Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] - نسخه متنی

Roberta Bragg

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Group Policy in Forest and Multiforest Scenarios


Group Policy is primarily a domain-centric process. That is, Group Policy Objects (GPOs) are created to control users and computers that have accounts in specific domains. The GPOs are linked to the domain or the domain's OUs. The exception to this is the Site GPO, a rare beast that can impact users in multiple domains depending on the location of domain users and computer accounts and where they log on. However, site policies only affect computers and users whose accounts reside in that site. The site GPO is limited to a single forest. There is no Group Policy mechanism for managing users forest-wide, and there is no mechanism for implementing a single GPO that can impact multiple forests.

However, it is still necessary to manage Group Policy across multiple domains in a forest to ensure consistency of policy. It may also be useful to be able to manage Group Policy across forest boundaries. The tedious practice of inspection, reviewing, querying, using, and understanding Group Policies in the forest can be alleviated by using the Group Policy Management Console (GPMC).

Using GPMC in a Multidomain Forest and with Multiple Forests


GPMC was introduced in Chapter 8, and its functionality was described for use by a single domain. In a multidomain forest, you can use these same functions to view GPOs for a domain, and you can use GPO planning and logging mode for each domain in the forest. Remember: There is no such thing as a GPO that is created at the forest level. If you understand and have practiced with GPMC in a single domain, you have most of the knowledge needed to use it in a multiple-domain forest or with multiple forests. However, there is one major issue with using GPMC in this environment. When GPMC is used to copy a GPO from one domain to another, you must be aware of domain-specific information and make adjustments accordingly.

Most of the information in a GPO is not domain-specific, and copying this part of the GPO to another domain does not cause a problem. Other information, such as user and Group SIDs, is domain-specific, and URLs may be, too. Leaving these items as they are in the original GPO may interfere with proper functioning of the new GPO at its new location. For example, if a group of user rights is assigned to domain A's groups, and the GPO is copied for use in domain B, what will it mean? Users from domain A will have access to domain B rightsis this what you wanted? Users from domain B will not have the rights they expected. Even the SIDs of built-in domain groups will vary from one domain to another.

Because this domain-specific information cannot be changed automatically, GPMC provides a tool called migration tables to assist you in using a copy of a GPO in another domain. Before making the copy, you prepare a migration table. The table is used during the copy to translate or replace one domain's domain-specific information with the appropriate information from the other domain.

Working with multiple forests in GPMC is similar to working with one forest. Each forest has its own root. Adding a forest to GPMC is a simple process:


1.

Right-click the GPMC root and select Add Forest.

2.

Enter the name of a domain in the other forest, as shown in Figure 8-39, and click OK.

Figure 8-39. Adding a forest.

3.

The forest is added to the GPMC console.


Using Migration Tables


User- and group-related information varies among domains in a forest and between forests. When a GPO is copied between two forests, the GPO may not function, or may not function as designed. To ensure that the GPO does its job, use migration tables to map users and groups from one domain to another.

To create the migration table, follow these steps:


1.

Decide which GPO will be copied and where it will be copied.

2.

Right-click the GPO container in GPMC and select Open migration Table Editor.

3.

Select Populate from GPO from the Tools menu.

4.

Select the forest and domain.

5.

Select the source GPO and check During scan, include security principals from the DACL on the GPO, as shown in Figure 8-40, and then click OK.

Figure 8-40. Selecting the GPO to copy.

6.

The table is populated with any users, groups, or URLs specific to the GPO. Enter the correct security principal or URL that will be used by the destination domain in the name column for each entry, as shown in Figure 8-41.

Figure 8-41. Creating the migration table.

[View full size image]

7.

Save the file and close the Migration Table Editor.


To copy a GPO from a domain in one forest to a domain in another trusted forest follow these steps:


1.

Right-click the GPO in Group Policy Objects and select Copy.

2.

Right-click Group Policy Objects in the destination domain and select Paste.

3.

On the welcome page of the Cross-Domain Copying Wizard, click Next.

4.

Select Preserve or migrate the permissions from the original GPOs, as shown in Figure 8-42, and then click Next.

Figure 8-42. Specify whether permissions should migrate.

5.

The wizard scans the GPO to determine if items need to be migrated, as shown in Figure 8-43. When it is done, click Next.

Figure 8-43. Scanning the GPO.

6.

Select Using this migration table to map them to new values in the new GPOs and enter or browse to the location of the migration table made earlier, as shown in Figure 8-44. Then click Next.

Figure 8-44. Selecting the migration table to be used.

7.

Click Finish and then click OK.


After the GPO has been copied to its new domain, it must be linked to the domain or OU before it will have any effect on users or computers. To link the GPO to a domain or OU:


1.

Right-click the OU or domain and select Link existing GPO.

2.

Select the new GPO and click OK.


Finally, check the GPO to ensure that names were migrated. For comparison, Figure 8-45 shows the details of the copied GPO, while Figure 8-46 shows the GPO implementation in the new domain. As you can see, the appropriate domain and group names were changed.

Figure 8-45. Viewing the copied GPO.

[View full size image]

Figure 8-46. Comparing the new result.

[View full size image]

TIP: Selective Authentication and GPMC

If selective authentication is required, GPMC cannot add another forest until the Administrator using GPMC has been given access in the other domain.


/ 194