Windows Server 2008 R2 Unleashed (122 page)

Windows Update, while an OU representing a branch office in the domain can have a

GPO linked that enables the branch office desktop administrators security group to run

Windows Update.

ptg

GPO links inherited from parent containers are processed before GPO links at the

container itself, and the last applied policy setting value is the resulting value, if multiple

GPOs have the same configured setting with different values. This Group Policy inheri-

tance is also known as GPO precedence and is shown in Figure 19.6.

19

FIGURE 19.6

Examining Group Policy precedence.

598

CHAPTER 19

Windows Server 2008 R2 Group Policies and Policy Management

Group Policy Block Inheritance

Just as GPOs can be inherited, Active Directory also provides the option to block inheri-

tance, as shown in Figure 19.7, of all GPOs from parent containers. This is actually an

option applied to an Active Directory domain or organizational unit within the Group

Policy Management Console and not on a GPO. This option can be useful if the

container contains users and/or computer objects that are very security sensitive or busi-

ness critical. As an example of this option in use, an OU can be created to contain the

Remote Desktop Services host systems, which would not function correctly if domain-

level GPOs were applied. The OU can be configured to block inheritance to ensure that

only the policies linked to the particular OU were applied. If GPOs need to be applied to

this container, links would need to be created at that particular container level, or the

GPO link from the parent container would need to be enforced, which would override

the block inheritance setting.

ptg

FIGURE 19.7

Blocking GPO inheritance.

Group Policy Order of Processing

GPOs can be linked at many different levels and in many Active Directory infrastructures;

multiple GPOs are linked at the same OU or domain level. This is a very common practice

because this particular configuration follows a GPO best-practice recommendation,

included in a later section in this chapter, of creating separate GPOs for a particular set of

functions. As GPOs are processed one at a time, the GPO links are processed in a particular

order starting with GPOs inherited from parent containers followed by the order of poli-

cies that were linked to that container. The resulting impact of this processing order is

Elements of Group Policy

599

that when multiple GPOs contain the same configured setting, the last GPO applied

provides the resulting setting value. As an example of this, if two GPOs are linked at the

domain level, named GPO1 and GPO2, and GPO1 has a configured setting of “Remove

Task Manager” set to disabled and GPO2 has the same setting set to enabled, the end

result is enabled for that setting. To fully understand what the end resulting policy will be

in a container that has multiple GPOs linked and inherited, the Resultant Set of Policy

tool should be run in Planning mode from the Active Directory Users and Computers

console or Group Policy Modeling can be run from the GPMC console. Resultant Set of

Policies will provide a console showing the final applied policy settings. Group Policy

Modeling will go further and provide a report detailing which policies were applied, in

which order the policies were applied, and the resulting policy settings. The steps required

to run Group Policy Modeling are detailed in Chapter 27. One easy way to understand

this is to know that when looking at a particular Active Directory container in GPMC, the

group policy link order and the group policy precedence order are processed from the

highest number down. This means that the group policy that has a link order of 1 will

always be processed last by objects within that container.

GPO Filtering

Applying GPOs can be tricky and the design of the Active Directory forest, domains, sites,

and OU hierarchy play a major part in this. One of the most important considerations

ptg

when designing the Active Directory OU hierarchy within a domain is to understand how

the domain administrators plan to manage the domain computers and users with group

policies. Designing the Active Directory infrastructure is discussed in detail in Chapters 5

and 6, “Designing a Windows Server 2008 R2 Active Directory” and “Designing

Organizational Unit and Group Structure,” respectively.

In many cases, even with the most careful planning of the Active Directory infrastructure,

GPOs will be applied to computers and/or users that do not necessarily need the settings

contained within that GPO. To better target which computer and user objects a particular

GPO applies to, Microsoft has built in a few different mechanisms to help filter out or

include only the necessary objects to ensure that only the desired computers or users actu-

ally apply the policy. The mechanisms that control or filter how a policy will be applied

are as follows:

. GPO security filtering

19

. GPO WMI filtering

. GPO status for the Computer Configuration or User Configuration nodes

GPO Security Filtering

GPO security filtering is the “group” in Group Policy. Many administrators can get frus-

trated when having to explain the fact that Group Policy applies to computers and users

but not to groups. In fact, the GPO security filtering is where administrators can define

which users, computers, or members of security groups will actually apply the group policy.

By default, GPOs apply to the Authenticated Users security group, which includes all users

and computers in the domain. The scope of GPO application is then segmented based on

600

CHAPTER 19

Windows Server 2008 R2 Group Policies and Policy Management

the location of the Group Policy links. It can be segmented even further by removing the

Authenticated Users group from the GPO security filtering, as shown in Figure 19.8, and

replacing it with a custom security group.

ptg

FIGURE 19.8

Examining GPO security filtering.

When the security filtering of a GPO is configured to apply to a custom security group,

only the members of that group, whether users, other groups, or computer objects, will

actually apply that particular policy. Last but not least, it is most important to always keep

the group membership current; otherwise, the application of Group Policy might be

incomplete or incorrect.

GPO WMI Filtering

GPO WMI filtering is a Group Policy concept introduced in Windows XP and Windows

Server 2003. A WMI filter is a query that is processed by computer objects only and can be

used to include or exclude particular computer objects from applying a GPO that includes

the WMI filter. An example of a WMI filter could be a query that includes only computer

objects with an operating system version of “6.1*,” which includes all Windows 7 and

Windows Server 2008 R2 systems. Of course, it is important to state that WMI filters will

not be processed by legacy Windows 2000 or older systems. The security filtering must

also meet the criteria for the GPO to be processed. WMI filters work great when the Active

Elements of Group Policy

601

Directory hierarchy is relatively flat, but maintaining computer group membership can be

tedious. How to create WMI filters, including a few examples, is included in Chapter 27.

GPO Status

As mentioned previously in this chapter, GPOs are applied to computer and user objects.

Within a particular GPO, the settings available are segmented into two distinct nodes,

including the Computer Configuration node and the User Configuration node.

Configuring or changing the GPO status, shown in Figure 19.9, enables administrators to

change the GPO as follows:

. Enabled (Default)

. User Configuration Settings Disabled

. Computer Configuration Settings Disabled

. All Settings Disabled

This function of a GPO can be a very effective tool in troubleshooting GPOs as well as

optimizing GPO processing. As an example, if a GPO only contains configured settings in

the Computer Configuration node, if any user objects are located in containers linked to

that particular GPO, the GPO will still be processed by the user to check for any config-

ured settings. This simple check can add a few seconds to the entire GPO processing time

ptg

for that user, and if many GPOs are processed, it could increase the logon, logoff, or

refresh interval by minutes or more. As a troubleshooting tool, if a user or computer is

19

FIGURE 19.9

Examining GPO status.

602

CHAPTER 19

Windows Server 2008 R2 Group Policies and Policy Management

not receiving the desired end result of a set of applied policies, disabling a node or the

entire policy can aid an administrator in identifying the suspect GPO causing the unde-

sired result.

Group Policy Loopback Processing

Group Policy loopback processing, shown in Figure 19.10, allows for the processing of

both the Computer Configuration and User Configuration nodes within a policy even if

the user object is not in the same container as the computer that the group policy is

linked to. As an example, this function would be useful with a Remote Desktop Session

Host deployment where you want to apply computer configuration policies to configure

the Remote Desktop server settings but you also want to control the user settings of any

user who logs on to the server, regardless of where the actual user account is stored in

Other books

The Heresy of Dr Dee by Rickman, Phil
Just Ella by Margaret Peterson Haddix
The Wanted by Lauren Nicolle Taylor
Mixing Temptation by Sara Jane Stone
Somewhere in Sevenoakes by Sorell Oates