The following sections describe in detail how to connect to a wireless network using the Network notification area icon and the Setup a connection or network dialog box in Windows 7, how to manage your wireless networks, and how to connect to non-broadcasting wireless networks.
To connect to an available wireless network, click the Network icon in the notification area of your desktop. The resulting pane contains a list of detected wireless networks and, for domain-joined computers, the name of wireless networks configured through Group Policy.
From this pane you can connect to a listed wireless network by double-clicking it, clicking the network and then clicking Connect, or by right-clicking the network and clicking Connect.
To view information for a listed wireless network, place the mouse pointer over the network name. The information includes the wireless network's name, signal strength, security type, radio type (802.11b/g/n), and Service Set Identifier (SSID). To refresh the list of wireless network, click the up/down arrow icon in the upper right of the pane. To disconnect from a connected wireless network, right-click the network and then click Disconnect.
You can obtain status of a connected network and properties of a connected network or a network that has been configured through connected network or a network that has been configured through Group Policy through the wireless networks' context menu.
The properties dialog box of a wireless network is described later in this article.
You can access the Step up a connection or network dialog box in Windows 7, from the Set up a new connection or network link in the Network and sharing center.
To manually create a wireless network profile, click manually connects to a wireless network, and then click Next.
On the Enter information for the wireless network you want to add page, configure the following.
You access the Manage Wireless Networks dialog box from the Manage Wireless Networks link in the Network and Sharing.
If you choose the WPA-Enterprise, WPA2-Enterprise or WPA2-Personal security types, you can also configure advanced settings.
Single Sign-On (SSO) allows you to configure when 802.1X authentication occurs relative to the user logon and to integrate user logon and and 802.1X authentication credentials on the Windows logon screen.
A non-broadcasting wireless network does not advertise its network name, also known as its SSID. A wireless access point of a non-broadcasting wireless network can be configured to send Beacon frames with an SSID set to NULL. A non-broadcasting wireless network is also known as hidden wireless network. You can configure wireless networks in Windows 7 as broadcast or non-broadcast. A computer running Windows 7 will attempt to connect to wireless networks in the preferred networks list order, regardless of whether they are broadcast or non-broadcast. Additionally, non- broadcast networks appear last in the list of available networks with the name Other Networks.
Configure Remote Desktop Access on Windows 7 System
Remote Desktop is not enable by default. You must specifically enable it to allow remote access to the workstation. When it is enabled, any member of the Administration group can connect to the workstation. Other users must be placed on a remote access, follow.
To use Windows Server 2008 you need to meet the following hardware required.
- Processor:
- Minimum:
1 GHz (x86 processor) or 1.4 GHz (x64 processor).
- Recommended:
2 GHz or faster Note: An Intel Itanium 2 processor is required for Windows Server 2008 for Itanium-based System.
- Memory:
- Minimum:
512 MB RAM.
- Recommended:
2 GB RAM or greater.
- Maximum:
(32-bit system): 4 GB (Standard) or 64 GB (Enterprise and Datacenter)
- Maximum (64-bit system):
32 GB (Standard) or 2 TB (Enterprise, Datacenter and Itanium-based System).
- Available:
- Minimum:
10 GB.
- Recommended:
40 GB or greater
- Disk Space:
- Note:
Computers with more than 16 GB of RAM will require more disk space for paging, hibernation and dump files
- Drive:
- DVD-ROM:
DVD-ROM is required not CD-ROM.
- Display:
- VGA:
Super VGA (800 x 600) or higher-resolution monitor, LCD or LED.
- Peripherals:
- Keyboard Microsoft Mouse or Compatible pointer device.
FOLLOW THIS PROCEDURE TO INSTALL WINDOWS SERVER 2008:
- Insert the appropriate Windows Server 2008 Installation Media into your DVD drive. IF you don't have an installation.
- Reboot the computer.
- When prompted for an installation language and other regional options, make your selection and press Next.
- Next, press Install Now to begin the installation process.
- Product activation is now also identical with that found in Windows Vista. Enter your Product ID in the next window, and if you want to automatically activate Windows the moment the installation finishes, click Next.
If you do not have the Product ID available right now, you can leave the box empty and click Next. You will need to provide the Product ID later, after the server installation is over. Press No.
- Because you did not provide the correct ID, the installation process cannot determine what kind of Windows Server 2008 license you own and therefore you will be prompted to select you correct version in the next screen, assuming you are telling the truth and will provide the correct ID to approve you selection later on.
- If you did provide the right Product ID, select the Full version of the right Windows version you are prompted and click Next.
- Read and accept the license terms by clicking to select the check box and pressing Next.
- In the "Which type of installation do you want?" window, click the only available option - Custom (Advanced).
- In the "Where do you want to install Windows?", if you are installing the server on a regular IDE hard disk, click to select the first disk, usually Disk 0, click Next.
If you are installing on a hard disk that's connected to a SCSI controller, click Load Driver and insert the media provided by the controller's manufacturer.
If you must, you can also click Drive Option and manually create a partition on the destination hard disk.
- The installation now begins, and you can go and have lunch. Copying the setup files from the DVD to the hard drive only takes about one minute. However, extracting and un-compressing the files takes a good deal longer. After 20 minute, the operating system is installed. The exact time it takes to install server core depends upon your hardware specification. Faster disks will perform much faster installs.. Windows Server 2008 takes up approximately 10 GB of hard drive space.
You remove it before going to lunch, as you will find the server hanged without the ability to boot (you can bypass this by configuring the server to boot from CD/DVD and then from the hard disk in the booting order on the server's BIOS).
- Then the server reboots you will be prompted with the now Windows Server 2008 type of login screen. Press CTRL+ALT+DEL to log in.
- Click on Other User.
- The default Administrator is blank, so just type Administrator and press Enter.
- You will be prompted to change the user's password. You have no choice but to press OK.
- In the password changing dialog box, leave the default password blank and enter a new, complex, at-least-7-characters-long new password twice. A password like "topsecret" is not valid (it's not complex), but one lick "TOpSecreT" sure is Make sure you remember it.
- Someone thought it would be cool to nag you once more, so now you will be prompted to accepted to accept the fact that the password had been changed. Press OK.
- Finally, the desktop appears and that's it, you are logged on and can begin working. You will be greeted by an assistant for the initial server configuration, and after performing some initial configuration tasks, you will be able to start working.
ACTIVE DIRECTORY INSTALLATION ON WINDOWS SERVER 2008
To start the installation of active directory is to change the name of the computer to reflect the new status. To do that, log-in to the server and click on the Start button and Right-click on Computer and go to Properties, at the bottom under computer name, domain, and work-group setting, click on the Change Setting:
The System Property window will come up.
Click on the Change tab, and change the computer name to whatever you want.
Click on the OK button, Windows Server 2008 will now reboot.
INSTALLING ACTIVE DIRECTORY DOMAIN SERVICES
Now that we have renamed the computer to something that reflects the new role on Windows Server 2008, we will proceed with the installation of active directory. To install active directory domain services, go to Start and on Server Manager.
The server manager window will come up:
The Select Server Role window will come up:
Make sure the Active Directory Domain Services option is checked.
Click on Next after checking the option.
Active directory domain services (AD DS) is something new on Windows Server 2008. On the following window you can read a small introduction about it. Click next when you finish reading.
You will be asked to confirm the installation of domain services:
Click on Install to start the installation.
You should receive the Installation Results window after the installation completes
Note: This only installs Active Directory domain services, it does not make Windows Server 2008 a domain controller, for that we will need to run the DCPROMO wizard.
INSTALLING ACTIVE DIRECTORY DOMAIN CONTROLLER
After Active Directory Domain Services have been installed, you should return to the Server Role Interface, click on Active Directory Domain Service:
One the window that pops up, you will see a summary message that reads, "This server is not yet running as a domain controller: RunActive Directory Domain Services Installation Wizard (depromo.exe)
Click on the blue link.
By clicking on the blue link, the depromo.exe wizard should come up.
Make sure "Use advanced mode installation" option is checked and click Next.
Read the provided information on the next screen, that explains some new features on Windows Server 2008 domain services that might affect older Windows operating system and non Microsoft SMB clients on an existing domain.
Click Next after you read the warning.
One the next window choose your deployment configuration.
Because this is my first domain controller, I will choose the "Create a new domain in a new forest" option.
Click on Next.
Choose the mane for your forest root domain on next window appear, click Next after choosing your fully qualified Domain Name:
The wizard will check if that forest name is already in used: after a few second, the wizard will ask you to enter the NetBIOS name: the default NetBIOS name should be fine. Click on the Next, and choose the Forest Functional Level:
I will choose Windows Server 2003 as my functional level. Choosing Windows Server 2008 functional level does not provide any new features over the Windows 2003 forest function level. However, it ensures that any new domain created in the forest will automatically operate at the Windows Server 2008 domain functional level, which does provide unique features, click on Next.
If DNS is not installed on your system, choose the DNS Server option, and click on Next.
If your server does have static IP address assigned on the server, you might get the warning: as you can see, having dynamic assigned IP address is not recommended, use static IP addresses for servers whenever is possible choose your option and click Next.
If you get the warning then click on OK button. Choose the location of the AD database on the screen: Leave the default settings and click on Next.
Enter your the password for your Restore Mode Administrator on the screen. Click Next after entering the password, you should get the Summary page, and click Next.
damn it!! I got an error saying I need to install DNS manually..
This is the first time I let the dpromo.exe to configure DNS for me, and I kind of was expecting for this error, that will be the subject of the need article.
Click OK on the error for now, after a while, you should get the completion Windows, click on Finish.
You will need to reboot the computer, go ahead and restart the computer and if you need to install DNS do so after the reboot.
INSTALL A DNS SERVER IN WINDOWS SERVER 2008
INSTALLATION
You can install a DNs server from the Control Panel or when promoting a member server to a domain controller (DC).
During the promotion, if''a DNS server is not found, you will have the option if installing it.
To install a DNS server from the Control Panel, follow these steps:
- From the Start menu, select + Control Panel + Administrative Tools + Server Manager.
- Expand and click Roles.
- Choose Add Roles and follow the wizard by selecting the DNS role.
- Click Install DNS in Windows Server 2008
DNS Console & Configuration
After installing DNS, you can find the DNS console from Start + All Programs + Administrative Tools + DNS. Windows 2008 provides a wizard to help configure DNS.
When configuring you DNS server, you must be familiar with following concepts:
- Forward look-up zone
- Reverse look-up zone
- Zone types
A forward lookup zone is simply a way to resolve host names to IP addresses. A reverse look-up zone allows a DNS server to discover the DNS name of the host. Basically, it is the exact opposite of a forward look-up zone. A reverse look-up zone is not required, but it is easy to configure and will allow for you Windows Server 2008 Server to have full DNS functionality.
When selecting a DNS zone type, you have the following options. Active Directory (AD) Integrated, Standard Primary and Standard Secondary. AD Integrated stores the database information in AD and allows for secure updates to the database file. This option will appear only if AD is configured. If it is configured and you select this option, AD will store and replicate you zone file.
A standard Primary zone stores the database in a text file. This text file can be shared with other DNS servers that store their information in a text file. Finally, a Standard Secondary zone simply creates a copy or the existing database from another DNS server. This is primarily used for load balancing.
To open the DNS server configuration tool:
- Select DNs from the Administrative tools folder to open the DNS console.
- Highlight your computer name and choose Action + Configure a DNS Server' to launch the Configure DNS Server Wizard.
- Click Next and choose to configure the following: forward look-up zone, forward and reverse look-up zone, root hints only.
- Click Next and then click Yes to create a forward look-up zone.
- Select the appropriate radio button to install the desired Zone Type.
- Click Next and type the name of the zone you are creating.
- Click Next and then click Yes to create a reverse lookup zine.
- Repeat Step 5.
- Choose whether you want an IPv4 or IPv6 Reverse Look-up Zone.
- Click Next and enter the information to identify the reverse lookup zone.
- You can choose to create a new file or use an existing DNS file.
- On the Dynamic Update window, specify how DNS accepts secure, nonsecure, or no dynamic updates.
- If you need to apply a DNS forwarder, you can apply it on the Forwarder window.
- Click Finish.
MANAGING DNS RECORDS
You have now installed and configured you first DNS server and you are ready to add records to the zone(s) you created. There are various types of DNS records available. Many of them you will never various types of DNS records available. Many of them you will never use. We will be looking at these commonly used DNS records:
- Start of Authority (SOA)
- Name Servers
- Host (A)
- Pointer (PTR)
- Canonical Name (CNAME) or Alias
- Mail Exchange (MX)
START OF AUTHORITY (SOA) RECORD
The Start of Authority (SOA) resource record is always first in any standard zone. The Start of Authority (SOA) tab allows you to make any adjustments necessary. You can change the primary server that holds the SOA record, and you can change the person responsible for managing the SOA. Finally, one of the most important features of Windows 2000 is that you can change your DNS server configuration without deleting your zones and having to re-create the wheel
NAME SERVERS
Name Servers specify all name servers for a particular domain. You set up all primary and secondary name servers through this records.
To create a Name Server, follow these steps:
- Select DNS from the Administrative Tools folder to open the DNS console.
- Expend the Forward Look-up Zone.
- Right - click on the appropriate domain and choose Properties.
- Select the Name Server tab and click Add.
- Enter the appropriate FQDN Server name and IP address of the DNS server you want to add.
HOST (A) RECORDS
A Host (A) record maps a host name to an IP address. These records helps you easily identify another server in a forward look-up zone. Host records improve query performance in multiple-zone environments, and you can also create a Point (PTR) record at the same time. A PTR record resolves an IP address to a host name.
To create a Host record:
- Select DNS from the Administrative Tools folder to open the DNS console.
- Expand the Forward Look-up Zone and click on the folder representing your domain.
- From the Action menu, select New Host.
- Enter the Name and IP Address of the host you are creating.
- Select the Create Associated Pointer (PTR) Record check box Otherwise, you can creat it later.
- Click the Add Host button.
POINTER (PTR) RECORDS
A Pointer (PTR) record creates the appropriate entry in the reverse look-up zone for reverse queries. You have the option of creating a PTR record when creating a Host record. If you did not choose to create your PTR record at that time, you can do it at any point.
To create a PTR record:
- Select DNS from the Administrative Tools folder to open the DNS console.
- Choose the reverse look-up zone where you want your PTR record created.
- From the Action menu, select New Pointer.
- Enter the Host IP Number and Host Name.
- Click OK.
CANONICAL NAME (CNAME) OR ALIAS RECORDS
A Canonical Name (CNAME) or Alias record allows an DNS server to have multiple names for a single host. For example, and Alias record can have several records that point to a single server in your environment. This is a common approach if you have both your Web server and your mail server running on the same machine.
To create a DNS Alias:
- Select DNS from the Administrative Tools folder to open the DNS console.
- Expand the Forward Look-up Zone and highlight the folder representing your domain.
- From the Action menu, select New Alias.
- Enter your Alias Name.
- Enter the fully qualified domain name. (FQDN).
- Click OK.
MAIL EXCHANGE (MX) RECORDS
Mail Exchange records help you identify mail servers within a zone in your DNS database. With this feature, you can prioritize which mail servers will receive the highest priority. Creating MX record with help you keep track of the location all of your mail servers.
