Performing Software Installation with Group Policy

Slides:



Advertisements
Similar presentations
Lesson 17: Configuring Security Policies
Advertisements

Configuring Windows Internet Explorer 7 Security Lesson 5.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Khan Rashid Lesson 11-The Best Policy: Managing Computers and Users Through Group Policy.
Managing User Settings with Group Policy
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
11.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Lesson 18: Configuring Application Restriction Policies
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Configuring Active Directory Certificate Services Lesson 13.
Deploying and Managing Software by Using Group Policy.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Corso referenti S.I.R.A. – Modulo 2 07 – Group Policy 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Introduction to Group Policy
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
Using Windows Firewall and Windows Defender
Using Group Policy Lesson 4. Skills Matrix Technology SkillObjective Domain SkillDomain # Creating and Understanding Group Policy Modeling and Group Policy.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Managing User Desktops with Group Policy
Overview Introduction to Managing User Environments Introduction to Administrative Templates Using Administrative Templates in Group Policy Assigning Scripts.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Performing Software Installation with Group Policy Lesson 9.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
Module 6: Configuring User Environments Using Group Policy.
Supporting and Maintaining Desktop Applications Lesson 13.
Module 7: Managing the User Environment by Using Group Policy.
Performing Software Installation with Group Policy BAI516.
Planning a Group Policy Management and Implementation Strategy Lesson 10.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Module 6: Deploying and Managing Software by Using Group Policy.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Security Planning and Administrative Delegation Lesson 6.
Working with Active Directory Sites Lesson 3. Skills Matrix Technology SkillObjective DomainObjective # Introducing Active Directory Sites Configure sites2.3.
1 Group Policies (Week 11, Monday 3/19/2007) © Abdou Illia, Spring 2007.
Working with Disks Lesson 4. Skills Matrix Technology SkillObjective DomainObjective # Configuring Data Protection Configure data protection6.4 Using.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Module 8: Managing Software Distribution. Collections Packages Programs Advertisements Collections Packages Programs Advertisements How Software.
Deploying Software with Group Policy Chapter Twelve.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Optimizing Windows Vista Performance Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Introducing ReadyBoostTroubleshoot performance.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Lesson 6: Controlling Access to Local Hardware and Applications
10.1 © 2004 Pearson Education, Inc. Lesson 10: Specifying Group Policy Settings Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Unit 9 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/17/2016 Instructor: Williams Obinkyereh.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
1.1 Microsoft® Windows® 2003 Server Group Policy Management Prof. Abdul Hameed.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Managing User Desktops with Group Policy
MANAGING SOFTWARE Chapter 9
Chapter 9 MANAGING SOFTWARE.
Chapter 10: Supporting and Maintaining Desktop Applications
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Deploy Software with Group Policy
Planning a Group Policy Management and Implementation Strategy
Presentation transcript:

Performing Software Installation with Group Policy Lesson 9

Skills Matrix Technology Skill Objective Domain Objective # Managing Software Through Group Policy Configure software deployment GPOs 4.5 Skills Matrix

Software Life Cycle Lesson 9 Planning Implementation Maintenance Removal Lesson 9

Configuring Software Installation Defaults Open the Group Policy Management Editor window for an existing GPO. Expand the User Configuration or the Computer Configuration node, followed by Software Settings. Right-click the appropriate Software Installation node, and then click Properties. Lesson 9 4

Configuring Software Installation Defaults (cont.) In the General tab of the Software Installation Properties dialog box, key the Uniform Naming Convention (UNC) path (\\servername\ sharename) to the software distribution point for the Windows Installer packages (.msi files) in the GPO in the Default Package Location box. In the New Packages section on the General tab, select one of the options listed. Lesson 9 5

Configuring Software Installation Defaults (cont.) In the Installation User Interface Options section, select one of the options listed. Click the Advanced tab, and select any of the listed options to apply the options to all packages in the GPO. Lesson 9 6

Configuring Software Installation Defaults (cont.) In the Application Precedence list box, move the application with the highest precedence to the top of the list using the Up or Down buttons. Click the Categories tab, and then click Add. Lesson 9 7

Configuring Software Installation Defaults (cont.) Key the name of the application category to be used for the domain in the Category box, and click OK. Click OK to save your changes. Lesson 9 8

Creating a New Software Installation Package Open the Group Policy Management Editor for the GPO you wish to configure. In the Computer Configuration or User Configuration node, drill down to Software Settings. Right-click the Software Installation node, select New, and then click Package. Lesson 9 9

Creating a New Software Installation Package (cont.) In the File Name list, key the UNC path to the software distribution point for the Windows Installer packages (.msi files), and then click Open. Lesson 9 10

Creating a New Software Installation Package (cont.) Select one of the options listed. If you selected Published or Assigned, the Windows Installer package has been successfully added to the GPO and appears in the Details pane. Lesson 9 11

Creating a New Software Installation Package (cont.) If you selected Advanced, the Properties dialog box for the Windows Installer package opens to permit you to set properties for the Windows Installer package, including deployment options and modifications. Make the necessary modification, and click OK. Lesson 9 12

Configuring Software Restriction Policies Unrestricted Disallowed Basic User Lesson 9 13

Modifying the Default Security Level In the Group Policy Management Editor window for the desired policy, expand the Software Restriction Policies node from either the Computer Configuration\Windows Settings\ Security Settings or User Configuration\Windows Settings\Security Settings node. If a software restriction policy is not already defined, right-click Software Restriction Policies, and select New Software Restriction Policies. Lesson 9 14

Modifying the Default Security Level (cont.) In the details pane, double-click Security Levels. Right-click the security level that you want to set as the default, and then click Set As Default. Lesson 9 15

Configuring Software Restriction Rules Hash rule Certificate rule Path rule Network zone rule Lesson 9 16

You Learned Group Policy can be used to deploy new software on your network and remove or repair software originally deployed by a GPO from your network. This functionality is provided by the Windows Installer service within the Software Installation extension of either the User Configuration\Software Settings or Computer Configuration\Software Settings node. Lesson 9

You Learned (cont.) Lesson 9 Three types of package files are used with the Windows Installer service: .msi files for standard software installation, .mst files for customized software installation, and .msp files for patching .msi files at the time of deployment. All pertinent files must reside in the same file system directory. Lesson 9

You Learned (cont.) Lesson 9 A .zap file can be written to allow non– Windows Installer–compliant applications to be deployed. A .zap file does not support automatic repair, customized installations, or automatic software removal. In addition, these files must be published. Lesson 9

You Learned (cont.) Lesson 9 A shared folder named a software distribution point must be created to store application installation and package files that are to be deployed using Group Policy. Users must have the NTFS Read permission to this folder for software installation policies to function. Lesson 9 20

You Learned (cont.) Lesson 9 Software to be deployed using Group Policy can either be Assigned or Published. Assigning software using the User Configuration node of a Group Policy allows the application to be installed when the user accesses the program using the Start menu or an associated file. Assigning software can also be performed using the Computer Configuration node of a Group Policy, which forces the application to be installed during computer startup. Lesson 9 21

You Learned (cont.) Lesson 9 Publishing an application allows the application to be available through Add Or Remove Programs in Control Panel. In addition, published applications can be divided into domain-wide software categories for ease of use. Lesson 9 22

You Learned (cont.) Lesson 9 Software restriction policies were introduced in Windows Server 2003 and allow the software's executable code to be identified and either allowed or disallowed on the network. Lesson 9 23

You Learned (cont.) Lesson 9 The three Default Security Levels within Software Restriction Policies are Unrestricted, which means all applications function based on user permissions; Disallowed, which means all applications are denied execution regardless of the user permissions; and Basic User, which allows only executables to be run that can be run by normal users. Lesson 9 24

You Learned (cont.) Lesson 9 Four rule types can be defined within a Software Restriction Policy. They include, in order of precedence, hash, certificate, network zone, and path rules. The security level set on a specific rule supersedes the Default Security Level of the policy. Lesson 9 25

You Learned (cont.) Lesson 9 Enforcement properties within Software Restriction Policies allow the administrator to control users affected by the policy. Administrators can be excluded from the policy application so that it does not hamper their administrative capabilities. Lesson 9 26

You Learned (cont.) Lesson 9 Certificate rules require enabling the System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies located in Computer Configuration\Windows Settings\Security Settings\Local Policies\ Security Options. Lesson 9 27

You Learned (cont.) Lesson 9 Path rules can point to either a file system directory location or a registry path location. The registry path location is the more secure option of the two choices because the registry key location changes automatically if the software is reinstalled. In contrast, if a file system directory is blocked for executables, the program can still run from an alternate location if it is moved or copied there, allowing the possibility of a security breach. Lesson 9 28