Group Policy
Group Policy
icy
Contents:
Module Overview
Lesson 1:
Lesson 2:
Lesson 3:
Lab:
Module Overview
Maintaining a consistent computing environment across an o
rganization is challenging. Administrators need a mechanism
to configureand enforce user and computer settings and rest
rictions. Group Policy can provide that consistency by enabli
ng administrators tocentrally manage and apply configuratio
n settings.
This module provides an overview of Group Policy and provid
es details about how to implement Group Policy.
Objectives
After completing this module, you will be able to:
Create and manage Group Policy Objects.
Describe Group Policy processing.
Implement a Central Store for administrative templates.
Lesson Objectives
After completing this lesson, you will be able to:
Describe the components of Group Policy.
Describe multiple local GPOs.
Describe storage options for domain GPOs.
Describe GPO policies and preferences.
Describe starter GPOs.
Describe the process of delegating GPO management.
Describe the process of creating and managing GPOs.
GPOs
Description
Software sett
Contain software settings that can be deployed to either the user or the compu
ings
Windows ope
Contain script settings and security settings for both user and computer, and I
rating syste
m settings
Administrativ
Contain hundreds of settings that modify the registry to control various aspect
e templates
ht be created by Microsoft or other vendors. You can add these new templates
n add to the GPME. You can download thesetemplates from the Microsoft webs
ry domaincontroller
(PDC) emulator Flexible Single Master Operations
(FSMO) role. It does not matter what computer you are using
to performthe editing, the GPMC is focused on the PDC emul
ator by default. You can, however, change the focus of the G
PMC to edit a versionon a diferent domain controller.
Characteristics of Preferences
Available Settings
Starter GPOs contain settings from only the Administrative T
emplates node of either the User Configuration section or th
e ComputerConfiguration section. The Software Settings and
Windows Settings nodes of Group Policy are not available, be
cause these nodesinvolve interaction
of services and are more complex and domain-dependent.
Domain Admins
Enterprise Admins
Creator Owner
Local System
The Authenticated User group has Read and Apply Group Poli
cy permissions only.
You can delegate the ability to create and manage WMI filter
s either through the GPMC or through the Delegation of Cont
rol Wizardin Active Directory Users and Computers.
Lesson Objectives
After completing this lesson, you will be able to:
Describe a GPO link.
Explain how to apply GPOs to containers and objects.
Describe the Group Policy processing order.
Describe the default GPOs.
Describe GPO security filtering.
GPO Links
Once you have created a GPO and defined all the settings th
at you want it to deliver, the next step is to link the policy to
an ActiveDirectory container.
A GPO link is the logical connection of the policy to a contain
er. You can link a single GPO to multiple containers by using
the GPMC.You can link GPOs to the following types of contain
ers:
Sites
Domains
Organizational Unit (OUs)
Once a GPO is linked to a container, by default
the policy is applied to all the objects in the container, and s
ubsequently all the child containers under that parent object
. This isbecause the default permissions of the GPO are such
that Authenticated Users have Read and Apply Group Policy
permission. You canmodify this behavior by managing permi
ssions on the GPO.
You can disable links to containers, which removes the confi
guration settings. You can also delete links. Deleting links do
es not deletethe actual GPO, only the logical connection to t
he container.
GPOs cannot be linked directly to users, groups, or computer
s. In addition, GPOs cannot be linked to the system container
s in AD DS,including Builtin, Computers, Users, or Managed S
ervice Accounts. The AD DS system containers receive Grou
Applying GPOs
.
3Domain GPOs. Policies that are linked to the domain are processed next. T
. olicies are processed in order of preference.
4OU GPOs. Policies linked to OUs are processed next. These policies contain
. mple, the Sales users might have special required settings. You can link a
5
Child OU policies. Any policies that are linked to child OUs are processed l
.
Objects in the containers receive the cumulative efect of all
polices in their processing order. In the case of a conflict bet
weensettings, the last policy applied takes efect. For exampl
e, a domain-level policy might restrict access to registry editi
ng tools, but youcould configure an OU-level policy and link i
t to the IT OU to reverse that policy. Because the OU-level po
licy is applied later in theprocess, access to registry tools wo
uld be available.
Note: Other methods such as Enforcement and Inheritance
Blocking can change the efect of policies on containers.
If multiple policies are applied at the same level, the adminis
trator can assign a preference value to control the order of p
rocessing.The default preference order is the order in which t
he policies were linked.
The administrator can also disable the user or computer con
figuration of a particular GPO. If one section of a policy is kno
wn to beempty, it should be disabled to speed up policy proc
essing. For example, if there is a policy that only delivers use
r desktopconfiguration, the administrator could disable the c
omputer side of the policy.
Scenario
Discussion Questions
Based on this scenario, answer the following questions:
Question: What power options will the servers in the Server
s OU receive?
Use Gpresult /H to create an HTML file that displays the current GPO s
Open the HTML report and review the results.
Use the Group Policy Modeling Wizard to simulate a policy application for
Lesson Objectives
s operatingsystems
(Windows Vista or newer or Windows Server 2008 or newer).
Because of this automatic behavior, the local workstation th
atthe administrator uses to perform administration always c
hecks to see if a Central Store exists before loading the local
ADMX andADML files in the Group Policy Management Editor
window. When the local workstation detects a Central Store,
it then downloads thetemplate files from there. In this way, t
here is a consistent administration experience among multip
le workstations.
ADM Files
Nodes
Control Panel
Network
Printers
System
Windows Components
All Settings
Section
User settings
Nodes
Control Panel
Desktop
Network
Shared Folders
System
Windows Components
All Settings
Objectives
Lab Setup
Virtual machines
20410C-LON-DC1
20410C-LON-CL1
User name
Adatum\Administra
Password
Pa$$w0rd
For this lab, you will use the available virtual machine enviro
nment. Before you begin the lab, you must complete the foll
owing steps:
1. On the host computer, click Start, point to Administrative Tools, and
2. In Hyper-V Manager, click 20410C-LON-DC1. In the Actions pane, click
3. In the Actions pane, click Connect. Wait until the virtual machine start
4. Sign in using the following credentials:
o User name: Adatum\Administrator
o Password: Pa$$w0rd
5. Repeat steps 2 and 3 for 20410C-LON-CL1. Do not sign in until directed
Scenario
A. Datum recently implemented a customized ADMX templat
e to configure an app. A colleague obtained
the ADMX files from the vendor before creating the GPO with
the configurations settings. The settings were applied to the
app asexpected.
After implementation, you noticed that you are unable to mo
dify the app settings in the GPO from any location other than
theworkstation that was originally used by your colleague. To
resolve this issue, your manager has asked you to create a C
entral Storefor administrative templates. After you create th
e Central Store, your colleague will copy the vendor ADMX te
mplate from theworkstation into the Central Store.
The main tasks for this exercise are as follows:
1. View the location of administrative templates in a Group Policy Object (
Scenario
After a recent meeting of the IT Policy committee, managem
ent has decided that A. Datum will use Group Policy to restri
ct useraccess to the General page of Internet Explorer.
Your manager has asked you to create a starter GPO that ca
n be used for all departments with default restriction setting
s for InternetExplorer. You then need to create the GPOs that
will deliver the settings for members of all departments exce
pt for the ITdepartment.
The main tasks for this exercise are as follows:
1. Create a Windows Internet Explorer Restriction default starter GPO.
2. Configure the Internet Explorer Restriction starter GPO.
3. Create an Internet Explorer Restrictions GPO from the Internet Explorer
4. Open Internet Options to verify that the General tab has been restri
5. Sign out from LON-CL1.
Results: After completing this lab, you should have created
a GPO.
Prepare for the next module
After you finish the lab, revert the virtual machines back to t
heir initial state. To do this, complete the following steps:
1. On the host computer, start Hyper-V Manager.
2. In the Virtual Machines list, right-click 20410C-LON-DC1, and then c
3. In the Revert Virtual Machine dialog box, click Revert.
4. Repeat steps 2 and 3 for 20410C-LON-CL1.
Lab Review Questions
Question: What is the diference between ADMX and ADML
files?
Question: The Sales Managers group should be exempted fr
om the desktop lockdown policy that is being applied to the
entireSales OU. All sales user accounts and sales groups resi
de in the Sales OU. How would you exempt the Sales Manag
ers group?
Question: What Windows command can you use to force th
e immediate refresh of all GPOs on a client computer?
Best Practices
All users in a particular OU are having issues, andthe OU has multiple GPOs applied.
Tools
Tool
Use
onsole (GPMC)
Group Policy Management E
ditor snap-in
Resultant Set of Policy
(RSoP)
Group Policy Modeling Wizar