Windows Server 2008 R2 Unleashed (210 page)

users to store and access their data, can be redirected to server shares. The following are

some basic rule-of-thumb guidelines when using this Group Policy extension:

.
Allow the system to create the folders—
If the folders are created by the adminis-

trator, they will not have the correct permissions. But properly configuring the share

and NTFS permissions on the server share is essential in providing a functional

folder redirection experience.

1072

CHAPTER 27

Group Policy Management for Network Clients

.
Enable client-side caching or offline file synchronization—
This is important

for users with portable computers but is not the desired configuration for folder redi-

rection on Remote Desktop Services systems. Furthermore, when storing data on

end-user workstations, it may violate regulatory and/or security requirements to

allow for cached local copies.

.
Use fully qualified (UNC) paths or DFS paths for server share locations—
For

example, use \\Server1.companyabc.com\UserProfiles or

\\companyabc.com\UserProfiles\ if DFS shares are deployed.

Before folder redirection can be expected to work, share and NTFS permissions must be

configured appropriately. For folder redirection to work properly, configure the NTFS as

follows:

. Configure the share folder to not inherit permissions and remove all existing

permissions.

. Add the file server’s local Administrators group with Full Control of This Folder,

Subfolders, and Files.

. Add the Domain Admins domain security group with Full Control of This Folder,

Subfolders, and Files.

ptg

. Add the System account with Full Control of This Folder, Subfolders, and Files.

. Add the Creator/Owner with Full Control of Subfolders and Files.

. Add the Authenticated Users group with both List Folder/Read Data and Create

Folders/Append Data – This Folder Only rights. The Authenticated Users group can

be replaced with the desired group, but do not choose the Everyone group as a

best practice.

The share permissions of the folder can be configured to grant administrators Full Control

and Authenticated Users Change permissions.

To redirect the Documents folder to a network share for Windows Vista, Windows 7,

Windows Server 2008, and Windows Server 2008 R2 systems, perform the following steps:

1. Log on to a designated Windows Server 2008 R2 administrative server.

2. Click Start, click All Programs, click Administrative Tools, and select Group Policy

Management.

3. Add the necessary domains to the GPMC as required.

4. Expand the Domains node to reveal the Group Policy Objects container.

5. Create a new GPO called UserFolderRedirectGPO and open it for editing.

6. After the UserFolderRedirectGPO is opened for editing in the Group Policy

Management Editor, expand the User Configuration node, expand Policies, expand

Windows Settings, and select the Folder Redirection node to display the user profile

folders that are available for redirection, as shown in Figure 27.19. Keep in mind

Managing Users with Policies

1073

that the folders in this section and detailed in Figure 27.19 represent the folders

available in Windows Vista, Windows 7, Windows Server 2008, and Windows Server

2008 R2 user profiles. If Windows 2000, Windows XP, or Windows Server 2003

profiles require folder redirection, configuring the Documents folder for redirection

is supported work but will require additional testing against each edition and service

pack level of the legacy operating system that the policy applies to.

ptg

27

FIGURE 27.19

Windows Server 2008 R2 and Windows Vista folder redirection.

7. In the Settings pane, right-click the Document folder and select Properties.

8. On the Target tab, click the Setting drop-down list arrow, and select Basic – Redirect

Everyone’s Folder to the Same Location, which reveals additional options. There is

another option to configure folder redirection to different locations based on group

membership, but for this example, select the basic redirection option.

9. In the Target Folder Location section, there are several options to choose from and

each should be reviewed for functionality; for this example, select Create a Folder for

Each User Under the Root Path. This is very important if multiple folders will be

redirected; more details are explained in the following steps.

10. In Root Path field, type in the server and share name, for example

\\companyabc.com\UserFolders, as shown in Figure 27.20. Notice how the end-user

name and Document folder will be created beneath the root share folder. This

requires that the end users have at least Change rights on the share permissions and

they must also have the Create Folder and Create File NTFS permissions on the root

folder that is shared.

1074

CHAPTER 27

Group Policy Management for Network Clients

FIGURE 27.20

Folder redirection with basic redirection to a target root folder.

ptg

11. Select the Settings tab and uncheck the Grant the User Exclusive Rights to

Documents check box. If necessary, check the check box to also apply redirection to

Windows 2000, Windows XP, and Windows Server 2003 operating systems.

12. Click OK to complete the folder redirection configuration. A warning pop-up opens

that states that this policy will not display the Folder Redirection node if an admin-

istrator or user attempts to configure or view this group policy using policy manage-

ment tools from Windows 2000, Windows XP, or Windows Server 2003. Click Yes to

accept this warning and configure the folder redirection.

13. Back in the Group Policy Management Editor window, close the GPO.

14. In the GPMC, link the new UserFolderRedirectGPO policy to an OU with a user

account that can be used to test this policy.

15. Log on to a Windows Vista, Windows 7, or a Windows Server 2008 system with the

test user account. After the profile completes loading, click the Start button, and

locate and right-click the Documents folder. Select the Location tab and verify the

path. For example, for a user named Khalil, the path should be

\\companyabc.com\UserFolders\Khalil\Documents.

If the folder is not redirected properly, the Windows Vista or later system might need to

have a domain policy applied that forces Synchronous Foreground Refresh of group poli-

cies. Also a very common configuration error is the NTFS and share permissions on the

root folder. In most cases, however, a few logons by the particular user will get the settings

applied properly.

Managing Users with Policies

1075

Each of the default folder redirection folders will automatically be configured to synchro-

nized with the server and be available offline. When additional server folders need to be

configured to be available offline, perform the following steps:

1. Locate the shared network folder that should be made available offline.

2. Right-click the folder and select Always Available Offline.

As long as the server share allows offline synchronization and the client workstation also

supports this, as they both do by default, that is all that is necessary.

Removable Storage Access

Windows Server 2008 R2, Windows Vista, and Windows 7 group policies provide several

settings that can be used to control how removable devices and removable storage can be

used. Some of these settings apply to CD and DVD drives and media, but many are

designed to control the read and write permission to removable disks such as external USB

drives and memory sticks. These settings can be configured in a computer group policy

but can also be configured in the User Configuration node to deny write access to remov-

able media, as shown in Figure 27.21. The settings are located in User

Configuration\Policies\Administrative Templates\System\Removable Storage Access.

ptg

27

FIGURE 27.21

Restricting write access to removable storage for users.

Managing Microsoft Management Console Access

Microsoft has standardized the deployment of management and configuration tools to use

Microsoft Management Console (MMC) snap-ins. By default, all users can open a blank

MMC and add snap-ins to the console. The snap-ins loaded on a particular machine are

1076

CHAPTER 27

Group Policy Management for Network Clients

the only ones that can be added. Having access to each snap-in can unnecessarily expose

configuration information to undesired individuals. Also, depending on the function of

the snap-in, functions might be available to standard users that can impact the perfor-

mance of production systems. For example, a user can add the Active Directory Users and

Computers snap-in to an MMC console and can then create queries that run against the

domain controller, causing unnecessary load on the system. To restrict access to the MMC

or specific MMC snap-ins using domain group policies, perform the following steps:

1. Log on to a designated Windows Server 2008 R2 administrative server.

2. Open the Group Policy Management Console from the Administrative Tools menu.

3. Add the necessary domains to the GPMC as required.

4. Expand the Domains node to reveal the Group Policy Objects container.

5. Either create a new GPO or edit an existing GPO.

6. After the GPO is opened for editing in the Group Policy Management Editor,

expand the User Configuration node, expand the Policies node, and select

Administrative Templates.

7. Expand the Administrative Templates node and select Windows Components.

8. Scroll down and select Microsoft Management Console in the tree pane. Expand this

node to reveal the Restricted/Permitted Snap-Ins node and select it.

ptg

9. With the Restricted/Permitted Snap-Ins node selected in the tree pane, a list of well-

known snap-ins is displayed in the Settings pane. Select and open the Active

Directory Users and Computers snap-in. Configure the setting to Disabled to block

the use of this snap-in for the users to whom this policy will apply and click OK.

10. After the snap-in is disabled, close the policy and link it to the desired OU that con-

tains the users who need to be restricted from using the disabled snap-in.

Managing Active Directory with Policies

Many Group Policy settings detailed in the previous sections of this chapter for computer

Other books

Seize the Night by Dean Koontz
Blood Trinity by Carol Lynne
The Alpha's Captive by Loki Renard
Glimmer by Stacey Wallace Benefiel, Valerie Wallace
Paradise General by Dave Hnida
Off to Be the Wizard by Scott Meyer
The St. Paul Conspiracy by Roger Stelljes