Group Policy ToolsGroup Policy Editor (GPE) is the native Windows tool for managing Group Policy. The GPE snap-in can be added to an MMC console and is opened when a GPO is created or modified from the Group Policy property pages of a container in Active Directory Users and Computers. The GPE is easy to use and provides basic utility. However, it does not provide many features that are essential for managing Group Policy. You cannot tell, for example, the impact of a combination of multiple GPOs on a specific workstation, server, or user. You cannot copy the GPO or export it and use it in another domain. You cannot even print the policy. To examine the settings in the policy, you must browse through the policy, opening many subcontainers to determine if anything in them is set.A new tool, the Group Policy Management Console (GPMC), fills in these holes. The tool, which can be downloaded by licensed owners of Windows Server 2003, can be used to manage Group Policy in a Windows 2000 domain. GPMC can only be run on a Windows XP Professional or Windows Server 2003 computer. While it is not necessary to obtain the tool to create and use GPOs, without the tool, it is much more difficult to manage Group Policy.NOTE: GPMC for Windows 2000 DomainsAlthough you can manage a Windows 2000 domain with GPMC, some features of GPMC are only available with Windows Server 2003 and Windows XP clients.After GPMC is installed on a DC, attempting to create or edit a GPO using the Group Policy property page of an object will not work. Instead, doing so will provide a link, as shown in Figure 7-24, to GPMC, instead of access to the GPE. When GPMC is used to manage Group Policy and Edit is selected from a context menu, the Group Policy Editor is loaded. Figure 7-24. The GPMC replaces the Group Policy Page. You can still invoke the Group Policy Editor from the GPC, but options that affect policy implementation are configured using GPMC.![]() Group Policy EditorIf you have installed GPMC, you will still use GPE to edit a GPO. However, if you installed GPMC, some features of GPE will be managed in the GPMC interface. Prior to installation of GPMC, GPE can be used to do the following:Create a GPO and edit its featuresManage a GPO inheritanceFilter a GPO application After GPMC is installed, only GPO editing is done using the GPE. Creating, Linking, and Editing GPOsTo create a GPO, you will edit a blank template until it contains the desired settings. For the settings to be applied, the GPO must be linked to a SOM. GPO creation and linking are two separate actions. It is possible to have a GPO that is not linked to SOM, and it is possible to link a GPO to many SOMs. Prior to the installation of GPMC, a new GPO is created using the property pages of a SOM and is linked automatically to that SOM. When GPMC is used, a GPO may be created and linked to a SOM using one operation or two.To create a new GPO, follow these steps:
An existing policy can be edited by opening it from the Group Policy property page of the SOM, or it can be loaded in an MMC console and edited. To edit a GPO in a console, follow these steps:
Controlling GPO Inheritance Using GPEThe Active Directory structure is hierarchical, and GPOs are processed according to where they are linked in that structure. The following rules of inheritance apply:GPOs can be linked to sites, domains, and parent and child OUs.GPOs are inherited by users and computers whose accounts reside either directly in a container or in a child container of these objects.All of the security settings from all GPOs are applied cumulatively, unless there is a conflict.A conflict is resolved by allowing the last setting to overwrite all previous settings. For example, if the DNS Server service is disabled in a GPO linked to the domain but is set to start automatically in a GPO linked to the OU within which a server account is located, the server, if DNS has been installed, will be able to start the DNS service successfully. A server whose account may be elsewhere in the domain (where no other GPO makes a change) will not be able to start the DNS service, even if the service is installed. Modifying this standard behavior is sometimes necessary. GPOs in Windows 2000 and Windows Server 2003 domains can be marked to block the inheritance of other GPOs to prevent a GPO from overriding settings and allow machine settings to be reapplied over individual settings. Best practices require that these techniques are applied sparingly. Many problems with Group Policy processing are discovered not to be problems at all. Instead, they are traced back to the unwise, unauthorized, or simply "set and forget" usage of these properties. Block InheritanceThe Block Inheritance property is used to prevent inheritance of a GPO. The configuration and management of computer and user accounts may be so critical