Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Vista

Managing Change through Group Policy (part 1) - Working with Local Policies

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
7/18/2013 5:57:00 PM

System settings in Windows are controlled through changes in either the graphical interface or the command line. These changes are recorded in the System Registry, a central database that is located on each Windows system and is used to store configuration settings and otherwise control the behavior of a computer. As seen in Figure 1, the Vista registry is divided into hives or sections that either affect the computer or the users who rely on it to perform work. The registry can be controlled both locally and centrally, most often through a special control engine called Group Policy. Group Policy works through Group Policy Objects, special components of Windows that contain thousands of settings — about 2,450 settings in fact — each designed to control one single aspect of the operating system.

Figure 1. The Vista System Registry

GPOs are designed to define the way a system — desktop or server — appears and behaves. This includes items such as the contents of the Start menu, icons on the desktop, ability to modify the desktop, ability to run various software products, and more. GPOs can be used to manage settings that affect PCs, servers, and users. This makes GPOs not only the most powerful management infrastructure for Windows systems, but also the engine of choice for object management. This is why you should endeavor to work with and understand GPOs as much as possible.

GPOs can control several aspects of a computer. They can

  • Modify the contents of registry hives

  • Assign logon, logoff, startup, and shutdown scripts

  • Be used to redirect data folders, moving precious user data to central locations so that it can be backed up and otherwise protected

  • Deploy software to PCs

  • Manage security settings

In addition, if you don't find the one setting you need to control, you can always add a custom administrative template to the mix and make your own modifications to the systems you administer.

As seen in Figure 2, GPOs contain thousands of settings. Each can be modified within the GPO and then saved into one object. This object can then be applied to hardware, affecting computer settings and therefore any user that interacts with them. Or the object can be applied to the users themselves, making sure that no matter which system they use, it will behave in exactly the same way each time they log on to Windows Vista.

Figure 2. A Group Policy Object

GPOs can be applied singly or in combination with other GPOs. GPO settings are assigned first for computers and then for users. GPO settings are cumulative and, depending on the order they are assigned, some settings may be overridden by others. Because of this, properly designing both the content of each GPO and the order in which the GPOs will be applied to the systems under your care is important. You should ensure that each GPO you design is targeted at a single object type, whether users or computers. Segregating GPOs in this manner will not only improve the speed with which each GPO is processed, but will also help in your delegation of administration structure.

1. Working with Local Policies

Each Windows computer system includes a local Group Policy, called the Local Security Policy (LSP). The local GPO is read each time the computer is started. However, if the computer is part of a domain — a network managed by Active Directory (AD) — this local GPO is often superseded by domain or central GPOs. Generally, the Local Security Policy contains fewer settings than do its central counterparts, partly because of its purpose and intent and partly because of the mechanism it uses to apply the settings.

Although central or directory GPOs include thousands of settings that control everything from the look of the desktop to the power settings of a computer, the LSP only includes items that are focused on security. As shown in Figure 3, this includes the following:

  • Account Policies or the policies that control both password settings and account lockouts

  • Local Policies or the policies that determine if you will audit activity on the computer, which user rights you will grant, and which security options you want to set

  • Windows Firewall with Advanced Security or the settings that control which programs can talk to your computers and which programs can talk from your computer to others

  • Public Key Policies or the policies that let you encrypt data on your computer

  • Software Restriction Policies or the policies that control which software is allowed to run on your computer

  • IP Security Policies or the policies that control how secure your communications with other computers will be

Organizations often elect to include content that is normally excluded from central GPOs into the local GPO. LSPs are often ideal to special settings that need only be applied locally or because their application is resource intensive. Because the LSP is applied as soon as the computer starts, it can provide a first line of defense, even and especially if your computer is no longer connected to the network. For this reason, you should include as many settings in the LSP as possible and then copy it to each system as it is installed.

Local policies are a boon for disconnected systems, but like the connected system, they presuppose that you have some form of control over the PC. To standardize systems, you must copy the policy you want to implement onto each one and then reboot them to make sure the policy is actually applied because it is only applied at system startup. Doing this is not very effective unless you need to rely on the local policy for specific purposes.

