Windows Server 2008 R2 Unleashed (120 page)

sections contain the Group Policy settings that will determine how often a policy will be

refreshed, if a policy will be reapplied even if the revision number has not changed since

the last cycle, and if the policy will be applied across slow links or if any local computer

policies will be processed by a computer or a user.

ptg

FIGURE 19.1

Examining Group Policy settings.

Local Group Policies

Two different types of policies can be applied to Windows systems and Windows system

user accounts: local group policies and Active Directory group policies. Local group poli-

cies exist on all Windows systems, but Active Directory group policies are only available in

an Active Directory forest. Until the release of Windows Vista and Windows Server 2008,

servers and workstations could contain and apply only a single local computer and user

policy. This policy contained the settings that could be applied to the local computer and

the user objects to control the security and configuration settings.

In many environments, usually due to legacy or line-of-business application requirements,

end users were frequently granted local Administrators group membership on worksta-

tions and essentially excluded from the application of many security settings applied by

both the local and group policies. End users with local Administrators group membership

Local Group Policies

589

have the ability to override settings and make configuration changes that could compro-

mise the security, or more frequently, reduce the reliability of the system.

Starting with Windows Vista and Windows Server 2008, administrators now have the

ability to create multiple local group policies. One of the new features is that specific user

group policies can be created for all users, for users who are not administrators, and for

users who are members of the local Administrators group on the computers. This new

feature can be especially valuable for computers configured in workgroup or standalone

configurations to increase the security and reliability of the computer. In domain configu-

rations, computer security policies are usually specified using group policies and applied to

the Active Directory computers.

Local Computer Policy

The default local computer policy contains out-of-the-box policy settings, as shown in

Figure 19.2, which are available to configure the computer and user environment. This

policy will be applied first for both computer and user objects logging on to the worksta-

tion in workgroups or domains.

ptg

19

FIGURE 19.2

Examining local computer policy settings.

Local User Policies for Non-Administrators and Administrators

Starting with Windows Vista and Windows Server 2008, and continuing with Windows 7

and Windows Server 2008 R2, administrators now have the option to create multiple local

user group policies on a single machine. In previous versions, the single local computer

policy allowed administrators to apply the single policy settings to all users logging on to

590

CHAPTER 19

Windows Server 2008 R2 Group Policies and Policy Management

a workstation that is part of a workgroup. Now, workgroup computers and domain

computers can have additional policies applied to specific local users. Also, policies can be

applied to local computer administrators or nonadministrators. This allows the worksta-

tion administrator to leave the user section of the default local computer policy blank,

and create a more-restrictive policy for local users and a less-restrictive policy for members

of the local workstation Administrators security group.

Security Templates

Within each local computer policy and within a GPO Computer Configuration node,

there is a section named Security Settings, as shown in Figure 19.3. This section includes

settings for computer audit policies, account management settings, and user rights assign-

ments. This section of the policy is unique because it can be imported and exported indi-

vidually. In previous versions of Windows, several security templates were provided out of

the box to give administrators the ability to quickly load a set of best-practice security

configuration settings. These templates included basic workstation and server templates

along with high security, compatible security, and domain controller security templates.

ptg

FIGURE 19.3

Examining the computer security section.

To manage and apply a standard set of security configurations to workgroup or standalone

systems, administrators can leverage the management functions of security templates.

Either using the Group Policy Object Editor, the Local Security Policy editor, or the

Security Configuration and Analysis MMC snap-in, administrators can import a base

template, configure or adjust settings to meet the desired security settings, and export and

Elements of Group Policy

591

save the settings to a custom template file. This custom template file could then be

imported or applied to all the desired systems using the tools referenced previously.

Security templates exist for Windows Vista, Windows 7, Windows Server 2008, and

Windows Server 2008 R2. These base security templates are located in the

%systemroot%\inf folder or on a default install, c:\windows\inf. The default security

templates all start with the name deflt and end with an .inf extension. For example, on

Windows Server 2008 R2, the templates that exist are named defltbase.inf, defltsv.inf,

and defltdc.inf. These files can be used to configure a system’s security settings to a

standard set of security configurations.

CAUTION

Importing security templates to servers or workstations already deployed can cause

several issues, including losing the ability to log on or access the system from the net-

work. Please make sure to test any changes to security settings when working with the

import and application of security templates.

Elements of Group Policy

ptg

This section of the chapter provides an overview of the concepts and terminology of the

elements of Group Policy to provide system administrators with the information required

to understand, support, and deploy group policies in an Active Directory forest. As a

follow-up to this chapter, Chapter 27, “Group Policy Management for Network Clients,”

provides useful best-practice examples of how Group Policy can be deployed to simplify

the management and configuration of your Active Directory servers, workstations, and

users. Although some administrators might be inclined to skip the remainder of this

chapter and jump right to Chapter 27, it is highly recommended that you review this

chapter to understand how to manage the Group Policy infrastructure before attempting

to manage the devices in the Active Directory forest.

Group Policy Objects

The elements of Group Policy start with the Group Policy Objects (GPOs) themselves.

19

GPOs are a predefined set of available settings that can be applied to Active Directory

computer and/or user objects. The settings available within a particular GPO are created

using a combination of administrative template files included or referenced within that

GPO. As the particular computer or user management needs change, additional adminis-

trative templates can be imported into a particular GPO to extend its functionality.

Group Policy Object Storage and Replication

GPOs are stored in both the file system and the Active Directory database. Each domain in

an Active Directory forest stores a complete copy of that particular domain’s GPOs.

Within Active Directory, the GPO links and version information are stored within the

domain naming context partition of the database. Because this partition is only replicated

592

CHAPTER 19

Windows Server 2008 R2 Group Policies and Policy Management

within a single domain, processing GPOs linked across domains, either using sites or just a

cross-domain GPO link, can take longer to load and process.

The GPO settings are stored in the file system of all domain controllers within the sysvol

folder. The sysvol folder is shared on all domain controllers. Each domain GPO has a

corresponding folder located within the sysvol\companyabc.com\Policies subfolder, as

shown in Figure 19.4 as an example of the companyabc.com domain. The GPO folder is

named after the globally unique identifier (GUID) assigned to that GPO during creation.

The GUID of a GPO is listed when viewing the properties of a domain GPO using the

Group Policy Management Console. Within the GPO folder are a common set of subfold-

ers and files, including the User folder, Machine folder, sometimes the ADM folder, and

the gpt.ini file.

ptg

FIGURE 19.4

Examining the sysvol Policies folder.

Group Policy Object Replication

Because GPOs are stored within the Active Directory database and on the domain controller

file system, all GPO information is replicated by the domain controllers. The file system

portion of the domain GPOs is replicated within the Domain System Volume Distributed

File System Replication group by the Distributed File System Replication service.

The Domain System Volume replication schedule is controlled by the DFSR schedule,

which, by default, follows the same replication cycle as the Active Directory database.

Replication occurs every 5 minutes or immediately between domain controllers in a single

Active Directory site and follows the site link schedule between domain controllers in

separate sites. Legacy domains will use the File Replication Service instead of DFSR.

Elements of Group Policy

593

User Subfolder

The User subfolder contains the files and folders used to store the settings, software,

scripts, and any other policy settings specific to user and user object policies configured

within a particular GPO.

Machine Subfolder

The Machine subfolder contains the files and folders used to store the settings, software,

scripts, and any other policy settings specific to machine or computer object policies

configured within a particular GPO.

ADM Subfolder

The ADM subfolder is created on new GPOs when legacy administrative template files are

imported into a GPO. Any GPOs created using Windows 2000 and Windows XP client

software, or Windows 2000 Server and Windows Server 2003 system software, will contain

Other books

aHunter4Rescue (aHunter4Hire) by Clement, Cynthia
Triple Trouble by Lois Faye Dyer
Wicked Cravings by Suzanne Wright
Daughter of Time by Josephine Tey
The Book of Why by Nicholas Montemarano
The Muscle Part Two by Michelle St. James
The Drowner by John D. MacDonald
White Gold by Amphlett, Rachel
The Invisible Papers by Agostino Scafidi