3 designing a group policy infrastructure

Upload: alexandreantunes

Post on 02-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    1/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize= 1/49

    3 Designing a Group Policy Infrastructure

    Section Topics

    Overview of Active Directory

    Introducing the Design Stages for Implementing Group Policy

    Planning Your Group Policy Design

    Designing Your Group Policy Solution

    Deploying Your Group Policy Solution

    Managing Your Group Policy Solution

    Section Objectives

    After completing this section, you will be able to:

    Describe the basic structure of Active Directory

    Describe the four stages of implementing Group Policy

    Explain how to plan your Group Policy in accordance with company requirements

    Describe the guidelines that you should follow when you create new GPOs

    Explain how to deploy Group Policy based on the Active Directory structure

    Explain how to manage Group Policy by delegating administration and setting permissions

    Section Overview

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    2/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize= 2/49

    This section describes the Active Directory environment and explains how Group Policy uses

    Active Directory as its foundation. This section describes the steps you should follow to

    deploy Group Policy, linking your design to how your company can best use the features.

    This section also defines the essential network components and the security design.

    Administrators must have a firm design developed before deploying Group Policy to a live

    environment.

    Overview of Active Directory

    igure 42: Overview of Active Directory

    Active Directory is a distributed database that stores information about objects such as user

    accounts. It can also provide information about network resources and application data for

    directory-enabled applications and services. You can organize Active Directory into a

    ierarchical structure that reflects the layout of your organization and possibly matches the

    NS architecture.

    Active Directory promotes the use of a single sign-on to the environment for ease of use and a

    ore top-down administrative model. Within an Active Directory forest, a user can be

    ermitted access to resources that exist on any computer in any domain.

    Active Directory is very flexible and extensible. Many potential uses for the Active Directory

    latform exist. The most important goals for Active Directory are:

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    3/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize= 3/49

    Storing object information: Active Directory stores information for dozens of different

    object types. The most important of these object types are users, groups, and computers.

    Authenticating users: Before gaining access to any part of the Active Directory

    infrastructure, users must prove who they are. This authentication is the responsibility of

    the domain controller. Before anyone is allowed in, the domain controller must check user

    credentials against the Active Directory database. If the information provided is correct, the

    user receives a TGT as the pass to get STs before accessing any resources.

    Implementing security and group policies: Security and group policies are stored in

    Active Directory to reflect the policies of the organization for items such as password

    strength, account lockout settings, restricted software, auditing guidelines, event log settings,

    and much more. These policies are carried down to any computer within the scope of the

    Security Policy.

    ctive Directory Objects

    igure 43: Active Directory Objects

    The heart of Active Directory is a database that stores meaningful object information. Many

    different object types are created within Active Directory. Administrators create and interact

    ith only a handful of the following possible objects.

    Users: User accounts are the most prominent objects within Active Directory. They

    establish the list of known individuals who are allowed to log on to the system.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    4/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize= 4/49

    Groups: Groups are very important in the reduction of administrative overhead.

    Collecting users into groups allows the administrator to assign privileges to the group instead

    to each individual.

    Computers: Computer objects are created either ahead of time or when a computer joins

    the domain. Once a computer object is created, it is allowed to participate in the security

    context of the domain.

    Contacts: Contacts are used to establish e-mail aliases for individuals who are outside the

    organization. Contacts do not have a user name and cannot log on to the domain

    environment.

    Printers: Printers exist within the directory as a convenient method to share a printer within

    the network.

    Shared folders: Shared folders are also created for convenience. A shared folder in Active

    Directory points to a physical share on a server or workstation. Creating a share in Active

    Directory does not create the share on the target computer. The destination share must

    already exist.

    ctive Directory Architecture

    igure 44: Active Directory Architecture

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    5/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize= 5/49

    Active Directory is made up of a collection of components that work at different levels of a

    ierarchy. You should understand the designations of these levels even when you implement

    smaller Active Directory structures.

    Site: Sites are established to provide an indication of the physical architecture of the

    environment. Usually a site is established for each physical location; then a Global Catalog

    is placed on a domain controller within each of the sites. Sites provide a foundation for

    replication and for local logons.

    Global Catalog: The Global Catalog for an Active Directory forest summarizes all the

    objects that are stored on each domain in the forest. Each domain contains its own

    database, which is separate from the databases of other domains. The Global Catalog binds

    these multiple domain directories into one larger searchable directory.

    Forest: A forest could be a single domain. However, the wordforestgenerally depicts

    something larger. A forest could be made up of two or more trees with different

    namespaces (for example, hq.localand widget.com). Trees and domains in the forest are

    bound together by links known as trusts.

    Tree: A tree is a collection of one or more domains in the same namespace (for example,

    hq.local). Domains in the tree are linked together by trust relationships.

    Domain: The domain is the basic building block and security boundary for the Active

    Directory environment. The domain also establishes a storage area for Active Directory

    objects within the domain controllers in that domain.

    Domain controller: A domain controller is a computer that runs the Active Directory

    service and is able to answer logon requests and queries about objects. The domaincontroller replicates any changes to the Active Directory database for redundancy.

    OU: OUs (Organizational Units) are containers in which other objects, such as users and

    groups, are stored. OUs are very important organizational techniques for dealing with large

    numbers of objects. It is difficult to manage thousands of user accounts all in one flat list.

    Instead, you can gather objects into meaningful subdivisions called OUs that you can

    manage more efficiently.

    Naming Standards

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    6/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize= 6/49

    igure 45: Naming Standards

    Active Directory uses a combination of different naming technologies to provide access to the

    directory database.

    DNS: DNS (Domain Name System) is one of the most important pieces of the Active

    Directory puzzle. DNS provides the host name to TCP/IP address resolution that is

    necessary to communicate with all of the Active Directory services. It also provides the

    naming structure for Active Directory itself.

    LDAP: LDAP (Lightweight Directory Access Protocol) is used to query and access the

    directory database. LDAP is an open standard used by other vendors for their own

    directory services and follows a common access scheme. Other network devices and

    services can use LDAP to leverage Active Directory for their own purposes.

    X.500: The X.500 standard is a naming structure that defines the hierarchical structure of adirectory database. Active Directory loosely conforms to the X.500 specifications, making it

    easier to convert objects from other directory services to Active Directory, and vice versa.

    Active Directory naming architecture: When Active Directory was first designed,

    Microsoft did not adopt the entire X.500 naming scheme for the Active Directory database.

    Instead, the developers took part of the X.500 architecture (the cn=and ou=) and

    appended the naming scheme that you use every day on the Internet today, DNS.

    The DNS domain name information (for example, gk.com) is turned into a series ofdc=

    qualifiers.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    7/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize= 7/49

    The following is an example of an Active Directory distinguished name: cn=JaneD,

    ou=Sales, dc=atl, dc=hq, dc=local

    Users and Groups

    igure 46: Users and Groups

    ser and group management comprises a large part of an administrators job. When a

    company hires new employees, as employees leave the company, or when users forget their

    asswords, the administrator must step in.

    To manage users and groups effectively, the administrator must understand the interaction

    etween users, groups, organizational units, and permissions.

    ocal User Accounts

    n an enterprise environment, local user accounts should be used sparingly. Although local

    sers and groups are a necessity when a computer is part of a workgroup, after a computer

    ecomes part of a domain, the local user accounts are not as important.

    Creating local user accounts for services is another possible scenario. Even in a domain

    environment, local service accounts are more resilient when the domain is unavailable for

    logon and critical services need to start.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    8/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize= 8/49

    To create local user and group accounts, use either Control Panel, the User Accounts tool, or

    he Computer Management Console.

    omain User Accounts

    omain user accounts have many advantages over their local counterparts. Once you

    authenticate a user in the domain as a particular individual, he or she can access any resources

    hat he or she has been given permissions to. Known as an SSO or single sign-on, this

    eliminates the cumbersome process of juggling multiple accounts and passwords on different

    systems. If the resources are in the same domain, you can grant access to the one user

    account.

    ser account objects are usually created within the Active Directory Users and Computers

    ool.

    owever, you can use other tools to create accounts in bulk, such as:

    Csvde.exe

    Ldifde.exe

    VBScript

    Any ADSI compatible tool

    Group Types and Scopes

    Groups are collections of user accounts that you can leverage to provide access to the

    operating system resources. Groups differ by type and scope.

    Group Types

    Groups in Active Directory come in two different group types:

    Security: A security group is used to provide access to resources throughout the domain.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    9/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize= 9/49

    Any user within a security group obtains all the rights and permissions of the group itself. A

    user who is a member of more than one group will receive all those rights combined.

    Distribution: A distribution group is used strictly for e-mail distribution. When an e-mail

    message is directed to the address of the group, all users who are part of the group will

    receive the message. For this mechanism to function properly, an e-mail service such as

    Microsoft Exchange must be running to enumerate the inboxes of the users who are in the

    group.

    Group Scopes

    Groups in Active Directory come in three different group scopes:

    Domain local: A domain local group is local to the domain where it has been created.

    These groups are limited to accessing resources only within that domain; they are not

    permitted to access resources in other domains. However, domain local groups can contain

    users and global groups from other domains in order to facilitate access to resources.

    Global: Global groups can access resources in any domain that they have permissions to.However, unlike local groups, global groups can contain users only from within the same

    domain that they are created in.

    Universal: Universal groups take on the features of both the global groups and the domain

    local groups. They can contain users from anywhere in the forest, and they can access

    resources anywhere in the forest. The caveat is that the universal group is stored within the

    Global Catalog. For this reason, it is undesirable to place frequently changing objects (suchas users) inside the universal group. It is much better suited as a replacement for domain

    local groups when resource access must cross domains. In this scenario, global groups are

    nested within the universal groups.

    Organizational Units

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    10/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 10/49

    igure 47: Organizational Units

    An OU is a structure borrowed from the X.500 specification that allows for the

    compartmentalization of objects within the directory structure. OUs can be arranged as a

    ierarchy of containers that can represent the structure of the organization itself.

    OUs and Groups

    igure 48: OUs and Groups

    OUs are not groups. Differences include:

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    11/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 11/49

    Users are members of groups for access control purposes, whereas users are contained

    within OUs for storage and for applying Group Policy.

    A user can be a member of as many groups as the administrator sees fit, but an account

    object can be stored in only one OU at a time.

    These differences can get confusing at times, especially when some of the OUs and groups

    ave similar names. To avoid confusion, some organizations prefix OUs with the letters

    OU-. This practice is not very commonplace and you can avoid it by naming groups

    descriptively and naming OUs more briefly.

    Creating an OU Structure

    igure 49: Creating an OU Structure

    An OU structure can be designed around several different types of schemes. The choice of

    scheme depends upon the size and distribution of the organization. In many cases, you can

    se a combination of techniques.

    Geographic

    The geographic design is useful when a company is spread widely throughout a region, or

    erhaps globally. The design should not stop at that level though. Within the regional OUs,

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    12/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 12/49

    ou can create sub-OUs to further divide organizational resources based upon other

    categories.

    epartmental

    The most popular OU design is a departmental one. This design fits neatly into the company

    rofile and you can base it upon existing organizational charts that depict the breakdown of the

    corporate structure. A tool that is commonly used to design these organizational charts is the

    icrosoft drawing tool Visio. Since the introduction of Active Directory, Microsoft Visio has

    een able to export the graphical organizational charts into a format compatible with Active

    irectory. For a new Active Directory deployment, this feature can reduce the effort needed

    o establish the initial OU structure.

    unctional

    The functional design does not usually stand on its own. Most organizations subdivide either

    heir geographic or departmental model into sub-OUs representing a more granular structure of

    departments and job roles.

