Chapter 29. Group Policy Management for Network Clients

<feature><title>In This Chapter</title> <objective>

Leveraging the Power of Group Policy

</objective>
<objective>

Baseline Administration for Group Policy Deployment

</objective>
<objective>

General Recommendations for Managing Clients Through Group Policy

</objective>
<objective>

Using Group Policy for System Updates and Patch Management

</objective>
<objective>

Real-Life Scenarios of Group Policy Management

</objective>
</feature>

Organizations that leverage the capabilities of Group Policy in Windows 2003 have realized the true potential of using policies to manage desktops and mobile users, improve network security, implement patch management routines, and perform regular maintenance tasks throughout the enterprise. By mirroring user data on servers, preventing users from loading unauthorized software, and backing up the entire state of desktops and configurations (profiles) to servers, you can secure, protect, and highly customize your workstation environment.

Furthermore, by applying system standards through group policy to particular users, groups, or sites within Active Directory, you can accommodate the diverse needs present in your organization. Different groups and individuals within any business require varying levels of access and control of your network resources. You should leverage the Group Policy management tools in such a way as to provide the specific workstation experience appropriate to the varying functional needs in your company.

This chapter concentrates on ways you can apply Group Policy tools to users and groups based on their specific needs and goals. In addition to providing general best practices, this chapter provides recommendations on how to handle particular types of network users through Group Policy.

Leveraging the Power of Group Policy

Group Policy functionality is used to deliver a standard set of security, controls, rules, and options to a user and workstation when authenticating to the domain. In addition, it can be used to configure everything from login scripts and folder redirection to enabling desktop features and preventing users from installing software on network workstations. With Windows Server 2003 and applications like Microsoft Office, Group Policy can be used to control the preferences and options available when configuring and customizing the application.

This section helps network administrators understand Group Policy and its functionality and characteristics when they manage the enforcement of policies.

Managing Group Policy

To manage Group Policy, administrators must understand that Group Policy applies only to Windows 2000 client systems, Windows XP client systems, Windows 2000 server systems, and Windows Server 2003 server systems.

To access and manage Windows Group Policy, administrators can use the Group Policy snap-in available in the Administrative Tools program group of the Windows domain controller. Another more powerful option for managing Group Policy with Windows Server 2003 is the use of the Group Policy Management Console (GPMC) tool, described in detail in Chapter 21, “Windows Server 2003 Group Policies.”

With the basic Group Policy Management snap-in, administrators are provided with a standard management console through the built-in administrative tools of Windows server. Through the standard method of accessing Group Policy, administrators are provided a single interface to access, manage, and configure policies with the standard options and functionality available in the built-in Windows tools.

Using the Group Policy Management Console tool, administrators are provided with easier access and better management capabilities of Group Policy that extend beyond the standard options available with the Administrative Tools built-in Management snap-in. GPMC also provides enhanced functionality and options for planning and testing Group Policy implementations prior to deploying and enforcing them on the Windows domain.

Note

To manage Group Policy using the GPMC tool in a Windows 2000 domain, the GPMC must be installed on a Windows XP desktop on the domain being managed.

The GPMC must be installed on Windows Server 2003 or Windows XP. The GPMC.msi package can be downloaded from http://www.microsoft.com/Windowsserver2003/downloads/featurepacks. After it is installed, it can be found in the Start menu in the Administrative Tools program group by selecting the Group Policy Management option.

Caution

Because Group Policy can have a tremendous impact on users, any Group Policy implementation should be tested with the Resultant Set of Policies tool in Planning mode. See the “Working with Resultant Set of Policies” section to learn more about testing Group Policy and using the Group Policy Management tool in Simulation mode.

Understanding Policies and Preferences

When working with Group Policy, you have two methods for making changes on the local workstations: using preferences and using policies. With both preferences and policies, changes are applied and enforced using the local Registry of the machine where they are being applied.

With preferences, changes to options such as wallpaper or screensavers and software settings are applied locally. With policies, changes to the Registry are applied that affect security and Registry keys, which are protected by Access Control Lists (ACLs).

Although Group Policy overrides preference settings when working with applications, the policy does not overwrite the preference keys when preferences are set on the local system by the workstation users. This means that if a policy is created, configured, and applied and then the policy is removed, the preferences that were set by the local user before the policy was applied will return.

This makes policies a powerful tool when a network’s administrator wants to control certain aspects of a client application or wants something the user accesses to remain static. Policies can be used to disable end users from changing the appearance, configuration, or functionality of the item to which the policy was applied.

Group Policy and Security Templates

One of the most important features for minimizing administration when working with Group Policy is leveraging security templates. Security templates are a powerful predefined set of security options available from Microsoft for applying Group Policy to a specific area or software component available to users on the network. Based on the type of users and environment needed, these templates can be a handy tool to create and enforce configuration settings on components already predefined in the template.

Available with the standard installation of Windows Server 2000 and Windows Server 2003, these templates can be downloaded and imported into Group Policy Objects (GPOs) where they can then either be implemented as is, or modified to meet the specific needs of the area in which the template applies. However, when templates are used, they are a great starting point for network administrators to obtain a base-level configuration of a client workstation’s software component or security settings.

Templates can also be used to configure settings such as account policies, event log settings, local policies, Registry permissions, file and folder permissions, and Exchange Server 2003 client settings.

