DESKTOP

Windows Server 2003 : Using AD to Support Network Administration - Using Group Policy to Manage Network Protocols

4/14/2013 7:18:11 PM

Some network configuration settings for domain member computers and users with domain accounts can be set in Group Policy. When they are set here, they can automatically update multiple domain member computers.

These Group Policy settings reside in nodes under the Computer Configuration node and affect computers with accounts in the organizational unit (OU), domain, or site object to which the Group Policy Object (GPO) is defined. Organizational units are subdivisions of domains and can contain user and computer accounts and records for shares and printers. Those settings in nodes under the User Configuration node affect users whose accounts reside in the OU, domain, or site object to which the GPO is linked. Computers and users are also affected by GPOs linked to the parent objects of the object their account resides in.

1. Dependency of Group Policy on DNS

Group Policy settings are downloaded and applied during computer startup and user logon from the authenticating domain controller. The following DNS issues can affect whether the correct GPOs are downloaded and applied:

  • If a domain controller cannot be located, no Group Policy can be downloaded. While Group Policy cached from a previous connection can be used, any changes to Group Policy will not be available. Domain controller connectivity requires a DNS lookup of the DC IP address.

  • If site information is incorrectly configured in DNS, it is possible that the wrong Group Policy may be applied.

  • Group Policy changes are replicated, partly through AD Replication and partly through the File Replication Service (FRS). Both services are dependent on locating designated DCs. If DNS is not functioning correctly, then replication cannot occur or will not be synchronized. (Elements replicated by AD and by FRS must match.)

As you can imagine, Group Policy is a powerful administrative tool. While it can and should be used for multiple administrative functions, it cannot be used for all of them. It does not have the capability to provide extensive help for all TCP/IP or AD functions. There are, however, several TCP/IP, DNS, Windows Time Service, and SNMP configuration settings that can be made using Group Policy.

2. Managing TCP/IP Configuration Using Group Policy

Management of TCP/IP settings is primarily accomplished using DHCP to provide dynamic addressing, including information on the preferred DNS server. However, some configuration can be done using Group Policy for both users and computers. These settings are in the Network Connection nodes. Table 1 lists and explains settings for computer, while Table 2 lists and explains those for users. The first column lists the setting, while the second column explains it. The Computer Configuration, Administrative Templates, Network, Network Connection node contains settings useful in managing TCP/IP configuration that are not available via DHCP. Settings are described in Table 1. Three of the settings (those that impact Internet Connection Sharing, Internet Connection Firewall, and the network bridge) are location-aware (that is, the setting has no meaning if the computer is connected to a different DNS domain network than the one it was connected to when the setting was applied).

Table 1. Computer-based TCP/IP configuration via Group Policy
Group policy TCP/IP settingExplanation
Prohibit use of Internet Connection Sharing on your DNS domain networkIf disabled, an administrator can enable and configure the Internet Connection Sharing (ICS) feature of an Internet connection (if the ICS service can run on the computer). ICS lets a Windows computer act as an Internet gateway for a small network and provides network services such as DHCP to the private network. Enabling this setting prohibits the configuration of ICS and also removes the Advanced page of the Properties pages of a LAN or remote access connection. The Internet Connection Sharing page is removed from the New Connection wizard and the Network Setup wizard is disabled.
Prohibit use of Internet Connection Firewall on your DNS domain networkIf enabled, prevents the use of the Internet Connection Firewall on the DNS domain network. Enabling this setting also removes the Advanced page of the Properties pages of a LAN or remote access connection. The Internet Connection Firewall page is removed from the New Connection wizard and the Network Setup wizard is disabled. If disabled, ICF is disabled when a LAN connection or VPN connection is created, but users can use the Advanced tab in the connection properties to enable it.
Prohibit installation and configuration of Network Bridge on your DNS domain networkIf enabled, the user cannot install or configure a network bridge on a computer with two or more networks. A network bridge is a layer 2 MAC bridge that allows the connection of two or more network segments. If the setting is disabled (or not configured), users can create and modify a network bridge. If a network bridge is created before this setting is enabled, the existing network bridge is not affected. (Creating a network bridge is disabled by default and requires administrator privileges to create or configure.)
IEEE 802.1x Certificate Authority for Machine Authentication802.1x authentication can be configured to require client (machine) certificates. If this is the case, a certificate must be acquired and installed on each client that will use the service. This setting enables the distribution of information on the Certification Authority that is used to sign the certificates issued to clients.