    Introducing the Design Stages for Implementing Group

    Policy

    igure 50: Introducing the Design Stages for Implementation Group Policy

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    13/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 13/49

    You might get many practical tips for deploying and managing Group Policy in a classroom

    environment, but the real test is when you deploy a Group Policy in your own Active

    irectory enterprise.

    Although deploying Group Policy presents many challenges, its benefits become apparent soon

    after deployment.

    The four major stages required for successfully implementing a Group Policy solution are:

    Planning

    Designing

    Deploying

    Managing

    Planning Your Group Policy Design

    igure 51: Planning Your Group Policy Design

    lanning the design of the Group Policy architecture is important due to the complexity that

    ay exist in many large organizations. This is not a problem exclusive to the Group Policies

    hemselves. You may need to address issues related to the OU structure, the existing

    anagement practices, and who is ultimately going to be in charge of administering the various

    olicy components.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    14/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 14/49

    Policy Survey

    igure 52: Policy Survey

    The planning stage involves consulting with your help desk, end users, management, and

    support staff to answer questions like the ones listed in Figure 52.

    You need enough information to decide exactly which components of Group Policy to deploy

    in your organization.

    Your Group Policy design is ultimately bound by the design and implementation of your

    Active Directory infrastructure. Because you can link GPOs to sites, domains, and OUs, your

    Active Directory design might make it easier to use sites rather than domain settings, or

    domains instead of sites or OUs.

    Policy Objectives

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    15/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 15/49

    igure 53: Policy Objectives

    uring the planning process, you will start to gather information about your company and how

    it carries out its day-to-day business with an Active Directory network. Analyzing the way

    our workers do their job will help you design a plan that will be acceptable and workable.

    Throughout the design stage, the initial scope of Group Policy may be broadened or reduced

    ased on the settings that are deployed on all users versus the settings that are applied for

    select groups of users.

    f your company has several divisions, you need information about how the network

    infrastructure is managed. If the administration is centrally controlled and administered, then

    aving divisions within your company does not provide the structure you need for network

    administration or Group Policy.

    Your Group Policy design will be based on your physical and logical Active Directory

    deployment. At a minimum, subnets (sites) and domains will be used; organizational units will

    e used as well. Remember the basic rule of a new plan: keep it simple.

    Your Group Policy will be deemed successful if it can seamlessly fit into your existing Active

    irectory environment.

    Policy Components

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    16/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 16/49

    igure 54: Policy Components

    A well-thought-out Group Policy design manages the following:

    Computer security: Can departments agree on security?

    Software deployment: Are MSI packages useful to deploy?

    Logon scripts: Are they user or enterprise?

    Folder redirection: Will you replace roaming user profiles?

    Administrative Template settings: What settings can be implemented to improve the user

    experience and reduce support calls?

    Preferences settings:Can cumbersome logon scripts be eliminated by implementing

    Preferences?

    A successful Group Policy design takes into account the many levels of policies that are

    implemented within your company. It balances acceptable network security levels against the

    T department requirements, the businesses requirements, and potentially, government

    equirements.

    lanning for Security

    The first step in designing a functional Security Policy is to understand what your company

    ill accept and what it will reject. Enabling a password policy that contains complex

    asswords might, on paper, be a smart security choice, as long as your users do not write theassword down on a scrap of paper and pin it to their cubicle bulletin board.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    17/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 17/49

    Analyzing the needs of your company and what management and IT will accept is important

    in deploying a sound Security Policy.

    A policy that enforces a 15-character password that will be changed once every 6 months may

    e more palatable to all users from the top of the management tree to the bottom than a 7

    character password with complexity that is changed every month and is constantly being

    ritten down.

    Designing Your Group Policy Solution

    igure 55: Designing Your Group Policy Solution

    esigning your Group Policy solution involves configuring the physical components of the

    environment, laying out the Group Policy model, delegating management authority, creating

    ew GPOs, and designing the interaction of GPOs with Active Directory sites.

    Group Policy Solution Components

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    18/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 18/49

    igure 56: Group Policy Solution Components

    any components are involved in designing a group policy solution for a large environment. If

    ou properly structure all of these components, you will help achieve a successful group policy

    ollout.

    igure 56 lists the subjects that are described in this topic.

    etworking

    Active Directory must be operational in order to deploy Group Policy settings at the site,

    domain, or OU. ICMP must be available to process Group Policy. The client or member

    servers use ICMP for communication with domain controllers on your network.

    NS Services

    Group Policy uses FQDNs, not NetBIOS names. Therefore, you must have DNS running in

    our forest in order to correctly process Group Policy.

    Time Synchronization

    The time synchronization for authentication between workstations and servers must be within

    5 minutes. The updating of Group Policy relies on communication between domain controllers

    sing DNS services and the FRS.

    Administration

    y default, only domain administrators or enterprise administrators can create and link GPOs.

    owever, you can delegate this task to other users. Local administrators can create Group

    olicy but do not need full control of the GPO infrastructure.

    Client Interoperability

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    19/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 19/49

    Group Policy applies only to computers running the following operating systems:

    Windows 2000

    Windows XP Professional

    Windows Server 2003

    Windows Vista

    Windows Server 2008

    Windows 7

    Windows Server 2008 R2

    Windows 8 Client

    Windows Server 2012

    (You cannot deploy Group Policy on computers that are running Windows 95, Windows 98,

    or Windows NT 4.0.)

    f the client and servers in your company primarily run Windows 2000 Professional and you

    ave Windows Server 2003 servers, use the Windows Server 2003 Administrative

    Templates; they are the latest .admfiles and include settings for Windows 2000, Windows

    P, and Windows 2003 computer systems. Similarly, the newest .admxtemplates included

    ith Windows Server 2008 and later provide all of the newest settings, plus backward

    compatibility for older versions of Windows.

    ach GPO setting details which version of Windows it supports. If you attempt to apply a

    GPO containing newer settings to an older version of Windows that does not support the

    applied setting, it will be ignored.

    To determine which settings apply to which operating systems, look at theSupported oninformation in the description for the setting. This information explains which operating

    systems can read the setting.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    20/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 20/49

    f the destination computer is running Windows 2000 or later, and the computer account and

    he account for the logged-on user are both located in an Active Directory domain, both the

    computer and the user portions of a GPO are processed.

    f either the logged-on user account or the computer account is located in a Windows NT 4.0

    domain, System Policy is processed for the accounts that are located in the domain.

    Computers running Windows NT 4.0, Windows 95, or Windows 98 use System Policy rather

    han Group Policy. System policies can still be deployed from an Active Directory domain to

    hese older clients.

    Designing Your Group Policy Model

    igure 57: Designing Your Group Policy Model

    The following discussion questions can help you tailor your Group Policy guidelines and

    design to the needs of your organization:

    Where will your GPOs be linked?

    What security filtering will you use on each GPO?

    How many GPOs will you have?

    What is the scope of where Group Policy is applied?

    Are all Group Policy settings applicable to all users?

    Are some Group Policy settings not applicable to all users?

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    21/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 21/49

    Are users and computers controlled based on their roles and locations?

    Are desktop configurations based on user and computer requirements?

    What are your user requirements for various types of users: desktop, notebooks, mobile,

    terminal services?

    Delegating GPO Responsibilities

    igure 58: Delegating GPO Responsibilities

    f possible, designate only one administrator (or one group of administrators) per GPO for all

    editing and linking tasks. You can delegate permission to edit and link GPOs to different

    roups of administrators. However, without adequate GPO control procedures in place,

    delegated administrators with overlapping responsibilities can duplicate GPO settings or create

    GPOs that conflict with settings set by another administrator or that are not in accordance with

    corporate standards.

    Creating New GPOs

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    22/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 22/49

    igure 59: Creating New GPOs

    e very cautious the first time you create and deploy GPOs. A small number of settings that

    ork well, for example Adding Logoff to the Start Menu, or forcing the Classic Windows

    esktop, will be greatly appreciated. However, implementing a very rigid policy from the

    eginning will cause end-users to become frustrated. Ultimately, they may try to circumvent

    he policy.

    se the settings in your GPOs that you are already familiar with and use a domain GPO to

    deploy a company-wide GPO with minimal settings that are acceptable to everyone. Avoid

    configuring very restrictive settings at the Domain root level as those settings will potentially

    impact everyone.

    Create more granular GPOs on a per-OU basis to affect smaller number of users and

    computers with their specific needs.

    aming GPOs

    efine a meaningful naming convention for GPOs that clearly identifies the purpose of each

    GPO.

    This easy tip is usually overlooked. The name should include the settings applied, and the date

    of creation and change.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    23/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 23/49

    GPO Functionality

    The functional characteristics of GPOs are:

    GPOs are inherited: If a GPO is linked at the domain level and at the OU level, both the

    user and computer accounts in the domain and OU could be affected by both OUs.

    GPOs are monolithic: Each GPO is created from the same master template and,

    therefore, contains the same choices regardless of its location in the site, domain, or OU.

    GPOs and performance are linked: If a computer system or user account has to process

    many GPO settings, performance can suffer.

    Sites and GPOs

    igure 60: Sites and GPOs

    Sites are important in the structure of Active Directory and in the functionality of location-

    ased GPO processing.

    omain Controller Location

    The location of your domain controllers becomes a consideration if your clients are located on

    emote subnets with no domain controller and must authenticate across a slow WAN link.GPOs are stored in both Active Directory and in the Sysvolfolder on each domain controller.

    These locations have different replication mechanisms.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    24/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 24/49

    eplication

    eplication in Active Directory is controlled by the built-in replication system of Active

    irectory. Within the same site, replication between domain controllers that are running at the

    unctional domain level of Windows 2003 Server within the same site occurs every 15

    seconds.

    n environments such as a partially upgraded forest that contains domain controllers running

    indows 2000 and Windows Server 2003, a typical replication might take up to 15 minutes.

    The FRS controls the replication of the Sysvolfolder. Within sites, replication occurs every 15

    inutes. If the domain controllers are in different sites, the replication process occurs at set

    intervals based on site topology and schedule; the lowest interval is 15 minutes across a WAN

    link unless Notificationhas been enabled.

    f it is critical to immediately apply a change to a specific group of users or computers in a

    specific site, use Active Directory Users and Computers to connect to the domain controller

    closest to these objects, and then make the configuration change on that domain controller.

    This technique will allow those users to get the updated policy first.

    All changes made to GPOs are replicated from the domain controller that is assigned the

    SMO role of PDC emulator to the other domain controllers hosting the domain. The FRS

    links together and updates the Sysvolfolders within each domain.

    Slow Links

    Active Directory defines a link as slow when it falls below the default threshold of 500 kBps.

    Group Policy settings that are applied under these conditions are the Administrative

    Templates settings along with the security settings.

    All other Group Policy settings, including software distribution and folder redirection, are notapplied across slow links. However, this default threshold for both the computer and user can

    e changed by modifying the Slow Link Detection policy.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    25/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 25/49

    Group Policy uses the following process to measure link speed:

    1. The server is pinged with 0 bytes of data and times the number of milliseconds; if the

    result is less than 10 ms, the operating system assumes a fast link.

