Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2012 Group Policies and Policy Management : Designing a Group Policy Infrastructure

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
10/23/2013 1:41:39 AM

1. Active Directory Design and Group Policy

A key to determining how to best design the Group Policy infrastructure is to first understand how the Active Directory infrastructure is configured. The site, domain, and OU design of an Active Directory infrastructure usually follows a few key elements, including physical office locations, network connectivity, and delegation of administration, including branch office management, separation of Active Directory management tasks, desktop and server administration, and, of course, security and reliability.

Site Group Policy Links

Group policies can be linked to Active Directory site objects. There is no default site policy created when Active Directory is first deployed. Common uses of site-linked group policies include settings related to networking, including wireless networking profiles, security configurations, and possibly site printer deployments. Considerations for determining whether a GPO should be linked at a site should include the following:

• Every object in a site, determined by the associated site subnet, will process the policy, regardless of the domain the user or computer account is located in. Is this the desired configuration?

• Does the site contain a domain controller in the domain in which the group policy is created?

• Do any of the associated site subnets include networks across slow links or VPNs? If so, changing the default values or disabling slow link detection on the site policy might be required for proper processing.

• Is there a particular security requirement for the site that required a higher level of enforced security or a required configuration or application?

Before a GPO can be linked to a site, the site must be added into the GPMC. To add an Active Directory site to the GPMC and add a GPO link, follow these steps:

1. Log on to a designated Windows Server 2012 administrative server.

2. Open the Group Policy Management Console.

3. Right-click the Sites container and select Show Sites.

4. In the Show Sites window, click the Select All button or check the box next to the site you want to add to the GPMC. Click OK to add the sites to the console.

5. In the tree pane, expand the Sites container, and right-click the desired site.

6. Select the Link an Existing GPO option.

7. In the Select GPO window, select the source domain from which you want to link the GPO.

8. In the Group Policy Objects section of the window, select the desired GPO or GPOs, and then click OK to create the link.

9. If necessary, configure the link settings for each new site link, and then close the GPMC.

Domain GPO Links

When Active Directory is deployed, two preconfigured default group policies are created. One is linked to the domain named the Default Domain Policy, and the other is linked to the Domain Controllers OU named the Default Domain Controllers Policy.

The Default Domain Policy contains the default security settings for the entire domain, including account and password policies. As a best practice, use this policy only for managing the default account policies for the entire domain. Any additional GPO settings that an organization would desire to apply to all users/computers, including domain controllers, member servers, and client workstations, should be added to new GPOs and linked at the domain level. The number of policies linked at the domain level should be kept to a minimum to ensure quality Group Policy processing performance for the organization. Changes to the default domain controller policy will be applied to all domain controllers and should also be made with caution, or implemented with different GPOs linked at the domain controller organizational unit.

Organizational Unit Links

Linking GPOs to organizational units is the most common use of GPO links. OU GPO links provide the most targeted GPO application and granular administrative control of the OU GPO-related tasks as well as the configuration and management of the objects contained in the OU. The only way to get more granular on an OU GPO link is to apply a security filter or a WMI filter on that particular GPO, but that would affect each GPO link related to that particular policy. One thing to keep in mind is that with the new GPMC functionality, administrators can force an update on computers stored within an OU, and although that doesn’t necessarily impact GPO link or placement, it does add some consideration to OU design.

2. Separation of GPO Functions

Determining which features and settings of a GPO will be utilized is one consideration; another is determining how to deploy those settings. There is one major consideration with GPO management that should be considered: Should a single GPO be created to contain all the necessary settings, or should separate GPOs be created for a particular set of features or functions?

As a best practice, separating GPO functions across multiple GPOs provides more flexibility, but that also adds time to GPO processing and increases the amount of GPO administration that needs to be performed. Separating GPOs for specific functions provides additional troubleshooting options and greater flexibility for how GPOs can be linked and filtered. As an example of how to separate GPO functions, the following list of GPOs can be applied to a Branch Office OU that contains user objects, group objects, and computer objects:

Branch Office Help Desk GPO—This GPO would configure settings to allow help desk administrators to manually run Windows Update, access all Control Panel applets, and run all software with unrestricted access. This would be the last GPO applied and would override any conflicting settings. This GPO status would be set to Computer Configuration Settings Disabled and the security filtering would be configured to use a security group called Branch Office Help Desk, which would include the help desk support staff.

Branch Office Server GPO—This GPO can contain the default security settings and soft-ware packages specific for branch office servers. Also this policy would configure specific audit settings, account management settings, and user rights assignments for servers. The GPO status would be configured for User Configuration Settings Disabled and would have a WMI filter linked that includes computers with an OS name that includes the word server.

Branch Office User GPO—This GPO can contain the default security and configuration settings to configure the end-user desktop environment, including managing Microsoft Internet Explorer settings, redirecting folders to the branch office DFSR shares, enabling offline files, mapping network drives, installing network printers, and configuring settings to hide or restrict access to specific Control Panel applets. The GPO status of this GPO would be configured to Computer Configuration Settings Disabled.

Branch Office Workstation GPO—This GPO can contain the default security settings used to manage the services, install corporate software packages and VPN clients, configure workstation security, and enable remote access. This GPO would be filtered using a WMI filter that includes only computer objects whose OS name value contained Windows 8. The GPO status would be set to User Configuration Settings Disabled. This GPO would be applied first to the workstations after local and inherited GPOs.

3. Separation of GPO by Targeting Operating System

With each release of a Microsoft client or server OS, Microsoft provides new Group Policy settings and functionality. The release of Windows 8 and Windows Server 2012 is no different; only a few new Group Policy settings will not apply to any other OSs, but most are still compatible Windows 7. These include both policy and preference settings to manage. Some of the preferences include managing power settings on Windows Vista and newer OSs as well as adding scheduled tasks and immediately scheduled tasks that will run at the next Group Policy refresh cycle.

When OS-specific Group Policy settings will be used, a best practice is to filter out all other OSs the GPO applies to. The best way to do this is with the use of a WMI filter for computers. Security filtering can also be used, but if a security group is used, a computer will only pick up group membership changes during startup, so getting application of a new policy adopted is less successful. A WMI filter will be processed by all Windows XP, Windows Server 2003, and later OSs.

Other -----------------
- Microsoft Lync Server 2013 : Deploying Lync Online - Configuring an Auto Attendant Number
- Microsoft Lync Server 2013 : Deploying Lync Online - Enabling Users for Exchange UM, Configuring a Subscriber Access Number
- Microsoft Lync Server 2013 : Deploying Lync Online - Configuring Lync-to-Phone, Creating a SIP URI Dial Plan
- Microsoft Lync Server 2013 : Deploying Lync Online - Configuring Dial-in Conferencing, Configuring Lync Properties for User Accounts
- Microsoft Lync Server 2013 : Deploying Lync Online - Adding User Accounts in Bulk, Configuring Federation and Public IM
- Microsoft Lync Server 2013 : Deploying Lync Online - Adding User Accounts Using the Online Portal
- Microsoft Lync Server 2013 : Deploying Lync Online - Adding Domains to Lync Online
- Microsoft Lync Server 2013 : Office 365 and Lync Online - Experiencing Lync Online
- Microsoft Lync Server 2013 : Office 365 and Lync Online - System Requirements
- Installing and Configuring the Basics of Exchange Server 2013 for a Brand-New Environment (part 10)
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server