Company Confidential 1 A Course on Planning A Group Policy Management And Implementation Strategy Prepared for: *Stars* New Horizons Certified Professional Course
FILTERING GROUP POLICY’S SCOPE By default, settings flow from site to domain to OU. Three ways to control Group Policy settings inheritance –Block Policy Inheritance: –Security filtering –WMI filters
SECURITY FILTERING
WMI FILTERS Windows Management Instrumentation (WMI) Used for queries and filters concerning –Hardware –Software –Operating system type Can be linked to multiple GPOs
WMI FILTER EXAMPLES Table 10-1 WMI Filter Examples T T a a r r g g e e t t C C o o m m p p u u t t e e r r S S a a m m p p l l e e W W M M I I All computers that are running Windows XP Professional Select * from Win32_OperatingSystem where Caption = "Microsoft Windows XP Professional" All computers that have more than 10 MB of availabledrive space on a C: NTFS partition Select * from Win32_LogicalDisk WHEREName= "C:" ANDDriveType = 3 ANDFreeSpace > AND FileSystem = "NTFS" All computers with a modem installed Select * from Win32_POTSModem Where Name = "MyModem" F F i i l l t t e e r r S S t t r r i i n n g g
CREATING WMI FILTERS
GROUP POLICY MANAGEMENT CONSOLE (GPMC) Free add-on tool that can be used to manage Group Policy. Installs on: –Windows XP with Service Pack 1 –Any edition of Windows Server 2003 Can be used for: –Importing and copying GPO settings –Backing up and restoring of GPOs –Executing the Resultant Set of Policy (RSoP) snap-in –Generating HTML reports
INSTALLING GPMC GPMC is not on the Windows Server 2003 CD-ROM. Can be downloaded for free from the Microsoft Web site. In this course, gpmc.msi is on your supplemental CD-ROM. –Double-click the gpmc.msi file and run through the wizard. –Distribute through Group Policy.
GPMC CHANGES ACTIVE DIRECTORY USERS AND COMPUTERS
CREATING WMI FILTERS IN GPMC
LINKING WMI FILTERS
NAVIGATING WITH GROUP POLICY MANAGEMENT
INFORMATION DISPLAYED IN THE GPMC INTERFACE
DETERMINING & TROUBLESHOOTING EFFECTIVE POLICY SETTINGS Resultant Set Of Policy (RSoP) Wizard Group Policy Results Group Policy Modeling Gpresult.exe command line tool
RSOP LOGGING MODE
RSOP PLANNING MODE
GROUP POLICY MODELING IN GPMC
GROUP POLICY RESULTS
Gpresult.exe
DELEGATING GROUP POLICY ADMINISTRATIVE CONTROL Creation of GPOs Permissions on GPOs Linking of GPOs Use of Group Policy Modeling and Group Policy Results Creation of WMI filters WMI permissions
DELEGATING GPO CREATION
DELEGATING PERMISSIONS TO AN INDIVIDUAL GPO GPMC Individual GPO Permissions A A l l l l o o w w e e d d P P e e r r m m i i s s s s i i o o n n s s C C a a t t e e g g o o r r y y U U n n d d e e r r l l y y i i n n g g P P e e r r m m i i s s s s i i o o n n s s a a n n d d E E f f f f e e c c t t s s ReadAllows Read Access on the GPO. Edit settingsIncludes Read, Write, Create Child Objects, and Delete Child Objects. Edit, delete, and modify security Includes Read, Write, Create Child Objects, Delete Child Objects, Delete, Modify Permissions, and Modify Owner. Implies Full Control without the Apply Group Policy permission being set. Read (from Security Filtering) An automatic setting that appears when a user has Read and Apply Group Policy permissions to the GPO. CustomThese permissions include those set individually using the ACL editor for the GPO. The ACL editor is invoked by using the Advanced button and shows the Security tab contents for the GPO.
DELEGATING LINKING, MODELING, AND RESULTS
DELEGATING WMI FILTERING
PLANNING GROUP POLICY INTEGRATION Create policies at the highest level possible. Limit the number of GPOs created. Create specialized GPOs for policies. Disable unnecessary portions (user or computer). Only apply GPOs to sites when settings are required on a site basis.
RECOMMENDATIONS ON GROUP POLICY INHERITANCE Limit use of the following: –No Override –Block Policy Inheritance –Security filtering
PLANNING ADMINISTRATION AND IMPLEMENTATION OF GPOS Determine which administrators will have policy delegation roles Test policy settings Document the plan
RESTORING DEFAULT SECURITY SETTINGS
CHAPTER SUMMARY Name two methods you can use to filter GPOs. How many WMI filters can be applied to each GPO? What can you do with GPMC? What two modes are available in RSoP? List ways in which you can delegate Group Policy control.