Performing Software Installation with Group Policy Lesson 9.

Slides:



Advertisements
Similar presentations
Lesson 17: Configuring Security Policies
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Khan Rashid Lesson 11-The Best Policy: Managing Computers and Users Through Group Policy.
1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
11.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Lesson 16: Creating Group Policy Objects
Lesson 18: Configuring Application Restriction Policies
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Maintaining and Updating Windows Server 2008
Performing Software Installation with Group Policy
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Deploying and Managing Software by Using Group Policy.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Corso referenti S.I.R.A. – Modulo 2 07 – Group Policy 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Introduction to Group Policy
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Section 10: Assigning and Publishing Software Packages Using MSI Packages to Distribute Software Using Group Policy as a Software Deployment Method Deploying.
70-411: Administering Windows Server 2012
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Managing User Desktops with Group Policy
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
Module 6: Configuring User Environments Using Group Policy.
Module 7: Managing the User Environment by Using Group Policy.
Module 7 Configure User and Computer Environments By Using Group Policy.
Performing Software Installation with Group Policy BAI516.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Module 5: Configuring Internet Explorer and Supporting Applications.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Module 6: Deploying and Managing Software by Using Group Policy.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Lesson 3: Migrating and Configuring User Data
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Deploying Software with Group Policy Chapter Twelve.
NetTech Solutions Security and Security Permissions Lesson Nine.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Windows Server 2003 群組原則設定與管理 林寶森
11 INTRODUCTION TO GROUP POLICY Chapter 7. Chapter 7: INTRODUCTION TO GROUP POLICY2 WHAT CAN YOU DO WITH GROUP POLICY?  Control the user environment.
Module 6: Configuring User Environments Using Group Policies.
Lesson 6: Controlling Access to Local Hardware and Applications
10.1 © 2004 Pearson Education, Inc. Lesson 10: Specifying Group Policy Settings Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Module 9: Using Group Policy to Manage Software. Overview Introduction to Managing Software Deployment Windows Installer Deploying Software Configuring.
Unit 9 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/17/2016 Instructor: Williams Obinkyereh.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
1.1 Microsoft® Windows® 2003 Server Group Policy Management Prof. Abdul Hameed.
Introduction to Group Policy Lesson 7. Group Policy Group Policy is a method of controlling settings across your network. – Group Policy consists of user.
Managing User Desktops with Group Policy
MANAGING SOFTWARE Chapter 9
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Chapter 9 MANAGING SOFTWARE.
Chapter 10: Supporting and Maintaining Desktop Applications
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Introduction to Group Policy
Presentation transcript:

Performing Software Installation with Group Policy Lesson 9

Skills Matrix Technology SkillObjective DomainObjective # Managing Software Through Group Policy Configure software deployment GPOs 4.5

Managing Software through Group Policy Group Policy can be used to install, upgrade, patch, or remove software applications when a computer is started, when a user logs on to the network, or when a user accesses a file associated with a program that is not currently on the user’s computer. Group Policy can be used to fix problems associated with applications. For example, if a user inadvertently deletes a file from an application, Group Policy can be used to launch a repair process that will fix the application. RESILIENT

.MSI File Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into an.msi file. –The Windows Installer Service, responsible for automating the installation and configuration of the designated software. –The Windows Installer Service requires a package file (.msi file) that contains all of the pertinent information about the software.

MSI File The.msi file: –Is a relational database file that is copied to the target computer system with the program files it deploys. –Assists in the self-healing process for damaged applications and clean application removal. –Consists of external source files that may be required for the installation or removal of software. –Includes summary information about the software and the package. –Includes reference point to the path where the installation files are located.

.MST File You may need to modify Windows Installer files to better suit the needs of your corporate network. Modifications to.msi files require transform files, which have an.mst extension.

Patch file (.msp) Windows Installer files with the.msp extension serve as patch files. Patch files are used to apply service packs and hot fixes to installed software. Instead, it contains, at minimum, a database transform procedure that adds patching information to the target installation package database. For this reason,.msp files should be located in the same folder as the original.msi file when you want the patch to be applied as part of the Group Policy software installation. This allows the patch file to be applied to the original package or.msi file.

ZAP File When repackaging an application is not an option and a Windows Installer file is not available, you can use a.zap file to publish an application. A.zap file is a non–Windows Installer package that can be created in a text editor. The disadvantages of creating.zap files are as follows: –They can be published, but not assigned. –Deployments require user intervention, instead of being fully unattended. –Local administrator permissions might be required to perform the installation. –They do not support custom installations or automatic repair. –They do not support the removal of applications that are no longer needed or applications that failed to install properly.

Software Distribution Point Before deploying software using Group Policy, you must create a distribution share/Software distribution point. Users who are affected by the Group Policy assignment should be assigned NTFS Read permission to the folder containing the application and package files.

Assigning and Publishing Software Assigning Software –If you assign the program to a user, it is installed when the user logs on to the computer. –If you assign the program to a computer, it is installed when the computer starts, and it is available to all users who log on to the computer. –When a user first runs the program, the installation is finalized. Publishing Software –You can publish a program distribution to users. –When the user logs on to the computer, the published program is displayed in the Add or Remove Programs dialog box, and it can be installed from there.

Assigning and Publishing Software

Software Restrictions Policies Provide organizations greater control in preventing potentially dangerous applications from running. Software restriction policies are designed to identify software and control its execution. Administrators can control who will be affected by the policies.

Software Restrictions Policies

When considering the use of software restriction policies, you must determine your approach to enforcing restrictions. The three basic strategies for enforcing restrictions are: –Unrestricted. This allows all applications to run except those that are specifically excluded. –Disallowed. This prevents all applications from running except those that are specifically allowed. –Basic User. This prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users. By default, the Software Restriction Policies area has an Unrestricted value in the Default Security Level setting.

Software Restrictions Policies Four types of software restriction rules can be used to govern which programs can or cannot run on your network: –Hash rule –Certificate rule –Path rule –Network zone rule

Software Restrictions Policies Hash –The file is hashed, resulting in a cryptographic fingerprint that remains the same regardless of the file name or location. –You can use this method to prevent a particular version of a program from running, or to prevent a program from running no matter where it is located. Certificate –You can build Certificate rules by providing a code- signing software publisher certificate. –Certificate rules apply no matter where the program file is located or what it is named.

Software Restrictions Policies Path –Apply to all programs that run from the specified local or network path, or from subfolders that are in the path. Internet Zone –Apply software restriction policy rules based on the Microsoft Internet Explorer security zone in which the program is run. –Currently, these rules apply only to Microsoft Windows Installer packages that are run from the zone. Internet Zone rules do not apply to programs that are downloaded by Internet Explorer.

Summary Group Policy can be used to deploy new software on your network and remove or repair software originally deployed by a GPO from your network. This functionality is provided by the Windows Installer service within the Software Installation extension of either the User Configuration\Software Settings or Computer Configuration\Software Settings node.

Summary Three types of package files are used with the Windows Installer service: –.msi files for standard software installation. –.mst files for customized software installation. –.msp files for patching.msi files at the time of deployment. All pertinent files must reside in the same file system directory.

Summary A.zap file can be written to allow non– Windows Installer–compliant applications to be deployed. –A.zap file does not support automatic repair, customized installations, or automatic software removal. –In addition, these files must be published.

Summary A shared folder named a software distribution point must be created to store application installation and package files that are to be deployed using Group Policy. –Users must have the NTFS Read permission to this folder for software installation policies to function.

Summary Software to be deployed using Group Policy can either be Assigned or Published. Assigning software using the User Configuration node of a Group Policy allows the application to be installed when the user accesses the program using the Start menu or an associated file. Assigning software can also be performed using the Computer Configuration node of a Group Policy, which forces the application to be installed during computer startup.

Summary Publishing an application allows the application to be available through Add Or Remove Programs in Control Panel. In addition, published applications can be divided into domain-wide software categories for ease of use.

Summary Software restriction policies were introduced in Windows Server 2003 and allow the software's executable code to be identified and either allowed or disallowed on the network.

Summary The three Default Security Levels within Software Restriction Policies are: –Unrestricted, which means all applications function based on user permissions. –Disallowed, which means all applications are denied execution regardless of the user permissions. –Basic User, which allows only executables to be run that can be run by normal users.

Summary Four rule types can be defined within a Software Restriction Policy. They include, in order of precedence, hash, certificate, network zone, and path rules. The security level set on a specific rule supersedes the Default Security Level of the policy.

Summary Enforcement properties within Software Restriction Policies allow the administrator to control users affected by the policy. Administrators can be excluded from the policy application so that it does not hamper their administrative capabilities.

Summary Certificate rules require enabling the System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies located in Computer Configuration\Windows Settings\Security Settings\Local Policies\ Security Options.

Summary Path rules can point to either a file system directory location or a registry path location. The registry path location is the more secure option of the two choices because the registry key location changes automatically if the software is reinstalled. In contrast, if a file system directory is blocked for executables, the program can still run from an alternate location if it is moved or copied there, allowing the possibility of a security breach.