To create a Mail Exchange (MX) record:
- Select DNS from the Administrative Tools folder to open the DNS console.
- Expand the Forward Look-up Zone and highlight the folder representing your domain.
- From the Action menu, select New Mail Ex-changer.
- Enter the Host or Domain.
- Enter the Mail Server and Mail Server Priority.
- Click OK.
OTHER NEW RECORDS
You can create many other types of records. For a complete description, choose Action + Other New Record from the DNS console. Select the record of your choice and view the description.
TROUBLESHOOTING DNS SERVERS
When troubleshooting DNS servers, the nslookup utility will become your best friend. This utility is easy to use and very versatile. It's command-line utility that is included within Windows 2008. With nslookup, you can perform query testing of your DNS server. This information is useful in troubleshooting name resolution problems and debugging other server-related problems. You can access nslookup right from the DNS console.
To get ready to manage user accounts in Windows SBS 2008, familiarise yourself with the following terms and definitions. These key terms are associated with managing user accounts in Windows SBS 2008.
WINDOWS SBS CONSOLE
Use the Windows SBS Console to accomplish network administration tasks and to manage the computers and devices on your network.
USER ROLES
Standardise common user properties (such as group memberships, Window (R) SharePoint(R) Service site groups disk quotas, and company address information for new user accounts) with these user account templates. Creating a user account that is based on a user role reduces the need to manually enter account properties. By7 default, Windows SBS 2008 includes three user roles; Standard User, Network Administrator and Standard User with administration links.
PASSWORD POLICIES
Use this set of rules to help you enhance the security of you Windows SBS 2008 network. Setting password policies forces the network users to employ strong passwords. In Windows SBS 2008, these password polices are configured by default during installation.
REMOTE WEB WORKPLACE
Enables users to access important features of Windows SBS 2008 when they are away from the office. By using the Remote Web Workplace, users can check e-mail and calendars, connect to their computers at work, use shared applications and access the company's internal Web site. Users can access all of these features by using a Web browser from any Internet-enabled computer (such as a home computer, Internet kiosk, or laptop) and navigating to the external address of the computer running Windows SBS 2008.
INTERNAL WEB SITE
Enable domain users to share information (such as documents, photographs and upcoming events) from a central location. Windows SBS 2008 provides a pre-configured internal Web sit (an intranet) that is based on Windows SharePoint Services. This Web site is available from within the company network at http://companyweb/.
SECURITY GROUP
Enables you to control access to files, folders, and application data. For example, if you have a shared printer on your network that you want only certain users to access, create a security group for the printer.
DISTRIBUTION GROUP
Enables you to send e-mail messages to a specific group of people. For example, if you want to send network reports to certain users, create a distribution group that consists of those user accounts.
This document includes topics that can help you understand, configure, and manage your user accounts in Windows SBS 2008. This information is presented in the following sections:
IMPLEMENT STRONG PASSWORDS
Password policies are a set of rules that can enhance the security of you Windows SBS 2008 network. Using strong password provides an additional layer of defense against an un-authorised user gaining access to your network.
To help implement strong passwords, password polices are enabled by default in Windows SBS 20008 during installation. You can ensure that users implement strong passwords by enforcing password policies in your network.
The password policies in Windows SBS 2008 include the following:
MINIMUM LENGTH
Enable this policy to determine the least number of characters that a password can contain. Setting a minimum length helps protect your network by preventing users from having short or blank passwords. The default is eight characters.
COMPLEXITY
Enable this policy to determine whether passwords must contain different types of characters. If this policy is enabled, passwords cannot contain all or part of a user's account name, and it must contain characters from three of the following four categories:
- English uppercase characters ( A through Z)
- English lowercase characters (a through z)
- Numerals (0 through 9)
- Non-alphanumeric characters (such as !, $. #, %)
MAXIMUM AGE
Enable this policy to determine the period of time (in days) that a password can be used before the system requires that the user change it. the default is 180 days.
EDUCATE USERS
After implementing strong password policies, educate users about strong and weak passwords. Ask users to treat their password as they would private information, such as credit card personal identification number (PIN).
Following are typical guidelines for creating a strong password. When implemented, they provide protection for your local network.
A password should not include any of the following.
- All or part of the user's account name.
- User's name or e-mail alias.
- Name of the user's child, parent, spouse / partner or friend.
- Any word found in a dictionary.
- Old password that is reused by appending numbers.
- User's birth date.
- User's phone number.
- User's Social Security Number or other identification number.
- Any easily obtained personal information (for example, a city of birth).
A strong password consists of the following:
- At least eight characters.
- Characters from three of the following four categories.:
- Uppercase letters (A through Z).
- Lowercase letters (a through z).
- Numbers (0 through 9),
- Non-alphanumeric character (for example) !, $, #, %).
CREATING A NEW COMPUTER ACCOUNT
To create a new computing account using the Windows interface
- To open Active Directory Users and Computers, click Start, click Control Panel, double-click Administrative Tools, and then double-click Active Directory Users and Computers.
- In the console tree, right-click Computers.
Where?
- Active Directory Users and Computer \ domain \ computers
Or
Right click the folder in which you want to add the Computer.
- Point to New, and then click Computer.
- Type the computer name.
ADDITIONAL CONSIDERATIONS
- To perform this procedure, you must be member of the Account Operators group, Domain Admins group, or Enterprise Admins group in Active Directory Domain Services (AD DS), or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure.
- Another way to open Active Directory Users and Computers to click Start, click Run, and then type dsa.msc.
- By default, members of the Account Operators group can create computer accounts in the Computers container and in new organisational units (OUs).
- By default, Authenticated Users in a domain are assigned the Add workstation to a domain user right, and they can create up to 10 computer accounts in the domain.
- There are two additional ways to give a user or group permission to add a computer to domain:
- Use a Group Policy object to assign the Add Computer User permission.
- On the OU, assign the user or group to Create Computer Objects permission.
- You can also perform the task in this procedure by using the Active Directory module for Windows Power Shell. To open Active Directory module, click Start, click Administrative Tools, and then click Active Directory Module for Windows Power Shell. For more information see Create a New Computer Account.
- To open a command prompt, click Start, click Run, type cmd, and then click OK.
- Type the ABOVE command, and then press ENTER.
HOW TO SET GROUP POLICY IN WINDOWS SERVER 2008
I need to apply group policy to several computers in a Windows Server 2008 domain. After running gpmc.msc, we can see Default Domain Policy and Default Domain Controller Policy.
Default Domain Policy is linked to the domain object and affects all users and computer in the domain (including computers that are domain controllers) through policy inheritance.
Default Domain Controllers Policy is linked to the Domain Controllers OU. This policy generally affects only domain controllers are kept in the Domain Controllers OU.
GROUP POLICY AND THE ACTIVE DIRECTORY
In Window Server 2008, administrators use Group Policy to enhance and control users' desktops. To simplify the process, administrators can create a specific desktop configuration that is applied to groups of users and computers. The Windows Server 2008 Active Directory service enables Group Policy. The policy information is stored in Group Policy Objects (GPOs), which are linked to selected Active Directory containers: sites, domains, and organisational units (OUs).
A GPO can be used to filter objects based on security group membership, which allows administrators to manage computers and users in either a centralised or a de-centralised manner. To do this, administrators can use filtering based on security groups to define the scope of Group Policy management, so that Group policy can be applied centrally at the domain level, or in a decentralised manner at the OU level, and can then be filtered again by security groups. Administrator can use security groups in Group Policy to:
- Filter the scope of a GPO. This defines which groups of users and computers a GPOI affects.
- Delegate control of a GPO. There are two aspects to managing and delegating Group Policy: managing the group policy links and managing who can create and edit GPOs.
Administrators use the Group Policy Microsoft Management Console (MMC) snap-in to manage policy settings. Group Policy includes various features for managing these policy setting. In addition, third parties can extend Group Policy to host other policy settings. The data generated by Group Policy is stored in a Group Policy Object (GPO), which is replicated in all domain controllers within a single domain.
The Group Policy snap-in includes several MMC snap-in extensions, which constitute the main nodes in the Group Policy snap-in. The extensions are as follows:
- Administrative Templates:
These include registry-based Group Policy, which you use to mandate registry setting that govern the behavior and appearance of the desktop, include the operating system components and application.
- Security Setting:
You use the Security Settings extension to set security options for computers and users within the scope of a Group Policy Object. You can define local computer, domain and network security setting.
- Software Installation:
You can use the Software Installation snap-in to centrally manage software in your orgainsation. You can assign and publish software to users and assign software to computers.
- Scripts:
You can use scripts to automate computer start-up and short-down and user log-on and log-off. You can use any language supported by Windows Script Host. These include the Microsoft Visual Basic development system, Scripting Edition (VBScript); JavaScript; PERL; and MS-DOS-style batch files (.bat and .cmd).
- Remote Installation Services:
You use Remote Installation Services (RIS) to control the behavior of the Remote Operating System Installation feature as displayed to client computers.
- Internet Explorer Maintenance:
You use Internet Explorer Maintenance to manage and customise Microsoft Internet Explorer on Windows Server 2008-based computers.
- Folder Redirection:
You use Folder Redirection to redirect Windows Server 2008 special folders from their default user profile location to an alternate location on the network. These special folders include My Documents, Application Data, Desktop and the Start menu.
HIERARCHY OF GROUP AND THE ACTIVE DIRECTORY
Group Policy objects are linked to site, domain, and OU containers in the Active Directory. The default order of precedence follows the hierarchical nature of the Active Directory: sites are first, then domains, and then each OU. A GPO can be associated with more than one Active Directory container or multiple containers can be linked to a single GPO.
PREREQUISITES & INITIAL CONFIGURATION
Prerequisites
This Software Installation and Maintenance document is based on Step-by Step to a Common Infrastructure for Window Server 2008 Server Deployment.
Before using this guide, you need to build the common infrastructure as described in the document above. This infrastructure specifies a particular hardware and software configuration. If you are not using the common infrastructure, you must take this into account when using the guide.
GROUP POLICY SCENARIOS
Note that this document does not describe all of the possible Group Policy scenarios. Please use this instruction set to begin to understand how Group Policy works and begin to think about how your organisation might use Group Policy to reduce its TCO. Other Windows Server 2008 features, including Security Settings and Software Installation and Maintenance, are built on Group Policy. To learn how to use Group Policy in those specific scenarios, refer to the white papers and Windows Server 2008 Server online help on Windows Server 2008 Security and Software Installation and Maintenance, which are available on the Windows Server 2008 Web site.
IMPORTANT NOTES
The Example Company, organisation, products, people, and events depicted in this guide are fictitious. No association with any real company, organisation, product, person or event is intended or should be inferred.
This common infrastructure is designed for use on a private network. This fictitious company name and DNS name used in the common infrastructure are not registered for use on the Internet. Please do not use this name on a public network or Internet.
The Active Directory service structure for this common infrastructure is designed to show how Windows Server 2008 Change and Configuration Management works and functions with Active Directory. It was not designed as a model for configuring an Active Directory service for any organisation - for such information see the Active Directory documentation.
Group Policy Snap-in Configuration
Group policy is tied to the Active Directory service. The Group Policy snap-in extends the Active Directory management tools using the Microsoft Management Console (MMC) snap-in extension mechanism.
Active Directory snap-ins the set the scope of management for Group Policy. The most common way to access Group Policy is by using the Active Directory User and Computers snap-in, for setting the scope of management to domain and organisational units (OUs). You can also use the Active Directory Sites and Services snap-in to set the scope of management to a site. These two tools can be accessed from the Administrative Tools program group; the Group Policy snap-in extension is enabled in both tools. Alternatively, you can create a custom MMC console, as described in the next section.
CONFIGURING A CUSTOM CONSOLE
The examples in this document use the custom MMC console that you can create by following the procedure in this section. You need to create this custom console before attempting the remaining procedures in this document.
Note: If you want more experience building MMC consoles, run through the procedures outlined in "Step-by-Step Guide to Microsoft Management Console."
TO CONFIGURE A CUSTOM CONSOLE
- Log on to the HQ-RES-DC-01 domain controller server as an administrator.
- Click Start, click Run, type MMC, and then click OK.
- On the Console menu, click Add / Remove Snap-in.
- In the Add / Remove Snap-in dialog box, click Add.
- In the Add Standalone Snap-in dialog box, in the Available standalone snap-ins list box, click Active directory users and computers, and then click Add.
- Double-click Active directory sites and services snap-in from the Available Standalone snap-ins list box.
- In the Available Standalone snap-ins list box, double-click Group Policy.
- In the Select Group Policy object dialog box, Local computer is selected under Group Policy Object. Click Finish to edit the local Group Policy object, click Close in the Add standalone snap-in dialog box.
- In the Add/Remove Snap-in dialog box, click the Extensions tab. Ensure that the Add all extensions check box is checked for each primary extension added to the MMC console (these are checked by default). Click OK.
TO SAVE CONSOLE CHANGES
- In the MMC Console, on the Console menu, click Save.
- In the Save As dialog box, in the File name text box, type GPWalkthrough, and then click Save.
ACCESSING GROUP POLICY
You can use the appropriate Active Directory tools to access Group Policy while focused on any site, domain or OU;
To open Group Policy from Active Directory Sites and Services
- In the GPWalkthrough MMC console, in the console tree, click the + next to Active Directory Site and Services.
- In the Console tree, right-click the site for which to access Group Policy.
- Click Properties, and click Group Policy.
To open Group Policy from Active Directory User and Computers
- In the console tree in the GPWalkthrough MMC console, click the + next to Active Directory Users and Computers.
- In the console tree, right-click either the reskit domain or the OU for which to access Group Policy.
- Click Properties, and click Group Policy.
To access Group Policy scoped to a specific computer (or the local computer), you must load the Group Policy snap-in into the MMC console namespace targeted at the specific computer (or local computer). There are two major reasons for these differences:
- Sites, domains and OUs can have multiple GPOs linked to them; these GPOs require an intermediate property page to manage them.
- A GPO for a specific computer is stored on that computer and not in the Active Directory.
TO SCOPE GROUP POLICY FOR A DOMAIN OR OU
- Click Start, point to Programs, click Administrative Tools, and click GPWalkthrough to open the MMC console you created earlier.
- Click the + next to Active Directory Users and Computers to expand the tree.
- Click the + next to reskit.com to expand the tree.
- Right-click either the domain ( reskit.com) or an OU, and click Properties.
- Click the Group Policy tab.
This displays a property page where the GPOs associated with the selected Active Directory container can be managed. You use this property page to add, edit, delete (or remove), and disable GPOs; to specify No Override options; and to change the order of the associated GPOs. Selecting Edit starts the Group Policy snap-in. More information on using the Group Policy snap-in can be found later in this document.
Note:
The Computers and Users containers are not organisational units; therefore, you cannot apply Group Policy directly to them. Users or computers in these containers receive policies from GPOs scoped to the domain and site object only. The domain controller container is a OU, and Group Policy can be applied directly to it.
SCOPING LOCAL OR REMOTE COMPUTERS
To access Group Policy for a local or a remote computer, you add the Group Policy snap-in to the MMC console, and focus it on a remote of computer. To access Group Policy for the local computer, use the GPWalkthrough console created earlier in this document and choose the Local Computer Policy node. You can add other computers to the console namespace by adding another Group Policy snap-in to the GPWalkthrough console, and click the Browse button when the Select Group Policy object dialog box is displayed.