Table 2. User TCP/IP Group Policy settings
Group policy TCP/IP settingExplanation
Ability to rename LAN connections or remote access connections available to all usersIf enabled, all users can rename connections. If disabled (and the policy Enable Network Connection settings for Administrators is also enabled), users and Administrators cannot rename connections.
Prohibit access to properties of components of a LAN connectionIf enabled (and the policy Enable Network Connection settings for Administrators is also enabled), then the network Properties button is disabled for administrators. (By default, it is disabled for users.)
Prohibit TCP/IP advanced configurationIf enabled (and the policy Enable Network Connection settings for Administrators is also enabled), then users cannot open the Advanced TCP/IP Settings Property pages and modify IP settings such as DNS and WINS server information.
Prohibit access to the Advanced Settings item on the Advanced menuIf enabled (and the policy Enable Network Connection settings for Administrators is enabled), then Administrators cannot access this menu to configure and view bindings and the order in which computers access connections, network providers, and print providers. (Users cannot access this page by default.)
Prohibit adding and removing component for a LAN or remote access connectionIf enabled (and the policy Enable Network Connection settings for Administrators is enabled), then Administrators cannot install or uninstall network components. (Users cannot access this page by default.)
Prohibit access to properties of a LAN connectionIf enabled (and the policy Enable Network Connection settings for Administrators is enabled), then Administrators and users cannot access LAN connection properties.
Prohibit Enabling/Disabling components of a LAN connectionIf enabled (and the policy Enable Network Connection settings for Administrators is enabled), then Administrators cannot enable or disable LAN connection components. (Users cannot access this page by default.)
Ability to Enable/Disable a LAN connectionIf enabled, then users can enable/disable LAN connections.
Prohibit access to the New Connection wizardIf enabled, the Make New Connection icon does not appear in the Start menu. If the policy Enable Network Connection settings for Administrators has also been enabled, users and administrators cannot start the New Connection wizard.
Ability to rename LAN connectionsIf enabled, nonadministrators can rename a LAN connection.
Prohibit viewing of status for an active connectionIf enabled, the connection status taskbar icon and Status dialog box are not available to users, including administrators. (If you disable the setting Enable Network Connection settings for Administrators, this setting does not apply to administrators.)
Enable Windows 2000 Network Connection setting for AdministratorsWindows 2000 included a number of settings that prevented administrators from performing some actions. Windows XP, while it lists these settings, does not honor them unless this setting is enabled. For an example, see the previous setting.

Table 2 lists and describes TCP/IP configuration-related settings in the User Configuration → Administrative Templates → Network → Network Connections node.

In addition to TCP/IP configuration, Group Policy also contains useful settings that can impact the client DNS service.

3. Managing DNS Client Configuration Using Group Policy

The Computer Configuration → Administrative Templates → Network → DNS Client node contains settings you can use to manage the DNS client service. Settings are described in Table 3. Note that settings applying to dynamic DNS registration do not apply if the client is not configured for dynamic registration.

Table 3. DNS client settings
Group policy DNS settingExplanation
Primary DNS SuffixSpecifies the primary DNS suffix. If configured, this setting prevents users and administrators from changing the setting on client computers covered by the GPO. By default, computers use the local primary DNS suffix, usually the DNS name of AD domain in which is a member. However, administrators can change this. If this Group Policy setting is configured, any local setting is ignored.
Dynamic UpdateEnables or disables the dynamic update of DNS information. If enabled, settings for specific network connections can be configured individually. If disabled, computers cannot dynamically register DNS settings.
DNS Suffix Search ListSettings here will determine any DNS suffixes that should be attached to an unqualified, single-label name before submitting a DNS query. Multiple DNS suffixes can be entered here. The DNS client will attempt a query using the first suffix in the list. If that fails, the DNS client will attempt a new query using the next suffix on the list, and so on, until it obtains a successful response or until it runs out of suffixes to try. If this setting is not configured, the primary DNS suffix configured for the client will be attached to any unqualified single-label names before submitting a DNS query.
Primary DNS Suffix DevolutionSingle-label DNS names are names that do not include suffixes such as .com, .org, or .net. If DNS queries for a single-label name using the primary DNS suffix configured for the client do not work, the DNS client tries any configured connection-specific DNS suffix. If this fails, the client devolves (or removes the left-most label of the Primary DNS suffix), attaches this to the single-label name, and tries a new query. The process continues as long as there are labels that can be removed and still create a valid DNS suffix. If this setting is enabled, devolution can be used. If this setting is disabled, devolution cannot be used. If not configured, computers use their local settings.
Register PTR RecordsIf set to "Do not register," computers will never attempt PTR resource records registration. If set to Register, computers attempt PTR resource record registration even if the registration of an A record fails. (By default, PTR registration is only attempted if A record registration is successful.) If set to "Register only if A record registration succeeds," then PTR registration will only be attempted if A record registration succeeds.
Registration Refresh intervalPeriodic reregistration is attempted by Windows XP and Windows 2000 computers configured to perform dynamic registration. If this setting is enabled, the refresh interval can be set for all affected computers.
Replace address in conflictsIf enabled, DNS clients attempt to replace conflicting A resource records (that is, overwrite existing records or records containing conflicting IP addresses) during dynamic update. This setting is useful in DNS zones that do not support secure dynamic updates. It can prevent a rogue computer from overwriting a legitimate IP address.
DNS ServersDefines the DNS servers used by the DNS client for name queries. This list will supersede any locally configured or DHCP-configured DNS servers.
Connection Specific DNS SuffixDefines the connection-specific DNS suffix. This setting will supersede any locally configured or DHCP-configured DNS servers.
Register DNS records with connection specific DNS suffixIf enabled, the client can register its A and PTR records with a concatenation of its name and a connection-specific DNS suffix, as well as a concatenation of its name and is primary DNS suffix. If the setting is not configured (or not disabled), the client only registers its A and PTR records with a concatenation of its name and its Primary DNS suffix.
TTL Set in the A and PTR RecordsThe value for the Time-to-Live field in dynamically registered A and PTR resource records.
Update security levelIf "Unsecure followed by secure" is set, clients will attempt secure dynamic updates only if nonsecure updates are refused. If Only Unsecure is set, clients send only nonsecure dynamic updates.If Only Secure is set, clients only send secure dynamic updates.
Update Top Level Domain ZonesIf enabled, computers send dynamic updates to any zone that is authoritative for the resource record, except the root zone. If disabled, computers do not send dynamic updates to any zone that is not authoritative for its resource records.

