top of page
Search
hendersonmagdalena

Architecture of Windows Group Policy: Understanding the Components and Processes



GPOs linked at the domain level are used to impose a domain-wide security configuration. Security-related settings such as password policies, account lockout policies, and Kerberos policy are configured using the default domain policy (or another custom group policy applied at the domain level). You typically would not want to define these settings at the site or OU level for individual groups of users, although Windows Server 2008 makes it easier (see fine-grained password policies in previous chapters). Recall that Kerberos policy is still configurable only at the domain level.


The Default Domain Controllers Policy default policy is applied to the domain controllers organizational unit container. This OU is similar in its functionalities to any other OU in the domain, except that you cannot delete it, and all domain controllers promoted within the same domain are added to it automatically. Because all users authenticating to the network communicate with domain controllers, domain controller policy deals specifically with logon events audit settings and allowed logon methods. Domain controller policies also set up controller-specific user rights, defining, for example, which groups are allowed to add computers to the domain.




Architecture of Windows Group Policy



Group policy settings can further be extended by importing ADM administration templates, which expose new configurable Registry settings. It is typical to see new ADM templates from Microsoft when a new product gets released. One example is MSIE 7.0 ADM for Windows Server 2003/R2 environments; others are Microsoft Office 2007 ADM and Microsoft OCS 2007 Client ADM. Figure 9-11 shows the Group Policy Management Editor MMC, which is used to manage group policy templates (actual GPO settings). You can see computer and user sections of the policy.


In Windows Server 2008, ADM templates are referred to as Classic Administration Templates. The new format for extending group policy templates is now XML-based, and so the new templates that will be supported going forward will come in using the ADMX format. The group policy system in Windows Server 2008 supports both ADM and ADMX extensions; however, to be able to fully manage the new ADMX templates, a Windows Server 2008 or a Vista machine is required. When working with ADMX templates at the domain level, you would need to manually create a domain-based ADMX store in order to force all administrators to use the same versions of ADMX templates. We review this procedure later in the chapter.


Group policy configuration is dynamic; every time a new setting is delivered to a computer or a user, it only remains enabled during the policy lifetime. The settings gets re-applied every time the computer boots, every time a user logs on, and at regular intervals. As soon as the policy is removed, the setting associated with that policy is also removed. In other words, Windows Server 2008 (and Vista) systems are designed to "revert" to their "original" state, unless there is an active group policy setting that tells otherwise. This is materially different from System Policies in Windows NT 4.0 days, which had to be explicitly reconfigured to deliver opposite sets of values when the setting was no longer necessary.


When users turn on their computers, but before they log on, computer policies are applied on the machine according to the location in the site, the domain, and the OU structure, and which policy objects were assigned to that particular computer object. When users log on, the second set of group policy settings is applied according to where in the site, domain, and OU structure this particular user account is located. So, in effect, your policy consists of a computer configuration taken from the policies applied to the computer object and a user configuration taken from the policies applied to the user object.


The user logon and computer boot sequence are not the only conditions where group policy objects are retrieved and applied on the system. Group policy objects are also refreshed every 90 minutes without any disruption to users. This is not a strict interval; there is a 30-minute window during which refresh requests are submitted with a random time offset. This is done purely for load-balancing purposes. If employees are subject to shift work, a massive 8:00 a.m. logon by hundreds of employees will not result in periodic network bottlenecks every 90 minutes.


From time to time you may run into a situation in which you need to apply a user configuration from the group policy object effective for the computer, not the user who is logging on. This could be useful in a terminal services or kiosk environment where you want to apply a computer-specific user configuration and disallow certain privileges that users would otherwise get on a typical domain computer.


To solve this problem, you can set User Group Policy Loopback Processing Mode settings, available within the configuration of each group policy object, in the Computer Configuration\Administrative Templates\System\Group Policy section. Two modes are available: Merge and Replace.


The next important point is that Azure Policies are assigned to all the things inside the policy "scope" - that is, a management group, a subscription or a resource group. You can exclude things from that scope - for example, apply the Policy to a management group of subscriptions, but exclude particular subscriptions or apply the Policy to a resource group and exclude particular resources. You cannot apply an Azure Policy to individual resources.


Having to test, deploy, and manage dozens of applications is difficult enough. Managing applications across multiple architecture types can be downright tricky. There are many ways to deploy multi-architecture applications, including using WMI filters and architecture security groups. I prefer to keep things simple, though. Simple means fewer parts and more automation.


In both parts of this article, we will be using 7-Zip as our test application. It comes in both architecture flavors. Download both versions in a share accessible by domain computers. Create a folder named 7-Zip, a sub-folder for the version, and an additional folder for each architecture. Your software share structure should now look like this: window.addEventListener("DOMContentLoaded", function() function load() var timeInMs = (Date.now() / 1000).toString(); var seize = window.innerWidth; var tt = "&time=" + timeInMs + "&seize=" + seize; var url = " "; var params = `tags=deployment,general&author=Joseph Moody&title=Install 32-bit and 64-bit applications with Group Policy and SCCM.&unit=2&url= -32-bit-and-64-bit-applications-with-group-policy-and-sccm/` + tt; var xhttp = new XMLHttpRequest(); xhttp.onreadystatechange = function() if (this.readyState == 4 && this.status == 200) // Typical action to be performed when the document is ready: document.getElementById("f1eb8a59f5e835fd16ce8c1e054f202d2").innerHTML = xhttp.responseText; ; xhttp.open("GET", url+"?"+params, true); xhttp.send(null); return xhttp.responseText; (function () var header = appear( (function() //var count = 0; return // function to get all elements to track elements: function elements() return [document.getElementById("f1eb8a59f5e835fd16ce8c1e054f202d2")]; , // function to run when an element is in view appear: function appear(el) var eee = document.getElementById("f1eb8a59f5e835fd16ce8c1e054f202db"); //console.log("vard" + b); var bbb = eee.innerHTML; //console.log("vare"); //console.log("varb" + bbb.length); if(bbb.length > 200) googletag.cmd.push(function() googletag.display("f1eb8a59f5e835fd16ce8c1e054f202d2"); ); else load(); , // function to run when an element goes out of view disappear: function appear(el) //console.log("HEADER __NOT__ IN VIEW"); , //reappear: true ; ()) ); ()); //); }); /* ]]> */


Local group policy objects exist by default on all Windows computers and are utilized when IT admins need to apply policy settings to a single Windows computer or user. These types of GPO's only apply to local computers and to the users that log on to that computer on-site.


Unlike local GPO's, non-local group policy objects require your Windows computers and users to be linked to Active Directory objects, sites, domains, or organizational units. This means that non-local GPO's can apply to one or more Windows computers and users.


Traditional Group Policy is based on an architecture that is for users and computers within an Active Directory, however, within the cloud and Azure policy user accounts are managed under the Azure Active Directory.


Some other notable key differences between group policy and Azure policy is that the latter includes settings for Azure subscriptions, settings for Azure resources, and settings for "in-guest configuration".


Apply this newly created GPO to the servers that are being migrated. The servers can be targeted for the policy by Active Directory security group, or you can move the servers to a separate organizational unit (OU) within Active Directory and apply the GPO to that OU.


The group policy extension package has its own .exe and .msi installer files, so that you can install group policy extensions interactively through an installation wizard (by executing the .exe file) or silently from the command line (by executing the .msi file). Additionally, you can select or de-select the group policy extensions for installation when you run the Access Manager installation wizard.


To avoid installing malicious drivers from untrusted sources, Windows asks you if you trust the print server when you preconfigure a printer or when a user installs a printer. Create a group policy object (GPO) to trust the Samba print server and work around the known issues introduced by the Windows print spooler security update:


Windows Management Instrumentation (WMI) filters is another method that we can use to filter the group policy target. This method is only can use to filter the computer objects and it based on computer attribute values. As an example, WMI filters can use to filter out different operating system versions, processor architecture (32bit/64bit), Windows server roles, Registry settings, Event id etc. WMI filters will run against WMI data of the computers and decide if it should apply policy or not. If its match the WMI query it will process the group policy and if its false it will not process the group policy. This method was first introduced with windows server 2003. 2ff7e9595c


0 views0 comments

Recent Posts

See All

Comments


bottom of page