Note:
Some of the Group Policy extensions are not loaded when Group Policy is run against a local GPO.
CREATING A GROUP POLICY OBJECT
The Group Policy settings you create are contained in a Group Policy Object (GPO) that is in turn associated with selected Active Directory objects, such as sites, domains, or organisational units (OUs).
TO CREATE A GROUP POLICY OBJECT (GPO)
- Open the GPWalkthrough MMC console.
- click the + next to Active Directory Users and computer, and click the reskit.com domain.
- Click the + next to Accounts to expand the tree.
- Right-click Headquarters, and select Properties from the context menu.
- In the Headquarters Properties page, click the Group Policy tab.
- Click New, and type HQ Policy.
The Headquarter Properties page appear.
At this point you could add another GPO for the Headquarters OU, giving each one that you create a meaningful name, or you could edit the HQ Policy GPO, which starts the Group Policy snap-in for that GPO. All Group Policy functionality is derived from the snap-in extensions. In this exercise, all of these extensions are enabled. It is possible--using standard MMC methods--to restrict the extension snap-ins that are loaded for any given snap-in. For information on this capability, see the Windows Server 2008 Server Online Help for Microsoft Management Console.
There is also a Group Policy that you can use to restrict the use of MMC snap-in extensions. To access this policy, navigate to the System\Group Policy node under Administrative Templates. Use the Explain tab to learn more about the use of these policies.
If you have more than one GPO associated with an Active Directory folder, verify the GPO order; a GPO that is higher in the list has the highest precedence. Note that GPOs higher in the list are processed last (this is what gives them a higher precedence). GPOs in the list are objects; they have context menus that you use to view the properties of each GPO. You can use the context menus to obtain and modify general information about GPO. This information includes Discretionary Access Control Lists (DACLs, which are covered in the Security Group Filtering section this document), and lists the other site domain, or OUs to which this GPO is linked.
- Click Close.
MANAGING GROUP POLICY
To manage Group Policy, you need to access the context menu of a site, domain or OU, select Properties, and then select the Group Policy tab. This displays the Group Policy Properties page. Please note the following:
- This page displays any GPOs that have been associated with the currently selected site, domain or OU. The links are object; they have a context menu that you can access by right-clicking the object. (Right-clicking the white space displays a context menu for creating a new link, adding a link, or refreshing the list).
- This page also shows an ordered GPO list, with the highest priority GPO at the top of the list. You can change the list order by selecting a GPO and then using the UP or Down buttons.
- To associate (link) a new GPO, click the Add button.
- To edit an existing GPO in the list, select the GPO and click the Edit button, or just double-click the GPO. This starts the Group Policy snap-in , which is how the GPO is modified. This is described in more detail later in this document.
- To permanently delete a GPO from the list, select it from the list and click the Delete button. Then, when prompted, select Remove the link and delete the Group Policy object permanently. Be careful when deleting an object, because the GPO may be associated with another site, domain, or OU. If you want to remove a GPO from the list, select the GPO from the links list, click Delete, and then when prompted, select Remove the link from the list.
- To determine what other sites, domain or OUs are associated with a given GPO, right-click the GPO, select Properties from the context menu, and then click the Links tab in the GPO Properties page.
- The No override check column the marks the selected GPO as one whose policies cannot be overridden by another GPO.
Note:
You can enable the No Override property on more than precedence over all other GPOs not marked. Of those GPOs marked as No override, the GPO with the highest priority will be applied after all the other similarly marked GPOs.
- The Disabled check box simply disables (deactivates) the GPO without removint it from the list. To remove a GPO from the list, select the GPO from the links list, click Delete, and then select Remove the link from the list in the Delete dialog box.
- It is also possible to disable only the User or Computer portion of the GPO. To do this, right-click the GPO, click Properties, click either Disable computer configuration settings or Disable user configuration settings, and then click OK. These options are available on the GPO Properties page, on the General tab.
- The Block policy inheritance check box has effect of negating all GPOs that exist higher in the hierarchy. However, it cannot block any GPOs that are enforced by using No override check box; those GPOs are always applied.
Note:
Policy settings contained within the local GPO that is not specifically overridden by domain-based policy setting are also always applied. Block Policy Inheritance at any level will not remove local policy.
EDITING A GROUP POLICY OBJECT
You can use the custom console to edit a GPO. You will need to log on to the HQ-RES-DC-01 server as an Administrator, if you have not already done so.
To edit a Group Policy Object (GPO)
- Click Start, point to Programs, click Administrative Tools, and the select GPWalkthrough.
- Click the + next to Active Directory Users and Computers, click the reskit.com domain, and then click the Account OU.
- Right-click Headquarters, select Properties, and then click the Group Policy tab. HQ Policy in the Group Policy object links list box should be highlighted.
- Double click the HQ policy GPO (or click Edit).
This open the Group Policy snap-in focused on a GPO named HQ Policy, which is linked to the OU named Headquarters.
EDITING OR BROWSING A GROUP POLICY OBJECT
The Add a Group Policy Object Link dialog box shows GPOs currently associated with domains, OUs, sites, or all GPOs without regard to their current association (links). The Add a Group Policy Object Link dialog box is shown.
Add a Group Policy Object Links
- GPOs are stored in each domain. The Look in drop-down box allows you to select a different domain to view.
- In the Domain/OUs tab, the list box displays the sub-OUs and GPOs for the currently selected domain or OU. To navigate the hierarchy, double-click a sub-OU or use the Up one level toolbar button.
- To add a GPO to the currently selected domain or OU, either double-click the object, or select it and click OK.
- Alternatively, you can create a new GPO by clicking the All tab, right-clicking in the open space, and selecting New on the context menu, or by using the Create New GPO toolbar button. The Create New GPO toolbar button is only active in the All tab. To create a new GPO and link it to a particular site, domain, or OU, use the New button on the Group Policy Property page.
Note:It is possible to create two more GPOs with the same name. This is by design and is because the GPOs are actually stored as GUIDs and the name shown is a friendly name stored in the Active Directory.
- In the Sites tab, all GPOs associated with the selected sites are displayed. Use the drop-down list to select another site. There is no hierarchy of sites.
- The All tab shows a flat list of all GPOs that are stored in the selected domain. This is useful when you want to select a GPO that you know by name, rather than where it is currently associated. This is also the only place to create a GPO that does not have a link to a site, domain, or OU.
- To create an unlinked GPO, access the Add a Group Policy Link dialog boxfrom any site, domain or OU. Click the All tab, select the toolbar button or right-click the white space, and select New. Name the new GPO, and the click Enter, and then click Cancel---do not click OK. Clicking OK links the new GPO to the current site, domain, or OU. Clicking Cancel creates an un-linked GPO.
REGISTRY-BASED POLICY
The user interface for registry-based policy is controlled by using Administrative Template (.adm) files. These files describe the user interface that is displayed in the Administrative Templates node of the Group Policy snap-in. These files are format-compatible with the .adm files used by the System Policy Editor tool (poledit.exe) in Microsoft Windows NT 4.0. With Windows Server 2008, the available options have been expanded.
Note:
Although it is possible to add any . adm file to the namespace, if you use an .adm file from a previous version of Windows, the registry keys are unlike to have an effect on Windows Server 2008, or actually set preference setting and mark the registry with these settings; that is, the registry setting persist.
By default, only those policy settings defined in the loaded .adm files that exist in the approved Group Policy trees are displayed; these settings are referred to as true policy.This means that the .adm file that set registry keys outside of the Group Policy trees; such items are referred to as Group Policy preferences. The approved Group Policies.
\Software\Policies
\Software\Microsoft\\Windows\CurrentVersion\Policies
A Group Policy called Enforce Show Policies Only is available in User Configuration\Administrative Templates, under the System\Group Policy nodes. If you set this policy to Enabled, the Show policy only command is turned on and administrators cannot not turn it off, and the Group Policy snap-in displays only only true policies. IF you set this policy to Disabled or Not Configured, the Show policies only command is turned on by default; however, youu can view preferences by turning off the Show policies only command. To view preferences, you must turn off the Show Policies only command, which you access by selecting the Administrative Templates node (under either User Configuration or Computer Configuration nodes), and then clicking the View menu on the Group Policy console and clearing the Show policy only check box. Note that it is not possible for the selected stat for this policy to persist; that is there is no preference for this policy using.
In Group Policy, preferences are indicated by a red icon to distinguish them from true policies, which are indicated by a blue icon.
Use of non-policies within the Group Policy infrastructure is strongly discouraged because of the persistent registry settings behavior mentioned previously. To set registry policies on Windows NT 4.0, and Windows 95 and Windows 98 clients, use the Windows.NT 4.0 System Policy Editor tool, Poledit.exe.
By default the System.adm, Inetres.adm, and Conf.adm files are loaded and present this namespace as shown.
ADDING ADMINISTRATIVE TEMPLATES
The .adm files include the settings:
- System.adm; Operating system setting.
- Inetres.adm; Internet Explorer restrictions
- Conf.adm; NetMeeting settings
ADDING ADMINISTRATIVE TEMPLATES
The .adm files consists of a hierarchy of categories and subcategories that together define how options are organised in the Group Policy user interface.
TO ADD ADMINISTRATIVE TEMPLATES (.adm files)
- In the Group Policy console double-click Active Directory Users and Computers, select the domain or OU for which you want to set policy, click Properties and then click Group Policy.
- In the Group Policy properties page, select the Group Policy Object you want to edit from the Group Policy Object Links list, and click Edit to open the Group Policy snap-in.
- In the Group Policy console, click the plus sign (+) next to either User Configuration or Computer Configuration. The .adm file defines which of these locations the policy is displayed in, so it does not matter which node you choose.
- Right-click Administrative Templates, and select currently active templates files for this Active Directory container.
- Click Add. This shows a list of the available .adm files in the %systemroot%\inf directory of the computer where Group Policy is being run. You can choose an .adm file is copied into the GPO.
To Set Registry-Based Setting Using Administrative Templates
- In the GPWalkthrough console, double-click Active Directory Users and Computers, double-click the reskit.com domain, double-click Accounts. right-click the Headquarter OU, and then click Properties.
- In the Headquarter Properties dialog box, click Group Policy.
- Double-click the HQ PolicyGPO from the Group Policy Object Links list to edit the HQ Policy GPO.
- In the Group Policy console, under the User Configuration mode, click the plus sign (+) next to Administrative Templetes.
- Click Start Menu & Taskbar. Note that the details pane shows all the policies as Not configured.
- In the details pane, double-click the Remove Run Menu From the Start Menu policy.
- In the Remove Run menu from Start Menu dialog box, click Enable.
Note:
The Previous Policy and Next Policy buttons in the dialog box. You can use these buttons to navigate the details pane to set the state of other policies. You can also leave the dialog box open and click another policy in the details pane of the Group Policy snap-in. After the details pane has the focus, you can use the Up & Down arrow keys on the keyboard and press Enter to quickly browse through the settings (or Explain tabs) for each policy in the selected node.
- Click OK. Note the change in state in the Setting column, in the details pane. This change is immediate; it has been saved to the GPO. If you are in a replicated domain controller (DC) environment, this action sets a flag that triggers a replication cycle.
If you log on to a workstation in the reskit.com domain with a user from the Headquarters OU, you will note that the Run menu has been removed.
At this point, you may want to experiment with the other available policies. Look at the text in the
Explain tab for information about each policy.
SCRIPTS
You can set up scrits to run when users log on or log off, or when the system starts up or shuts down. All scripts are Windows Script Host (WSH)-enabled. As such, they may include Java Scripts or VB Scripts, as well as .bat and .cmd files. Links to more information on the Windows Script Host are located in the More Information section at the end of this document.
Setting Up a Logon Script
Use this procedure to add a script that runs when a user logs on.
Note:
This procedure uses the Welcome2000.js script described in Appendis A of this document, which includes instructions for creating and saving the script file. Before performing the procedure for setting up logon scripts, you need to create the Welcome2000.js script file and copy it to the HQ-RES-DC-01 domain controller.
To Set Up Logon Scripts
- In the GPWalkthrough console, double-click Active Directory Users and Computers, right-click the reskit.com domain, click Properties, and then click Group Policy.
- In the Group Policy properties page, select the Default Domain Policy GPO from the Group Policy Objects links list, and click Edit to open the Group Policy snap-in.
- In the Group Policy snap-in, under User Configuration, click the + next to Windows Settings and then click the Scripts (Logon/Logoff) node.
In the details pane, double click Logo
- The Logon Properties dialog box displays the list of scripts that run when affected users log on. This is an ordered list, with the script that is to run first appearing at the top of the list. You can change the order by selecting a script and then using the Up or Down buttons.
- To add a new script to the list, click the Add button. This displays the Add a Script dialog box. Browsing from this dialog allows you to specify the name of an existing script located in the current GPO or to browse to another location and select it for use in this GPO. The script file must be accessible to the user at logon or it does not run. Scripts in the current GPO are automatically availble to the user. You can create a new script by right-clicking the empty space and selecting New, the selecting a new file.
Note:
If the View Folder Option for this folder are set to Hide file extensions for known file types, the file may habe an unwanted extension that prevents it from being run.
- To edit the name or the parameters of an existing script in the list, select it and click the Edit button. This button does not allow the script itself to be edited. That can be done through the Show Files buttons
- To remove a script from the list, select it and click Remove.
- The Show Files button displays an Explorer view of the scripts for the GPO. This allows quick access to these files or to the place to copy support files to if the script files require them. If you change a script file name from this location, you must also use the Edit button to change the file name or the script cannot execute.
- Click on the Start menu, click Programs, click Accessories, click Windows Explorer, navigate to the Welcome2000.js file (use Apendix A to create the file), and then right click the file and select Copy.
- Close Windows Explorer.
- In the Logon Properties dialog box, click the Show Files button, and paste the Welcome2000.js script into thed default file location.
- Close the Logon Window.
- Click the Add button in the Logon Properties dialog box.
- In the Add a Script dialog box, click Browse, then in the Browse dialog boxk, double-click the Welcome2000.js file.
- Click Open.
- In the Add a Script dialog box, click Ok (no script parameters are needed), and then click Ok again.
You can then logon to cl;ient workstation that has a user in the
Headquarters OU, and verify that the script is run when the user logs on.
Setting Up a Logoff or Computer Startup or Shutdown Script
You can use the same procedure outlined in the preceding section to setup scripts that run when a user logs off or when a computer start up or is shut down. For logoff scripts, you would select
Logoff in step 4.
Other Script Considerations
By default, Group Policy scripts that run is a command Window (such as .bat or .cmd files) run hidden, and legacy scripts (those defined in the user object are by default visible as they are processed (as was the case for Windows NT 4.0), although there is a Group Policy that allows this visibility to be changed. The policy for users is called
Run logon scripts visible or
Run logoff script visible, and is accessed in the
User Configuration\Administrative Templates node, under
System\Logon/Logoff. For example, the policy is
Run startup scripts visible and can be accessed in the
Computer Configuration\Administrative Templates node, under
System\Logon.
Security Group Filtering
You can refine the effect of any GPO by modifying the computer or user membership in a security group. To do this, you use the
Security tab to set Discretionary Access Control Lists (DACLs) for the properties of a GPO. DACLs are used for performance reasons, the details of which are contained in the Group Policy technical paper referenced earlier in this document. This feature allows for tremendous flexibility in designing and deploying GPOs and the policies they contain.
By default, all GPOs affect all users and machines that are contained in the linked site, domain, or OU. By using DACLs, the effect of any GPO can be modified to exclude or include the members of any security group.
You can modify a DACL using the standard Windows Server 2008
Security tab, which is accessede from the
Properties page of any GPO.
To access a GPO Properties page from the Group Policy Properties page of a Domain or OU
- In the GPWalkthrough console double-click Active Directory Users and Computers, double-click the reskit.com domain, double-click Accounts, right-click the Headquarters OU,and the click Properties.
- In the Headquarters Properties dialog, click Group Policy.
- Right-click the HQ Policy GPO from the Object links list and select Properties from the context menu.
- in the Properties page, click the Security tab. This displays the standard Security properties page.
You will see security groups and users based on the Common Infrastructure. For more information, see the Windows Server 2008 step-by-step guide, A Common Infrastructure for Change and Configuration Management. Make sure that you have completed the appropriate steps in that document before continuing.
- In the Security property page, click Add.
- In the Select Users, Computers and Groups dialog box, select the Management group from the list, click Add, and click OK to close the dialog.
- In the Security tab of the HQ Policy Properties page, select the Management group and view the permissions. By default, only the Read Access Control Entry (ACE) is set to Allow for the Management Group donot have this GPO applied to them unless they are also members of another groiup (by default, there are also Authenticated Users) that has the Apply Group Policy ACE selected.
At this point, everyo0ne in the Authenticated USers group has this GPO applied, regardless of having added the Management group to the list.
- Configure the GPO so that it applies to the members of the Management group only. Select Allow for the Apply Group Policy ACE for the Management group and then remove the Allow Group Policy ACE from the Authenticated Users group.
By changing the ACEs that are applied to different groups, administrators can customise how a GPO affects the users or computers that are subject to the GPO. Write access is required for modifications to be made; Read and Allow Group Policy ACEs are required for a policy to affect a group (for the policy to apply to the group).
Use the Deny ACE with caution. A Deny ACE setting for any group has precedence aver any Allow ACE given to a user or computer because of membership in another group. Details of this interaction may be found in the Windows Server 2008 Server online Help by searching on Security Group.
Note:
You can use these same types of security options with the Logon scripts you set up in the preceding section. You can set a script to run only for members of a particular group or for everyone except the members of a specific group.
Security group filtering has two functions: the first is to modify which group is affected by a particular GPO and the second is to delegate which group of administrators can modify the contents of the GPO by restricting Full Control to a limited set of administrators (by a group). This is recommended because it limits the chance of multiple administrators making changes at any one time.
Blocking Inheritance and No Override
The Block Inheritance and No Override features allow you to have control over the default inheritance rules. In this procedure, you set up a GPO in the Accounts OU, which applies by default to the users (and computers) in the Headquarters, Production and Marketing OUs.
You then establish another GPO in the Account OU and set it as No Override. These settings apply to the children OUs, even if you set up a contrary setting in a GPO scoped to that OU.
You then use the Block Inheritance feature to prevent Group policies set in a parent site, domain or OU (in this case, the Accounts OU) from being applied to the Production OU.
A description of how disable portions of a GPO to improve performance is also included.
Setting Up the Environment
You must first set up the environment for the procedures in this section.
To Set Up the GPO Environment
- Open the saved MMC GP console GPWalkthrough and the open the Active Directory User and Computer node.
- Double-click the reskit.com domain and then double-click the Account OU.
- Right-click the Account OU and select Properties from the context menu and click the Group Policy tab.
- Click New to create a new GPO called Default User Policies.
- Click New to create a new GPO called Enforced User Policies.
- Select the Enforced Users Policies GPO and click the Up button to move it to the top of the list. The Enforced User Policies GPO should have the highest precedence. Note that this step only serves to demonstrate the functionality of the Up button; an enforced GPO always takes precedence over those that are not enforced.
- Select the No Override setting for the Enforced User Policies GPO by double-clicking the No Override column or using the Options button.
- Double-click the Enforced User Policies GPO to start the Group Policy snap-in.
- In the Group Policy snap-in, under User Configuration, click Administrative Templates, click System and then click Logon/Logoff.
- In the details pane, double-click the Disable Task Manager policy, click Enabled in Disable Task Manager dialog box and the click OK. For information on the policy, click the Explain tab.
- Click the Close button to exit the Group Policy snap-in.
- In the Accounts Properties dialog box, on the Group Policy tab, double-click the Default User Policy GPO from the Group Policy Object link list.
- In the Group Policy snap-in, in the User Configuration node, under Administrative Templates, click the Desktop node, click the Active Desktop folder, and then double click the Disable Active Desktop policy on the details pane.
- Click Enable, click OK and click Close.
- In the Accounts Properties dialog box, click Close.
You can now log on to a client workstation an any user in any of the OUs under the Accounts OU. Note that you cannot run the Task Manager--the tab is unavailable from both CTRL+SHIFT+ESC and CTRL+ALT+DEL. In addition, the Active Desktop cannot be enabled. When you right-click on
Desktop and select
Properties, you will that the
Web tab is missing.
Ad an extra step, you can reverse the setting of the Disable Task Manager policy in a GPO that is linked to any of the child OUs of the Accounts OU (Headquarter, production, Marketing). To do this change the radio button for that policy.
Note: Doing this has no effect file the Enforced User Policies GPO is enabled in the Accounts OU.
Disabling Portions of a GPO
Because these GPOs are used solely for user configuration, the computer portion of GPO can be turned off. Doing so reduces the c omputer startup timed, because the Computer GPOs do not have to be evaluated to determine if any policies exit. In this procedure, no computers are effected by these GPOs. Therefore, disabling a portion of the GPO has no immediate benefit. However, since these GPOs could later be linked to a different OU that may include computers, you may want to disable the computer side of these GPOs.
To Disable the Computer Portion of a GPO
- Open the saved MMC console GPWalkthrough and then double-click the Active Directory User and Computer node.
- Double-click the reskit.com domain.
- Right-click the Account OU select Properties from the context menu and click Group Policy tab.
- In the Accounts Properties dialog box, click the Group Policy tab, right-click the Enforced User Policy GPO and select Properties.
- In the Enforced User Policies Properties dialog box, select the General tab and then select the Disable computer Configuration Setting check box. In the Confirm Disable dialog box click Yes.
Note that the General properties page includes two check boxes for disabling a portion of the GPO.
- Repeat steps 4 & 5 for the Default User Policies GPO.
Blocking Inheritance
You can block interitance so that one GPO does not inherit policy from another GPO in the hierarchy. After you block inheritance, only those settings in the Enforced User Policies affect the Users in this OU. This is simpler than reversing each individual policy in a GPO scoped at this OU.
To Block Inheritance of Group Policy for the Production OU
- Open the saved MMC console GPWalkthrough and then double-click the Active Directory User and Computer node.
- Double-click the reskit.com domain and then double-click the Accounts OU.
- Right-click the Production OU, select Properties from the context menu and then click the Group Policy tab.
- Select the Block Policy Inheritance check box and click OK.
To verify that inherited settings are now blocked, you can logon as any user in the Production OU. Notice that the Web tab is present in the Display setting properties page. Also, note that the task manager is still disabled, as it was set to No Override in the parent OU.
Linking a GPO to Multiple Sites, Domain and OUs
This section demonstrates how you can link a GPO to more than one container (site, domain or OU) in the ACtive Directory. Depending on the exact OU configuration, you can use other methods to achieve similar Group Police effects; for example, you can see security group filtering or you can block inheritance. In some cases, however, those methods do not have the desired affects. Whenever you need to explicity stat which sites, domains, or OUs need the same set of policies, use the method outlined below:
To Link a GPO to Multiple Sites, Domain and OUs
- Open the saved MMC console GPWalkthrough and then double-click the Active Directory User and Computer node.
- Double-click the reskit.com domain, and double-click the Account OU.
- Right-click the Headquarter OU, select Properties from the context menu and then click the Group Policy tab.
- In the Headquarters Properties dialog box, on the Group Policy tab, click New to create a new GPO named Linked Policies.
- Select the Linked Policies GPO and click the Edit button.
- In the Group Policy snap-in, in the User Configuration node, under Administrative Templates node, click Control Panel, and then click Display.
- On the details pane, click the Disable Changing Wallpaper policy and the click Enabled in the Disable Changing dialog box and click OK.
- Click Close to exit the Group Policy snap-in.
- In the Headquarters Properties page, click Close.
Next you will link the
Linked Policies GPO to another OU.
- In the GPWalkthrough console, double-click the Active Directory User and Computers node, double-click the reskit.com domain and then double click the Accounts OU.
- Righ-click the Production OU, click Properties on the context menu and then click the Group Policy tab on the Production Properties dialog box.
- Click the Add button or right-click the blank area of the Group Policy Object Links list and select Add on the contxt menu.
- In the Add a Group Policy Object Link dialog box, click the down arrow on the Look in box, and select the Accounts.reskt.com OU.
- Double-click the Headquarter.Account.reskit.com OU from the Domain, OUs and linked Group Policy Objects list.
- Click the Linked Policies GPO amd then click OK.
You have now linked a single GPO to two OUs. Changes mad to the GPO in the either location result in a change for both OUs. You can test this by changing some policies in the
Linked Policies GPO, and then logging onto a client in each of the affecte OUs,
Headquarters and
Production.
Loopback Processing
This session demonstrates how to use the loopback processing policy to enable a different set of user type Group Policies based on the Computer being logged onto. This policy is useful when you need to have user type policies applied to users of specific computer. There are two methods for doing this. One allows for the policies applied to the user to be processed, but to also apply user policies based on the computer that the user has logged onto. The second method does not apply the user's settings based on where the user object it, but only processed the policies based on the computer's list of GPOs. Details on this method can be found in the Group Policy white paper referred to earlier.
To Use the Loopback Processing Policy
- In the GPWalkthrough console, double-click the Active Directory User and Computer node, double-click the reskit.com domain and then double-click the Resources OU.
- Right-click the Desktop OU, click Properties on the context menu and then click the Group Policy tab on the Desktop Properties dialog box.
- Click New to create a new GPO named Loopback Policy.
- Select the Loopback PoliciesGPO and click Edit.
- In the Group Policy snp-in, under the Computer Configuration node, click Administrative Templates, click System, and then Click Group Policy.
- In the details pane, double-click the User Group Policy loopback processing mode policy.
- Click Enable in the User Group Policy loopban processing mode dialog box, select Replace in the Mode drop-down box and then click OK to exit the property page.
Next, you will set several
User Configuration policies by using the
Next Policy navigation buttons in the dialog box.
- In the Group Policy snap-in, under the User Configuration mode, click Administrative Templates and click Strat Menu & Taskbar.
- In the details pane, double-click the Remove user's folders from the Start mune policy, and then click Enabled in the Remove user's folder form the Start menu dialog box.
- Click Apply to apply the policy, and click the Next policy button to go on to the next policy. Disable and remove links to Windows update.
- In the Disable and Romove Links to Windows Update dialog box, click Enable, click Apply, and then click the Next Policy button.
- In each of the following policies' dialog boxes, set the state of the policies as Indicated on the list below.
Policy Setting
- Remove common program groups from Start Menu Enabled
- Remove Documents from Start Menu Enabled
- Disable programs on Settings Menu Enabled
- Remove Network & Dial-up Connections from Start Menu Enabled
- Remove Favorites Menu from Start Menu Enabled
- Remove Search Menu from Start Menu Enabled
- Remove the Help Menu from Start Menu Enabled
- Remove Run Menu from Start Menu Enabled
- Add Logoff on the Start Menu Enabled
- Disable Logoffon the Start Menu Not Configured
- Disable and remove the Shut Down Commond Not Configured
- Disable drag-and-drop context menus on the Start Menu Enableed
- Disable changes to Taskbar and Start Menu Setting Enabled
- Disable Context menus for the taskbar Enabled
- Donot keep history of recently opened documents Enabled
- Clear history of recently opened documentsw on exit Enabled
- Click OK when you have set the last policy from the list in step 5.
- In the Group Policy console tree, navigate to the Desktops node under User Configuration\Administration Templates, and set the following policies to Enable.
Policy Setting
- Hide Remove My Document from Start Menu Enabled
- Hide My Network Places icon on desktop Enabled
- Hide Internet Explorer icon on desktop Enabled
- Prohibit user from changing My Documents path Enabled
- Disable adding, dragging, dropping and closing the taskbar's toolbars Enabled
- Disable adjusting desktop toolbars Enabled
- Don't save settings at exit Enabled
- Click OK when you have set the last policy from the list in step 7.
- In the Group Policy console tree, navigate to the Active Desktop node under User Configuration\Administrative Templates\Desktop, set the Disable Active Desktop policy to Enabled, and then click OK.
- In the Group Policy console tree, navigate to the Control Panel node under User Configuration\Administrative Templates, click the Add/Remove Programs nod, double-click the Disable Add/Remove Programs policy, set it to Enabled, and then click OK.
- In the Group Policy console tree, navigate to the Control Panel node under User Configuration\Administrative Templates, cllick the Display node, double-click the Disable display in control panel policy, set it to Enabled, and then click OK.
- In the Group Policy snap-in, click Close.
- In the Desktops Properties dialog box, click Close.
At this point, all users who log on to computers in the
Desktops OS have no policies that would normally be applied to them; instead, they have the user policies set in the
Loopback Policies GPO. You may want to use the procedures outlined in the section on Security Group Filtering to restrict this behavior to specific groups of computers, or you may want to move some computers to another OU.
For the following example, a security group callec
No Loopback is created. To do this, use the
Active Directory Users & Computers snap-in, click the
Group container, click
New, and create this global security group.
In this example, computers that are in the
No-Loopback security group are excluded from this loopback policy, if the following steps are taken:
- In the GPWalkthrough console, double-click Active Directory User & Computers, double-click risket.com,m double-click Resources, right-click Desktop and then select Properties.
- In the Desktop Properties dialog box, click Group Policy, right click the Loopback Policy GPO, and then select Properties.
- In the Loopback Policies Properties page, click Security, and select Allow for the Apply Group Policy ACE for the Authenticated User group.
- Add the No Loopback group to the Name list. To do this, click Add, select the No Loopback group, and click OK.
- Select Deny for the Apply Group Policy ACE for the No Loopback group, and click OK.
- Click OK in the Loopback Policies Properties page.
- Click Close in the Desktop Properties dialog box.
- In the GPWalkthrough console, click Save on the Console menu.
Other Group Policy Secnarios
Now that yoiu familiar with the methodologies for administrating Group Policy, you may want to set up some security policies, perform some software installation and maintenance, and redirect some user folder--such as the My Documents folder. These topics are covered in detail in the following step-by-step guides, available on the Windows Server 2008 Server Web site.
- Deploying Security Policies
- Software Installation and Maintenance
- User Data and Settings Management