    2. The server is pinged with 2 kB of uncompressible data and times the number ofmilliseconds. This value is called time2. DELTA = time2 time1 The result is equal to

    the time to move 2 kB of data.

    ote

    In Windows Vista, Windows Server 2008 and later, Group Policy uses NLA in

    he operating system to detect a slow network. This circumvents the issues surrounding the

    nreliable usage of ICMP to determine speed.

    Deploying Your Group Policy Solution

    igure 61: Deploying Your Group Policy Solution

    eploying your Group Policy solution involves making the policy available to the users and

    computers that you want to affect with the settings. You can link the policies to the domain,

    site, or at the various levels of a nested OU structure. After deployment, the policy changes

    ill automatically be discovered at regular intervals.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    26/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 26/49

    pplying Group Policy Changes

    igure 62: Applying Group Policy Changes

    olicy refresh occurs at computer startup and user logon. In addition, clients and servers

    check for changes to GPOs every 90 minutes by using a randomized offset of up to 30

    inutes.

    Any changes to Group Policy settings are not immediately available on the desktops of users

    ecause changes to each GPO must first replicate to the appropriate domain controller where

    authentication is occurring.

    Security Policy settings delivered by Group Policy are reapplied every 16 hours (960 minutes)

    even if security settings have not changed.

    t is possible to change this default period (in minutes) by modifying the registry entry

    axNoGPOListChangesIntervalin the following subkey:

    KLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtentions

    omain controllers check for computer policy changes every 5 minutes.

    To change the default polling frequency, go to Computer Configuration\Administrative

    Templates\System\Group Policyfor computers and User Configuration\Administrative

    Templates\System\Group Policyfor users. Modify the following settings:

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    27/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 27/49

    Group Policy Refresh Interval for Computers

    Group Policy Refresh Interval for Domain Controllers

    Group Policy Refresh Interval for Users

    or Windows 2000 Server, Windows XP, and Windows Server 2003, software packages

    equire:

    A logoff and logon to take effect when applied to the user

    A reboot when applied to the computer

    indows Vista, Windows Server 2008 and later can apply software packages without the

    eed to first log off or restart the computer.

    Linking GPOs to the Domain

    igure 63: Linking GPOs to the Domain

    As the name suggests, the Default Domain Policy GPO is also linked to the domain.

    The Default Domain Policy GPO is created when the first domain controller in the domain is

    installed and the administrator logs on for the first time.

    This GPO contains the domain-wide account policy settings, Password Policy, Account

    ockout Policy, and Kerberos Policy, which are enforced by the domain controller computers

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    28/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 28/49

    in the domain.

    n order to apply account policies to domain accounts, these policy settings must be deployed

    in a GPO that is linked to the domain. It is recommended that you set these settings in the

    efault Domain Policy GPO.

    eep in mind the Group Policy inheritance model and how precedence is determined. By

    default, options set in GPOs that are linked to higher levels of Active Directory containers

    (sites, domains, and OUs) are inherited by all containers at lower levels.

    f you want to apply a number of policy settings to computers in a particular physical location

    only (for example, network or proxy configuration settings), you can apply these settings at the

    site level. However, if the settings do not distinctly match to computers in a single site, it is

    etter to assign the GPO to the domain or OU structure instead.

    Designing an OU Structure that Supports Group Policy

    igure 64: Designing an OU Structure that Supports Group Policy

    You can more efficiently manage an OU structure if it is in a single domain environment. In a

    single domain, you can move users in and out of OUs without using complex migration tools.

    You can also move entire OU structures, with all of their contents, within the single domain.

    You can delegate the administration of the OUs to specific groups of users to provide a more

    ranular administrative architecture.

    OU Organization

    ake sure that you base your OU design on a solid management strategy for GPO creation

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    29/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 29/49

    and delegation of administrative duties. The goal of your OU design is to simplify Group

    olicy application and troubleshooting.

    Separate OU Design

    One distinct design is to place all the computer accounts in one OU and all the user accounts

    in another. Using a structure in which OUs contain either user or computer objects but not

    oth, you could disable the computer section or user section of a GPO to speed up the

    rocessing of each GPO. However, separating the user and computer components into

    separate GPOs will require more GPOs. You can compensate for this by adjusting the GPO

    status to disable the user or computer sections of each GPO that do not apply and to reduce

    he time required to apply a given GPO.

    Central Control

    f central control is desired, consider geographically-based OUs as child OUs and duplicate the

    structure for each location for a clean familiar structure.

    emember, all child OUs by default inherit GPOs that are linked to the higher layers of your

    OU structure.

    You can apply Group Policy settings at the domain level, so consider settings at the domain

    level for company-wide settings, such as password policies.

    pplying Group Policy to New User and Computer

    ccounts

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    30/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 30/49

    igure 65: Applying Group Policy to New User and Computer Accounts

    After deployment, the policy changes will automatically be discovered at regular intervals. By

    default all new user and computer accounts are created in the CN=Usersand

    CN=Computerscontainers shown in Active Directory Users and Computers.

    or Windows 2003 and later Active Directory environments, you can apply group policies to

    he default user and computer containers if you redirect them with the following command-line

    tilities:

    redirusr.exe: For user accounts

    redircmp.exe: For computer accounts

    These command-line utilities enable you to change the default location where new user and

    computer accounts are created so that you can more easily design and link GPOs directly to

    ewly created user and computer objects.

    The Redirusrand Redircmputilities are located in WINNT\system32on a Windows 2003 or

    later domain controller.

    unning the Redirusrand Redircmputilities, a domain administrator can specify the OUs

    into which all new user and computer accounts are placed when they are created.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    31/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 31/49

    Managing Your Group Policy Solution

    igure 66: Managing Your Group Policy Solution

    Once group policies have been designed and deployed, mechanisms must be put in place to

    anage them on an ongoing basis. The management of policies does not need to all fall on the

    shoulders of a single person. Subordinate administrators can be delegated the authority theyeed to manage certain aspects of Group Policy.