that it is necessary to block potential changes from a GPO linked to an object above. For example, to manage users and computers in an OU, a GPO may be created and configured to apply security and other configuration settings appropriate for these accounts. Settings configured in the GPO linked to the OU will automatically override any settings configured in GPOs linked at the domain or site level. However, if some settings are not configured at the OU level and are configured at the domain or site level, the settings will be inherited by the OU. There are hundreds of settings, and it is possible for an inherited setting to aversely impact users and computers. To prevent this from happening, two things can be done. First, all non-policy configured settings can be set so that they match the default settings for users and computers in the OU. Second, the Block Inheritance setting can be selected, which will block inherited settings.To set block inheritance, follow these steps:
No OverrideThe No Override or, as it is called in GPMC, Enforcement property ensures that a Block Inheritance setting has no effect. In an environment where the responsibility for GPOs is delegated, it is possible that the administrator of an OU might inadvertently or maliciously use Block Inheritance and therefore thwart the organization's security policy. The security policy specified in a domain or parent OU is blocked when Block Inheritance is set. It is also possible that some policy settings in a GPO are so critical that it is desirable to ensure that no present or future GPO will override them. In either case, setting the No Override/Enforcement property of a GPO will ensure that the GPO settings of a parent object are inherited. If Enforcement is set on an inherited GPO, and Block Inheritance is set on a local GPO, then Enforcement will win.To set No Override, follow these steps:
LoopbackThe loopback property is used to reapply the user portion of the GPO applied to the computer account after all GPOs have been applied. This option may be required when it is desirable that a specific security policy is applied, no matter which user logs on to the computer. This is a good policy for kiosks or other public computers where both employees and non-employees may log on. Ordinarily, when a user logs on, he inherits user settings from each GPO that is applicable to his account. His environment will be configured exactly the same way, no matter which workstation he uses, as long as policy can be obtained and as long as the computer supports the settings in the policy. This user-based consistency is desirable in most circumstances. However, there may be a situation in which it is preferred that every user is treated the same or a situation where it would be undesirable if the elevated privileges of administrators or other privileged users was applied. Instead, it must be ensured that no matter who the user is, he has limited access and privileges on the specific system or network. Situations where this is important are those where a specific computer(s) is used for a unique purpose. Examples of kiosks are computers in a mall used for gift selection, a workstation on a plant floor used for product location, a lobby kiosk that provides public information, an Internet browsing station at a conference, a computer in a learning lab, and so on. You can imagine, for example, what might happen if an unprotected public system was used by a domain admin, who then left it without logging off. If the next user is able to access the system before the logon times out, this user may now have administrative privileges on the network. He certainly has them on the current computer. To ensure that this type of vulnerability does not occur, use loopback processing.To set loopback replace mode, follow these steps:
Filtering by GroupsThe Security property page of a GPO defines which groups receive the policy. Those groups given the Read permission and the Apply Group Policy permission will be assigned the policy. By default, the Authenticated Users group is assigned these permissions. This means that the GPO will be read and applied to all accounts that exist in the SOM where the policy is linked. It is possible, however, to manipulate the application of a GPO by adding specific groups to the security page and either giving them the Allow or Deny Apply Group Policy permission. Best practices recommend that if you need to filter by groups, you should add all groups that should receive the policy and remove the Authenticated Users group. By default, a group that is not given this permission will not receive the policy.Windows Server 2003 introduces another way to modify the application of a GPO: WMI filters. Windows Management Instrumentation (WMI) is a way to manage Windows computers. WMI filters on GPOs are used to limit the application of the GPO to computer or user accounts that meet specific characteristics. Rather than filtering a GPO application by membership in a group, a dynamic group can be created. The dynamic group consists of a collection of accounts with a specific characteristic. For example, a WMI filter could select all computers that have a specific network card, or all users who work for a specific manager, and apply a GPO only to those computers or users. If a computer's network card was replaced with another model, or the user was assigned to a new manager, the accounts would no longer be a part of the dynamic group and would not receive the policy. Likewise, if a new computer received the specific network card, or a new employee was transferred to the manager's department, the accounts would become part of the dynamic group and would receive the policy.WARNING: Watch out for WMI ErrorsIf an error occurs during the use of a WMI filter on a GPO, GPO processing may be affected. If the error is known, the GPO will be applied, although the WMI filter may not be used. However, if the error is unknown, the GPO may not be processed at all. More information can be found in the Knowledge Base article 814613 at http://support.microsoft.com/default.aspx?scid=kb;en-us;814613. Resultant Set of PolicyOne of the problems with Group Policy in Windows 2000 is that it can be difficult to determine the actual results of a Group Policy implementation. It's difficult to keep straight the impact of multiple policies and the options that can impact inheritance. There is no native Windows 2000 tool to help do this. A Windows 2000 resource kit tool, gpresults, can be used to determine the outcome for a single user logged on to a specific workstation. In effect, it reads the policy applied. You must, however, log on as that user at that machine to use the tool. Afterward, you must analyze the text-based report and examine other information to determine the results. If you want a picture of policy at another machine or the effect of policy on the current machine but for a different user, the process must be repeated.A second problem with Windows 2000 Group Policy is its inability to help in the design of a Group Policy architecture. Policies have to be created and assigned to real computers and users to confirm the results.Using a new tool in Windows Server 2003 domains solves both of these problems. This tool is Resultant Set of Policy (RSoP). The tool can poll existing policies by using logging mode or planned policies by using planning mode and display the results. When logging mode is used, the effect of GPOs on a specific computer and user are evaluated by connecting to the computer. When planning mode is used, any combination of user and computer account location can be selected to test the effect of the GPOs that are linked to the location and the combinations of policies applied. Planning mode allows the determination of the "what if" effect of GPOs. Because no actual computer is accessed, planning mode can be used even before a computer is joined to a domain. All GPOs, including site, domain, and OU policiesmay be reviewed, depending on the mode. (Local and site policy, for example, cannot be evaluated for a computer that does not yet exist because no local policy is established and there is no way to tell what site the computer might ultimately be located in.) RSoP uses the Common Information Management Object Model (CIMOM) database (the CIM-compliant object repository) through Windows Management Instrumentation.RSoP queries are created using the Resultant Set of Policy Wizard, which is accessible as a snap-in loaded into an MMC, by right-clicking a site, domain, or OU object, and from the Group Policy Management Console. (Once GMPC is installed, the wizards supplied with GPMC are always used.) If the created query is saved, it can be accessed again to refresh or modify the query.To create an RSoP planning mode query, follow these steps:
RSoP planning and logging can be generated from an MMC to which the Resultant Set of Policy snap-in is added.To do RSoP logging:
Group Policy Management ConsoleGPMC provides the answers for many Group Policy management issues and concerns, empowers the Group Policy administrator, and has the potential for eliminating the need for third-party products and for reducing staff requirements. GPMC provides all of the following:An easy-to-use GUI, making Group Policy easier to useBackup, restore, and copying of GPOsHTML reporting of only the GPO settings that are actually configuredHTML reporting of Resultant Set of Policy (RSoP) dataSimplified management of Group Policy securityImport and export of GPOs and WMI filtersCopy and paste of GPOs and WMI filtersScripting of policy tasks exposed within the tool (it does not include the ability to script settings within a GPO)The ability to administer Windows 2000 GPOs GPMC can be used to manage Group Policy for multiple domains and multiple forests and is an effective Group Policy troubleshooting tool. These capabilities will be described and illustrated in Chapters 8 and 10, respectively. This chapter will look at using GPMC in a single Windows Server 2003 domain. Installing and Configuring GPMCGPMC is not a native Windows Server 2003 utility. It was released after Windows Server 2003 shipped, but it is available as a free download. The console can be downloaded from http://www.microsoft.com/downloads/details.aspx?FamilyId=F39E9D60-7E41-4947-82F5-3330F37ADFEB&displaylang=en.While GPMC can be used to manage Windows 2000, Windows XP Professional, and Windows Server 2003 computers, it must be installed on a Windows XP Professional or Windows Server 2003 computer. If Windows XP is used, it must have the following:Service Pack 1The Microsoft .NET FrameworkThe post SP1 hotfix (QFE 326469), which updates gpedit.dll to version 5.12600.1186, which is required by GPMCTo install GPMC, follow these steps: To open the GPMC console, you can do one of the following:Click Start, click Run, type GPMC.msc, and click OK.Use the Group Policy Management shortcut from Administrative Tools.Open GPMC from the property pages of sites, domains, and OUs.Create a custom GPMC console by adding the Group Policy Management snap-in to an MMC. First LooksWhen first loaded, the GPMC console, as shown in Figure 7-34, displays the forest in which the account used to run the utility exists. Additional forests can be loaded and managed if the account has authority to manage Group Policy within those forests. Each forest will have three or four containers: Domains, Sites, Group Policy Modeling, and Group Policy Results. (The Group Policy Modeling node will not be present in a pure Windows 2000 forest.)Figure 7-34. GPMC is a tool that provides superb management of Group Policy.[View full size image] ![]() Figure 7-35. Each SOM is defined by several property pages.[View full size image] ![]() Figure 7-36. All inherited GPOs are listed with the exception of Site policies because these may vary depending on the computer and user account and what site they are in.[View full size image] ![]() Figure 7-37. Delegated permissions are listed. You must change the drop-down list to view different permissions.[View full size image] ![]() Figure 7-38. The Scope pane is used to determine where the GPO is linked.[View full size image] ![]() GPMC OptionsSeveral options are available to customize how GPMC works. The following options can be selected from the View, Options menu of the GPMC.Options Customizes the location of columns for some tables.Reporting Sets the location of .adm files used for reporting. The default search path for .adm files is the system folder and then the SYSVOL folder of the GPO. You can, however, override this option to provide a custom location.General Enables or disables several options:Enable or disable trust detectionBy default, a two-way trust with a forest is required to add the forest to GPMC. You can remove this distinction, allow connection, and work with a one-way forest-trust, or use the Stored User Names and Passwords feature for Windows XP and Windows Server 2003 to enable access to untrusted forests.Enable or disable confirmation of GPO or GPO link distinction.Display domain controller name beside domain name. Basic OperationsCreating, editing, testing, protecting, reporting, backup/restore, and copy/paste are all basic Group Policy management processes available via GPMC. Other operations, such as setting the DC to use for Group Policy, can also be managed from the console. Setting the DC to Use for Group Policy DevelopmentBy default, GPMC, like its predecessor the Group Policy Editor, will default to using the primary domain controller emulator DC in the domain to access Group Policy information. It is possible to use another DC as the location for storage of the GPO, but arbitrary DC selection is not a good idea. A policy should be established that selects and maintains a specific DC as the GPO location for all GPOs that can be created by the same group of administrators. If Group Policy management is delegated and distributed, such as on an OU-by-OU basis, then selection of a single DC is of less importance. The reason for limiting the DCs is that the use of multiple DCs can cause issues due to replication. If two different administrators are editing the same GPO, but on different DCs, what will be the result? It is possible that the GPOs will become out of synch, or that policy written by one administrator will be overwritten by another. The end result is that policy may be different than intended. Good reasons for using multiple DCs are as follows:The administrator in charge of Group Policy for a specific domain, OU, or site is not physically present in the location where the default or preselected GPO management DC resides. In this case, a WAN connection would be required for him to modify GPOs. To avoid this, a local DC can be selected for his use. Administrators at other physical locations should not select different DCs if they also are privileged to modify Group Policy for that domain.If the majority of the users and computers affected by the policy are in a location different from the default DC used for GPO management, a DC at their location as the configuration point for modification of GPOs that affect them may be a good choice. If it is, replication latency will be less of a factor for these users. Because policy is available locally, users will be more likely to quickly receive policy changes. This can be especially important if the changes are to security settings.Management of Group Policy is delegated and distributed. In this case, all domain-linked GPOs are created and managed on a single DC, but GPOs linked to a specific OU may be created on different DCs. Again, the arbitrary selection of a new DC for each OU would be pointless. However, there may be reasons, such as the two preceding examples, that would make this desirable. It may also be used when it is desirable to limit administrative access to specific domain controllers; in this case, ensuring that administrative authority does not extend to other DCs can be accomplished by allowing the management of GPOs on a DC. However, you should be cautious in deploying this solution because any administrative function that can modify replicated data on a single DC will in essence modify all other DCs due to replication. In addition, if not done carefully, restricting access to specific DCs can cause issues for users in normal day-to-day operations.To select the domain controller to use:
NOTE: Site GPO StorageBecause a site can contain domain controllers from many domains, which DC will be used to store a site GPO? By default, the PDC emulator in the domain of the administrator who created it is used. With GPMC, you can select the domain controller to be used for this purpose. Creating a GPO Using GPMCA GPO can be created using GPMC in several ways. Once the GPO is created, the Group Policy Object Editor is used to define the settings for that GPO. The GPE tool is the same tool used in Windows 2000 and in Windows Server 2003 prior to installing GPMC.The choices for creating a GPO using GPMC are as follows:Right-click on any domain or OU and choose Create and Link a GPO here from the context menu. This operation creates the GPO and links it to the domain or OU selected.Use a script.Right-click the Group Policy Objects node in any domain and click New. A new, unlinked GPO is created. To edit the settings in any GPO, right-click the GPO and select Edit. Scoping GPOsDetermining and assigning the computer and user accounts that will be impacted by a GPO is called scoping the GPO. To scope a GPO, follow these steps:Link the GPO to a domain, site, or OU by doing one of the following:Create a GPO by right-clicking on a SOM and choosing Create and Link a GPO here.Link an existing GPO to a SOM by right-clicking the site, domain, or OU node and choosing Link an existing GPO here. (This is like choosing the Add button in the Group Policy user interface prior to installing GPMC.)Drag a GPO from the Group Policy Object node to an OU in the same domain.Use security filtering on the GPO. Prior to GPMC, this required using the ACL editor to set the Read and Apply Group Policy permissions for specific users and groups. With GPMC, the user or group is added to the Scope tab for the GPO or GPO link. This automatically sets the Read Group Policy permission. However, should you want to deny these permissions, you must use the ACL editor.Use a WMI filter on the GPO. WMI filters dynamically determine the scope of GPOs based on attributes. The scope of a GPO consists of the users and computers it will be applied to. WMI client-side support is only available for Windows XP Professional and Windows Server 2003. (Windows 2000 will ignore WMI filters.) The filter is always evaluated on the client computer. This means that each client computer will examine the WMI filter to see if it applies. Be sparing with the application of WMI filters because they can mean extended processing time.GPMC ReportingDocumenting a GPO without GPMC is a tedious manual chore. GPMC provides extensive HTML reporting. Reports can be viewed and printed. Representative reports are as follows:Settings in GPOClick the Settings tab of the GPO or GPO link pane to produce a report like the one shown in Figure 7-40.Figure 7-40. Use the show all link to see all settings in the GPO, or only view selected areas. Only those settings that are configured will display.[View full size image] ![]() When RSoP logging is performed, some settings may not be displayed. Microsoft lists the following items:IE Maintenance section; does not include the details of Content RatingsIE Settings in Preference modeSome cookie settingsCustomized Java settings in Zones and PrivacySome details for Wireless and IPSec settings To save a report, right-click on the SOM and select Save Report (or select Save Report from the Action menu), name the report, and then save it as an XML or HTML file. The report can then be printed after opening the file.Reports, as shown in Figure 7-41, are automatically displayed in a condensed fashion and only show areas where settings are established. This simplifies their viewing. To examine the settings, you need only expand the appropriate category. To expand all of the settings, you can use the show all option at the top of the report. In the Administrative templates portion of the report, additional meaning, the "Explain" information, can be viewed by clicking the setting name, as shown in Figure 7-42. Figure 7-41. A full report of the GPO settings can be produced by clicking the Settings tab.[View full size image] ![]() Figure 7-42. Administrative Template settings can display the "Explain" information.[View full size image] ![]() Using GPMC to Ensure Group Policy Permission ConsistencyWhen permissions are modified on a GPO using GPE or GPMC, they are modified on both the GPO information in AD and in sysvol. Permissions can also be set outside of these interfaces, so it is possible for them to become out of synch. Permissions settings in both areas must be the same, or policies will not be properly processed. GPMC checks permission consistency in Windows Server 2003 domains when the GPO is selected. If there is a problem, a dialog box warning appears that, if the user is authorized, allows the user to click OK and fix the sysvol permissions to be the same as those in Active Directory.Windows 2000 domain GPOs can be checked for this issue by looking at the Default Domain Policy and the Default Domain Controllers Policy from the GPMC. There actually is a bug in Windows 2000 with respect to this issue. The ACLs on the sysvol portion of the GPO are set to allow inheritance, but they should not be. Because of this, the permissions can easily be out of synch with the permissions set in the Active Directory. To correct the error, examine the GPOs in GPMC and when prompted to click OK to make the permissions match, do so. The permissions will be synched with the ACLs on the Active Directory portion of the GPO, and the allow inheritance feature will be removed. Backup and RestoreWhen Backup is selected from the context menu, a copy of the GPO is made to the file system. Backup also serves as the export function for the GPO. A GPO backup can be used with either the restore or import function. The backup includes each of the following:The GPO GUID and domain nameThe GPO settingsWMI filter links (not the filter itself)Permissions settings on the GPOAn XML report of the GPO settingsBackup does not include items that are not stored outside the GPO. (Only items that are stored in sysvol or AD portions of the GPO are backed up.) The following items, which many think are part of the GPO, are not stored with the GPO and thus are not backed up:WMI filters. (These can be backed up separately using GPMC.)IPSec Policies. (Export to a file from the IP Security Policy snap-in.)Links from the SOM to the GPO. WARNING: Backups Create New Security IssuesBeing able to back up a GPO allows the restoration of an Active Directory Group Policy environment. However, anyone who can access the backup, copied, or exported GPOs has a large amount of information about the security configuration of the enterprise. This is not information that should be exposed. Only authorized administrators, security teams, and auditors should have access to this information. The location and the DACLs set on the files are critical. GPO backups should be treated as carefully, if not more carefully than, other backups. On- and off-site storage locations are important. In addition to providing an attacker with security information, a backup might be used in an attack. Older, incorrect GPOs might be restored in place of the correct versions, thus weakening security. Ensure that access to these files is limited and that access to all GPMC operations is limited to those trusted individuals who are authorized to perform them.Restore takes a backup and puts it back in the domain just the way it was when it was backed up. The GUID of the original GPO is used, as is the domain information. You cannot use a backup and restore to move a GPO to another domain. The restore replaces the GOP setting, the ACLs on the GPO, and the WMI filter links.To back up a GPO, follow these steps:
To back up all GPOs, follow these steps:
|