Defining the Order of Application

When applying Group Policy, each policy object is applied in a specific order. Computers and users whose accounts are lower in the AD tree may inherit policies applied at different levels within the Active Directory. Policies should be applied to objects in the AD in the following order:

  1. Local security policy

  2. Site GPOs

  3. Domain GPOs

  4. OU GPOs

  5. Nested OU GPOs and on down until the OU at which the computer or user is a member is reached

If multiple GPOs are applied to a specific AD object—such as a site or OU—they are applied in the reverse order from which they are listed. This means that the last GPO listed is applied first and if conflicts exist, settings in higher GPOs override those in lower ones.

Group Policy Refresh Intervals

When Group Policy is applied, the policy is refreshed and enforced at regularly scheduled intervals after a computer has been booted and a user has logged onto the domain. By default, Group Policy is refreshed every 90 minutes on workstation and member servers within the domain.

When you need to better control the refresh interval of a group policy, the refresh interval can be configured for each group policy by changing its time in the policy configuration. Using the GPMC, refresh intervals can be configured by going to domain policy and selecting the following:

  • Computer Configuration, Administrative Templates, System, Group Policy (to change the interval for computer policies and domain controllers)

  • User Configuration, Administrative Templates, System, Group Policy (to change the interval for user policies)

Changes made to existing GPOs or new GPOs being created are enforced when the refresh cycle runs. However, with the following settings, policies are enforced only at login or when booting a workstation to the domain, depending on the GPO configuration settings:

  • Software installation configured in the Computer Policies

  • Software installation configured in the User Policies

    Note

    When working with application settings, refresh intervals can be configured and customized to fit the environment needs. You should leave the refresh interval as the default, however, unless requirements call them to be modified.

Baseline Administration for Group Policy Deployment

Now that you have a base understanding of functionality and terminology of Group Policy, you can look at usage and how the configuration of Group Policy can vary greatly with each individual implementation.

Administrators can use this information to understand the more common methods of applying permissions to Group Policy for management purposes and the tools for testing Group Policy implementations prior to deployment in the production environment.

Note

In this section, some best practices for managing Group Policy are covered. For more information and details regarding Group Policy management, view the help information for managing Group Policy with Windows Server 2000 and Windows Server 2003.

Delegating Group Policy Management Rights

It is important to delegate the proper rights for administrators to manage and manipulate Group Policy. For example, in larger organizations, a very small group of users normally has permission to edit policies at the domain level. However, when specific requirements are needed to administer applications such as the Exchange client, permissions can be granted to specific areas with the Group Policy Management Console.

When creating specific permissions with the GPMC, administrators can delegate control for other administrators to manage the following areas within Group Policy:

  • Create GPOs

  • Create WMI filters

  • Permissions on WMI filters

  • Permissions to read and edit an individual GPO

  • Permissions on individual locations to which the GPO is linked, called the scope of management (SOM)

To easily assign permissions to GPOs, administrators can use the Delegation Wizard.

Working with Resultant Set of Policies

The new GPMC tool provides administrators with an additional function called Resultant Set of Policies (RSoP) for planning and testing Group Policy implementations prior to enforcing them on domain workstations and users. Using the RSoP tool in Planning mode, administrators can simulate the deployment of a specified group policy, evaluate the results of the test, make changes as needed, and then test the deployment again. After RSoP shows that the GPO is correct, the administrator can then back up the GPO configuration and import it into production.

To run RSoP in simulation mode, right-click on Group Policy Modeling in the forest that will be simulated, and choose Group Policy Modeling Wizard. The wizard enables you to input slow links, loop-back configuration, WMI filters, and other configuration choices. Each modeling is presenting in its own report as a subnode under the Group Policy Modeling node.

Tip

Because errors in Group Policy settings can affect users and client server connectivity, any Group Policy implementation should be tested using the RSoP tool in Planning mode before applying the policy.

Managing Group Policy Inheritance

To maximize the inheritance feature of Group Policy, keep the following in mind:

  • Isolate the servers in their own OU: Create descriptive Server OUs and place all the nondomain controller servers in those OUs under a common Server OU. If software pushes are applied through Group Policy on the domain level or on a level above the Server OU and do not have the Enforcement option checked, the Server OU can be configured with Block Policy Inheritance checked. As a result, the servers won’t receive software pushes applied at levels above their OU.

  • Use Block Policy Inheritance and Enforcement sparingly to make troubleshooting Group Policy less complex.

Group Policy Backup, Restore, Copy, and Import

One new major improvement to Group Policy management offers the capability to back up (or export) the Group Policy data to a file. Using the backup functionality of the GPMC, any policy can be tested in a lab environment and then exported to a file for deployment in the production domain.

When backing up a group policy, you back up only data specific to that policy itself. Other Active Directory objects that can be linked to GPOs, such as individual WMI filters and TCP/IP security policies, are not backed up because of complications with restoration when working with these specific areas. When backup is completed, administrators can restore the Group Policy data in the same location, restoring proper functionality to misconfigured and accidentally deleted group policies.

The import functionality of the GPMC also enables administrators to take an exported Group Policy file and import the Group Policy data into a location other than its original one. This functionality is true even in scenarios in which no trust exists between domains.

Imports of Group Policy files can be completed using files from different domains, across forest domains, or within the same domain. This functionality is most powerful when you move a GPO from a test lab into production without having to manually re-create the policy setting tested in the lab environment.

Another helpful function of Group Policy Management is copying GPOs. If the administrator has configured a complex group policy and applied the setting to a specific organizational unit (OU) in the domain, the group policy can be copied and duplicated for application to another OU. When using the copy function, a new group policy is created when the copy function is performed. This new policy can then be placed and applied to the new location.

General Recommendations for Managing Clients Through Group Policy

There are some general rules of thumb to follow when using Group Policy to manage your network clients. This section details the best practices to keep in mind as you design your Group Policy solutions for most situations. It also provides some helpful tips on how to use software installations and folder redirection.

Keeping Group Policy Manageable

It has often been said that a simple solution is the best solution. Because Group Policy in Windows Server 2003 provides such a wide palette for customizing the network client experience, it can also become unwieldy as you build policy after policy in an effort to manage your environment. To avoid unnecessary complexity in your Group Policy solutions, keep the following recommendations in mind:

  • Use a common sense naming convention—. As you name the policies you build for your environment, stick to a naming convention that will help you easily identify the function of your policies. Windows Server 2003 does not prevent you from naming two policies with the same name, but it would be confusing if you did so. Also, keeping your policy names simple lends ease of designing and troubleshooting with the Resultant Set of Policy (RSoP) tools.

  • Use Block Policy Inheritance and No Override sparingly—. These features are great tools for applying Group Policy in organizations with strict hierarchical frameworks and for organizations with distributed administration. They can also make troubleshooting your policies difficult.

  • Disable unused parts of Group Policy Objects (GPOs)—. If your policy uses only User Configuration, you can disable Computer Configuration. Likewise, if you are modifying only Computer Configuration through policy, you can disable User Configuration. This will speed up the startup and logon process for those network clients receiving the policy.

  • Avoid cross-domain policy assignments—. Again, to expedite the startup and logon process, have your users receive their policy assignments from their own domain. The importance of this tip is particularly pertinent to the management of remote users.

Managing Client Software Installations

If your organization requires software installations that leverage scheduling, inventorying, reporting, or installation across a wide area network (WAN), you should add a Systems Management Server (SMS) solution to your management arsenal. If, on the other hand, you have simpler software installation and deployment scenarios, you can extend the use of Group Policy to fill this role. Keep in mind these points when deploying software to your network clients:

  • Assign or publish software to high-level Active Directory objects—. Because group policy settings apply by default to child containers, it is simpler to assign or publish applications by linking a Group Policy Object to a parent organizational unit or domain. Use security descriptors (ACEs) on the Group Policy Object for finer control over who receives the software.

  • Assign or publish just once per Group Policy Object—. For simpler management and troubleshooting, knowing that each installation package is associated with one group policy, and likewise each policy is associated with one piece of software, will alleviate future confusion. Also, do not assign or publish to both the Computer Configuration and User Configuration of a Group Policy Object.

  • Repackage existing software—. Because software is installed with Microsoft Windows Installer Packages (MSIs) via Group Policy, you may need to repackage software that is compiled with Setup.exe. Many third-party vendors supply utilities to develop installations in this native Windows format.

  • Specify application categories—. Using categories makes it easier for users to find an application in Add or Remove Programs in the Control Panel. You can define application categories, such as Engineering Applications, Marketing Applications, and so on.

Using Folder Redirection

You can use folder redirection to redirect certain special folders on the network client’s desktop to network locations. Special folders are those folders, such as My Documents, that are located under Documents and Settings. Folder Redirection is a valuable extension of Group Policy that will come into play for some of the scenarios detailed later in this chapter. The following are some basic rules of thumb to guide you when using this Group Policy extension:

  • Allow the system to create the folders—. If you create the folders yourself, they will not have the correct permissions.

  • Do not redirect My Documents to the home directory—. This feature is available but should be used only if you have already deployed home directories in your organization. Redirection to the home directory is available only for backward compatibility.

  • Enable client-side caching—. This is important for users with portable computers.

  • Synchronize offline files before logging—. This feature of folder redirection should always be enabled to ensure that current files are available to users who work offline.

  • Use fully qualified (UNC) paths—. For example, use \servershare. Although paths like c:foldername can be used, the path may not exist on all your target network clients, and redirection would fail.

Using Group Policy for System Updates and Patch Management

With security patches and updates coming on a regular basis, one of the major advantages to Group Policy is the centralized deployment options available to distribute the updates and patches. With Group Policy and the Microsoft MSI installation package format available with most updates, software updates can be deployed from the centralized administrative distribution point to a predefined set of workstations configured in the GPO settings.

Deployment Options When Updating Network Clients

Using Group Policy, network client systems can be upgraded and patched using one of the three following deployment methods:

  • Assigned to Computers—. This method of installation adds the software package to the workstation and is available when the workstation is restarted. Using this option, systems can be updated on a regular basis.

  • Assigned to Users—. When the installation package is assigned to users, Application Shortcuts are placed on the desktop of the user’s profile and on the Start menu. When these shortcuts are selected, the application installation will be initiated.

    Tip

    When using the Assigned Application options for both users and computers only, when a package is uninstalled, Group Policy automatically reassigns the installation to the user or computer.

  • Publishing the Installation—. This is the most common method of deploying software updates to client systems. When a software package is published, the installation package is displayed in the Add/Remove Programs Group in the local desktop system control panel. Users can then initiate the installation by selecting the update.

Each method enables network administrators to push MSI software update packages to the network workstation from a central location or Administrative Installation Point, to the workstation or users on the network.

Caution

Do not assign the option to install updates to Users and Computers at the same time. Assigning both options can create conflict to how updates are installed, and possibly corrupt the installation of the application or update when it is applied.

