Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2003 : Hardening Servers - Deploying Role-Specific GPOs

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
4/12/2011 11:33:19 AM

Combining GPO Policies

To modify the security configuration for a group of servers performing a particular role, without altering your baseline configuration, you can create a separate GPO for a server role and, after these computers receive the GPO containing the baseline configuration, you can apply the role-specific GPO to them. The settings in the role-specific GPO override those in the baseline. You can use the role-specific GPO to do any of the following:

  • Modify settings you configured in the baseline

  • Configure settings that are not defined in the baseline

  • Leave the baseline settings for specific parameters unchanged

Because a GPO assigned to an Active Directory container affects all the objects in that container, you must create separate organizational units for the servers running the Windows operating system on your network that are performing different roles. You can deploy your server GPOs in two ways: by creating role-specific organizational units anywhere in the Active Directory tree and assigning multiple GPOs to each organizational unit, or by creating a hierarchy of organizational units and letting group policy inheritance do some of the work for you.

Applying Multiple GPOs

When you create a GPO, you must associate it with a specific Active Directory domain, site, or organizational unit object. However, once you have created the GPO, you can link it to as many other objects as you want. Therefore, if servers running Windows Server 2003 on your network are performing different roles, you can create separate organizational units for them at the same level, as shown in Figure 1.

Figure 1. Organizational units for server roles


In the figure, you see the Domain Controllers organizational unit that the Windows Server 2003 creates by default when you create the domain, as well as new organizational units for member servers (named Members), infrastructure servers (named InfSvrs), file and print servers (named FilePrint), and application servers (named Web). To create a separate security configuration for each server role, you would use a procedure like the following:

1.
Create a new GPO for the Members container and use it to create your baseline security configuration.

2.
Create a new GPO in each of the role-specific containers and use it to create a role-specific security configuration.

3.
Link the Members GPO to each of the role-specific containers and move it to the bottom of the Group Policy Object Links list in the Group Policy tab in the Domain Controllers Properties dialog box.

Important

When you link a GPO to multiple container objects, you are only creating links between the object pairs; you are not creating copies of the GPO. Therefore, when you modify the policy settings for the GPO from one of the linked containers, the changes you make affect all the containers to which you have linked the GPO.


The order in which the GPOs appear in the Group Policy Object Links list is critical. GPOs that are higher in the list have higher priority, so that a setting in the first policy listed will overwrite a setting in the second. If you list the GPOs in the wrong order, a different set of policy values than you had planned might be in effect.

Tip

Although Active Directory objects inherit group policy settings from their parent objects by default, it is possible to block the inheritance. Display the Properties dialog box for an object, click the Group Policy tab, and then select the Block Policy Inheritance check box to prevent that object from inheriting group policy settings from its parent objects.


Creating a Container Hierarchy

Instead of manually linking your GPOs to the various organizational unit objects in your Active Directory tree, you can also create a hierarchy of organizational unit objects, as shown in Figure 2. In this figure, you see the Members organizational unit, with the role-specific organizational units beneath it.

Figure 2. An organizational unit hierarchy


As with most tree hierarchies in Windows operating systems, the properties of a parent object are passed down to the child objects beneath it. Therefore, when you create a GPO and link it to the Members container, not only the computer objects in Members receive the policy settings from the GPO; all the computers in the role-specific organizational units receive these settings.

Note

The one exception to the rule of group policy inheritance is that subdomains do not inherit group policy settings from their parent domains.


Tip

If you plan to create a hierarchy of organizational units that includes domain controllers in one of the role-specific containers, you will not be able to move the Domain Controllers organizational unit object that Windows Server 2003 creates automatically at domain creation to another location in the tree. However, you can create a new organizational unit object in the hierarchy and move the computer objects there from the Domain Controllers container.


To create security configurations for the servers in the role-specific organizational units, you create a new GPO for each container. When you do this, the policy settings in the GPOs linked to the role-specific containers take precedence over the settings for the same policies in the parent container’s GPO. The rules governing the combination of inherited and direct policy settings are as follows:

  • If the parent container’s GPO contains a policy setting, and the same policy is undefined in the child container’s GPO, the objects in the child container use the setting from the parent GPO.

  • If the child container’s GPO contains a policy setting, and the same policy is undefined in the parent container’s GPO, the objects in the child container use the setting from the child GPO.

  • If the parent container’s GPO contains a policy setting, and the same policy has a different setting in the child container’s GPO, the objects in the child container use the setting from the child GPO.

Real World: GPO Combination

When you apply multiple GPOs to a container, whether with multiple links or with a hierarchical GPO arrangement, it is important to understand the difference between an undefined policy and an explicit policy setting. An undefined policy is not necessarily the same as a Disabled setting. When you leave a policy undefined in the GPO, the computers to which that GPO applies use the operating system’s default setting, which might be Enabled, Disabled, or something else, depending on the policy. If you define a policy with an Enabled value in the parent container’s GPO, you must explicitly define the same policy in the child container’s GPO to assign it a different value, even if that value is the same as the Windows Server 2003 default setting.

Other -----------------
- Empowering Users Through SharePoint 2010 Libraries (part 2) - A Brief Tour of a Document Library & Adding Documents to a Document Library
- Empowering Users Through SharePoint 2010 Libraries (part 1) - Using the View All Site Content Page in SharePoint 2010
- Exchange Server 2010 : Prioritizing and Scheduling Maintenance Best Practices
- Exchange Server 2010 : Best Practices for Performing Database Maintenance
- BizTalk 2010 Recipes : Orchestrations - Using the Loop Shape
- BizTalk 2010 Recipes : Orchestrations - Using the Parallel Action Shape
- BizTalk 2010 Recipes : Orchestrations - Receiving Untyped Messages
- Windows Server 2008 R2 : File System Management and Fault Tolerance - Using the Volume Shadow Copy Service
- Windows Server 2008 R2 : File System Management and Fault Tolerance - Backing Up DFS
- Windows Server 2008 R2 : File System Management and Fault Tolerance - Managing and Troubleshooting DFS
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server