DESKTOP

Windows Server 2008 R2 : Administering group policy (part 1) - Overview of Group Policy

6/1/2014 4:34:05 AM

Group Policy is widely used in Windows networks of all sizes to manage various user and computer policies. In this section, we will explore Group Policy and how to properly deploy it within an AD domain.

1. Overview of Group Policy

Group Policy was first introduced in Windows Server 2000 AD and was widely adopted as the standard method to manage user and computer configurations for Windows networks. Group Policy allows administrators to set and enforce settings on users and computers within the domain. These settings include security settings, restricting access to specific parts of the OS, and deploying software. At the core of the Group Policy is GPOs. GPOs contain the settings you wish to apply to computers or users and are applied locally or to sites, domains, or OUs within AD.

Group Policy links and security filtering

GPOs can be linked to AD sites, domains, or OUs. They can also be set up locally on individual computers. As you develop your GPOs, you will need to understand what objects you wish to apply the settings to. For example, if you want to prevent access to the Windows control panel for all users in the HR department, you could apply a GPO with those settings to the OU containing all the users in HR. Maybe you want to configure a specific Internet Explorer homepage for every user in the New York location. You could create a GPO with the IE settings defined and apply it to the New York AD site.

In addition to linking GPOs, you can also filter them based upon security. A user or computer must have read and apply permissions to a GPO before it applies to him. You can limit which users or computers can apply a specific GPO by adding or removing them to the GPO permissions as seen in Figure 1.

Notes from the field

GPOs apply to users and computers only

GPOs apply to users and computers only. They do not apply to groups. Groups can be used to security-filter GPOs but you cannot apply a GPO to an AD group.

Image

Figure 1. GPO permissions.

Group Policy user and Computer Settings and preferences

Every GPO has a User Settings section and a Computer Settings section which means it can apply settings to user objects, computer objects, or both. As you expand each section, you will see various settings that can be applied to user or computer objects. You can configure the following groups of settings within a GPO:

  • Software Settings—Software Settings allow you to use GPOs to deploy applications such as Microsoft Office.

  • Windows Settings—Windows Settings allow you to configure basic windows settings such as startup and shutdown scripts, folder redirection, and Public Key Policies.

  • Administrative Templates—Administrative Templates allow registry keys to be modified on systems applying the policy. This allows administrators to configure detailed settings for Windows and other applications, including Microsoft Office.

Group Policy Preferences were first introduced in Windows Server 2008 R1. Group Policy Preferences allow for even more granular control of various Windows settings. Group Policy Preferences additionally have better targeting techniques such as applying the GPO to only specific OSs, specific hardware specs, or IP address ranges.

Group Policy processing order

It is important that you understand how Group Policy is applied and the processing order is used to apply GPOs. As mentioned earlier, GPOs can be set up on the local computer or applied to AD Sites, Domains, and OUs. When multiple GPOs are configured, the order in which they are applied to a user or computer is important. In the event of a conflict, the next policy applied will override the one that was applied before it. GPOs are applied in the following order:

  1. Local Policies created on the computer

  2. GPOs applied to AD Sites

  3. GPOs applied to Active Directory Domains

  4. GPOs applied to AD OUs

  5. GPOs applied to AD child OUs

Other  
 
Top 10
Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
OPEL MERIVA : Making a grand entrance
FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
BMW 650i COUPE : Sexy retooling of BMW's 6-series
BMW 120d; M135i - Finely tuned
PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS