Presentation is loading. Please wait.

Presentation is loading. Please wait.

CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY

Similar presentations


Presentation on theme: "CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY"— Presentation transcript:

1 CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
Chapter 8 CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY

2 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
SECURITY POLICIES

3 USER CONFIGURATION NODE SECURITY SETTINGS
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY USER CONFIGURATION NODE SECURITY SETTINGS

4 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
ACCOUNT POLICIES

5 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
PASSWORD POLICY

6 ACCOUNT LOCKOUT POLICY
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY ACCOUNT LOCKOUT POLICY

7 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
KERBEROS POLICY

8 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
LOCAL POLICIES

9 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
AUDIT POLICY

10 DEFAULT DOMAIN CONTROLLER AUDIT POLICY
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY DEFAULT DOMAIN CONTROLLER AUDIT POLICY

11 THE CRASHONAUDITFAIL SETTING
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY THE CRASHONAUDITFAIL SETTING

12 AUDITING BEST PRACTICES AND TIPS
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY AUDITING BEST PRACTICES AND TIPS Audit only pertinent items. Archive security logs to provide a documented history. Understand the following categories: System events Policy change Account management Logon event versus account logon event Configure the size of your security logs carefully.

13 USER RIGHTS ASSIGNMENT
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY USER RIGHTS ASSIGNMENT

14 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
SECURITY OPTIONS

15 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
EVENT LOG POLICY

16 RESTRICTED GROUPS POLICY
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY RESTRICTED GROUPS POLICY

17 SYSTEM SERVICES POLICY
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SYSTEM SERVICES POLICY

18 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
REGISTRY POLICY

19 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
FILE SYSTEM POLICY

20 WIRELESS NETWORK (IEEE 802.11) POLICIES
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY WIRELESS NETWORK (IEEE ) POLICIES

21 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
PUBLIC KEY POLICIES

22 SOFTWARE RESTRICTION POLICIES
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY SOFTWARE RESTRICTION POLICIES

23 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
FOLDER REDIRECTION Allows you to redirect user folders to a central location Benefits: Centralized backup of user files Centralized access of user files when users change computers Works with roaming profiles

24 FOLDER REDIRECTION (continued)
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY FOLDER REDIRECTION (continued)

25 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
OFFLINE FILES

26 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
DISK QUOTAS

27 REFRESH INTERVALS FOR COMPUTERS
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY REFRESH INTERVALS FOR COMPUTERS

28 REFRESH INTERVALS FOR USERS
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY REFRESH INTERVALS FOR USERS

29 MANUALLY REFRESHING GROUP POLICY
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY MANUALLY REFRESHING GROUP POLICY

30 OPTIMIZING GROUP POLICY PROCESSING
Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY OPTIMIZING GROUP POLICY PROCESSING

31 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
SUMMARY Most security settings are in the Computer Configuration node of a GPO. Domain-wide policies should be made in the Default Domain Controllers GPO. Specifically, account policies such as Password, Account Lockout, and Kerberos belong here. Local policies are processed first and overwritten by all other policies in the hierarchy. Auditing can be done at any level, but should be configured carefully. Default Domain Controllers Policy has some default auditing configured. Results are posted to the security log in the Event Viewer.

32 Chapter 8: CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY
SUMMARY (continued) GPOs are refreshed every 90 minutes with a 30-minute offset, except on domain controllers, which refresh GPOs every five minutes. Disable the unneeded Group Policy portion, either User Settings or Computer Settings.


Download ppt "CONFIGURING THE USER AND COMPUTER ENVIRONMENT USING GROUP POLICY"

Similar presentations


Ads by Google