CST8200 Windows Domain Administration PDF

Summary

This document is a set of lecture notes on Windows Domain Administration. It provides an overview of group policy objects (GPOs), their configuration, and management within a Windows domain environment. The notes cover various aspects of GPOs, including their architecture, processing, and replication.

Full Transcript

CST8200 –Windows Domain Administration Professor: Denis Latremouille Week 7 CST8200 2 Agenda  Describe the architecture and processing of group policies  Configure group policy settings  Configure group policy security settings  Configure and manage administrative templates ...

CST8200 –Windows Domain Administration Professor: Denis Latremouille Week 7 CST8200 2 Agenda  Describe the architecture and processing of group policies  Configure group policy settings  Configure group policy security settings  Configure and manage administrative templates  Work with security templates  Configure Group Policy Preferences 3 Agenda  Configure group policy processing  Configure group policy client processing  Configure Group Policy Results and Group Policy Modeling tools  Manage GPOs 4 Local GPOs  Local GPOs are stored on local computers, and are edited via the Group Policy Object Editor snap-in  Settings in local GPOs that are inherited from domain GPOs can’t be changed on the local computer.  Only settings that are undefined or not configured by domain GPOs can be edited locally  When you run gpedit.msc, you open a local GPO named Local Computer Policy containing Computer Configuration and User Configuration nodes 5 Local GPOs 6 Domain GPOs  Domain GPOs are stored in Active Directory on domain controllers  Consists of two separate parts: a Group Policy Template (GPT) and a Group Policy Container (GPC)  GPT and GPC have the following common traits:  Naming structure  Folder structure  Knowing GPO structure is important for resolving issues 7 Group Policy Templates  A Group Policy Template (GPT) contains all the policy settings that make up a GPO as well as related files, such as scripts, and is contained in the Sysvol share on a domain controller  Upon creation of a GPO, several files and subfolders are created (exact number may vary) but each GPT folder will contain at least three items:  GPT.ini  Machine  User 8 Group Policy Containers  A Group Policy Container (GPC) is stored in the System\Policies folder  Stores GPO properties and status information but no policy settings  Similar to GPT in that it uses a GPO’s GUID for a folder name  Information contained in a GPC: ◼ Name of the GPO ◼ File path to GPT ◼ Version ◼ Status 9 Group Policy Replication  GPCsare replicated with Active Directory  GPTs, located in the SYSVOL share, are replicated by one of the following methods:  File Replication Service (FRS) - used when running in a mixed environment of differing Windows Server operating systems  Distributed File System Replication (DFSR) - used when all DC s are running Windows Server 2008  DFSR is more efficient and reliable  GPC and GPT can become out of sync  To gather information, open Group Policy Management Console and click the domain node in the left pane and the Status tab in the right pane  Click Detect Now 10 Group Policy Settings  Settings in Computer Configuration take precedence over settings in User Configuration, should there be a conflict  Three folders under the Policies folder:  Software Settings  Windows Settings  Administrative Templates 11 Software Installation Policies  Contains the Software Installation extension, which can be configured to install software packages remotely  Applications are deployed with the Windows Installer service, which uses Microsoft Software Installation (MS I) files  An MSI file is a collection of files packaged into a single file with an.msi extension  Contains the instructions Windows Installer needs to install the application correctly 12 Configuring Software Installation for Users  The Software installation extension performs the same function in the User Configuration node  A software package can only be assigned to a computer, but there are two options for deploying software to users:  Published - isn’t installed automatically; a link to install the application is available in Control Panel’s Programs and Features  Assigned - can be installed automatically when the user logs on to a computer in the domain 13 Configuring Group Policy Processing  An administrator should have a solid understanding of how GPOs are processed, how settings are inherited, and the exceptions to normal processing and inheritance  This section discusses the following:  GPO scope and precedence  GPO inheritance  GPO filtering 14 GPO Scope and Precedence  GPO scope - defines which objects are affected by settings in a GPO  GPOs are applied in this order:  Local policies  Site-linked GPOs  Domain-linked GPOs  OU-linked GPOs  Policies that aren’t defined or configured are not applied at all and the last policy applied is the one that takes precedence  A GPO linked to a domain affects all computers and users in the domain, but settings in a GPO linked to an OU override the settings in a GPO linked to the domain if there are conflicts 15 GPO Scope and Precedence  When OUs are nested, the GPO linked to the OU nested the deepest takes precedence over all other GPOs  If two GPOs are applied to an object, and a certain setting is configured on one GPO but not the other, the configured setting is applied 16 Understanding Site-Linked GPOs  GPOs linked to a site object affect all users and computers physically located at the site  Can be used to set up different policies for mobile users  In a singular site and domain environment, it is better to use domain GPOs  Site GPOs can be confusing for users if policy changes are drastic enough between sites  Use with caution and only when there are valid reasons for different sites to have different policies 17 Understanding Domain-Linked GPOs  GPOs at the domain level should contain settings that apply to all objects in the domain  Account policies that affect domain logons can be defined only at the domain level  Active Directory folders, such as Computers and Users, are not OUs and can’t have a GPO linked to them  Best practices suggest setting account policies and a few critical security policies at the domain level 18 Understanding OU-Linked GPOs  Fine-tuning of group policies should be done at the OU level  OU-linked policies are applied last  They take precedence over site and domain policies  Users and computers with similar policy requirements should be located in the same OU  Because OUs can be nested, so can GPOs applied to them  GPOs applied to nested OUs should be used for exceptions to policies set at a higher level 19 Group Policy Inheritance  GPO inheritance is enabled by default  To see which policies affect a domain or OU and where policies are inherited from, select a container in the left pane of GPMC and click the group policy inheritance tab in the right pane  There are several ways to affect GPO inheritance:  Blocking inheritance  GPO enforcement 20 Blocking Inheritance  Blocking inheritance prevents GPOs linked to parent containers from affecting child containers  To block GPO inheritance, in GPMC, right click the child domain or OU and click Block Inheritance  If blocking is enabled, the OU or domain object is displayed with a blue exclamation point  Inheritance blocking should be used sparingly  Frequent blocking implies a possible flawed OU design 21 Blocking Inheritance 22 GPO Enforcement  GPO enforcement forces inheritance of settings on all child objects in the GPO’s scope, even if a GPO with conflicting settings is linked to a container at a deeper level  GPO that’s enforced has the strongest precedence of all GPOs in its scope  If multiple GPOs are enforced, the GPO at the highest level is enforced in a conflict  Example: If a GPO linked to an OU and a GPO linked to a domain are both set to be enforced, the GPO linked to the domain has stronger precedence 23 GPO Enforcement 24 GPO Filtering  GPO filtering - a method to alter the normal scope of a GPO and exclude certain objects from being affected by its settings  Two types of GPO filtering:  Security filtering  Windows Management Instrumentation (WMI) filtering  Security filtering uses permissions to restrict objects from accessing a GPO  Use the Security Filtering dialog box in the GPMC to add or remove security principals from the GPO access list 25 GPO Filtering 26 GPO Filtering  Another way to use security filtering is to edit the GPO’s D A C L directly  In the GPMC, click the GPO in the Group Policy Objects folder, and click the Delegation tab in the right pane to see a complete list of access control entries (ACEs) for the GPO  You can add security principals to the DACL or click the Advanced button to open the Advanced Security Settings dialog box  You can assign Deny permissions as well as Allow permissions 27 WMI Filtering  WMI filtering uses queries to select a group of computers based on certain attributes, and then applies or doesn’t apply policies based on the query’s results  You need to have a solid understanding of the WMI query language before creating WMI filters  Example of using a WMI filter to select only computers running Windows 10 Enterprise:  Select * from Win32_OperatingSystem where Caption = “Microsoft Windows 10 Enterprise” 28 WMI Filtering 29

Use Quizgecko on...
Browser
Browser