DESKTOP

Settings Breakdown for Windows Server 2008 and Windows Vista : Policies (part 3) - Security Settings - Restricted Groups, System Services, Registry

10/10/2013 3:50:33 AM
2.3.3 Restricted Groups (Computer Configuration Only)

This setting allows you to centralize the group membership of both groups that reside in Active Directory and those that live locally in the Security Accounts Manager (SAM) on each computer, referred to as local groups. The setting allows you to control group membership, which includes both user accounts and group accounts. You can also control the groups in which a specified group has membership. Both options are shown in Figure 4.

Figure 4. The Restricted Groups policy allows you to control group membership.


Warning

Restricted Groups is a delete-and-replace policy. This means that if you define a list of user and group accounts to have membership in a specified group, the existing group members will first be deleted and replaced with the user and group accounts that you define in the policy.


Note

If you want to control the membership of local groups without having the delete-and-replace behavior of Restricted Groups, consider using Group Policy Local Users and Groups.


2.3.4 System Services (Computer Configuration Only)

This policy allows you to control certain aspects of services that reside on the target computer. The settings available in this policy include the ability to control the following aspects of services (also shown in Figure 5):

  • Start-up mode

  • Security permissions to control service

Figure 5. The System Services policy allows you to control the start-up mode and permissions of the service.


Note

To control more details of services that are running on target computers, you can use Group Policy Services.


2.3.5 Registry (Computer Configuration Only)

This policy is designed to control permissions on registry keys. You can control the full array of NTFS permissions, including advanced permissions, auditing, and ownership of the objects configured in the policy. After the policy is configured, you have the option of controlling whether the permissions will propagate down through the subkeys in the registry or only apply to the registry key defined, as shown in Figure 6.

Figure 6. The Registry policy allows you to control security permissions and other NTFS aspects of registry keys.


Warning

Application of permissions to registry keys can be resource intensive and cause delayed computer start-up. You should use this policy only when absolutely necessary and only after testing to ensure that the performance of the start-up is satisfactory for your production environment.

Other  
  •  Windows 8 : Managing Application Virtualization and Run Levels (part 2) - Setting Run Levels, Optimizing Virtualization and Installation Prompting for Elevation
  •  Windows 8 : Managing Application Virtualization and Run Levels (part 1) - Application Access Tokens and Location Virtualization, Application Integrity and Run Levels
  •  Windows 8 : Installing and Maintaining Applications - Managing Desktop Apps
  •  Windows Server 2003 : Managing Software Deployment with Group Policy (part 2) - Software Deployment Approaches, Distributing Windows Installer Packages
  •  Windows Server 2003 : Managing Software Deployment with Group Policy (part 1) - Software Installation Extension
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 3) - Folder Redirection Best Practices
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 2) - Policy Removal Considerations, Folder Redirection and Offline Files
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 1) - Folder Redirection, Setting Up Folder Redirection
  •  Windows 7 : Computer Management (part 2) - Shared Folders,Services
  •  Windows 7 : Computer Management (part 1) - Task Scheduler, Event Viewer
  •  
    Top 10
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
    Java Tutorials : Nested For Loop (part 1)
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS