and computers in that domain as

Understanding Group Policies 295

The order of policy inheritanceflows from the local computer,through the site,domain, and OU.

Engineering Policies GPO

Local Computer Policy

Site Policy GPO

Default Domain Policy GPO

Market Policies GPOPublic DocsPolicies GPO

Local Computer

Site

EntCert2.comDomain

MarketingOU

CompMarketing

OU

ChannelMarketing

OU

EngineerOU

SustainOU

DevelopOU

FIGURE 8.1 The Order of Policy Inheritance

3930 P-08 3/12/03 10:26 AM Page 295

Page 4: Group Policies

well as all OUs within it will receive these policy settings. The same GPO may alsobe applied to more than one Active Directory container. In the figure, the PublicDocs Policies GPO is applied to both the Engineering OU and the Marketing OU.This is referred to as linking.

GROUP POLICY OBJECT STORAGE

Before introducing the Group Policy feature set, it is important to understand, onthe local and domain levels, Group Policy storage. Local computer policies arestored on the local system in the %SystemRoot%System32\GroupPolicy directory.They are not replicated to other systems, nor do they cover the complete range ofpolicies accessible to enterprise-wide GPOs applied to Active Directory containers.

Active Directory GPO storage is a little more complicated. These policies arestored in the Group Policy container (GPC) and the Group Policy template (GPT).The GPC includes version, status, and extensions for the GPO. As discussed earlier,it may be a site, domain, or OU Active Directory object, and is synchronized withother domain controllers on its own update schedule. Small amounts of informationthat are modified infrequently are stored in the GPC, which is assigned a globallyunique identifier (GUID), such as {31B2F340-016D-11D2-945F-00C04FB984F9},which corresponds to a GPT. Data stored in the GPC is used to determine whetherthe GPO is enabled and to ensure that the correct GPT version is applied to user andcomputer accounts in the container.

The GPT is stored on domain controllers in the %SystemRoot%\SYSVOL\sysvol\domainname\Policies\GUID folder for domain-wide replication and access. Stan-dard folders in this directory are Adm, USER, and MACHINE. All user and computerpolicy settings for the GPO are stored in the GPT and synchronized on a differentschedule from that of its sister GPC information. The GPT contains the raw policysettings, including security settings and software installation information. It can bethought of as the folder structure you can see when modifying a Group Policy ob-ject from an MMC snap-in, such as is shown later in Figure 8.6.

REFINING GROUP POLICY INHERITANCE

In addition to inheritance order, several other rules control which users and com-puters are assigned group policies. These rules allow the administrator to refinepolicy application:

• Policy inheritance

• Blocking policy inheritance

• Enforcing policy inheritance

• Using security groups to filter group policies

296 CHAPTER 8 GROUP POLICIES

3930 P-08 3/12/03 10:26 AM Page 296

Page 5: Group Policies

Policy InheritanceThe LSDOU model discussed earlier generally describes how Group Policy inher-itance is implemented in Windows Server 2003. A clear example may shed light onhow it works. In Figure 8.1 the Engineering Policies GPO applied to the Engineer-ing OU is also inherited by the Sustaining and Development OUs. This shows thatwhereas child Active Directory containers inherit group policies, Group Policy in-heritance does not flow upward to parent containers.

Let’s dissect the example in Figure 8.2 to illustrate this flow in greater detail. Poli-cies inherited by the Marketing OU from its parents are applied to members of theChannel Marketing OU. Users and computers in the Channel Marketing OU alsoapply the Marketing Policies GPO and Public Docs GPO to their systems upon boot-up and logon. The Distribution Centers GPO is applied last and may override group

Understanding Group Policies 297

Market Policies GPONot Enforced

Public Docs GPONot Enforced

Inherit policies from a higher-leveldomain, site, or local computer GPO.

All policies are inherited and applied to child OUs.

Marketing OU

No Blocking

DistributionCenters GPO

Channel Market OU

FIGURE 8.2 An Example of Policy Inheritance

3930 P-08 3/12/03 10:26 AM Page 297

Page 6: Group Policies

policies previously applied to the Channel Marketing OU. Thus, the lowest-level Ac-tive Directory container has the last opportunity to override inherited policies.

NOTE As levels are added to the Active Directory hierarchy, more GPOs are applied to auser account when a user logs on to the network. A vertical domain containerstructure generally results in additional policies applied to the user, so it will takeslightly longer to log on. Also, more GPOs make it more complex to determinewhich policies apply to a user. A very horizontal Active Directory structure may elim-inate some of this complexity and logon delay, illustrated in Figure 8.3.

Blocking Policy Inheritance and EnforcementThe inheritance hierarchy can be modified by use of the Override or Enforce func-tion, which blocks inherited features associated with parent GPOs. The EngineeringOU (Figure 8.4) has enforced the Design Access GPO policies and not the Engi-neering GPO policies. The Sustaining OU has elected to block inheritance, so itdoes not inherit the Engineering GPO policies since they are not enforced. How-ever, the Design Access GPO policies are enforced at the Engineering OU level and

298 CHAPTER 8 GROUP POLICIES

HorizontalDomain

VerticalDomain

OU

OU OU

OU

OU OU

OUOU

FIGURE 8.3 Horizontal and Vertical Domain Structures

3930 P-08 3/12/03 10:26 AM Page 298

Page 7: Group Policies

thus override the Sustaining OU’s desire to block inheritance. In other words, theenforcement of parent group policies takes precedence over policy blocking onchild containers.

NOTE Both policy blocking and policy enforcement should be kept to a minimum. Thiscapability makes it difficult to track policies that affect the user.

Security Group FilteringAs with files and other objects in Windows Server 2003, the discretionary accesscontrol list (DACL) determines permission levels for users and computers that ac-cess a GPO. Each GPO has its own security settings determined by a DACL and as-sociated permissions. Access control entries (ACEs) usually take the form of securitygroups, rather than individual users, and assign sweeping privileges to many users

Understanding Group Policies 299

Policies not enforcedare blocked and notinherited.

Design Access GPOEnforced

Engineering GPONot Enforced

Inherit policies from a higher-leveldomain, site, or local computer GPO.

Enforced policies override blockedinheritance and areapplied to child OUs.

Engineering OU

BlockingInheritance Set

Sustaining GPO

Sustaining OU

FIGURE 8.4 An Example of Blocking Policy Inheritance

3930 P-08 3/12/03 10:26 AM Page 299

Page 8: Group Policies

at once. Each ACE can be assigned Allow and Deny permissions through the GPOsecurity settings (Figure 8.5).

The Authenticated Users group is one of the default security groups assignedto a new GPO. Read and Apply Group Policy permissions are set to Allow, whichmeans that all newly authenticated users mapped to this GPO will apply its poli-cies. Consistent with other Windows Server permissions, Deny takes precedenceover Allow. Members of a security group may “filter” group policies by denying theApply Group Policy permission. A filtered security group will not accumulate logondelays due to the GPO. Group Policy access permissions can also be used to dele-gate administrative authority to security groups and users. A user must have Readand Write access to make GPO changes.

CAUTION Security group filtering should be used sparingly because determining which poli-cies affect a user may become quite complex. As with all security permissions, useof the Deny setting to override Allow should be used with caution.

300 CHAPTER 8 GROUP POLICIES

FIGURE 8.5 GPO Security Properties

3930 P-08 3/12/03 10:26 AM Page 300

Page 9: Group Policies

Group Policy SettingsGroup policies are broken into five areas, each of which is discussed in the follow-ing sections. Example implementations are provided at the end of the chapter. Keepin mind that individual policies affect all aspects of a system’s operation.

Following are the five policy categories defined in the Group Policy snap-in.

• Administrative templates (Registry-based) policies primarily affect the user in-terface and available tools and desktop settings.

• Security settings limit user access to systems and user account policies.

• Software installation policies allow the publishing and assignment of availablesoftware.

• Scripts configure scripts for logon, logoff, startup, and shutdown.

• Folder redirection settings permit the relocation of user profile folders (e.g.,My Documents, Application Data, Start menu) to other system network shares.

NOTE Windows Server 2003 adds a Web view for the Group Policy snap-in. This GroupPolicy feature is available in the Administrative Template extension snap-in. This in-formation is also available on the Explain tab of the Property page of each setting.

USER AND COMPUTER POLICIES

A GPO divides policies into two major sections, Computer Configuration and UserConfiguration (Figure 8.6). Policies within Computer Configuration are appliedduring the boot sequence and affect all sessions that follow on that system. UserConfiguration policies are applied when the user first logs on. Computer policiesapply to the system; user policies follow the user.

Either the Computer Configuration or the User Configuration portion of a GPOmay be disabled to save time and processing. For instance, if a GPO does not en-able any computer policy settings, the Computer Configuration portion of the GPOshould be disabled. This is demonstrated in the following sections.

ADMINISTRATIVE TEMPLATES

Both user-related and computer-related Administrative Template nodes are usedto modify Registry settings. The related Registry database settings are located in theHKEY_CURRENT_USER (HKCU) and HKEY_LOCAL_MACHINE (HKLM) Registrykeys. Whenever policy changes are made to the Administrative Template portionof the GPO, the Registry keys HKCU and HKLM are also updated. If there is a con-flict between computer and user settings, the computer settings take priority. A

Understanding Group Policies 301

3930 P-08 3/12/03 10:26 AM Page 301

Page 10: Group Policies

Registry.pol file in the %systemroot%\SYSVOL\sysvol\domainname\Policies\GUID\MACHINE and USER directories maintains group policy changes to the Registry.Any changes made through administrative template policies are made in the Reg-istry.pol file and then mapped onto the Registry.

The policies available under the Administrative Templates node take the formof the ASCII files such as system.adm and inetres.adm by default (Figure 8.7). Thedefault Windows Server 2003 installation includes other administrative templatesthat may be loaded in order to modify policies for specific applications or networkarchitectures (Table 8.1).

In addition to these templates, located physically in the %systemroot%\infdirectory, custom .adm files may be created for specific application needs. Guide-lines for doing this can be found in the Windows .NET Help tool under CreatingCustom .adm Files. Application developers can also customize group policies by cre-ating an MMC extension snap-in.

NOTE In enterprises that implement the Windows Server 2003 Remote Installation Ser-vices, several group policies can be used to govern what installation options are avail-able to the client. For instance, the administrator may choose to restrict which usersmay install an Active Directory domain controller. The policy to control this setting,located via gponame → User Configuration → Windows Settings → Remote

Installation Services → Choice Options, can dictate an automatic installationsetup that prevents user control over installation options.

302 CHAPTER 8 GROUP POLICIES

FIGURE 8.6 Computer and User Policies

3930 P-08 3/12/03 10:26 AM Page 302

Page 11: Group Policies

SECURITY SETTINGS

Group security policies apply to nine different areas in the Windows Server 2003Group Policy Editor. The Security Configuration Editor can be used to comparethe system’s security policy settings with suggested settings. Security templates lo-cated in the %systemroot%\Security\Templates directory can be modified using

Understanding Group Policies 303

FIGURE 8.7 Policy Templates

TABLE 8.1 Administrative Template Options

Template Purpose

common.adm Windows NT 4.0, 98, and 95 policies

conf.adm Microsoft NetMeeting policies

inetcorp.adm Language, Dial-up, and Temporary Internet File policies

inetres.adm Internet policies

inetset.adm Internet restriction policies

system.adm Default template with policies specific to Windows Server 2003

windows.adm Windows 98 and 95 policies

winnt.adm Windows NT 4.0 policies

wmplayer.adm Windows Media Player policies

3930 P-08 3/12/03 10:26 AM Page 303

Page 12: Group Policies

the Security Templates snap-in tool. They can then be imported to the SecuritySettings portion of the Group Policy tree. The security group policy settings, illus-trated in Figure 8.8, include those listed in Table 8.2.

An understanding of security policies would not be complete without a reviewof Restricted Groups, Registry, and Files System settings.

Restricted GroupsWhen the Restricted Groups settings are applied to a system, the current groupmemberships are modified to match them. Only groups listed in the Details windowof the Restricted Groups node are affected. Any group added to Restricted Groupshas its own member and “Member of ” lists. These lists are then enforced on thelocal system, overwriting group membership assigned by the Active Directory.

To add a restricted group:

1. Right-click the Restricted Group policy node and select Add Group.

2. Click Browse and select a group from your directory (Figure 8.9).

3. Click OK and right-click the new group. Select Security.

4. Add Members of this Group and This group is a member of entries asdesired (Figure 8.10).

If you were to add the Power Users group to the Restricted Groups settingand not include any users in the Members of this group list, the policy wouldremove current users from the Power Users group. Oddly enough, if the This

304 CHAPTER 8 GROUP POLICIES

FIGURE 8.8 Group Policy Security Settings

3930 P-08 3/12/03 10:26 AM Page 304

Page 13: Group Policies

Understanding Group Policies 305

TABLE 8.2 Group Policy Settings

Security Setting Node Description

Account Policies Password policies—uniqueness, maximum age, minimumlength.

Account lockout—invalid logon attempt.

Kerberos policy—ticket lifetime, synchronization.

Local Policies Audit policy—user rights, local machine security such asshutdown privileges and autodisconnect.

Event Log Size and time limits for event logs.

Restricted Groups Designates some security groups to allow only designatedmembers to participate in the group for any length of time;if a nondesignated member is added to the group, the userwill be removed.

System Services System service startup mode (Automatic, Manual, Disabled)modification for the next system boot.

Registry Security access permissions on portions of the Registry;permissions for the CLASSES_ROOT, MACHINE, andUSERS Registry keys may be assigned using security groupsor user IDs.

File System Security permissions for files and folders set and appliedwhen user logs on to the system.

Public Key Policies Designate trusted root certificate authorities and recoveryagents for file encryption.

Software Restriction Policies Limit applications that can run on a system.

IP Security Policies on Active Directory IP security level for the system; set software Authenticode,user authentication, and encrypted communicationmethods.

FIGURE 8.9 Adding a Group

3930 P-08 3/12/03 10:26 AM Page 305

Page 14: Group Policies

group is a member of list is empty, no modifications are made to other groupmemberships. In other words, it is additive only. The restricted group will beadded to the groups listed in the This group is a member of field. This policysetting is good for limiting membership to select groups, but it should be usedsparingly.

File System and Registry PolicyGroup Policy can be used to set permissions on files and Registry keys. The File Sys-tem and Registry settings allow the administrator to configure the ACLs on a per file/folder/Registry directory basis.

NOTE When applied at the domain level, these settings can lock down all system Reg-istries, protecting against meddling users and ensuring uniform permissions set-tings throughout an OU or a domain.

Right-click the GPO → Computer → Windows Settings → Security Set-

tings → Registry node and select Add Key. This produces the Select Registry

306 CHAPTER 8 GROUP POLICIES

FIGURE 8.10 Group Membership

3930 P-08 3/12/03 10:26 AM Page 306

Page 15: Group Policies

Key dialog box (Figure 8.11). Three Registry keys can be explored, and permis-sions may be selectively applied to the key structure.

Right-click the GPO → Computer → Windows Settings → Security Set-

tings → File System node and select Add File. This produces the Add a file or

folder dialog box (Figure 8.12). The entire directory structure can be exploredand selectively assigned permissions.

After an item is selected, security permission (Figure 8.13) can be assigned, ascovered in Chapter 10, “Kerberos and the Public Key Infrastructure.”

Understanding Group Policies 307

FIGURE 8.11 Setting Registry Security Policies

FIGURE 8.12 Setting File Security Policies

3930 P-08 3/12/03 10:26 AM Page 307

Page 16: Group Policies

Once permissions have been assigned, inheritance properties are requested.Selecting the Configure option applies the permissions according to these sub-choices, shown in Figure 8.14:

• Propagate inheritable permissions to all subfolders and files. Thisoption applies the permissions set to the current object and all child foldersand files. Any specific or explicit user or group that has been added to a childfile or subfolder is not overwritten. In other words, all permissions that wereinherited are replaced with the new permissions, but Joe Engineer, who wasgiven Read privileges on a specific subfolder, still maintains his user right.

• Replace existing permissions on all subfolders and files with inher-itable permissions. This option applies the new policy settings to all childfolders and files, overwriting all existing permissions.

If Do not allow permissions on this file or folder to be replaced is se-lected, the current file or folder and its child file and folders are immune to per-missions assigned in this GPO. This policy is needed only if a parent to this file orfolder has been assigned new permissions within this GPO and you want this branchto keep its permissions and ignore the new settings.

308 CHAPTER 8 GROUP POLICIES

FIGURE 8.13 Assigning Registry and File Permissions

3930 P-08 3/12/03 10:26 AM Page 308

Page 17: Group Policies

SOFTWARE INSTALLATION: ASSIGNING AND PUBLISHING

The Software Installation and Management feature provides two strategies for dis-tributing software applications throughout the network to the groups in GroupPolicy. The assign method places a shortcut to the application on the Start menuand loads the application advertisement into the Registry. Applications may be as-signed with user or computer settings. Applications assigned via user settings areinstalled on the local system the first time the application is executed. In this waythey maintain consistent application availability for a set of users, who benefit fromenhanced desktop usability since their Start menu will always appear the same re-gardless of where they log on. If the needed application is not already installed onthe system the user is using, application installation can be invoked by selectingthe application from the Start menu or by opening a file of the application’s type.Applications assigned with computer settings will be installed on those systemswhen booted. Application availability is based on the computer system, not the user.

NOTE The discussion of application installations involves elements of Microsoft’s Intelli-Mirror that are discussed at the end of this chapter. The ability to set policies onapplications that can be intelligently mirrored across the enterprise is one of theprimary functions of IntelliMirror technology.

Understanding Group Policies 309

FIGURE 8.14 Requesting Permissions Inheritance

3930 P-08 3/12/03 10:26 AM Page 309

Page 18: Group Policies

The second method for distributing software is to publish the application. Apublished application leaves the software installation up to the user without theaid of shortcuts and local Registry modifications. The user may install a publishedapplication by clicking the Add/Remove Programs icon from Control Panel orby opening a file that matches the published application type. An application mustbe published with user settings so that its availability will follow the user, regard-less of which system is used. Software cannot be published using computer set-tings. Published software does not have the resilient quality of assigned software.If a library or file associated with the application is deleted, the software will not berepaired.

The ability to assign or publish software for group policies relies on the Win-dows Installer to manage application installation. A software package with an .msifile name contains information necessary to install the application on differentplatforms, and to deal with previous versions and different configurations. The re-siliency of the Windows Installer is a key new feature that rolls back applicationversions or repairs missing libraries when necessary. Assigned applications modifythe Registry and persist on the system even when the user deletes an applicationor associated libraries. They will be reinstalled or repaired the next time the programis invoked.

Packaging ApplicationsFor a software application to be assigned or published, a package for the softwaremust be obtained in a couple of ways:

• Use a Microsoft Installer (MSI) package from the software vendor or repack-aging software to generate an .msi file.

• Use a .zap file to guide software installation.

The MSI package and associated files are fairly straightforward. However, whenan MSI package is not available, a .zap text file can be used to add applicationsusing the Software Installer, rather than the Windows Installer, to publish (not as-sign) them. This of course means that the application will not be resilient or repairitself when damaged. The user instigating the Software Installer must also have ac-cess permissions to write to the required installation directories, because, unlikethe Windows Installer, the Software Installer is not granted sweeping privileges tomake system modifications. The installation procedure will also probably involveuser intervention and therefore lead to more handholding and user guidance.

A .zap file requires an application section, designated by line 1, and two re-quired tags on lines 2 and 3. The Friendly Name tag indicates the applicationname that will appear in the Control Panel → Add/Remove Programs utility,and the Setup command is the executable to instigate the application’s installa-tion. The following tags are optional and relate to parameters that are displayed in

310 CHAPTER 8 GROUP POLICIES

3930 P-08 3/12/03 10:26 AM Page 310

Page 19: Group Policies

the Add/Remove Programs utility. The Ext marker on line 8 indicates the op-tional extension section. File extensions specified here will be stored in the ActiveDirectory and linked to the newly installed application. The extension is listedwithout the period.

line 1: [Application]line 2: FriendlyName = ECC W2K Starterline 3: SetupCommand = setup.exeline 4: DisplayVersion = 1.0line 5: Publisher = Enterprise Certifiedline 6: URL = http://www.EntCert.com/Softwareline 7:line 8: [Ext]line 9: CUR=

Software Installation ExampleThe software installation component of the IntelliMirror technology allows thepublishing or assigning of software applications to users and computers. As previ-ously discussed, assigning software applications puts the software’s icon on theStart menu. The application is then installed when invoked by the user and will“follow” the user wherever he goes within the network. Obviously, software ap-plication installation takes time and network resources. If the application is as-signed to a computer, the software is installed at the system’s leisure, which usuallymeans that installation will occur when the system is booted. Publishing softwarerequires the user to invoke the Add/Remove Programs tool from Control Panel.Software components, published to the user or computer, are listed under theAdd New Programs menu. They are then installed at the user’s request.

In order to publish or assign software, an MSI package must be obtained forthe application from the software vendor. In this example, the Microsoft Office2000 package is used to assign software to domain users. For more information onthe MSI/MST formats, see the Help pages.

NOTE Repackaging tools, such as VERITAS WinINSTALL LE, are included on the WindowsServer 2003 CDs. These tools examine the system before and after application in-stallation, record system changes, and package the final system state. The result-ing MSI package enables resilient application publish and assign capabilities.

1. Find an MSI software package and copy it to a network share named NetworkDocs and Settings.

2. Open the Default Domain Policy (or other GPO) and right-click User Con-

figuration → Software Settings → Software Installation and select

Understanding Group Policies 311

3930 P-08 3/12/03 10:26 AM Page 311

Page 20: Group Policies

New → Package (Figure 8.15). Find the software package from the Find

File window. BE SURE TO ENTER THE NETWORK PATH to the network shareand software package. If it is on the local drive, reference the packet in\\servername\Network Docs and Settings. Clients must be able to access thepackage from the network using the full file name given here. Click OK.

3. Select whether the application is to be Published or Assigned (Figure 8.16).Click OK.

4. Once the application has been added to Software Installation, policy prop-erties can be viewed. Right-click the newly added package and select Proper-

ties (Figure 8.17). Configurable items (discussed further in the comingsections) include

• General—name and product and support information.

• Deployment—deployment type, options, and the allowed user interfaceduring installation.

• Upgrades—packages that upgrade this package and those that this pack-age upgrades.

312 CHAPTER 8 GROUP POLICIES

FIGURE 8.15 Adding a Software Package

3930 P-08 3/12/03 10:26 AM Page 312

Page 21: Group Policies

• Categories—categories in which this application will be listed. New cate-gories can be created to group software types. A category called Accountingmight contain several accounting packages.

• Modifications—.mst files or transforms to customize software installations.

• Security—users and groups with access to modify this package’s GPOsetting.

Once the user logs on again, on any machine, the software will be installed onceactivated from the Start menu or accessed by double-clicking a file of the appli-cation type from My Computer.

Modifying the Deployment MethodOnce the package has been installed on a network share and added to a GPO, itsdeployment configuration may be further modified. Right-clicking the Software

installation node for the GPO that contains the new software package and se-lecting Properties presents several configuration tabs. The General tab (Figure8.17) presents product and support information for the application.

The Deployment tab (Figure 8.18) allows configuration of the deploymenttype, the deployment options, and the user interaction. Under Deployment type,

you can change the deployment method, Published or Assigned. The Deploy-

ment options include the following configurations:

• Auto-install this application by file extension activation. This optionapplies only to published applications. It allows you to prevent or allow in-stallation of an application when a user double-clicks a file name with an ex-tension that matches the published application.

• Uninstall this application when it falls out of the scope of manage-ment. This option determines whether the application is uninstalled from a

Understanding Group Policies 313

FIGURE 8.16 Selecting the Deployment Method

3930 P-08 3/12/03 10:26 AM Page 313

Page 22: Group Policies

user or computer when leaving the scope of the current GPO. If a user nolonger falls under the jurisdiction (scope) of this GPO, the application will beremoved if this option is checked.

• Do not display this package in the Add/Remove Programs controlpanel. If this option is checked, the user will not be able to browse for the ap-plication and install it from Control Panel. If the user invokes or double-clicksa file name with the application’s extension, the application will be installed.

The user interface options determine that the application will be installedusing default values (Basic), or they prompt the user for installation configurationinformation (Maximum).

The Advanced button allows removal of previous installations not governedby group policies. An option also exists to disregard language configuration duringthe installation.

UpgradesThere are two ways to distribute software upgrades. A mandatory upgrade involvesa check mark in the box next to Required upgrade for existing packages (Fig-

314 CHAPTER 8 GROUP POLICIES

FIGURE 8.17 The Application Properties General Tab

3930 P-08 3/12/03 10:26 AM Page 314

Page 23: Group Policies

ure 8.19). This option requires the user to upgrade her current version of the ap-plication with the new package. The optional upgrade (clearing check box) allowsthe user to install the new application version or to continue using the currentone. It also permits her to install the new version in addition to her current versionand access both through old and new shortcuts.

To add an upgrade package, go to the Upgrades tab (Figure 8.19), click Add,and find the upgrade package in the current GPO (Figure 8.20) or browse the di-rectory by selecting the A specific GPO and clicking Browse. Once the correctGPO is located, select the application package to upgrade from among those as-sociated with that GPO. Then you can Uninstall the existing package, then In-

stall the upgrade package, or select Package can upgrade over the existing

package. The Uninstall option is used to replace an existing application with anew one; the Upgrade option is used to upgrade a package with the same product.

Redeploying Software PatchesOnce you obtain the new MSI package containing a software fix, replace the oldMSI package and associated files with the new package and files on the networkshare. Select the Software Installation node from the GPO that originally

Understanding Group Policies 315

FIGURE 8.18 The Deployment Tab

3930 P-08 3/12/03 10:26 AM Page 315

Page 24: Group Policies

316 CHAPTER 8 GROUP POLICIES

FIGURE 8.19 The Upgrade Tab

FIGURE 8.20 Adding an Upgrade Package

3930 P-08 3/12/03 10:26 AM Page 316

Page 25: Group Policies

deployed the software and right-click the software package in the Details window.Select All Tasks → Redeploy application and click Yes to redeploy the soft-ware fix. Regardless of whether the application was published or assigned, thepatch will be installed the first time it is started.

Software RemovalSoftware may undergo either a forced or an optional removal. A forced removalwill delete software installed through computer settings the next time the systemis booted. The optional removal permits the current application installations topersist but will not allow new installations for the package.

To remove software, select the Software installation node from the corre-sponding GPO. In the Details window, right-click the desired software packageand select All Tasks → Remove. The Remove software dialog appears and pre-sents two software removal methods (Figure 8.21). These options correspond tothe forced and optional removal strategies, respectively. After you have selectedthe method, click OK .

File Extensions and InstallationInvoking application installation when a user selects a file of the application’s filetype is convenient. However, some organizations may have several applications as-sociated with a given file extension. Suppose both Microsoft Office 2000 Premiumand Microsoft Office 2000 Standard are deployed using group policies. Right-clickthe Software installation node for a given GPO and select Properties. From theExtensions tab, access the list by pressing the arrow next to the drop-down box,select an extension, and then assign application priority (Figure 8.22). The appli-cation at the top of the list for a selected extension will be installed first. In Figure8.22, only one office product package has been added to group policies, so no pri-ority decision need be made.

Understanding Group Policies 317

FIGURE 8.21 Software Removal Options

3930 P-08 3/12/03 10:26 AM Page 317

Page 26: Group Policies

CategoriesWhen the user accesses the Control Panel to Add/Remove Programs, availableapplications will be listed. Categories can be used to create a hierarchy of applica-tion folders to order the software more effectively. Three new categories, Draw

Tools, Email Clients, and Word Processors, can classify available applications (seeFigure 8.23).

To add categories, right-click the Software installation node for a givenGPO and select Properties. On the Categories tab, click Add and type in a newcategory name. Click Apply and then press OK. The new category will be addedto the Active Directory and become available from any GPO in it.

Once the new category name has been made available, software applicationsmay be added to the new category. Add a package by right-clicking a software pack-age in the Details window of the GPO Software installation node and selectingProperties. On the Categories tab, choose a category from the Available cate-

gories pane and click Select to add the current package to it (Figure 8.24). In thisexample, the Microsoft Office 2000 Premium package would be available underthe Word Processors category via Control Panel → Add/Remove Programs.

318 CHAPTER 8 GROUP POLICIES

FIGURE 8.22 Associating File Extensions with Applications

3930 P-08 3/12/03 10:26 AM Page 318

Page 27: Group Policies

Understanding Group Policies 319

FIGURE 8.23 Adding New Software Categories

Application ModificationsModifications may be made to customize a software application installation. Differ-ent GPOs may apply their own modifications to suit users who require additionalfeatures. A transform file or an .mst file is created to indicate application customiza-tions. On the Modifications tab (Figure 8.25), click Add and browse for the desired.mst file.

In order for modifications to be added, the application must be installed usingthe Advanced published or assigned option from the Deploy Software dialog(Figure 8.16 on page 313). Once an application has been deployed, modificationscannot be added or removed.

NOTE The Application Deployment Editor in Windows .NET will contain a new optionthat allows a user-assigned application to be installed completely at logon. In pre-vious versions, this was accomplished on demand. This could be useful when anadministrator is planning to deploy an application to a group of mobile com-puter users. The application is immediately installed in full at logon. When the ap-plication is used offline, all features will then be available. The prompting to install

3930 P-08 3/12/03 10:26 AM Page 319

Page 28: Group Policies

on-demand features is eliminated. This function is set using Group Policy snap-

in → Software Installation → Deployment Properties. Another enhancementto Windows Server 2003 includes the ability to install 32-bit applications on 64-bit sys-tems; from the Application Deployment Editor, select Make 32-bit x 86 Windows

Installer Application Available to IA64 machines. Each application may be as-signed a URL that is visible when a user clicks Add/Remove Programs. Help tipsfor installing and using the application can be posted at this Web address to mini-mize Help desk interaction.

NOTE With Windows Server 2003, the administrator can remove links to the WindowsUpdate Web site from the user’s desktop. This prevents users from adding soft-ware to their systems independent of company standards. Access this policy fromthe Local Computer Policy node → User Configuration → Administrative

Templates → Windows Components → Windows Update → Remove ac-

cess to use all Windows Updates features; for DataCenter Server, invokeUser Configuration → Administrative Templates → Start menu andTaskbar → Remove links and access to Windows Update.

320 CHAPTER 8 GROUP POLICIES

FIGURE 8.24 The Categories Tab

3930 P-08 3/12/03 10:26 AM Page 320

Page 29: Group Policies

ScriptsGroup Policy enables assigning scripts to entire domains or OUs rather than mod-ifying each user account and tediously mapping logon scripts to it. The Group Pol-icy scripts execute as follows:

• User Configuration

• Logon scripts, executed when the user logs on to a system.

• Logoff scripts, executed when the user logs off the system.

• Computer Configuration

• Startup scripts, executed when the system boots.

• Shutdown scripts, executed when the system is shut down.

NOTE During the shutdown process, logoff scripts are executed before shutdown scripts.This allows gathering of log data, for example, to be written before the system ter-minates services and operations.

Understanding Group Policies 321

FIGURE 8.25 The Modifications Tab

3930 P-08 3/12/03 10:26 AM Page 321

Page 30: Group Policies

Scripting group policies for Windows Server 2003 can be found by highlight-ing the GPO and then selecting → Computer Configuration → Windows Set-

tings → Scripts (Startup\Shutdown) and gponame → User Configuration

→ Windows Settings → Scripts (Startup\Shutdown) (Figure 8.26).Windows Server 2003 comes equipped with the Windows Scripting Host

(WSH) 1.0, which currently supports Javascript (.js) and Visual Basic Scripting Edi-tion (.vbs) in addition to the MS-DOS command scripts (.bat, .com, .exe). TheWSH may also be installed on Windows NT 4.0, 95, and 98 to support modernscripting languages on older systems. Scripts are accessed throughout the networkby storing them in the server replication directory %systemroot%\SYSVOL\sysvol\domainname\scripts. (WSH 2.0 is discussed in Chapter 17.)

Additional policies that affect script performance can be found under Admin-istrative Templates (Figures 8.27 and 8.28). If the WSH is not installed on thelegacy systems, scripts may need to run in the DOS prompt window. SelectingUser Configuration → Administrative Templates → System → Logon → Run

legacy logon scripts hidden will minimize the script window or hide scripts fromview.

The Maximum wait time for Group Policy scripts (Figure 8.28) andasynchronous/synchronous settings are also helpful for centrally managing scriptbehavior.

322 CHAPTER 8 GROUP POLICIES

FIGURE 8.26 Shutdown

3930 P-08 3/12/03 10:26 AM Page 322

Page 31: Group Policies

Understanding Group Policies 323

FIGURE 8.27 User Script Properties

FIGURE 8.28 Computer Script Policies

3930 P-08 3/12/03 10:26 AM Page 323

Page 32: Group Policies

FOLDER REDIRECTION

The Folder Redirection policies allow the administrator to relocate several direc-tories in the user’s profile (Figure 8.29). Even with roaming user profiles, the pro-file directories are copied to the local system (%SystemRoot%\Documents andSettings\username) when the user logs on. This can be time consuming and canimpact the network, especially for large My Documents folders.

NOTE The discussion of redirection involves elements of Microsoft’s IntelliMirror, whichis discussed at the end of this chapter. As stated earlier, the ability to set policieson folder direction that can be intelligently mirrored across the enterprise is oneof the primary features of IntelliMirror technology.

Redirection policies can relocate four user profile directories to a centrally man-aged network share so that they are not copied to the local system.

The Offline Folder or Cache settings may be set on the network share to allowlocal system access to these network profile folders when the user’s system cannotaccess the network. The profile information is cached locally and then updated onthe network share when the user has access to the share at a later date.

324 CHAPTER 8 GROUP POLICIES

FIGURE 8.29 Folder Redirection Policies

3930 P-08 3/12/03 10:26 AM Page 324

Page 33: Group Policies

NOTE An administrator can use this feature to transition users from a legacy deploymentof home directories to the My Documents model. This will ensure compatibilitywith the existing home directory environment.

NOTE Group Policy in Windows Server 2003 determines a users right to modify networkand dial-up TCP/IP properties. Users may be selectively restricted from modifyingtheir IP address and other network configuration parameters.

GPO IMPLEMENTATION

The previous sections of this chapter provide some understanding of Group Pol-icy application and usage. Before we discuss actually implementing GPO, there area few systemic issues to address regarding Group Policy behavior.

Refreshing Policy SettingsUnderstanding the basic Group Policy refresh schedule is helpful when changinggroup policies on your local system. Once a group policy has been changed on adomain controller, the group policies on the local system must be refreshed inorder to take effect. Client computers that are not domain controllers receive pol-icy refreshes every 90 minutes plus or minus a random time interval. The randominterval helps distribute client requests evenly so that they do not all come in atthe same time. To change the interval in a GPO, select Computer Configuration

→ Administrative Templates → System → Group Policy → Group Policy

refresh interval for computers (Figure 8.30).Domain controllers refresh group policies more frequently. The default Group Pol-

icy setting for DCs, via Computer Configuration → Administrative Templates →System → Group Policy → Group Policy refresh interval for domain con-

trollers, sets the refresh interval for every 5 minutes (Figure 8.31). This is why succes-sive examples should be executed on a domain controller.

NOTE Security policy refresh can be instigated from the command line. The gpudate

command has replaced secedit utility. Use secedit for Windows 2000 servers andgpupdate for Windows 2003 servers. These commands are discussed in the ap-pendix; its basic forms are:

secedit /refreshpolicy machine_policy /enforce (for Windows 2000 computer settings)

secedit /refreshpolicy machine_policy /enforce (for Windows 2000 user settings)

gpupdate /enforce (Windows Server 2003)

GPO Implementation 325

3930 P-08 3/12/03 10:26 AM Page 325

Page 34: Group Policies

Group policies are also refreshed when the system is started. Obviously, shut-ting down and booting a system could prove troublesome when simply trying torefresh policy settings.

PDC Operations ManagerIn addition to performing the functions of the primary domain controller (PDCEmulator), the PDC Operations Manager is the default domain controller thathandles Group Policy modifications. When the PDC Operations Manager is notavailable, an error message is displayed and the administrator may select anotherdomain controller to handle changes. When you do this, be sure that all previousGroup Policy changes have propagated throughout the domain and that no otheradministrator is currently making modifications.

IMPLEMENTING GROUP POLICY

This section provides a number of examples of implementing group policies. Theseexamples are representative of the type of Group Policy management available tothe system administrator.

326 CHAPTER 8 GROUP POLICIES

FIGURE 8.30 Setting Client Group Policy Refresh Intervals

3930 P-08 3/12/03 10:26 AM Page 326

Page 35: Group Policies

Local Computer PolicyThe example that follows shows how to implement the Local Computer Policy snap-in and employ it to manage local GPOs. This is the easiest way to access this GPO;other GPOs can be reached through the Active Directory containers. Local com-puter policies are centrally managed on remote systems by adding the remotecomputer policies to the administrator’s console. This example loads the local poli-cies for the system the administrator is logged on to.

1. Log on as Administrator.

2. Go to Start → Programs → Accessories → command prompt or Start →Run, type MMC, and then Enter.

3. A Console window appears. Click the File pull-down menu.

4. Select Add/Remove snap-in.

5. The Add/Remove Snap-in dialog should appear (Figure 8.32).

6. Click Add. The Add Standalone Snap-in dialog should appear.

7. Select Active Directory Users and Computers.

8. Click Add.

Implementing Group Policy 327

FIGURE 8.31 Setting Domain Controller Group Policy Refresh Intervals

3930 P-08 3/12/03 10:26 AM Page 327

Page 36: Group Policies

9. From the list of Available Standalone snap-ins, select Group Policy (Fig-ure 8.33).

10. Click Add. The Group Policy Object should be LocalComputer (Figure 8.34).

11. Click Browse. The Browse for a Group Policy Object dialog appears (Fig-ure 8.35).

12. There are four tabs associated with this dialog:

• The Domains/OUs tab displays GPOs for the domain and OU containers.

• The Sites tab displays current sites and their associated GPOs (Figure 8.36).

• The Computers tab allows you to select the local GPO assigned to the cur-rent computer or to select another computer from Active Directory. Thisprovides remote administration of local computer policies (Figure 8.37).

• The All tab displays all GPOs for the domain except the local computer pol-icy object (Figure 8.38).

13. For this example, click Cancel, and select Local Computer as the Group

Policy Object.

14. Click Finish, then Close, then OK.

328 CHAPTER 8 GROUP POLICIES

FIGURE 8.32 The Snap-in List

3930 P-08 3/12/03 10:26 AM Page 328

Page 37: Group Policies

Implementing Group Policy 329

FIGURE 8.33 Adding a Standalone Snap-In

FIGURE 8.34 Selecting a Group Policy Object

3930 P-08 3/12/03 10:26 AM Page 329

Page 38: Group Policies

330 CHAPTER 8 GROUP POLICIES

FIGURE 8.35 GPOs Available for a Domain

FIGURE 8.36 GPOs Linked to Sites

3930 P-08 3/12/03 10:26 AM Page 330

Page 39: Group Policies

Implementing Group Policy 331

FIGURE 8.37 A Computer GPO

FIGURE 8.38 All GPOs in a Domain

3930 P-08 3/12/03 10:26 AM Page 331

Page 40: Group Policies

The Local Computer Policy snap-in has now been added to your newly createdconsole. Opening the Policy node reveals available local policy settings. When youare finished, select the Save As option from the Console pull-down menu and savethe console on the desktop or in a specific folder.

Creating a GPO and Linking to the Active Directory ContainerThis example illustrates how to create a GPO and apply it to an Active Directorycontainer. In particular, a new organizational unit is created and then an Adminis-trative Template group policy is enabled. Methods for blocking inheritances arealso explored. As mentioned in the discussions about implementation, the fol-lowing examples should be implemented on a domain controller. Doing so willmean that you will have to wait approximately 5 minutes for policies to be re-freshed on your test system.

1. Start the Custom console created earlier by double-clicking the console filefrom My Computer or the desktop.

2. Click the plus sign in front of Active Directory Users and Computers. Right-click Your domain.com (Entcert2.com) and select New → Organizational

Unit. Create a new OU called Engineering and add a user.

3. Create an OU within Engineering called Sustaining and add a user (Figure8.39).

4. Right-click the Engineering OU and select Properties. The Engineering

Properties dialog box appears (Figure 8.40). Select the Group Policy taband click New. Name the new object Engineering GPO (Table 8.3).

5. Click Edit and select the plus sign in front of User Configuration → Ad-

ministrative Templates → System → CTRL + ALT + DEL Options. Inthe Policy window, double-click Remove Lock Computer.

6. The Remove Lock Computer Properties dialog window appears. SelectEnabled. Notice that the Previous Setting and Next Setting buttons allowyou to browse up and down the Policy window. Click OK. The Remove Lock

Computer policy has been enabled at the Engineering OU level (Figure 8.41).

7. Allow Group Policy to refresh and log on as an Engineering user. Press CTRL

+ ALT + DEL and notice that Lock Computer appears dimmed. Log onagain as the Administrator.

DISABLING COMPUTER AND USER CONFIGURATION SETTINGS

As discussed earlier, it is helpful to disable the portions of a GPO that are not beingused to save processing time when applying group policies. User and computersettings can be disabled if no policies are enabled below the node in the policy

332 CHAPTER 8 GROUP POLICIES

3930 P-08 3/12/03 10:26 AM Page 332

Page 41: Group Policies

Implementing Group Policy 333

FIGURE 8.39 Creating New OUs

FIGURE 8.40 Create an Engineering GPO

3930 P-08 3/12/03 10:26 AM Page 333

Page 42: Group Policies

334 CHAPTER 8 GROUP POLICIES

TABLE 8.3 Group Policy Tab Buttons and Functions

Button Function

New Creates a new GPO and adds it to the Active Directory container.

Add Selects from a list of existing GPOs or creates a new GPO to addto the current container.

Edit Displays the Group Policy tree for the selected GPO and allowspolicy modification.

Options Allows user to enforce this GPO on this container and childcontainers below it or to prevent this policy from acting on thecontainer.

Delete Removes the selected GPO from the container Group Policy list.

Properties Allows the administrator to disable the user or computer portionof the GPO to enhance boot-up or user logon speed. Permits thisGPO to be linked by other domains and allows access to securitysettings for the selected GPO.

Up Promotes the selected GPO in the current GPO list. GPOs areapplied from the top of the list to the bottom.

Down Demotes the selected GPO in the current GPO list. GPOs areapplied from the top of the list to the bottom.

Block inheritance Blocks policy inheritance from a parent container.

hierarchy. In this example, we have set a user policy and can therefore disable thecomputer portion of the GPO.

1. Right-click the Engineering OU and select Properties. Select the Group Pol-

icy tab. Click Edit.

2. Right-click the Engineering GPO root node and select Properties. On the Gen-

eral tab, select Disable Computer Configuration settings (Figure 8.42).

Users in the Engineering OU and its child OUs will also inherit this policy. Fora child OU to disable a policy inherited from its parents, it must counteract the pol-icy setting using another GPO. Let’s create a GPO at a lower level to override theRemove Lock Computer policy setting.

1. Click the plus sign in front of the Active Directory Users and Computers

selection in the Custom console. Open your domain name node, the Engi-

neering OU node, and then the Sustaining OU node.

2. Right-click the Sustaining OU and select Properties. The Sustaining Prop-

erties dialog appears. Click the Group Policy tab.

3930 P-08 3/12/03 10:26 AM Page 334

Page 43: Group Policies

3. Click New. Name the new object Sustaining GPO.

4. Highlight the new GPO and click Edit.

5. Click the plus sign in front of User Configuration, then select Administra-

tive Templates → System → CTRL + ALT + DEL Options. In the Policywindow, double-click the Remove Lock Computer policy. Select Disabled.Click OK.

6. The Remove Lock Computer policy should be disabled at the SustainingOU level.

7. Log off the system and log on again as a Sustaining user. Notice that the Lock

Workstation button no longer appears dimmed.

By disabling the Remove Lock Computer policy in the Sustaining GPO, users in theSustaining OU will be able to lock their systems. Rather than directly override aninherited policy, try using the Block Policy Inheritance feature as follows:

• From the Custom console, open the Sustaining OU and right-click Proper-

ties. Select the Group Policy tab and select the Sustaining GPO. Click Edit.Proceed to Remove Lock Computer policy → User Configuration →

Implementing Group Policy 335

FIGURE 8.41 Policy Details

3930 P-08 3/12/03 10:26 AM Page 335

Page 44: Group Policies

Administrative Templates → System → CTRL + ALT + DEL Options.In the Policy window, double-click Remove Lock Computer. Select Not

Configured. Click OK.

Now the Remove Lock Computer policy will again be inherited by the Sus-taining OU.

Block policy inheritance from the Engineering OU as follows:

• Close the Group Policy window. In the Sustaining Properties dialog box,check the Block Policy inheritance box (Figure 8.43). Close the Custom

console, log off, and log on as a Sustaining user. Notice that the Lock Work-

station box is still accessible. Blocking policy inheritance prevents the Engi-neering GPO from being applied to the Sustaining OU.

Enforcing a GPO from the Engineering OU takes precedence over both theblock policy inheritance and the policy override settings.

1. Open the Custom console, right-click the Engineering OU, and selectProperties.

336 CHAPTER 8 GROUP POLICIES

FIGURE 8.42 Disabling Computer Configuration Settings

3930 P-08 3/12/03 10:26 AM Page 336

Page 45: Group Policies

2. Select the Group Policy tab and click New. Name the new GPO Design Ac-

cess GPO. Press Options and check the No Override check box (Figure 8.44).Click OK. Notice that the No Override column is now checked. This featurecan also be enabled/disabled by going to the Engineering Properties dialogbox and double-clicking in the No Override column.

Implementing Group Policy 337

FIGURE 8.43 Blocking Policy Inheritance at the Sustaining OU

FIGURE 8.44 The No Override Group Policy Object Setting

3930 P-08 3/12/03 10:26 AM Page 337

Page 46: Group Policies

3. The Design Access GPO is now enforced at the Engineering OU level.

4. Exit Custom console, log off, and log on as a Sustaining user. Notice that theLock Workstation button appears dimmed once again.

The Sustaining group cannot override an enforced policy from a parent. TheBlock Inheritance feature is also unable to prevent enforced policy inheritance.

NOTE One of the tasks an administrator should undertake is preventing users from “tat-tooing” the Registry. From the Administrative Templates node, the user can viewuser preferences in addition to policy settings. The user can view and modify userpreferences that are not stored in maintained portions of the Registry. If the grouppolicy is removed or changed, the user preference will persist in the Registry. Thisis known as “tattooing,” a prominent problem in earlier group policy implemen-tations. Avoid letting users modify user preferences by going to User Configura-

tion → Administrative Templates → System → Group Policy → enableEnforce Show Policies Only (Figure 8.45).

338 CHAPTER 8 GROUP POLICIES

FIGURE 8.45 Limiting Registry Tattooing by Enabling a Policy

3930 P-08 3/12/03 10:26 AM Page 338

Page 47: Group Policies

Security Group FilteringGPOs that are linked to a given Active Directory container (site, domain, or OU)apply to all authenticated users in the container by default. However, Security per-missions associated with a GPO also govern which users the GPO will apply to. Asecurity group may deny the GPO policy, thereby making all users who are mem-bers of that group immune to it. Let’s look at an example.

1. Create a domain local security group called Software Config and add an En-

gineering OU user to it.

2. Go to the Engineering OU, right-click Properties, and view the Group Pol-

icy tab. Select the Engineering GPO and click Properties.

3. Click the Securities tab (Figure 8.46) and click Add. Add the Software Con-

fig security group to the Engineering GPO’s access control list.

4. Select the Software Config group and check the Deny box on the Apply

Group Policy permissions line.

5. Click OK and answer Yes to the Warning dialog box.

Implementing Group Policy 339

FIGURE 8.46 GPO Security for Software Config

3930 P-08 3/12/03 10:26 AM Page 339

Page 48: Group Policies

6. Log off and log on as the Engineering OU user previously added to the SoftwareConfig security group. The Lock Workstation button should be accessible.

This new member of the Software Config group has filtered out the Engineer-ing GPO by denying the Apply Group Policy permission. Even though the user isalso a member of the Engineering OU, the Deny permission from the Software Con-fig group takes priority over all other security groups that may allow Apply GroupPolicy. In the following steps, the Engineering GPO will be rendered useless if nei-ther the Allow box nor the Deny box is marked for the Apply Group Policy permis-sion for all security groups associated with it.

1. Go to the Engineering GPO Properties dialog box. Remove all security groupsexcept Enterprise Admins and Software Config. Select the Software Config

group and ensure that the Apply Group Policy box is not checked underAllow or Deny for either group (Figure 8.47). You may have to press the Ad-

vanced button and clear the Inherit from parent the permission entries

that apply to child objects option.

340 CHAPTER 8 GROUP POLICIES

FIGURE 8.47 The Domain Users Security Group

3930 P-08 3/12/03 10:26 AM Page 340

Page 49: Group Policies

2. The Enterprise Admins group should allow Read/Write/Create All Child

Objects/Delete All Child Objects so that administrative functions can stillbe performed on the GPO.

3. Log off and log on as the Engineering user. The Lock Workstation buttonshould be accessible. The GPO is not applied to the Software Config group ofwhich the user is a member.

If the Domain Users group allowed Apply Group Policy, then the user wouldhave the group policy applied. A user must be a member of a security group thatapplies the group policy in order to use the GPO. The default security settings forGPOs apply policies to the Authenticated Users group. This covers most users withinteractive logon capability.

ScriptsIn a previous section, we discussed the conceptual basis of scripts. For system ad-ministration, scripts can be used for numerous activities. A script can be executedin one of four time periods: startup, shutdown, logon, or logoff.

This example runs a test script when the user logs on to a system:

1. Create a very simple test Java script to run on logon. Open Notepad andenter the following line:

Wscript.echo("You have run the logon script!");

2. Save the file as testscript.js on the local hard drive.

3. Open the Custom console and find the Engineering OU. Open the grouppolicies linked to this OU and edit the Engineering GPO.

4. Follow the User Configuration → Windows Settings → Scripts path anddouble-click the Logon Properties (Figure 8.48).

5. Click Add to expose the Add a Script dialog box (Figure 8.49). Click Browse

and find the file named testscript.js. Click OK.

The script should be available to the user at logon.Scripts execute from top to bottom and may be rearranged by clicking the Up

and Down buttons. The Edit button allows script path modification, name chang-ing, and parameter editing. Scripts are removed by clicking the Remove button.

The Show Files button displays the scripts stored in the default directory forthis GPO. The startup and shutdown script policies may found in Computer Con-

figuration → Windows Settings → Scripts.

Implementing Group Policy 341

3930 P-08 3/12/03 10:26 AM Page 341

Page 50: Group Policies

Folder RedirectionThis example will illustrate how to implement folder redirection. To redirect all MyDocument folders for the Engineering OU to one common server, follow thesesteps:

1. Edit the Engineering GPO applied to the Engineering OU. Go to User Con-

figuration → Windows Settings → Folder Redirection → My Docu-

342 CHAPTER 8 GROUP POLICIES

FIGURE 8.48 Logon Scripts

FIGURE 8.49 Adding a Script

3930 P-08 3/12/03 10:26 AM Page 342

Page 51: Group Policies

ments. Right-click My Documents and select Properties. The My Docu-

ment Properties window appears. From the Setting pull-down menu, selectBasic—Redirect everyone’s folder to the same location.

2. Click Browse and find a shared server folder for all Engineering users.

3. Click OK.

See the later section “IntelliMirror” for examples of folder redirection.

RESULTANT SET OF POLICY

With Windows Server 2003 administrators can determine the actual resulting set ofpolicy for a given user or computer. They can also play what-if scenarios. Thesefeatures are reflected in two new modes. The logging mode allows examination ofwhat was processed on a given computer. The planning mode permits perfor-mance of “what-if” analysis for a specified location in the directory, security groupmembership, and WMI filtering properties.

The Resultant Set of Policy (RSoP) wizard guides an administrator through thesteps necessary to this process. This tool can determine the state of a target andrun scenarios. As the user manipulates the way in which Group Policy might beapplied, the impacts can then be analyzed. This allows quick inspection of differ-ences under new criteria. This feature is available in the Resultant Set of Policy Snap-in or the Active Directory Users and Computers Snap-in; right-click a container,user, or computer.

GROUP POLICY WMI FILTERING

The Windows Management Instrumentation (WMI) filtering is an addition to theGroup Policy infrastructure of Windows Server 2003. It is designed to enable theadministrator to specify a WMI-based query to filter the affect of a Group PolicyObject. This is an addition to the GPO Properties page as a new tab. A filter can bespecified, created, and edited. Support is also included to allow RSoP to display ex-isting WMI filters. Conceptually, this is similar to how Windows 2000 handled theSecurity group filtering. The advantage of this feature is to allow an administratorto dynamically determine whether to apply a GPO based on any properties avail-able via WMI especially for exception management. This function is available by in-voking Group Policy Properties page → WMI Filter tab.

INTELLIMIRROR

One of the more widely promoted aspects of Windows Server 2003, IntelliMirror sim-ply brings together other Windows Server technologies to provide more intelligent

IntelliMirror 343

3930 P-08 3/12/03 10:26 AM Page 343

Page 52: Group Policies

user interfacing. In particular, it helps to reconcile desktop settings, applications,and stored files for users, particularly those who move between workstations orthose who must periodically work offline. This section provides a highlight of Intel-liMirror functionality.

Roaming Documents and PreferencesTogether folder redirection and offline folders provide centralized managementand storage of user documents. Additionally, the user is permitted to access andupdate documents when not connected to the network. This design is ideally suitedto laptop users. Maintaining an offline folder on the network allows the adminis-trator to perform backups on a scheduled basis without direct concern for back-ing up the laptop system.

REDIRECTING MY DOCUMENT FOLDERS

In this example the user’s My Documents folder is redirected to a directory in hisname under a shared network folder using group policies. The My Documentsfolder is designated as offline. A security group is used to determine which usersand groups the folder redirection policy will affect.

1. Create a network share called \Network Docs and Settings.

2. Create a global security group called Engineers and a new user account calledJoe Engineer.

3. Add Joe Engineer to the Engineers group.

Redirect Joe Engineer’s My Documents folder to the network share folderusing the Default Domain Policy.

1. From the Default Domain Policy, right-click the User Configuration →Windows Settings → Folder Redirection → My Documents and selectProperties (Figure 8.50).

2. Select the Target tab and select Advanced–Specify locations for vari-

ous user groups. Click Add to reveal the Specify Group and Location dia-log (see Figure 8.51) and browse for the Engineers group. Click Add, thenclick OK.

3. Under Target Folder Location, click Browse and search for the \NetworkDocs and Settings folder on the appropriate server. Complete the path nameusing the \\servername\Network Docs and Settings\%username%. The %user-name% environmental variable will be used to create a separate directory foreach user. Click OK.

344 CHAPTER 8 GROUP POLICIES

3930 P-08 3/12/03 10:26 AM Page 344

Page 53: Group Policies

4. On the Settings tab, make appropriate choices for policy removal and per-missions. The default settings are fine for this example. Click OK.

Now all users in the Engineers security group will have their folders redirectedto the new network share and have their own My Documents subdirectory belowtheir personal folder. Let’s use offline folders to allow the engineering users accessto their documents when they are offline.

1. Go to Joe Engineer’s laptop and right-click My Computer and select Explore.From the Tools pull-down menu, select Folder Options. Select the Offline

Files tab and enable the Enable Offline Files option.

2. From My Computer, right-click the My Documents folder and select Make

Available Offline. The Offline Files Wizard starts. Click Next.

3. Select the Automatically synchronize the Offline Files when I log on

and log off my computer option to instruct the Synchronization Managerto handle file updates between the remote system and the network share.Click Next.

IntelliMirror 345

FIGURE 8.50 Folder Redirection

3930 P-08 3/12/03 10:27 AM Page 345

Page 54: Group Policies

4. Select the Create shortcut option. Click Next.

5. Select Yes, make this folder and all its subfolders available offline.Click OK.

Now when Joe Engineer logs on to his laptop when not connected to the net-work, an offline dialog warns that the system is offline. An icon on the taskbar ap-pears. Right-clicking the icon gives the user four options:

• Status indicates whether the folder is offline or online.

• Synchronize allows manual synchronization of the offline files.

• View Files displays all files that are available offline.

• Settings sets reminders, synchronization, and offline availability (see Fig-ure 8.52).

346 CHAPTER 8 GROUP POLICIES

FIGURE 8.51 Redirect Security Group to Target Folder

3930 P-08 3/12/03 10:27 AM Page 346

Page 55: Group Policies

The Synchronization Manager may be manually started from either the My

Computer or My Network Places desktop tools. From the Tools pull-down, se-lect Synchronize. Manual synchronization can be started by selecting the desireddirectories and pressing the Synchronize button. Clicking Setup allows config-uration via three tabs (Figure 8.53):

• Logon/Logoff—logon, logoff, and prompting before synchronization con-figuration

• On Idle—idle time before synchronization configuration

• Scheduled—times and directories to synchronize

IntelliMirror 347

FIGURE 8.52 Offline Settings

3930 P-08 3/12/03 10:27 AM Page 347

Page 56: Group Policies

POSTSCRIPT

Group Policy is obviously a very powerful system administration tool. When ap-plied cautiously, a GPO can streamline repetitive tasks such as individually settingthe rights of every user in an OU. It can also be used to assign and publish com-mon applications. Despite many strengths, group policies can also cause real userand system problems. If a GPO is improperly constructed or assigned, it could havea ripple effect through all child objects and user accounts.

Our advice is to experiment with group policies in a very narrowly definedarena. Once you understand the impact of the GPO on your test environment, youcan expand as required. Again, caution is important when using group policies.

348 CHAPTER 8 GROUP POLICIES

FIGURE 8.53 Synchronization Manager Configuration

3930 P-08 3/12/03 10:27 AM Page 348