Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2008 R2 Administration : Managing Users with Local Security and Group Policies (part 1) - Viewing Policies with the Group Policy Management Console & Creating New Group Policies

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/5/2011 3:43:48 PM
Windows Server 2008 R2 systems provide local security policies to manage user and group administrative access on a per-server basis. Within Active Directory, you can use group policies to set configurations and security on a specified collection of computers, users, or groups of users from a single policy. These policies can be used to deliver standard desktop configurations and security settings for server access and application functionality. Also, policies can set user configurations to deliver software on demand, redirect desktop folders, plus affect many more settings. Many settings within each policy explain what the setting controls and whether computer-based settings apply to only Windows XP, Windows Vista, or Windows 7 workstations.

Viewing Policies with the Group Policy Management Console

You can view Active Directory-based group policies or server and workstation local security policies with very little effort by using a single console, the Group Policy Management Console (GPMC). This tool is added to the Server Manager console when the Active Directory Domain Services role is added to a server. The GPMC enables administrators to view group policies, edit group policies, and model the effects of combinations of group policies (that is, model the resulting configuration).

To open an existing policy, follow these steps:

1.
Launch Server Manager on a domain controller.

2.
Expand the Features folder.

3.
Expand the Group Policy Management Console.

4.
Expand the Forest folder.

5.
Expand the Domains folder.

6.
Expand the specific domain, such as companyabc.com.

7.
Select a Group Policy Object, such as the Default Domain Policy. Click OK to close the linked policy warning window.

8.
Select the Settings tab to review the settings. Or right-click the Group Policy Object, and select Edit to change the settings.

After you access the policy, you can view each setting or settings container to determine the default value and, in some cases, learn what the setting controls. Keep in mind that, with the correct level of permissions, any changes you make to this policy are live changes; there is no undo other than reversing the individual setting changes or performing an authoritative restore of Active Directory.

Creating New Group Policies

When changes need to be made or tested using group policies, the administrator should leave the production environment untouched and create test policies in isolated test lab environments. When test labs are not available or cannot replicate the production environment, the administrator can test policies in isolated organizational units within a domain. Also, if domain- or site-based policies need to be created for testing, security filtering could be modified to apply the policy only to a specific set of test users or groups.

The preceding section described how to locate a group policy. Using the Group Policy Management Console, you can also create, configure, and open site, domain, and organizational unit (OU) group policies for editing.

In some cases, it will be necessary to prevent a GPO from being applied to a user or computer. That is, there might be a GPO that applies to all members of a department, but it is necessary to make a single exception to the rule. Rather than create a specific OU to apply the GPO, security filtering can be used to allow or deny the application of the Group Policy Object.

The following steps outline how to create a new domain-based policy and configure its security filtering to apply to a single user:

1.
Launch Server Manager on a domain controller.

2.
Expand the Features folder.

3.
Expand the Group Policy Management Console.

4.
Expand the Forest folder.

5.
Expand the Domains folder.

6.
Select the specific domain, such as companyabc.com.

7.
Right-click on the domain and select Create a GPO in This Domain, and Link It Here.

8.
Type in a descriptive policy name, leave the source starter GPO set to None, and click OK to create the policy.

Note

Source starter GPOs are GPO templates that can be used to prepopulate settings in GPOs. If there are common settings that will go into GPOs, they can be created in starter GPOs and then seeded into new GPOs as they are created.

The starter GPOs are stored in a common folder named StarterGPOs. Any GPOs created in this folder are available for seeding GPOs. There are no starter GPOs in a domain by default.

9.
The new policy will be displayed in the right pane. Right-click the new policy and select Edit to launch the Group Policy Management Editor snap-in.

10.
Right-click the GPO name in the Group Policy Management Editor, and select Properties.

11.
Select the Security tab and highlight the Authenticated Users entry.

12.
In the Permissions section, scroll down and uncheck the Allow check box for Apply Group Policy. This means that the GPO will not take effect on any user or computer.

13.
Select each entry in the Group Policy access control list and verify that no existing groups are allowed to apply Group Policy.

14.
Click Add and type in the name of a user or group. To find a list of users and groups within the current domain, click the Advanced button, and in the search window, click Find Now to return the complete list. Scroll down and select the users or groups you want, and click OK.

15.
Click OK to add the entries to the policy.

16.
Back in the security window, select the respective entry and check the Allow check box for Apply Group Policy, as shown in Figure 1. This means that the GPO will take effect on the members of this group, which could include both users and computers. Click OK when you’re finished.

Figure 1. Modifying a group policy’s application scope.


17.
Close the Group Policy Management Editor snap-in.

Now the group policies set in the GPO will affect only the users or computers that were specified—in this case, members of the Oakland Help Desk. This allows for fine-grained application of group policies to targeted groups.

Other -----------------
- Windows Server 2008 R2 Administration : Creating Groups
- Examining Windows Server 2008 R2 Active Directory Groups
- Windows Server 2008 R2 Administration : Configuring Sites (part 2) - Establishing Site Links & Delegating Control at the Site Level
- Windows Server 2008 R2 Administration : Configuring Sites (part 1) - Creating a Site
- Windows Server 2008 R2 Administration : Examining Active Directory Site Administration
- Windows Server 2008 R2 Administration : Defining the Administrative Model
- Migrating to Windows Server 2008 R2 : Lab-Testing Existing Applications
- Migrating to Windows Server 2008 R2 : Verifying Compatibility with Vendors
- Migrating to Windows Server 2008 R2 : Researching Products and Applications
- Migrating to Windows Server 2008 R2 : Preparing for Compatibility Testing
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server