Copyright Anthony K. Holden, 2003. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,

Slides:



Advertisements
Similar presentations
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
Advertisements

© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
Copyright Sylvia Maxwell and Michael White, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Lesson 17: Configuring Security Policies
February 2006 copyright Michael Welch, Blinn College This work is the intellectual property of the author. Permission is granted for this material to be.
Delivering Windows OS Updates at Yale with SUS EDUCAUSE Security Professionals Workshop May 17, 2004 Washington DC Ken Hoover, Systems Programmer
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
15.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
11.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Lesson 16: Creating Group Policy Objects
Copyright Copyright Alayna Wadleigh and Blaine Hensley This work is the intellectual property of the author. Permission is granted for this material.
1 EDUCAUSE 2002 IT Support Community Training Model University of Colorado at Boulder.
Multimedia Modules Teaching and Learning Multimedia Applications with Written Scripts John Bowers, Director of Computing Services Pam Gades, Instructional.
Intellectual Property Protocol and Assessment for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Classroom Technologies Re-organization Copyright Kathy Bohnstedt, This work is the intellectual property of the author. Permission is granted for.
Sharing MU's SharePoint Experience 2005 Midwest Regional Conference Innovative Use of Technology: Getting IT Done Wednesday, March 23, 2005.
Group Policy in Microsoft Windows Active Directory.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Catalyst Portfolio Tool Copyright Tom Lewis, This work is the intellectual property.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Introduction to Group Policy
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Overview Introduction to Managing User Environments Introduction to Administrative Templates Using Administrative Templates in Group Policy Assigning Scripts.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
Module 6: Configuring User Environments Using Group Policy.
Module 7: Managing the User Environment by Using Group Policy.
Active Directory Harikrishnan V G 18 March Presentation titlePage 2 Agenda ► Introduction – Active Directory ► Directory Service ► Benefits of Active.
Planning a Group Policy Management and Implementation Strategy Lesson 10.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Copyright © 2003, The University of Texas at Austin. This work is the intellectual property of the author. Permission is granted for this material to be.
Chapter 8 Configuring and Managing Shared Folder Security.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Learning & Teaching = Activities Copyright Steve Ehrmann & Nikki Reynolds, This work is the intellectual property of the author. Permission is granted.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
1 Group Policies (Week 11, Monday 3/19/2007) © Abdou Illia, Spring 2007.
Administering Group Policy Chapter Eleven. Exam Objectives in this Chapter  Plan a Group Policy strategy using Resultant Set of Policy Planning mode.
Deploying Software with Group Policy Chapter Twelve.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Portals and Web Standards Lessons Learned and Applied David Cook Copyright The University of Texas at Austin This work is the.
Managing Applications, Services, Folders, and Libraries Lesson 4.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Module 6: Configuring User Environments Using Group Policies.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
© 2009 Pittsburgh Supercomputing Center Server Virtualization and Security Kevin Sullivan Copyright Kevin Sullivan, Pittsburgh Supercomputing.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Introduction to Group Policy Lesson 7. Group Policy Group Policy is a method of controlling settings across your network. – Group Policy consists of user.
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
Introduction to Group Policy
Presentation transcript:

Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and that notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Streamlining Support and Management Through the Implementation of Active Directory Presented by Lehigh University and Caldwell College

We are a small, private institution with a corresponding small budget There are approximately 2100 students We have an almost completely Microsoft Windows based environment Windows 2000 Advanced Servers running Active Directory services are the center of it all More than 95% of workstations are running Windows 2000 Professional About Caldwell College

Deploying software and patches to our workstations over the network Managing workstation security for the entire campus from one central location An overall reduction of the time and effort necessary to keep software up to date, and to maintain a high percentage of fully functional workstations, allows our staff to pursue other tasks and be proactive in supporting the campus What use is Active Directory?

Done with software included with the Windows 2000 Server Resource Kit and group policies The original installation of a program is “pushed” to a computer via Active Directory group policies Sysprep and Ghost are combined to create an image of that computer Updates can be deployed similarly in minutes instead of hours spent walking to each machine Programs are “self healing”.MSI installation files come with many programs and can be created for many more programs that do not come with one Software Deployment

A Strategy for Security Set up Organizational Units (OUs) for the staff, faculty, and the computer labsOUs Set a restrictive set of security policies for all computers joined to the Caldwell domain Exempt those computers which require a more open environment (e.g., an employee’s office computer) with a Loopback policy Loopback is assigned by computer A Loopback policy dictates that an alternate set of policies are appplied when a user logs on to that computer

Issue: Users saving files to the hard drive Resolution:Hide C:\ drive from users Redirect the Desktop and My Documents to read-only folders on a network share Issue:Users installing programs Resolution:Disable the Windows Installer, any Registry editing tools, the Command prompt, and the Run command on Start Menu Allow only specified programs to run Workstation Security Highlights

In two and half years, there have been only four system crashes among our 150+ student lab computers There has been a dramatic decrease in the volume of support requests for our general use computers (see chart)see chart More than 80% of all software on campus is installed via Active Directory group policies Our staff has been able to divert it’s time and resources to other areas such as internal web application development and the expansion of our student employee program, now three times its size in 1999 So How Well Has it Worked?

OU Diagram 2001 OU Diagram 2001

OU Diagram 2002 OU Diagram 2002