4. Managing the Windows Time Service Using Group Policy

Settings for time service clients can be set in the Computer Configuration → Administrative Templates → Network, Windows Time Service node. Settings are described in Table 4.

Table 4. Windows time service Group Policy settings
Group policy time service settingExplanation
Global Configuration SettingsA number of configuration settings such as update interval and polling intervals that can be used to tweak the operation of the Time Service client.
Enable Windows NTP ClientIf disabled, the Windows NTP client will not be used. Disable this setting if you choose to use another time service. If enabled or not configured, the Windows NTP client is used for time synchronization.
Configure Windows NTP ClientDetermines whether the client uses an external timeserver or the Windows domain hierarchy. If enabled, the NTP server must be entered, as well as various settings that control the NTP client's operation (and even logging).
Enable Windows NTP ServerEnabling this setting allows the computer to respond to NTP requests.

5. Managing SNMP Using Group Policy

SNMP is not integrated with AD nor required for the operation of AD. Nevertheless, your organization may implement SNMP on the network and utilize it in the management of Windows computers that belong to an AD domain. Therefore, for completeness, the Group Policy settings that impact SNMP are listed here. The Computer Configuration → Administrative Templates → Network → SNMP node contains settings useful in managing SNMP. Settings are described in Table 5.

Table 5. SNMP Group Policy settings
Group policy SNMP settingExplanation
CommunitiesA list of communities defined to SNMP service. If enabled, SNMP only accepts request from management systems for these communities.
Permitted ManagersA list of permitted hosts that can submit a query to SNMP agent.
Traps for public communityA list of hosts that receive trap messages for the community sent by the SNMP service.

You've seen how Group Policy settings can be used to manage DNS, TCP/IP, the Windows Time Service, and SNMP, but what about other network services? There are no Group Policy-based configuration policies for network infrastructure servers such as WINS servers, Routing and Remote Access Service (RRAS) servers, or Internet Authentication Service (IAS) servers. However, there are important Group Policy-based settings that impact these network services

6. Managing WINS, RRAS, and IAS Servers Using Group Policy

WINS , Routing and Remote Access (RRAS) service , and Internet Authentication service (IAS)  are important Windows services. While there are no Administrative Templates settings for them, the System Services node of Computer Configuration, Windows Settings, Security Settings allows basic configuration of the services themselves. This node also allows service configuration for other services as well.

Two types of settings are available: startup and security. Startup settings determine whether the service is disabled or enabled. If enabled, these settings determine if it automatically starts at boot or must be manually started. Security settings can determine who can change the startup settings.

These settings can be used in two ways:

  • Enabling and starting a service that is not necessary is counterproductive for security and performance reasons. The converse is also true. If the service is disabled in Group Policy, affected computers that may be designated as network infrastructure servers will not be able to start these services and fulfill their network role. In an AD domain, care should always be taken to ensure that Group Policy is correctly configured to enable or disable appropriate services. Disabling unnecessary services can also prevent their use, should they be installed where they are not authorized. Rogue infrastructure servers can be prevented from running even if installed.

  • Using security settings can help to reduce and manage the number of administrators who can change the service startup settings. It is always a good practice to limit this authority to avoid accidental denials of service and wasted resources. This also helps to limit the risk of a successful attack based on some vulnerability in the service. If the service shouldn't be started and fewer people can start it, then there is less chance of it being incorrectly or accidentally started and thus less risk that any vulnerability can be exploited.

Other  
 
Top 10
Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
OPEL MERIVA : Making a grand entrance
FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
BMW 650i COUPE : Sexy retooling of BMW's 6-series
BMW 120d; M135i - Finely tuned
PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS