CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY

Slides:



Advertisements
Similar presentations
Chapter Five Users, Groups, Profiles, and Policies.
Advertisements

MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
Lesson 17: Configuring Security Policies
Managing User Settings with Group Policy
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 6: Configure and Troubleshoot Local User and Group Accounts.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
© N. Ganesan, Ph.D., All rights reserved. Active Directory Nanda Ganesan, Ph.D.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Module 8: Implementing Administrative Templates and Audit Policy.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Module 2: Managing User and Computer Accounts
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
1 Chapter Overview Understanding Group Policies Implementing Group Policies Using Security Policies Troubleshooting Group Policy Problems.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Week #7 Objectives: Secure Windows 7 Desktop
Chapter Six Windows XP Security and Access Controls.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
Section 7: Implementing Security Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Hardening.
Troubleshooting Windows Vista Security Chapter 4.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 UNDERSTANDING USER ACCOUNTS  Local user accounts  stored in the Security.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Overview Introduction to Managing User Environments Introduction to Administrative Templates Using Administrative Templates in Group Policy Assigning Scripts.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Understanding Group Policy James Michael Stewart CISSP, TICSA, CIW SA, CCNA, MCSE NT & W2K, iNet+
Module 6: Configuring User Environments Using Group Policy.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Administering Group Policy Chapter Eleven. Exam Objectives in this Chapter  Plan a Group Policy strategy using Resultant Set of Policy Planning mode.
Module 7: Implementing Security Using Group Policy.
NetTech Solutions Security and Security Permissions Lesson Nine.
Creating and Managing Digital Certificates Chapter Eleven.
Administering Microsoft Windows Server 2003 Chapter 2.
Module 10: Implementing Administrative Templates and Audit Policy.
11 INTRODUCTION TO GROUP POLICY Chapter 7. Chapter 7: INTRODUCTION TO GROUP POLICY2 WHAT CAN YOU DO WITH GROUP POLICY?  Control the user environment.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
Configuring the User and Computer Environment Using Group Policy Lesson 8.
11 CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY Chapter 8.
Lesson 14: Configuring File and Folder Access MOAC : Configuring Windows 8.1.
Managing User Desktops with Group Policy
MANAGING SOFTWARE Chapter 9
Module Overview Installing and Configuring a Network Policy Server
SECURING NETWORK TRAFFIC WITH IPSEC
ACTIVE DIRECTORY ADMINISTRATION
Module 8: Securing Network Traffic by Using IPSec and Certificates
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Lesson 16-Windows NT Security Issues
Module 8: Securing Network Traffic by Using IPSec and Certificates
Chapter 9: Managing Groups, Folders, Files, and Object Security
Presentation transcript:

CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY Chapter 8 CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY Briefly describe the topics covered in the chapter. Refer to the objective list at the beginning of Chapter 8, “Configuring the User and Computer Environment Using Group Policy.”

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SECURITY POLICIES This information is discussed in Table 8-1, “Computer Configuration Node Security Settings,” of the textbook.

USER CONFIGURATION NODE SECURITY SETTINGS Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY USER CONFIGURATION NODE SECURITY SETTINGS This information is discussed in Table 8-2 of the textbook.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY ACCOUNT POLICIES Emphasize that these policies only apply when they are linked to the domain container. The following slides elaborate on each policy.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY PASSWORD POLICY Describe each setting in Password Policy. Students will configure and test Password Policy in the lab.

ACCOUNT LOCKOUT POLICY Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY ACCOUNT LOCKOUT POLICY Describe each setting in Account Lockout Policy. Students will configure and test Account Lockout Policy in the lab. Explain what happens if the Account Lockout Duration setting is set to zero. In such a case, only the administrator can unlock a locked account.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY KERBEROS POLICY Describe each setting in the Kerberos Policy. Mention that although the Account Lockout Policy and Password Policy are often adjusted, the Kerberos Policy is rarely adjusted. The Kerberos Policy node is available only in an Active Directory domain; it is not present in the Local Security Policy, as shown in upcoming slides. Point out that this is the policy that mandates system times within an Active Directory domain and may not skew more than five minutes. This setting exists to prevent replay attacks. A replay attack involves capturing an authentication request using a protocol analyzer or other network packet-capturing software and then using that request to gain authentication to a resource by resending that request on the network at a later time.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY LOCAL POLICIES Briefly summarize that Local Policies are available on each Windows NT, Windows 2000, Windows XP, and Windows Server 2003 computer, regardless of domain membership.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY AUDIT POLICY Discuss each audit setting. If you want to know more about any Audit policy, click on the policy’s name and press F1. The context-sensitive help feature in Windows Server 2003 opens a description of each policy. This description includes policy functions, proper usage, and event types generated. A summary of these settings is included on the Instructor CD-ROM under the Textbook\Chapter 8 folders in a document named AuditSettings.doc. For more information on any of these settings, check “Auditing Policy: Security Setting Descriptions” in the Windows Server 2003 product documentation.

DEFAULT DOMAIN CONTROLLER AUDIT POLICY Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY DEFAULT DOMAIN CONTROLLER AUDIT POLICY Emphasize that there is default auditing enabled and a specifically disabled No Auditing setting for the domain controllers of each domain. In Windows 2000, all of these settings were specifically set to No Auditing, so this is a change for Windows Server 2003. If the students are sitting in front of their computers, have them look at the Event Viewer Security Log of their domain controllers, or open the Event Viewer Security Log on the instructor computer and show them the security events that are in there.

THE CRASHONAUDITFAIL SETTING Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY THE CRASHONAUDITFAIL SETTING This animated slide illustrates the settings that must be configured to ensure you lose no security events. You must configure the Security Options – Audit: Shut Down System Immediately If Unable To Log Security Audits setting. You must also configure your Event Viewer – Security Log – Security Properties for Do Not Overwrite Events (Clear Log Manually). If your log allows overwriting, an intruder could potentially generate many bogus security events in order to cover up a security event that the intruder does not want you to discover. However, you must archive the security log regularly and review the events, otherwise there is no point in logging them. If the number of Security events exceeds the size of the log file, the system shuts down and a stop error message, STOP: CC0000244 {Audit Failed} An Attempt To Generate A Security Audit Failed, is displayed. If this happens, a user account that is a member of the Administrators group must log on and reset the CrashOnAuditFail key. Until that happens, no other users can log on to the system. A setting of 2 means that the security log is full. A setting of 1 means that the security log is not full, and the CrashOnAuditFail setting (a.k.a. Audit: Shut Down System Immediately If Unable To Log Security Audits Policy) is active. A setting of 0 means that the policy/setting is not active. You should consider that using this policy does allow an intruder to potentially launch a successful Denial-of-service (DoS) attack because the intruder can remotely shut down the system just by generating enough security events to fill the security log.

AUDITING BEST PRACTICES AND TIPS Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY AUDITING BEST PRACTICES AND TIPS Audit only pertinent items. Archive security logs to provide a documented history. Understand the following categories: System events Policy change Account management Logon event versus account logon event Configure the size of your security logs carefully. This slide relates to the information presented in the “Planning an Audit Policy” textbook section. For more information on this topic, use the Windows Server 2003 Help And Support option and search for Auditing Policy. Locate and read the section titled “Best Practices: Auditing Security Events.” Students will implement object access auditing in the lab. Consider showing them how to implement one or two other auditing features at this time.

USER RIGHTS ASSIGNMENT Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY USER RIGHTS ASSIGNMENT Students adjusted the User Rights assignment in Exercise 4-1. You can remind them of this here and discuss other user rights that might be of interest, such as Shut Down The Computer. Perhaps some students noticed during the lab that when they log on using normal domain user accounts, they do not have the option to Shut Down. If you want to know more about a User Rights Assignment policy, click on the policy’s name and press F1. The context-sensitive help feature in Windows Server 2003 opens a description of each User Rights Assignment policy.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SECURITY OPTIONS If you want to know more about a Security Options policy, click on the policy’s name and press F1. The context-sensitive help feature in Windows Server 2003 opens a description of each Security Options policy.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY EVENT LOG POLICY This is an animated slide covering Event Viewer and log settings. It also illustrates where to find the Group Policy settings for the Event Viewer that can be distributed through an Active Directory GPO.

RESTRICTED GROUPS POLICY Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY RESTRICTED GROUPS POLICY Explain how Restricted Groups work. Typically, they are used to control group memberships to special groups like Administrators on client computers and member servers on the domain. The animated slide illustrates how to configure a Restricted Groups setting. The final step of configuring the Local Admins group as Member Of is typically not needed for most networks. In most cases, the local Administrators group has no additional group memberships. This setting is only illustrated for demonstration purposes; it is acceptable to not configure the Member Of setting and still control group membership.

SYSTEM SERVICES POLICY Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SYSTEM SERVICES POLICY (Animated slide.) You can manage services centrally for the domain member computers on your network through Group Policy. A good security and performance optimization tip is to set services that are not needed to Manual. You can do this through a GPO by using the System Services node.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY REGISTRY POLICY You can configure registry keys that can be propagated to domain member computers.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY FILE SYSTEM POLICY You can configure files to be distributed to domain member computers.

WIRELESS NETWORK (IEEE 802.11) POLICIES Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY WIRELESS NETWORK (IEEE 802.11) POLICIES (Animated slide.) Wireless configuration and security is an important issue for many organizations. This policy helps to control many settings that relate to basic wireless configuration and security. Show students the possible config-urations. To learn more about configuring wireless GPO settings, click on the Wireless Network (IEEE 802.11) Policies node and then press F1. Navigate to the Wireless Networking Help document.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY PUBLIC KEY POLICIES Briefly describe what each node subordinate to Public Key Policies does. In the textbook, there is a thorough description of how to distribute smart cards using autoenrollment. This is a good example of how to implement autoenrollment for a specific purpose. Emphasize that autoenrollment can be used to distribute certificates that allow users to digitally encrypt and sign e- mail messages and attach to secured Internet servers without logging on, as well as to smart cards. In order for autoenrollment to work, both the Renew and Update check boxes must be selected. Furthermore, the following items must be in place: Enterprise certificate authority (CA) Appropriate certificate template that is published in the directory and configured for the specific purpose intended, such as smart card logon, digital signature, and so on Users whom you want to be able to autoenroll must have the Read, Apply, and Autoenroll permissions enabled

SOFTWARE RESTRICTION POLICIES Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SOFTWARE RESTRICTION POLICIES Briefly explain what these policies can do and then explain that it is covered in detail in the next chapter. Mention that these policies are not a replacement for virus protection software.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY FOLDER REDIRECTION Allows you to redirect user folders to a central location Benefits: Centralized backup of user files Centralized access of user files when users change computers Works with roaming profiles

FOLDER REDIRECTION (continued) Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY FOLDER REDIRECTION (continued) This animated slide demonstrates configuration options for redirecting Application Data. However, the options are exactly the same for all four (Application Data, Desktop, My Documents, and Start Menu) redirection options. On the last image in this animation, mention that if you do not select the option to redirect the folder back to the local user profile when the policy is removed, and you remove the policy, you must create another policy to redirect the folders back to the user’s local profile in case you need to move the user’s folders in the future.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY OFFLINE FILES This animated slide that first shows all the settings for offline files from Windows XP and Windows Server 2003 computers and then shows the Offline File settings in Group Policy.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY DISK QUOTAS This animated slide that illustrates how to set up disk quotas on a single machine and then how to enable disk quotas in a GPO object. Default entry means that administrators are not subject to disk quotas. You must have NTFS volumes to implement disk quotas.

REFRESH INTERVALS FOR COMPUTERS Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY REFRESH INTERVALS FOR COMPUTERS Explain the Group Policy refresh interval as you show this animated slide. The slide illustrates where to configure Refresh Intervals in the Group Policy Object Editor. The example refresh screens illustrate the default settings for computers—90 minutes with a 30-minute offset, and for domain controllers—5 minutes with no offset. The following slide illustrates the GPO refresh interval for user settings.

REFRESH INTERVALS FOR USERS Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY REFRESH INTERVALS FOR USERS This animated slide illustrates the refresh interval for users. Again, the settings shown are the default settings—90 minutes with a 30-minute offset. Mention that not all Group Policies refresh on this cycle. Software will not deploy to computers until after a restart. Software will not deploy and folders are not redirected for user accounts until a logoff or logon.

MANUALLY REFRESHING GROUP POLICY Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY MANUALLY REFRESHING GROUP POLICY

OPTIMIZING GROUP POLICY PROCESSING Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY OPTIMIZING GROUP POLICY PROCESSING There is no need to make the user logon process or computer logon process apply a policy that has no settings configured. If you are only using half of a GPO, either Computer Settings or User Settings, you can disable the unused half.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SUMMARY Most security settings are in the Computer Configuration node of a GPO. Domain-wide policies should be made in the Default Domain Controllers GPO. Specifically, account policies such as Password, Account Lockout, and Kerberos belong here. Local policies are processed first and overwritten by all other policies in the hierarchy. Auditing can be done at any level, but should be configured carefully. Default Domain Controllers Policy has some default auditing configured. Results are posted to the security log in the Event Viewer.

Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SUMMARY (continued) GPOs are refreshed every 90 minutes with a 30-minute offset, except on domain controllers, which refresh GPOs every five minutes. Disable the unneeded Group Policy portion, either User Settings or Computer Settings.