Deploying Client Updates

As with all aspects of Group Policy, the choices and configuration options of deployment updates are numerous. Regardless of which type of update package is being pushed, some basic best practices apply and can help make updates easier and less troublesome:

  • Software packages must be in the format of an MSI package. Any other format type cannot be pushed using Group Policy. Third-party applications can help the administrator create customized MSI packages to deploy any type of software, as well as software with predefined installation choices.

  • Configure software pushes at the highest levels possible in the domain. If the push is going out to more than one group or organizational unit, the software update should be configured to be pushed at the domain level. If the software update is being pushed to only a few groups or one organizational unit, or if multiple update packages are being pushed, configure the push at the group or organizational unit level.

  • Configure software pushes to the Computers configuration rather than the User configuration. This way, if users log in to multiple computer systems, updates are not applied more than once.

  • When pushing updates in multiple locations, use a technology such as Distributed File System (DFS) so software installations are installed from packages and sources close to the client being updated.

Pushing Client Updates

With the options available and a good understanding of the best practices for deploying software, the next step is to configure a Group Policy Object to push an update to the network workstation. The steps in this scenario enable administrators to push a small update package to workstations in the domain.

Begin by downloading the update and creating a share on the folder where the update will be placed. Open the GPMC by selecting Start, All Programs, Administrative Tools, Group Policy Management. To create a software update Group Policy Object, follow these steps:

  1. Select the Default Domain Policy for your domain by selecting Forest, Domains, YourCompanydomain, Group Policy Objects.

  2. Select Default Domain Policy, Action, Edit. This opens the Group Policy Editor to create the software push.

  3. Select Computer Configuration and then select Software Settings, Software Installation.

  4. From the Action menu, select New, Package.

  5. Navigate the Open dialog to the network share where the MSI was placed and select the MSI package being applied. Select Open to continue.

    Tip

    If prompted that the Group Policy Editor cannot verify the network location, ensure that the share created earlier in these steps has permission allowing users access to the share. Select Yes to continue after confirmation.

  6. At the Deploy Software dialog box, select Advance and click OK to continue. Windows will verify the installation package; wait for the verification to complete before continuing to the next step.

  7. When the Package is visible in the right window of the software installation properties, highlight the install package and click Action, Properties.

  8. On the Package properties page, select the Deployment tab. Review the configuration, click Assign, and ensure that the Install This Package At Logon option is selected. Select OK when this is complete.

The new package is ready to deploy. Test the update by logging on to a workstation and verifying that the package has installed. If problems exist, redeploy the package by selecting the software update and clicking Action, All Tasks, Redeploy Application to force the deployment.

Determining the Success of a Push

Without additional management software, administrators cannot determine whether a software package was pushed successfully, because all evidence of software pushes are seen locally on the client machines. On the local machines, there are two areas to check to determine whether a software installation was successful:

  • Look for MSI Installer events that are written into the Application Event Logs.

  • On the local machine, view Add/Remove programs to see whether the Outlook update package is listed.

Real-Life Scenarios of Group Policy Management

Now that you have some working recommendations for managing network clients with Group Policy, the remainder of this chapter guides you in a detailed fashion on Group Policy strategies for specific network client scenarios. Every organization has groups and individuals who have unique requirements of the company’s network resources. Users who dial in to the network have different needs than office workers who always work from their desks. A network administrator requires a different workstation environment than an employee with a limited set of applications. Technologies in the Windows Server 2003 framework, including Group Policy, enable you to accommodate these different needs. When you can identify the particular types of network clients that you support, you can begin to develop particular strategies and Group Policy solutions for managing those clients. The following sections address some of the most common types of network clients and provide recommendations for managing their unique scenarios.

Working with Mobile Users

Many companies have employees who either frequently travel or are located away from the typical office environment. These mobile users are unique because they usually log on to the company network through a portable computer from different locations over a slow-link dial-up modem connection. Although mobile users differ, both the slow-link connection and lack of local access should be used as the defining qualities for this type of network client. As such, your Windows Server 2003 and Group Policy strategy for managing this type of user should take into account the slow link and lack of local access.

Because mobile users are away from the local office, they are in the unique situation of often having to provide for their own computer support. As such, you may want to grant your mobile users more privileges than standard office users. To do this, you apply a Group Policy Object to your mobile clients that would allow the users to perform functions such as printer or software installs, while at the same time protect critical system files.

Mobile users also expect access to their critical data whether or not their portable computers are connected to the network. The Offline Files feature of IntelliMirror simplifies management of mobile users in that it allows the users to work on network files when they are not actually connected to the network. Even though Offline files are enabled in Windows 2000 and XP by default, you still need to select the network files and folders for synchronization before giving portable computers to the users.

To set up a folder for offline access, perform the following steps:

  1. Click the shared network folder that you want to make available offline.

  2. Select File, Make Available Offline.

  3. The Offline Files Wizard will open; click Next to continue.

  4. Choose whether or not to synchronize automatically during logon and logoff and click Next.

  5. Choose to have reminders pop up stating whether you are working online or offline and click Finish. This wizard will only appear for the first folder configured to work offline.

Note

For offline folders to work, the offline folder function needs to be enabled. To enable it, within Windows Explorer, select Tools, Folder Options. Next, click the Offline Files tab, select Enable Offline Files, and then click OK.

Combining folder redirection with offline file access makes sense for mobile users. If you redirect the My Documents folder to a network share, when users save files to My Documents, they will be automatically made available for offline use.

Note

Mobile users are likely to disconnect from their dial-up session to the network without properly logging off. It is recommended that you set offline files to synchronize when users log on and periodically synchronize in the background. This way, you can ensure that the users’ files are always up to date.