Every computer running Windows XP, Windows Vista, or Windows Server includes a local GPO by default. The settings in this default file are applied to each computer at every startup. Organizations that want to standardize certain elements of the desktop and other computer behavior should configure this policy object with default organizational settings and make sure this file is part of the installation set for each computer. Because these GPOs are local, they can also be different on each computer. To make the best of local GPOs, you should define a given set of parameters for each computer type (workstations, mobile systems, or kiosk computers) and change them as little as possible.

The local GPO is located in the %SYSTEMROOT%\SYSTEM32\GROUP POLICY folder. To view this folder, you must enable two settings in the Folder view options (Windows Explorer => Organize Menu => Folder and Search Options => View tab):

  • Show hidden files and folders

  • Hide protected operating system files (Recommended)

If you disable the later this generates a warning dialog box. The best practice in this regard is to enable the setting to capture a copy of the local GPO you want to deploy, then disable the setting afterward.

Local Security Policies are managed through a special console called Local Security Policy. This console is located in Administrative Tools.

  1. To launch the Console, go to Start Menu => Administrative Tools => Local Security Policy.

  2. Accept the User Account Control (UAC) prompt, and the Console opens. LSPs are saved in .INF format. After you've configured an LSP, you can export it by using the Action => Export policy command. Doing this is much easier than trying to use the default GPO in the Group Policy folder.

  3. Make sure that you click on the Security Settings node in the tree pane of the console to export all of the settings in the policy. By default, policies are saved to the Documents => Security => Templates folder. Subsequently, you can import the LSP into another computer by once again using the Action => Import policy command. When imported, the LSP will automatically update each of the settings you previously configured. You should add a custom LSP to each computer system as you build it.

NOTE

If Administrative Tools does not appear on the Start Menu, add it by right-clicking the Start button and then selecting Properties. Click the Customize button on the Start Menu tab, scroll down to the bottom, and select Display on the All Programs menu and the Start menu under System administrative tools. Click OK twice. Administrative Tools will now be displayed both on the Start Menu and under the All Programs banner.

Figure 3. The Local Security Policy

Local Security Policy contents

LSPs can contain several different security settings and, because they are your first line of defense, should be configured to provide a minimum level of security for each computer system connected or not in your network. Look to the recommendations of Table 1 to configure your LSP.

Table 1. Recommended Settings for Local Security Policies
SettingRecommendation
Account Policies: Password PolicyBy default, there is no password policy on Vista computers except for a request to change your password once every 42 days. Your password policy should be set as follows:
  • 24 passwords remembered in password history

  • 42 days as the minimum age

  • 1 day as the minimum age

  • 7 characters as the minimum length

  • Enable complexity requirements

  • Ignore any other settings.

Account Policies: Account Lockout PolicyBy default, there are no account lockout restrictions. Set your account lockout to:
  • 30 minutes as the lockout duration

  • 3 invalid logon attempts

  • Reset lockout counter after 30 minutes

Local Policies: Audit PolicyAudit success of every item. Audit failure only if your systems contain sensitive information. Auditing fills up the Event Log very rapidly so apply failure audits with care.
Local Policies: User Rights AssignmentThese settings are generally better left as is unless you have specific security requirements.
Local Policies: Security OptionsThese settings are generally better left as is unless you have specific security requirements.
Windows Firewall with Advanced SecurityThe firewall should be configured as on for all profiles (Domain, Private, and Public) and especially for the Public profile since it is the one that puts computers at most risk. Most applications that are designed for Vista will automatically configure firewall settings during installation so leaving the firewall on should not limit communications.
Public Key PoliciesTurn on all recommended settings (settings with the word recommended beside them) for both Certificate Path Validation Settings and Auto-Enrollment.
Public Key Policies: Encrypting File SystemTurn this on only for computers containing sensitive data.
Software Restriction PoliciesTurn this on only for computers running sensitive roles in your network.
IP Security Policies (IPSec)IPSec policies are linked with the Windows Firewall. Turn them on only for computers transferring sensitive data over the network.

NOTE

Although some of the settings in the LSP are not configured, you must remember that it is because these settings are for local computers only. Most computers linked together in a network will rely on Active Directory. They receive the most important settings from a domain controller — the server that provides central authentication services — and these settings will override those in the LSP. In fact, when computers are part of a domain, settings that include a small lock on the folder icon are provided centrally by default and cannot be changed locally.

To make any changes in the Group Policy Editor — the engine that lets you modify the contents of the LSP — use the Tree pane to click on the item to change, then move to the Details pane to double-click on the setting to change. Modify the setting through its dialog box. Use the Explain tab to find more information about each one of the settings.

Using Multiple Local Security Policies

Windows Vista has the ability to include more than one single local GPO on each computer system. It applies these local GPOs in layers much as it applies central GPOs. As in previous versions of Windows, the first layer applies it to the computer system itself. The second applies to a local group, either the Administrators or a Users group. The third can apply a local policy to specific local user accounts. This gives you a lot more control over computers that may or may not be connected to an AD structure — computers in a workgroup, for example — but it still limits you to the content of the local policy only.

By default, you can only edit one single LSP with the Local Security Policy editor in Administrative Tools. The LSP lets you modify the behavior for the local computer system only. In order to modify and create more than one LSP on a system, you need to create a custom LSP console. To do so, follow these steps:

  1. Go to Start Menu, and type mmc in the Search box and press Enter. Accept the UAC prompt. This launches a new, empty Microsoft Management Console.

  2. Go to the File menu and select Add/Remove Snap-in. The Add or Remove Snap-ins dialog box appears.

  3. Select Group Policy Object and click Add.

  4. In the Select Group Policy Object dialog box, verify that it states Local Computer and click Finish. Your first LSP is added.

  5. Repeat the process by clicking Add again. This time, click Browse in the Select Group Policy Object dialog box. Go to the Users tab and select either the Administrators or Non-Administrators group. Click OK and Finish. Your second LSP now applies to a group.

  6. Repeat Step 5 again to add the third LSP that applies to a single user, as shown in Figure 4.

  7. Click OK to close the Add or Remove Snap-ins dialog box.

  8. Choose File Save and then name the console and click Save. By default, this console will be placed in your own personal Administrative Tools folder.

  9. Modify the GPO settings according to your requirements.

  10. Save when done and close the console.

NOTE

Windows Vista and Windows Server 2008 (WS08) both support multiple local GPOs. This is done by assigning different security descriptors to each local GPO. Multiple LSPs contain much more information than a single LSP because they are actually complete Group Policy Objects.

Multiple LSPs can be useful when you have kiosk systems that require tight security when users are logged on, but that require less security when administrators are logged on. 

Figure 4. Creating a Multiple Local Security Policy
Other -----------------
- Securing the Workstation : Applying the Castle Defense System (part 7) - Working with external access - Working with Public Key Infrastructures, Working with Virtual Private Network connections
- Securing the Workstation : Applying the Castle Defense System (part 6) - Working with external access - Working with the Windows Firewall with Advanced Security
- Securing the Workstation : Applying the Castle Defense System (part 5) - Managing information access
- Securing the Workstation : Applying the Castle Defense System (part 4) - Hardening the system - USB Device Control, Windows Defender
- Securing the Workstation : Applying the Castle Defense System (part 3) - Hardening the system - User Account Control
- Securing the Workstation : Applying the Castle Defense System (part 2) - Hardening the system - Local Security Policy and security configurations
- Securing the Workstation : Applying the Castle Defense System (part 1) - Protecting information, Working with protection
- Participating in Internet Newsgroups : Setting News Options - Options for Newsgroups and Messages, Options for Individual Newsgroups
- Participating in Internet Newsgroups : Filtering Newsgroup Messages, Rating Posts
- Participating in Internet Newsgroups : Notes on Working with Newsgroup Messages, Following Up a Message, Posting a New Message
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server