ActiveDirectory-UniversityofOxford:活動(dòng)目錄-牛津大學(xué).ppt_第1頁(yè)
ActiveDirectory-UniversityofOxford:活動(dòng)目錄-牛津大學(xué).ppt_第2頁(yè)
ActiveDirectory-UniversityofOxford:活動(dòng)目錄-牛津大學(xué).ppt_第3頁(yè)
ActiveDirectory-UniversityofOxford:活動(dòng)目錄-牛津大學(xué).ppt_第4頁(yè)
ActiveDirectory-UniversityofOxford:活動(dòng)目錄-牛津大學(xué).ppt_第5頁(yè)
已閱讀5頁(yè),還剩33頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、Active Directory,Group Policy,Group Policy Overview,Successor to NT policies Much more flexible Only applies to 2000 workstations Use old style policies for NT Used to manage desktop environment Integrated into Active Directory,What Can Group Policy Manage?,Administrative Templates registry-based se

2、ttings Security settings Software installation Scripts Login, logout, startup, shutdown Folder redirection Remote Installation Services Internet Explorer maintenance,Registry-based Settings,Control over desktop, control panel access, Start Menu and Taskbar, some Windows components, and more Generall

3、y three settings Not configured, Enabled, Disabled Implemented via Administrative Templates Text file with .adm extension Extensible Can create your own Some programs ship with their own (Office),Security Policy Settings,Account Policies password, account, Kerberos Local Policies auditing, user righ

4、ts, security options Event Log e.g. maximum size Restricted Group group membership System Services security and startup settings Registry registry key security File System file system security Public Key Policies encryped data, certificate authorities IP Security Policies IP security,Software Instal

5、lation,Use to install software Use to upgrade software Three methods Assign applications to users Assign applications to computers Publish applications to users Available to users, but not installed unless requested,Script Settings,Assign scripts (login, logout etc.) Set processing order,Folder Redi

6、rection,Redirect special folders Start Menu, Desktop My Pictures, My Documents, Application Data Choices No redirection Direct to same location Different locations based on security groups,Parts of Group Policy Objects,Each GPO has two sections Computer Configuration User Configuration Each part may

7、 be disabled Properties of GPO/General Recommended if a section is unused, disable it E.g. On GPO to configure user desktop, disable Computer Configuration section,Creating Group Policy Objects,AD Users and Computers Properties of Domain/OU Creates new GPO linked to that domain/OU AD Sites and Servi

8、ces To create site GPO Also via MMC Group Policy Snap-in To create a GPO not linked to a site, domain or OU,How are Group Policy Objects Applied,GPOs may be linked to AD containers Sites, Domains and Organizational Units (OUs) Apply to users and computers within container Objects in child OUs inheri

9、t GPO settings from parent OUs, domain and site unless explicitly blocked No inheritance across domain boundaries One GPO may be linked to multiple containers Multiple GPOs may be linked to a container GPOs are not linked to groups,Modifying GPO Inheritance,Block Inheritance If enabled on a containe

10、r, objects in container do not receive any GPO settings from parent containers No Override If enabled on a GPO link, inheritance of GPO settings cannot be stopped via block inheritance NB Applied to link, not the GPO itself,Filtering Group Policy Settings,GPO settings applied to all objects in conta

11、iner Filter using security groups Change default GPO permissions Need Read and Apply GP ACEs to be able to apply a GPO Need Read and Write GP ACEs to be able to read and modify a GPO,Deleting and Disabling Group Policy Objects,Disabling a GPO Disable Computer or User sections Disable both to disable

12、 GPO entirely Also disable using Options button in AD Users and Computers/Container Properties Deleting a GPO AD Users and Computers Will be offered two options Remove the link from the list deletes link but not GPO Remove the link and delete the GPO permanently deletes GPO,Disabling and Inheriting:

13、 What do the Properties Belong to?,Properties of a given GPO Disable Computer Configuration Settings Disable User Configuration Settings Properties of a given container Block policy inheritance Properties of a given link No override Disabled: the GPO is not applied to this container,Storage of Group

14、 Policy Objects,Group Policy Container (GPC) Active Directory object storing version, status etc. View by enabling Advanced Features in AD Users and Computers, then System/Policies Named by GUID Group Policy Template (GPT) SysvolPolicies folder Contains all GP) settings Named by GUID GPC and GPT rep

15、licated separately Policies only apply if both GPC and GPT are in sync,Storage of Group Policy Settings,Stored in client registry HKEY_LOCAL_MACHINE (Computer settings) HKEY_CURRENT_USER (User settings) Special registry keys used SoftwarePolicies (preferred) SoftwareMicrosoftWindowsCurrentVersionPol

16、icies Removed when GPO no longer applies,Order of GPO Application,Order of application is Site, Domain OU (SDOU) Multiple OUs order of application is according to domain hierarchy (start at top of tree and work down) Multiple GPOs for same OU processed in reverse order of list of GPOs shown for that

17、 OU I.e. GPO at top of list takes precedence Order can be changed,When are GP Settings Applied?,Computer settings On boot According to periodic refresh cycle User settings On user logon According to periodic refresh cycle If computer and user settings conflict, computer settings take precedence,Refr

18、eshing Group Policy,Default refresh intervals 2000 professional and member servers very 90 minutes with randomized 30 minutes offset Domain controllers every five minutes Changed by altering administrative template settings for user or computers Exception software installation and folder redirection

19、 policies only applied on boot or user logon, not periodically,Conflicts,Where settings for GPO of parent container conflict with those for GPO of child, child container settings win Where settings from different GPOs linked to same container conflict, settings of GPO highest in list are win Use Up/

20、Down to change position Exception where computer and user settings conflict, computer settings win Except IP Security and User Rights settings,Managing Group Policy Objects,Creating or editing GPOs controlled by PDC emulator by default Minimise conflicts To change Group Policy mmc snap-in/View/DC Op

21、tions Or use Group Policy Recommended that this is left unchanged NB By default, only Domain Admins, Enterprise Admins, Group Policy Creator Owners and System account can create and edit GPOs,Loopback Processing,Computer settings part of GPO linked to OU apply only to computers within OU Similarly,

22、user settings apply only to users within OU Therefore, normally, user in OU A logging on to computer in OU B gets combination of user settings from OU A GPOs and computer settings from OU B GPOs (and any inherited etc.),Loopback Processing cont.,May want to apply same user settings to any user loggi

23、ng on to a given workstation, regardless of user OU E.g. classroom, public area workstations Loopback processing does this Merge mode applies normal GPOs for user as well (but those from computer take precedence) Replace mode does not apply normal GPOs for user,Local Group Policy,Computers also have

24、 a single Local Group Policy Object (LGPO) Only supports Security Settings, Administrative Templates and Scripts Processed before AD GPOs Block inheritance does not stop its application Generally unused in an AD setup Most useful for configuring standalone computers,Delegation,It is possible to dele

25、gate responsibility for the following tasks Managing links Creating GPOs Editing GPOs,DomainExceptions for Domain Controllers,Some settings only from GPOs linked to domain Domain controllers share same account database so some settings must be the same Not applied to Domain Controllers OU because DC

26、s may be moved out of this OU NB Can change these settings in other GPOs but will have no effect on domain policy Will affect local logons (i.e. non-domain) if they apply to workstations or member servers,Exceptions for Domain Controllers cont.,Domain-wide settings All account policies (Computer Con

27、figuration/Windows Settings/Security Settings) I.e. Password, Account lockout and Kerberos policies) Some settings from Computer Configuration/Windows Settings/Local Policies/Security Options Automatically log off users when logon time expires Rename administrator account Rename guest account,Common

28、 Desktop Management Scenarios,Package containing GPOs developed for six different scenarios that can be loaded into AD Includes white paper describing scenarios Excel spreadsheet documenting all GPO settings Scenarios are for the following Lightly Managed Desktop (e.g. power user) Mobile User Multi-

29、User Desktop AppStation (Highly Managed Desktop) (e.g. admin user) TaskStation (e.g. single task) Kiosk (e.g. public workstation),Common Desktop Management Scenarios,NB Loading GPOs into AD does not mean they take immediate effect Not linked to any container Use as starting points Use Excel spreadsh

30、eet to document GPO changes,Common Desktop Management Scenarios,White paper All files ,OU Design Issues,Deep OU structure Easier to apply GPOs without filtering More likely to require inheritance modifications Flat OU structure More likely to need filtering Easier to troubleshoot (less inheritance issues),Number of GPOs Required,Few comprehensive GPOs Less to manage Shorter logon times Many narrowly focussed GPOs More to manage Likely to need to more filtering Increased logon time

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論