    Another important aspect of Group Policy management is the ability to specify a default

    domain controller for GPO editing. This can help reduce issues that occur when managing

    olicies in widely disbursed environments.

    hen there are many administrators in an environment, version control is imperative. GPO

    ollback, Starter GPOs, GPO Comments, and the AGPM are all tools that can assist in

    racking and controlling GPO management.

    Delegating the Administration of Group Policy

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    32/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 32/49

    igure 67: Delegating the Administration of Group Policy

    Your Group Policy design will probably call for delegating certain Group Policy administrative

    asks.

    One of the most important factors to consider when assessing the needs of your organization

    is the degree to which you should centralize or distribute administrative control of Group

    olicy.

    A centralized administration model has an IT group providing services and setting standards

    or the entire company. In organizations that use a distributed administration model, each

    usiness unit manages its own IT group.

    ased on the administrative model of your organization, you need to determine which

    components of configuration management should be handled at the site, domain, and OU

    levels.

    Administrative responsibilities at each site, domain, and OU level might be further delegated at

    each level.

    hen deciding whether to delegate authority at the site, domain, or OU level, remember the

    ollowing points:

    Authority delegated at the domain level affects all objects in the domain if the permission is

    set to inherit to all child containers.

    Authority delegated at the OU level can affect either that OU only, or that OU and its child

    OUs.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    33/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 33/49

    efault Rights for Group Policy Management

    igure 68: Default Rights for Group Policy Management

    You can always modify the default permissions shown in Figure 69 that are assigned to one of

    he system groups. However, to avoid giving a user more control than is necessary, it is best to

    create a new group for Group Policy management.

    Windows

    Group

    Rights Granted

    Enterprise Admin Create, delete, edit, and link GPOs in all forest containers (sites, domains, and OUs).

    Domain Admins Create, delete, edit, and link GPOs in the domain and all OUs hosted by the domain, but not

    in sites. See note below for exceptions to this rule.

    Group Policy Creator

    Owners

    Create GPOs in the domain to which the group belongs. Users who are members of this

    group can edit any GPOs that they create; however, other members of the group cannot.

    Deleting GPOs is not allowed. Linking to a site, domain, or OU is also not allowed.

    Local Admins Create GPOs in the domain to which the group belongs. A user that is a member of this

    group can edit and delete all GPOs that any other group member has created. Linking the

    GPO to the domain and any OUs hosted by the domain is also allowed.

    igure 69: Groups Assigned GPO Rights

    You can manage three Group Policy tasks on a per-container basis in Active Directory:

    Linking GPOs to the site, domain, or OU

    Analyzing Group Policy Modeling for domains and OUs

    Reading Group Policy Results data for domains and OUs

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    34/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 34/49

    f your Active Directory network is a single domain, be aware that by default the local

    administrator is made a member of the Domain Admins, Enterprise Admin, Schema Admins

    and Group Policy Creators groups.

    Group Policy Creator Owners Group

    igure 70: Group Policy Creator Owners Group

    ollowing are the main characteristics of the GPCO (Group Policy Creator Owners) group:

    Members of the GPCO group cannot link GPOs to containers unless they have been

    separately delegated the right to do so on a particular site, domain, or OU. Membership in

    the GPCO group allows each member the ability to create GPOs in a domain.

    However, they cannot link any GPO that they have created to any other container.

    Being a member of the GPCO group gives the non-administrator full control of only those

    GPOs that the user creates. When a non-administrator who is a member of the GPCO

    group creates a GPO, that user becomes the creator owner of the GPO and can edit the

    GPO and modify permissions on the GPO.

    GPCO members do not have permissions for GPOs that they do not create.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    35/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 35/49

    Other Group Policy Creator Owner Details

    ecause the GPCO group is a domain global group, it cannot contain members from outside

    he domain. Therefore, if you add Jane Smith to the GPCO group, she alone can create and

    edit GPOs that she has created.

    hen the Group Policy MMC creates the GPO for Jane, it does not assign the GPCO to the

    ACL on the GPO; it instead assigns it directly to the user that created the GPO, in this case

    Jane.

    The GPCO is just a placeholder for the members of the group; when a user actually creates a

    GPO, the permissions are assigned to that specific user.

    GPO Delegation

    igure 71: GPO Delegation

    elegation in Active Directory is performed using the Delegation of Control wizard. You can

    se this tool to assign security permissions to specific users and groups to perform specialized

    administrative tasks on Active Directory objects. Internally, the ACL is doing all the work as

    shown in Figure 71. Unfortunately, there is no un-delegation of control wizard.

    You can delegate the following Group Policy tasks:

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    36/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 36/49

    Creating GPOs

    Managing individual GPOs (for example, granting edit or read access to a GPO)

    Performing the following tasks on sites, domains, and OUs:

    Managing Group Policy links for a given site, domain, or OU

    Performing Group Policy Modeling analyses for objects in that container (not applicable

    for sites)

    Reading Group Policy Results data for objects in that container (not applicable for sites)

    Creating WMI filters

    Managing and editing individual WMI filters

    To delegate Group Policy-related permission on a site, domain, or OU, select the appropriate

    container. Do the following:

    1. Right-click the site, domain, or OU and select Delegation.

    2. Click the Addbutton to add new groups or a user.

    3. Select the permission that you want to manage: Link GPOs,Perform Group Policy

    Modeling analyses, orRead Group Policy Results data.

    ote

    Group Policy Modeling and Group Policy Results are not available for sites.

    anually Assigning Permissions

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    37/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 37/49

    igure 72: Manually Assigning Permissions

    To manually assign permissions to a GPO, from the Group Policy MMC, right-click the

    GPOobject and from the GPOproperties, click the Securitytab.

    igure 73 shows the rights that must be granted to edit, view, link, and delete a GPO.

    Rights Control

    Full control Create, edit, view, and delete the GPO

    Read View the GPO in the Group Policy Console (Opening the GPO to edit is not allowed.)

    Write View and edit the GPO (Note: The read permissions must also be granted to even be able

    to view the GPO.)

    Create all child objects Create and edit GPOs (Deleting is not allowed.)

    Delete all child objects Delete a GPO

    igure 73: Rights for GPO Control

    Administrative Rights

    hen an administrator creates a GPO, the Domain Administrators group becomes the creator

    owner of the GPO.

    f the domain administrator wants a non-administrator or non-administrative group to create

    GPOs, that user or group can be added to the Group Policy Creator Owners security group.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    38/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 38/49

    After a non-domain administrator creates an unlinked GPO, the domain administrator or

    someone else who has been delegated permissions to link GPOs in a container can link the

    GPO as appropriate.

    y default, domain administrators have GPO linking permission for domains and OUs, and

    enterprise administrators and domain administrators of the forest root domain can manage

    links to sites.

    y default, access to Group Policy Modeling and remote access to Group Policy Results data

    is restricted to enterprise administrators and domain administrators.

    Specifying a Domain Controller for Editing GPOs

    igure 74: Specifying a Domain Controller for Editing GPOs

    esolving Conflicts

    To avoid conflicts that could be caused when multiple administrators are editing policies, the

    DC emulator in each domain is used as the default for editing GPOs. This ensures that all

    administrators are using the same domain controller. If multiple administrators manage a

    common GPO, all administrators actually use the same domain controller when editing a

    articular GPO in order to avoid collisions.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    39/49

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    40/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 40/49

    igure 75: Rolling Back Domain GPOs

    f for some reason there is a problem with the changes to the GPOs and you cannot revert to

    he previous or initial states, you can use the Dcgpofix tool to re-create the default policies in

    heir initial state.

    cgpofix is a command-line tool that completely restores the Default Domain Policy GPO and

    efault Domain Controller GPO to their original states in the event of a disaster.

    cgpofix restores only the policy settings that are contained in the default GPOs for the

    domain at the time it was first created; the default settings are found in Security, RIS, and

    FS.

    cgpofix does not restore other GPOs that administrators create; it is intended only for

    disaster recovery of the default GPOs. Dcgpofix works only in a Windows Server 2003 or

    later domain.

    The syntax for Dcgpofix is:

    cgpofix [/target: domain | dc | both]

    igure 76 lists the options for Dcgpofix.

    Option Function

    /target Description of option

    domain Recreates the Default Domain Policy

    dc Recreates the Default Domain Controllers Policy

    both Recreates both the Default Domain Policy and the Default Domain Controllers Policy

    igure 76: Options for Dcgpofix.exe

    Starter GPOs

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    41/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 41/49

    igure 77: Starter GPOs

    Starter GPOs allow administrators to build a library of common GPO scenarios. They work

    like templates in that they enable you to create new GPOs from a set of predefined values that

    ou can later modify to suit the needs of the situation.

    Starter GPOs are not the same as Administrative Templates, however. The Administrative

    Templatesestablish the structure of what is possible in a GPO without defining any actual

    settings. A Starter GPO comes with preconfigured settings that allow an administrator to get

    started more quickly.

    There are several Starter GPOs included in the operating system. Click on the Starter GPOs

    container and it will ask if you want it to create them. Additional Starter GPOs can be

    downloaded from Microsoft in the form of Solutions Accelerators.

    One deficiency of the Starter GPO is that it can contain only Administrative Templates

    settings.

    Although these settings constitute the bulk of the settings that would be used to define user

    environment characteristics or to lock down the desktop, they do not contain security settings

    and other parameters that would be useful in a Starter GPO form. Windows Server 2012

    includes several new predefined Starter GPOs that address Windows Firewall with Advanced

    Security settings. However, you still cannot modify the security section of a Starter GPO that

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    42/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 42/49

    ou create yourself.

    dding Comments to a GPO

    igure 78: Adding Comments to a GPO

    n large, complex environments, it is important to keep track of the various GPOs and what

    hey are used for. The new Group Policy structure allows you to add comments to a GPO for

    uture reference.

    To add a comment, follow these steps:

    1. Edit the policy, right-click the name of the policy in the Group Policy Management

    Editor, and then select Properties.

    2. Click the Commenttab and then type a description of the policy.

    hen you select the policy, the comment should be visible in the GPMC, on the Detailstab.

    Using the AGPM

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    43/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 43/49

    igure 79: Using the AGPM

    icrosoft AGPM (Advanced Group Policy Management) increases control over managing

    roup policies. AGPM provides role-based delegation and change management control. These

    added Group Policy management features will result in fewer conflicting or improperly

    configured GPOs.

    AGPM is part of the Microsoft Desktop Optimization Pack for Software Assurance, availableo Software Assurance customers. Those who have MSDN or Microsoft TechNet

    subscriptions may download and experiment with the MDOP and AGPM features. AGPM

    allows for better management and control of enterprise desktop environments.

    To use AGPM, you must install a server component on a domain controller within the

    enterprise.

    Those managing group policies must install the client component to participate.

    Note: The current version of AGPM is 4.0. This version works with Windows Server

    2008, Server 2008 R2, Windows Vista and Windows 7. There is no official version of

    AGPM available for Windows Server 2012 and Windows 8 Client yet.

    igure 79 lists the benefits of the AGPM.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    44/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 44/49

    cronyms

    The following acronyms are used in this section:

    ACL access control list

    ADSI Active Directory Services Interfaces

    ADUC Active Directory Users and Computers

    AGPM Advanced Group Policy Management

    CN common name

    C domain controller

    NS Domain Name System

    C Enterprise Client

    FS Encrypting File System

    QDN fully qualified domain name

    RS File Replication service

    SMO Flexible Single Master Operation

    GPCO Group Policy Creator Owners

    GPO Group Policy object

    KLM HKEY_LOCAL_MACHINECMP Internet Control Message Protocol

    T Information Technology

    B kilobytes

    Bps kilobits per second

    DAP Lightweight Directory Access Protocol

    DOP Microsoft Desktop Optimization Pack

    MC Microsoft Management Console

    s millisecond

    SDN Microsoft Developer Network

    SI Microsoft Software Installer

    etBIOS Network Basic Input/Output System

    LA Network Location Awareness

    OU organizational unit

    DC primary domain controller

    IS Remote Installation Services

    SSLF Specialized Security Limited Functionality

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    45/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 45/49

    SSO single sign-on

    ST service ticket

    TCP/IP Transmission Control Protocol/Internet

    Protocol

    TGT Ticket Granting Ticket

    AN wide area network

    MI Windows Management Instrumentation

    Section Review

    Summary

    The heart of Active Directory is a database with object types such as Users, Groups,

    Computers, Contacts, Printers, and Shared folders. Active Directory is made up of a

    collection of components (Site, Global Catalog, Forest, Tree, Domain, Domain Controller,

    and OU) that work at different levels of a hierarchy.

    The four stages of implementing Group Policy are:

    Planning: During this stage, you will decide which components of Group Policy to

    deploy in your organization; start gathering information about your company and how it

    carries out its day-to-day business with an Active Directory network; design a Group

    Policy that manages entities such as: Computer security, Software deployment, etc.

    Designing: During this stage, you will configure the physical components of theenvironment, lay out the Group Policy model, delegate management authority, create

    new GPOs, and design the interaction of GPOs with Active Directory sites.

    Deploying: During this stage, you will make the policy available to the users and

    computers that you want to affect with the settings.

    Managing: During this stage, you will put mechanisms in place to manage group policies

    on an ongoing basis; delegate authority to subordinate administrators to manage certain

    aspects of Group Policy; specify a default domain controller for GPO editing; use tools

    such as Starter GPOs and the GPO to track and control Group Policy objects.

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    46/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 46/49

    To plan your Group Policy in accordance with your company requirements, do the

    following:

    Ask your help desk, end users, management, and support staff the planning stage

    questions.

    Determine which components of Group Policy to deploy.

    Find out about the design and implementation of your Active Directory infrastructure.

    Start gathering information about your company; how it carries out its day-to-day

    business with an Active Directory network.

    If your company has several divisions, find out how the network infrastructure is

    managed.

    Base your Group Policy design on your physical and logical Active Directory

    deployment.

    Ensure the plan manages the Group Policy entities such as computer security, folder

    redirection, roaming user profiles, etc.

    Follow these guidelines when you create new GPOs:

    Use the settings in your GPOs that you are already familiar with and use a domain GPO

    to deploy a company-wide GPO with minimal settings that are acceptable to everyone.

    Create more granular GPOs on a per-OU basis to affect smaller numbers of users and

    computers with their specific needs.

    Define a meaningful naming convention for GPOs that clearly identifies the purpose of

    each GPO; the name should include the settings applied and the date of creation and

    change.

    You can link policies to the domain, site, or at the various levels of a nested OU structure.

    Decide the degree to which you should centralize or distribute administrative control of

    Group Policy. In a centralized administration model, the IT group provides services and

    setting standards for the entire company. In a distributed administration model, each

    business unit manages its own IT group. Based on the administrative model, determine

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    47/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 47/49

    which configuration management components should be handled at the site, domain, and

    OU levels.

    You can manually assign permissions to a GPO from the Group Policy MMC.

    nowledge Check

    1. What types of objects can you store in Active Directory?

    2. Briefly describe the Planning and Design stages of implementing Group Policy.

    3. What should you do when you plan your Group Policy in accordance with your

    company requirements? (Choose all that apply.)

    a. Ask the planning stage questions.

    b. Find out about the design and implementation of your Active Directory

    infrastructure.

    c. Base your Group Policy design on your physical and logical domain controller

    deployment.

    d. Determine how your company carries out its day-to-day business with an Active

    Directory network.

    . What should you include when you name a GPO?

    5. What can you link the policies to when you deploy your Group Policy solution?

    6. Name the two models you can use to delegate the administration of Group Policy.

    Knowledge Check Answer Key

    The correct answers to the Knowledge Check questions are bolded.

    1. What types of objects can you store in Active Directory?

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    48/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=4&FontSize 48/49

    Users, Groups, Computers, Contacts, Printers, and Shared Folders

    2. Briefly describe the Planning and Design stages of implementing Group Policy.

    During the Planning stage:

    Decided which components of Group Policy to deploy

    Start gathering information about your company and how it carries out its day-

    to-day business with an Active Directory network

    Design a Group Policy that manages entities (computer security, software

    deployment, etc.)

    During the Design stage:

    Configure the physical components of the environment

    Lay out the Group Policy model

    Delegate management authority

    Create new GPOs

    Design the interaction of GPOs with Active Directory sites

    3. What should you do when you plan your Group Policy in accordance with your

    company requirements? (Choose all that apply.)

    a. Ask the planning stage questions.

    b. Find out about the design and implementation of your Active Directory

    infrastructure.

    c. Base your Group Policy design on your physical and logical domain controller

    deployment.

    d. Determine how your company carries out its day-to-day business with an

    Active

    Directory network.

    . What should you include when you name a GPO?

  • 8/10/2019 3 Designing a Group Policy Infrastructure

    49/49

    16/11/2014 3 Designing a Group Policy Infrastructure

    The settings applied and the date of creation and change.

    5. What can you link the policies to when you deploy your Group Policy solution?

    You can link the policies to the domain, site, or at the various levels of a nested

    OU structure.

    6. Name the two models you can use to delegate the administration of Group Policy.

    Centralized administration model and distributed administration model