To redirect the My Documents folder to a network share, perform the following steps:

  1. Open a Group Policy Object that is linked to the organizational unit that contains the mobile users.

  2. In the console tree under user Configuration/Windows Settings, double-click Folder Redirection to display the special folder that you want to redirect.

  3. Right-click the folder that you want to redirect (in this case, My Documents) and then click Properties.

  4. On the Target tab, click Basic - Redirect Everyone’s Folder to the Same Location in the Setting area.

  5. Under Target Folder Location, click Redirect to the Following Location. In Root Path, type a UNC path (for example, \servershare). Folder redirection automatically appends the username and folder name when the policy is applied.

Software installation for mobile users requires a unique strategy. It is not recommended to assign or publish software for mobile users who are rarely in the office. If they periodically work in the office, you can set the Group Policy slow-link detection to the default in the user interface so that software will install only when the user is connected directly to the local area network (LAN).

You can verify or adjust the connection speed for Group Policy settings in the Group Policy slow-link detection setting. To do this in the Group Policy Object Editor, navigate to Computer Configuration/Administrative Templates/System/Group Policy or User Configuration/Administrative Templates/System/Group Policy.

Mobile users should not, for the most part, be running network–based applications. Typically, your mobile users’ portable computers should have all the core software installed before they have to work outside the office. If users require additional software after they are in the field and cannot return to the office to have it installed, it may make sense to copy your software packages to CD to be installed locally by the mobile users with elevated privileges.

Managing Remote Users

Remote users share many of the characteristics of the mobile users discussed in the preceding section. As such, they also benefit from many of the same technological recommendations made for managing mobile users. This includes offline file access combined with folder redirection. Remote users as a network client type may be distinguished from mobile users in that they typically connect to a network from a static location (although remote from the office), and they often benefit from a higher-speed connection such as DSL or cable modem. Whereas a traveling mobile user logs in to your network from hotel rooms and airport kiosks over a dial-up modem, the remote user often works from home and connects over a high-speed DSL or cable modem.

With the added benefit of a high-speed connection, software installations that are published or assigned through Group Policy can be implemented to remote users. This, in turn, allows you to lock down some of the privileges you may have granted to your mobile users through Group Policy (such as software installation). Preventing your remote users from installing their own software or making configuration changes to their computers reduces total cost of ownership.

If you intend to implement additional security to your remote users’ connections to the network, you should implement a virtual private network (VPN) server solution. A VPN is a Windows Server 2003 Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling Protocol (L2TP) technology deployment that creates a secure remote access network connection. Although implementing a VPN solution is outside the context of this chapter, some policy-related items should be considered.

You should create an Active Directory group (such as VPN_Users) for those remote users who will be connecting to the network over the VPN connection. You will use this group name in the conditions section of the Remote Access Policy. In the dial-in properties of each user account, you should set Control Access through Remote Access Policy.

Next, create the Group Policy Object for the Remote Access policy that will define the authentication and encryption settings for the remote users. Assuming you already have a Windows Server 2003 server configured for VPN using Routing and Remote Access, you can configure additional remote access policies through Routing and Remote Access as follows:

  1. In Routing and Remote Access, right-click Remote Access Policies, located under the Server object and choose New Remote Access Policy.

  2. The New Remote Access Policy Wizard opens; click Next on the welcome page to continue.

  3. Choose Use the Wizard to Set Up a Typical Policy for a common scenario and enter VPN authentication for the policy name. Press Next to continue.

  4. Select VPN on the Access Method property page.

  5. Grant access to the group you created for the VPN users in the User or Group Access property page.

  6. For Authentication Methods, select the appropriate authentication method that your current infrastructure supports and click Next.

  7. On the Policy Encryption Level property page, select Strong and Strongest.

  8. Click on the Policy Encryption Level page and click Finish to create the policy.

  9. Once the policy is created, double-click the policy in the right pane and, under the policy conditions section, add the Called-Station-ID and enter the Internet-based IP address of your VPN server. Your policy should look similar to Figure 29.1.

    Policy settings for routing and remote access.

    Figure 29.1. Policy settings for routing and remote access.

Locking Down Workstations

In some companies, employees have total control of their desktop computers regardless of their business function or computer expertise. When these users have problems, they call you or your IT department. This scenario proves to be very expensive to support. These support costs are decreased the more you adopt and enforce network client standards and limit the ability of users to change the standard configurations. The degree to which you choose to limit your users’ control over their desktop environment depends on the roles these users play in the company and their level of computer expertise.

You should limit some groups more than others. For example, a data entry clerk who uses a computer solely to input data into a database requires little or no control over the desktop configuration, whereas a software programmer possessing a high level of computer expertise requires more control of the desktop environment. You can create different organizational units (OUs) and apply different group policies based on the level of desktop control you allow these groups of network clients.

This section reviews Group Policy configuration recommendations for a highly managed network client. A good example of a highly managed network client would be a data entry clerk. Data entry clerks use computers to enter data that will then be available for other corporate functions. Data entry workers are dedicated to a single task and normally use a single line-of-business application (or a small number of related applications) to do their jobs. System services such as virus checkers are the only other applications installed. Bank tellers, data entry personnel, factory line workers, and transcriptionists fall into this category. These users require a standard application with no specialized or customized configurations.

To manage the data entry clerk, you should implement a highly managed configuration that does not require the user to have computer skills for data management, software installs, or system configuration. Characteristics of the policies associated with the highly managed network client include the following:

  • Desktops have a limited set of applications that the user can run. You can limit, through Group Policy, which applications the user can execute. To do this in the Group Policy Editor, navigate to User Configuration/Administrative Templates and expand Start Menu and Taskbar.

    Note

    You can launch the Group Policy Editor by right-clicking the OU and selecting the Group Policy Object tab.

  • Desktops have no Start menu and may have limited desktop icons. You need to hide Network Neighborhood and other icons that normally appear on the desktop. You can see in Figure 29.2 the many options you have for limiting the Start menu and taskbar.

  • Users cannot install software. The software the users require is already installed on their computers.

  • All data is stored on the network. You can implement folder redirection to satisfy this requirement. To set up folder redirection for a folder on your highly managed client, follow these steps:

    1. Open a Group Policy Object that is linked to the organizational unit for these clients.

    2. In the console tree under User Configuration/Windows Settings, double-click Folder Redirection to display the special folder that you want to redirect.

    3. Right-click the folder that you want to redirect (in this case, My Documents) and then click Properties.

    4. On the Target tab, click Basic - Redirect Everyone’s Folder to the Same Location in the Setting area.

    5. Under Target Folder Location, click Redirect to the Following Location. In Root Path, type a UNC path (for example, \servershare). Folder redirection automatically appends the username and folder name when the policy is applied.

  • If the highly managed users all save data to the same server volume, you can then also implement disk quotas on the network shares for them. To enable disk quotas that limit users to a particular amount of hard disk space, follow these steps:

    1. On your server, right-click the appropriate disk volume and click Properties.

    2. In the Properties dialog box, click the Quota tab.

    3. On the Quota tab, check the Enable Quota Management box.

    4. Select Limit Space To and then specify the amount of disk space.

  • You can also enforce disk quota limits through Group Policy. To do this in the Group Policy Editor, navigate to Computer Configuration/Administrative Templates/System/Disk Quotas.

  • Many users, working on different shifts or on temporary contracts, can share computers. You should set up roaming profiles so that the users’ desktop settings follow them regardless of the workstation in use. To create a roaming user profile, do the following:

    1. In Active Directory Users and Computers, right-click the applicable user account and choose Properties.

    2. In the Properties dialog box, click the Profile tab.

    3. In the Profile Path, type a path to a server share for the profile specifying the username, such as \servernameshare\%username%.

Options for limiting the Start menu and taskbar.

Figure 29.2. Options for limiting the Start menu and taskbar.

Supporting Power Users

As you can see from the preceding section, you can really lock down a network client’s ability to change the desktop standards you set in place. Of course, for many of your network clients, to have a workstation that’s too restrictive would hamper productivity and cause great frustration. There are always groups in every organization that require more control of the workstation. To meet this need, you should not have to provide complete control of your carefully designed desktop standards. You can still maintain a level of control over your network clients while at the same time provide a productive desktop environment to your more demanding users.

This section focuses on these more demanding users, who can be characterized as lightly managed network clients. A good example of a lightly managed network client is a software developer. Software developers’ job success is completely dependent on their use of technology. They require highly specialized software applications to carry out their jobs and make relatively little use of office productivity applications. These workers can be either project-driven or process-driven. Because their salaries are high and their job value is directly tied to their use of technology, computer downtime for these individuals is extremely costly. Financial traders and other types of engineers also fall into this category.

To manage your software developer network client, you should implement a lightly managed desktop policy. You can maximize the user’s ability to perform the job function by removing obstacles and distractions, while at the same time maintaining a level of manageability to reduce total cost of ownership. Characteristics of the policies associated with the lightly managed desktop include the following:

  • Users run with Power Users privileges. To give your software developers more control over their workstation than standard users, add the users’ accounts to the local Power Users group on the workstation.

  • You can also implement roaming profiles if these users will be using more than one workstation. This way, the users’ desktop settings will be consistent across the various machines they use. To create a roaming user profile, perform the following steps:

    1. In Active Directory Users and Computers, right-click the applicable user account and choose Properties.

    2. In the Properties dialog box, click the Profile tab.

    3. In the Profile Path, type a path to a server share for the profile specifying the username, such as \servernameshare\%username%.

  • Users can configure installed applications to suit their needs. Being a member of the Power Users group enables this functionality, provided you have not applied a group policy that limits the system directories on the workstation.

  • Users cannot change standard hardware settings. Unless the users are directly working with hardware that will interface with the workstation, you should maintain control of your hardware configurations. To secure many of your hardware settings through Group Policy, navigate to Computer Configuration/Windows Settings/Security Settings/Local Policies/User Rights Assignments. Drivers for a selected group of plug-and-play drivers can be preinstalled to allow the users to connect and disconnect devices (such as scanners or local printers).

  • Users cannot remove critical applications, such as antivirus software. If you repackage your antivirus software installation to create an MSI, you can specify in the package not to show this software in the Add or Remove Programs Control Panel applet. You can also prevent the files from being deleted on the workstation by setting security on those files so that they can be deleted only by an administrator.

  • Although critical data is stored on the network, users have the ability to store data locally. You should implement folder redirection and offline file access. To set up folder redirection, follow these steps:

    1. Open a Group Policy Object that is linked to the organizational unit for these clients.

    2. In the console tree under User Configuration/Windows Settings, double-click Folder Redirection to display the special folder that you want to redirect.

    3. Right-click the folder that you want to redirect and then click Properties.

    4. On the Target tab, click Basic - Redirect Everyone’s Folder to the Same Location in the Setting area.

    5. Under Target Folder Location, click Redirect to the Following Location. In Root Path, type a UNC path (for example, \servershare). Folder redirection automatically appends the username and folder name when the policy is applied.

Providing a High Level of Security

In the preceding scenarios, you were presented with recommendations on how to provide or limit particular functionality to the network client based on the role that client played in the organization. In this section, the focus is on how to increase the security of the network client. Most organizations have groups or individual network clients who work with or require access to highly confidential data. You may have such users working in the Human Resources or Payroll departments of your company. Executives in the company also fall under this category. Because these users are privileged to very sensitive information, it is important for you to secure the network accounts used to access this information as well as the means by which this data is accessed.

Though Windows Server 2003 security is addressed in Part IV, “Security,” in this book, this section outlines some security recommendations as they relate to managing high-security network clients through Group Policy.

Because you probably store sensitive data on servers that is, in turn, accessed by privileged network clients, you should secure that data as it passes from server to client. Most data is not protected when it travels across the network, so employees, supporting staff members, or visitors may be able to plug in to your network and copy data for later analysis. They can also mount network-level attacks against other computers. Internet Protocol Security (IPSec), a built-in feature of Windows Server 2003, is a key component in securing data as it travels between two computers. IPSec is a powerful defense against internal, private network, and external attacks because it encrypts data packets as they travel on the wire.

You can create and modify IPSec policies using the IP Security Policy Management snap-in available in the Microsoft Management Console. IPSec policies can then be assigned to the Group Policy Object of a site, domain, or organizational unit. If your sensitive data is located on a server, you should assign the predefined Secure Server policy to the server so that it always requires secure communication. You can then assign the predefined Client (Respond Only) policy to the network clients that will communicate with the secure server. This policy ensures that when the network client is communicating with the secure server, the communication is always encrypted. The network client can communicate normally (unsecured) with other network servers.

To assign the Client (Respond Only) IPSec policy in the Group Policy Object Editor, perform the following steps:

  1. Navigate to IP Security Policies on Active Directory under Computer Configuration/Windows Settings/Security Settings.

  2. In the details pane, click Client (Respond Only).

  3. Select Action, Assign.

Although it may be okay for your high-security network client to communicate normally (unsecured) with other servers within your organization that do not contain sensitive data, you may still want to limit that client’s ability to communicate outside the organization. You can enable several settings within Group Policy to prevent a user from modifying or creating new network connections. For example, a Group Policy setting can be applied to prohibit connecting a remote access connection.

To enable Group Policy settings related to network connections in the Group Policy Editor, navigate to User Configuration/Administrative Templates/Network. Figure 29.3 displays the settings you can enable in this category.

Settings for network connections.

Figure 29.3. Settings for network connections.

If your secure network clients save sensitive data to their local workstations, you can provide additional security to this data through the Encrypting File System (EFS). Because EFS is integrated with the file system, it is easy to manage and difficult to attack. Moreover, once a user has specified that a file be encrypted, the actual process of data encryption and decryption is completely transparent to the user. How data encryption and decryption works is explained in detail in Chapter 12, “Server-Level Security.”

To encrypt a file or folder, follow these steps:

  1. In Windows Explorer, right-click the file or folder that you want to encrypt and then click Properties.

  2. On the General tab, click Advanced.

  3. Check the Encrypt Contents to Secure Data box.

To encrypt and decrypt files, a user must have a file encryption certificate. If the file encryption certificate is lost or damaged, access to the files is lost. Data recovery is possible through the use of a recovery agent. A user account of a trusted individual can be designated as a recovery agent so that a business can retrieve files in the event of a lost or damaged file encryption certificate or to recover data from an employee who has left the company.

One of the many advantages of using Windows Server 2003 domains is that you can configure a domain EFS recovery policy. In a default Windows Server 2003 installation, when the first domain controller (DC) is set up, the domain administrator is the specified recovery agent for the domain. The domain administrator can log on to the first DC in the domain and then change the recovery policy for the domain.

If you want to create additional recovery agents, the user accounts must have a file recovery certificate. If available, a certificate can be requested from an enterprise Certificate Authority (CA) that can provide certificates for your domain. However, EFS does not require a CA to issue certificates, and EFS can generate its own certificates to users and to default recovery agent accounts.

Maintaining Administrator Workstations

At this point, you have established and applied Group Policy to all your network clients based on their function, location, and security needs to provide a productive and manageable desktop or laptop experience. You must now turn your attention to the network clients that manage the network: the administrators’ workstations. In many companies, the administrators’ workstations have no controls in place at all. The accounts the administrators use to log on to the network give them access to control every aspect of the workstation, as well as the servers. Because these accounts have so much power over the network, it is recommended that policies are in place to protect that power (see Figure 29.4). This section suggests some recommendations in the proper configuration and use of the administrator workstation.

Public key policy options and settings.

Figure 29.4. Public key policy options and settings.

To make changes in Active Directory, perform system maintenance, run backups and restores, and install software, administrators require a logon account that gives them elevated privileges. At the same time, administrators also perform normal network activity such as reading email, writing documents, and setting schedules. For this reason, administrators should have two or more accounts. They should have an account that behaves as a normal network client account with the same privileges and subject to the same Group Policy as most normal users or power users. This account would then be used as the standard logon for the administrator workstation. They should then have other accounts for workstation administration and network or domain administration that remain secure in virtue of not being used during the day-to-day network client work. Even administrators can inadvertently make damaging changes to a workstation or server configuration if they are logged in with Domain Admin privileges all the time.

The Run As feature of Windows Server 2003 and Windows 2000 can be used from an administrator workstation or any network client to elevate privileges temporarily to perform administrative functions. For example, while logged in to a workstation with a user account that has standard user privileges, you can run Active Directory Users and Computers using the Run As command to execute the utility from an administrative account.

To run an application with the Run As command, do the following:

  1. While holding down the Shift key on the keyboard, right-click the application you want to run.

  2. Click Run As.

  3. In the Run As Other User dialog box, type the username, password, and domain name of the administrative account.

It is also recommended to enforce a password-protected screensaver with a short timeout interval on administrator workstations. This protects the workstation from malicious users taking advantage of the administrator’s credentials should the administrator be temporarily away from the machine.

To specify a particular screensaver with password protection and timeout in a Group Policy, do the following:

  1. In the Group Policy Object Editor, navigate to User Configuration/Administrative Templates/Control Panel/Display.

  2. Enable the following settings: Screen Saver Executable Name, Password Protect the Screen Saver, and Screen Saver Timeout. Figure 29.5 shows these settings enabled.

    Control Panel display setting policies.

    Figure 29.5. Control Panel display setting policies.

Note

Group Policy administrators should keep in mind that user accounts belonging to the Domain Admins or Enterprise Admins groups do not have group policy applied to their accounts by default and should be enabled with extreme caution.

Finally, when you’re dealing with a large organization with distributed administration, it is a good idea to delegate authority for your network clients to administrator groups based on geographical location. Some organizations make the mistake of creating a global administrators group populated with every administrator in the company. Just because an administrator in the Santa Clara office requires administrative rights over the network clients in his office does not mean that he should also get administrative rights over network clients in Papua, New Guinea. Keeping your administrators organized also protects your network clients from receiving improper Group Policy assignments.

Summary

You can see that Group Policy in Windows Server 2003 can address network client management needs for a wide array of scenarios. You can fine-tune your management policies based on the function, location, and security needs of your users. From the scenarios examined in this chapter, you can construct management policies specific to your own organization. Although this chapter offers some solid recommendations for typical organizational groups, you may find unique management requirements in your own management design. As you begin to explore the multitude of Group Policy settings available in Windows Server 2003, keep in mind that the simplest solutions are often the best from both a management perspective and a productive end user perspective.

Best Practices

  • Stick to a naming convention that will help you easily identify the function of your policies as you name the policies you build for your environment. Windows Server 2003 does not prevent you from naming two policies with the same name, but it would be confusing if you did so.

  • Use Block Policy Inheritance and No Override sparingly. These features are great tools for applying Group Policy in organizations with strict hierarchical frameworks and for organizations with distributed administration. They can also make troubleshooting your policies difficult.

  • Disable unused parts of Group Policy Objects. If your policy uses only User Configuration, you can disable Computer Configuration. Likewise, if you are modifying only Computer Configuration through policy, you can disable User Configuration. This speeds up the startup and logon process for those network clients receiving the policy.

  • Avoid cross-domain policy assignments. Again, to expedite the startup and logon process, have your users receive their policy assignments from their own domains. The importance of this tip is particularly pertinent to the management of remote users.

  • Assign or publish software to high-level Active Directory objects. Because Group Policy settings apply by default to child containers, it is simpler to assign or publish applications by linking a Group Policy Object to a parent organizational unit or domain.

  • Assign or publish just once per Group Policy Object. Again, for simpler management and troubleshooting, knowing that each installation package is associated with one group policy and likewise each policy is associated with one piece of software will alleviate future confusion. Also, do not assign or publish to both the Computer Configuration and User Configuration of a Group Policy Object.

  • Repackage existing software. Because software is installed with Microsoft Windows Installer Packages (MSIs) via Group Policy, you may need to repackage software that is compiled with Setup.exe.

  • Allow the system to create the folders. If you create the folders yourself, they will not have the correct permissions.

  • Do not redirect My Documents to the home directory. This feature is available but should be used only if you have already deployed home directories in your organization. Redirection to the home directory is available only for backward compatibility.

  • Enable client-side caching. This is important for users with portable computers.

  • Synchronize offline files before logging. This feature of folder redirection should always be enabled to ensure that current files are available to users who work offline.

  • Use fully qualified (UNC) paths, such as \servershare. Although paths like c:foldername can be used, the path may not exist on all your target network clients, and redirection would fail.

  • Use the Offline Files feature of IntelliMirror to simplify management of mobile users. This feature allows the users to work on network files when they are not actually connected to the network.

  • Set offline files to synchronize when users log on and periodically synchronize in the background. This way, you can ensure that the users’ files are always up to date.

  • Implement a virtual private network (VPN) server solution if you intend to implement additional security to your remote users’ connections to the network.

  • Implement a highly managed configuration that does not require highly managed users to have computer skills for data management, software installs, or system configuration. If the highly managed users all save data to the same server volume, you can then also implement disk quotas on the network shares for them.

  • Implement a lightly managed desktop policy to manage your software developer network clients. These users should run with Power Users privileges. Being a member of the Power Users group enables this functionality, provided you have not applied a group policy that limits the system directories on the workstation.

  • Implement IPSec group policies and use Encrypting File System for high-security users.

  • Have administrators use standard user accounts to do their day-to-day tasks and use administrator accounts only when the task demands it. Enforce screensavers on Administrator workstations.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset