SlideShare a Scribd company logo
USEFUL
GROUP
POLICY
CONCEP
TS
A random collection of some helpful tips. Let’s
start with a review!
Review: What is Group Policy?
Group Policy provides the centralized management and configuration
of Operating Systems, Apps, and user settings via Active Directory.
Set
Screensaver
timeout
Review: What are GPO’s good
for?
You can tweak things like:
Password complexity settings
Screensaver timeouts
File/Folder Permisisons
Web browser settings
WiFi profiles
Application-specific settings
What a user can and cannot access (regedit.exe, cmd.exe, OS
features)
Networking characteristics
Windows Update settings
And much, much more!
Managing Group Policies
Open Group Policy Management Console (GPMC) from your Domain
Controller
Or
Install the Remote Server Administration Toolkit (RSAT) on your Windows
client OS
Windows 10 build >= 9926: http://www.microsoft.com/en-
us/download/details.aspx?id=45520
Windows 8.1: http://www.microsoft.com/en-us/download/details.aspx?id=39296
Windows 8: http://www.microsoft.com/en-us/download/details.aspx?id=28972
Windows 7: http://www.microsoft.com/en-us/download/details.aspx?id=7887
Windows Vista: http://www.microsoft.com/en-us/download/details.aspx?id=21090
Managing Group Policies
Review: What exactly are Group
Policy Objects?
 Group Policy Objects (GPO’s) are settings & definitions which
reside on your domain controllers and replicate via DFS and FRS,
stored in the sysvol folder.
 These GPO’s contain settings which can manipulate a computer’s
or user’s configuration/experience – as such, the settings are
broken into ‘Computer Configuration’ and ‘User Configuration.’
 GPO’s are then associated (aka ‘linked’) to Organizational Units
(OU’s) in Active Directory. Any user or computer object in the OU
tree will apply the settings from those GPO’s by default.
 You can link one GPO to many OU’s if desired.
 You can allow or disallow GPO application per user/computer/group
by way of Security Filtering.
Review: The order in which GPO’s
are applied
1. Local computer policy (gpedit.msc)
2. Site
3. Domain
4. OU
5. Child OU (highest priority)
Things change a bit if you right-click and ‘enforce’ group
policies – The order of precedence now favors the
enforced policy.
Review: When Group Policies are
Applied
 By default they refresh at around 90 minutes for workstations
and 5 minutes for domain controllers.
 They are also processed at bootup/logon.
 You can force a refresh by running GPUpdate /force from an
elevated command prompt
 You can also force a refresh from the GPMC or ADUC if you
are running Windows 8 or Server 2012 (SpecOps makes a
tool for this as well that works with Windows 7).
http://www.specopssoft.com/product/specops-gpupdate/
Review: Getting started with Group
Policy?
1. Create a new OU
2. Move a computer/user object into the OU
3. Create a new GPO, make a change
4. Link the new GPO to your test OU.
Starter tips:
 Don’t modify the default domain policy (DDP) –
use only for account security settings.
 Don’t move your domain controllers out of the
‘Domain Controllers’ OU
Nifty online reference for GPO settings: http://gpsearch.azurewebsites.net
SOFTWARE
RESTRICTIONS
Yes, you don’t need to open that email from
george32426@earthlink.com. Really.
Stopping your users from running
“junk”
Software Restriction
Policies
 Allow or disallow
certain programs from
being run on your
domain computers
 Users will receive a
“helpful” popup telling
them that their
application has been
blocked
 Event log entry 866 is
generated
Software Restriction Policies:
How they work
Block or approve applications based on file
hash, path, or folder name. Decent start for
preliminary defense against malware like
Cryptolocker.
AppLocker is the next generation of SRP, found
on Windows Ultimate & Enterprise (and Server).
Software Restriction Policies:
Blacklist or Whitelist?
You maintain a list of applications that
are not OK to run. Everything else is
allowed to execute.
Good for when you need to block one or
two problem apps in your environment.
Easier to introduce/implement.
This is tedious.
Configure under
Computer
ConfigurationPoliciesWindows
SettingsSoftware Restriction
PoliciesUnrestricted
You maintain a list of applications that
are approved* to run. Everything else is
not allowed to execute.
The whitelist will set up a default set of
applications that Windows needs to
operate.
Requires extensive testing to make sure
everything works as expected.
Best for overall system security.
Configure under
Computer
ConfigurationPoliciesWindows
SettingsSoftware Restriction
PoliciesDisallowed
Blacklisting Whitelisting
Software Restriction Policies -
where to find them
In your GPMC, head to:
Computer or User ConfigurationPoliciesWindows SettingsSecurity
SettingsSoftware Restriction Policies
GROUP POLICY
PREFERENCES
Do you have a moment to talk about our savior,
Group Policy Preferences?
Group Policy Preferences (GPP)
 Printers & Mapped Drives
 ODBC Data Sources
 Modify local user groups
 Power Plans
 Scheduled Tasks & Services
 Copy, Update or Remove Files/Folders
 Application Shortcuts
 Registry Entries
 Etc.
Group Policy Preferences – where
to find them
 Head to ‘Computer’ or ‘User Configuration’Preferences in your
GPMC.
Item Level Targeting: Granular
Preferences
Deployment of preferences and configs to
computers & users based upon very specific
criteria:
Examples:
 If a computer has a battery
 If a user is or is not a member of a security group
 If a computer has a specific IP address
 If an object is a member of a particular OU Etc.
 Or a combination of the above!
Group Policy Preferences
Console Shortcuts
• F5 – applies all visible options
(green)
• F6 – applies only the option
that currently has focus
(green)
• F7 – does not apply the option
that currently has focus
(dashed red)
• F8 – does not apply all visible
options (dashed red)
Extremely useful if you only want
to configure a single preference
out of a large grouping.
LOOPBACK
POLICIES
Perfect for Terminal/Citrix servers…
What do Loopback Policies do?
 These are policies where you can configure
user based configurations on computer
objects.
 I.e. lock out user access to certain items or
perhaps set application specific settings only
when they log into a particular computer.
 Great for Kiosk/Terminal/Citrix other shared
computers where every user must have the
same experience on a specific computer.
How to set up a Loopback
Policy
1. Set up a group policy as you normally would, configuring items
under ‘User Configuration.’ A good start would be to lock out
certain desktop items.
2. Under ‘Computer Configuration,’ modify ‘Configure user Group
Policy loopback processing mode’ under Windows
SettingsAdministrative TemplatesSystemGroup Policy.
3. Enable ‘Replace’ mode to start with. ‘Merge’ takes longer to
process and may produce unexpected results if you’re just starting
out.
4. Link group policy to OU where computer object resides.
5. Log in and enjoy!
POWERSHELL
AND GROUP
POLICY
Working with GPOs in
PowerShell: What you need
 Windows 7 or better: RSAT
(Remote Server Administration
Tools)
-or-
 Server 2008 R2 member server
or better: with the GPMC (Group
Policy Management Console)
installed
-or-
 Server 2008 R2 Domain
Controller or better
At least PowerShell 2.0 (this
comes with Windows 7/Server
2008 R2)
Must Have AND
When performing ‘administrative-like’ duties
in PowerShell, always right-click and run
PowerShell as an administrator.
The more you know…
Starter cmdlets
 Get-GPO
 Get-GPOReport
 Backup/Restore-GPO
 Get-GPResultantSetOfPolicy (like ‘GPResult
/h’)
 Set-GPLink
Backup your GPO
Example of output:
DisplayName : Computer Policy - Test
GpoId : a4bafa8d-a66d-4b08-a433-01e79086e08b
Id : 004c5691-45a3-47f5-a556-77b5fb7d4109
BackupDirectory : c:temp
CreationTime : 4/28/2015 10:44:26 PM
DomainName : lnrdomain.local
Comment :
Backup-GPO –All –Path c:temp | out-file c:tempgpo-backups.txt
The ID from the Backup-GPO cmdlet output corresponds to the GPO directory
names contained the backup folder.
Backup your GPO
Restore your GPO
This will restore the specified GPO via the ID back to your domain
from the c:temp path.
A couple things to note:
 If you are restoring a GPO that was previously deleted, the
restored GPO will NOT retain its original links in AD.
 Restoring a GPO will restore the original GPO ID. However,
when you run Backup-GPO again against this GPO, a new
BackupID will be generated.
Restore-GPO –BackupID 004c5691-45a3-47f5-a556-77b5fb7d4109 –Path c:temp
Get an output of all your Policy
settings
You can use the following PowerShell cmdlet to export the
settings for all your domain policies:
This is great for a reviewing all GPOs (grab a pot of coffee!),
and looks similar to the ‘GPResult.exe’ HTML output.*
You can also run this against a single policy:
*Note that RSoP PowerShell cmdlet is Get-
GPResultantSetOfPolicy
Get-GPOReport –All –ReportType Html –Path “c:tempgpo-output.html”
Get-GPOReport -Name “Computer Policy – Test” –Path “c:tempcp-
test.html”
For more information relating to
PowerShell and GPO’s…
Use PowerShell to find more cmdlets relating to Group Policy…
Want to know more about a specific cmdlet? Type the following:
If you have PowerShell 3.0 or better, you can do this…
Get-Help Get-GPO #<-- Or whatever cmdlet you want to know about
Get-Help Get-GPO -ShowWindow
Get-Command –Noun “GP*”
Useful Group Policy Concepts

More Related Content

What's hot

Active directory slides
Active directory slidesActive directory slides
Active directory slides
Timothy Moffatt
 
Active Directory component
Active Directory componentActive Directory component
Active Directory component
kuldeep singh shishodia
 
Users and groups
Users and groupsUsers and groups
Users and groups
Varnnit Jain
 
Group Policy Windows Server 2008
Group Policy Windows Server 2008Group Policy Windows Server 2008
Group Policy Windows Server 2008
Unitek Eduation
 
Windows Server 2012 Managing Active Directory Domain
Windows Server 2012 Managing  Active Directory DomainWindows Server 2012 Managing  Active Directory Domain
Windows Server 2012 Managing Active Directory Domain
Napoleon NV
 
10 implementing GPOs
10 implementing GPOs10 implementing GPOs
10 implementing GPOs
Hameda Hurmat
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
Tuan Yang
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
masbulosoke
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
Hameda Hurmat
 
What is active directory
What is active directoryWhat is active directory
What is active directory
Adeel Khurram
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
thoms1i
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
Harsh Sethi
 
DHCP
DHCPDHCP
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
thebigredhemi
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linux
Varnnit Jain
 
Linux User Management
Linux User ManagementLinux User Management
Linux User Management
Gaurav Mishra
 
Install active directory on windows server 2016 step by step
Install active directory on windows server 2016  step by stepInstall active directory on windows server 2016  step by step
Install active directory on windows server 2016 step by step
Ahmed Abdelwahed
 
Active directory domain services
Active directory domain servicesActive directory domain services
Active directory domain services
IGZ Software house
 
Group policy preferences
Group policy preferencesGroup policy preferences
Group policy preferences
Rob Dunn
 
Windows server
Windows serverWindows server
Windows server
Hideo Amezawa
 

What's hot (20)

Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
Active Directory component
Active Directory componentActive Directory component
Active Directory component
 
Users and groups
Users and groupsUsers and groups
Users and groups
 
Group Policy Windows Server 2008
Group Policy Windows Server 2008Group Policy Windows Server 2008
Group Policy Windows Server 2008
 
Windows Server 2012 Managing Active Directory Domain
Windows Server 2012 Managing  Active Directory DomainWindows Server 2012 Managing  Active Directory Domain
Windows Server 2012 Managing Active Directory Domain
 
10 implementing GPOs
10 implementing GPOs10 implementing GPOs
10 implementing GPOs
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
1 introduction to windows server 2016
1  introduction to windows server 20161  introduction to windows server 2016
1 introduction to windows server 2016
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
 
DHCP
DHCPDHCP
DHCP
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linux
 
Linux User Management
Linux User ManagementLinux User Management
Linux User Management
 
Install active directory on windows server 2016 step by step
Install active directory on windows server 2016  step by stepInstall active directory on windows server 2016  step by step
Install active directory on windows server 2016 step by step
 
Active directory domain services
Active directory domain servicesActive directory domain services
Active directory domain services
 
Group policy preferences
Group policy preferencesGroup policy preferences
Group policy preferences
 
Windows server
Windows serverWindows server
Windows server
 

Similar to Useful Group Policy Concepts

Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1
denogx
 
70 640 Lesson07 Ppt 041009
70 640 Lesson07 Ppt 04100970 640 Lesson07 Ppt 041009
70 640 Lesson07 Ppt 041009
Coffeyville Community College
 
Windows server 2012 and group policy
Windows server 2012 and group policyWindows server 2012 and group policy
Windows server 2012 and group policy
Ravi Kumar Lanke
 
Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy AD
sentmery5
 
A.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptxA.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptx
RosannaFranciscoFlor
 
Win Connections Group Policy Changes (Harold W)
Win Connections   Group Policy Changes (Harold W)Win Connections   Group Policy Changes (Harold W)
Win Connections Group Policy Changes (Harold W)
Harold Wong
 
Win Connections Group Policy Changes ( Harold W)
Win  Connections    Group  Policy  Changes ( Harold W)Win  Connections    Group  Policy  Changes ( Harold W)
Win Connections Group Policy Changes ( Harold W)
Harold Wong
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune Desktops
Unidesk Corporation
 
Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
gameaxt
 
70 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 04100970 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 041009
Coffeyville Community College
 
(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage
Petros Koutroumpis
 
Deploying office 2010 via group policy
Deploying office 2010 via group policyDeploying office 2010 via group policy
Deploying office 2010 via group policy
Naresh Gotad
 
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Mark Skurla
 
How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10
Global Knowledge Training
 
Domain wide organisation policy
Domain wide organisation policyDomain wide organisation policy
Domain wide organisation policy
Emmanuel Oshogwe Akpeokhai
 
usbblocking in desktop laptop
usbblocking in desktop laptopusbblocking in desktop laptop
usbblocking in desktop laptop
sakthivel25
 
Citrix group policy troubleshooting for xen app and xendesktop
Citrix group policy troubleshooting for xen app and xendesktopCitrix group policy troubleshooting for xen app and xendesktop
Citrix group policy troubleshooting for xen app and xendesktop
solarisyougood
 
Citrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktopCitrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktop
David McGeough
 
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
David McGeough
 
FSlogix ODFC POC Guide (version 1.3)
FSlogix ODFC POC Guide (version 1.3)FSlogix ODFC POC Guide (version 1.3)
FSlogix ODFC POC Guide (version 1.3)
Michael Baars
 

Similar to Useful Group Policy Concepts (20)

Ad group policy1
Ad group policy1Ad group policy1
Ad group policy1
 
70 640 Lesson07 Ppt 041009
70 640 Lesson07 Ppt 04100970 640 Lesson07 Ppt 041009
70 640 Lesson07 Ppt 041009
 
Windows server 2012 and group policy
Windows server 2012 and group policyWindows server 2012 and group policy
Windows server 2012 and group policy
 
Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy AD
 
A.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptxA.Group Policy and group policy obj.pptx
A.Group Policy and group policy obj.pptx
 
Win Connections Group Policy Changes (Harold W)
Win Connections   Group Policy Changes (Harold W)Win Connections   Group Policy Changes (Harold W)
Win Connections Group Policy Changes (Harold W)
 
Win Connections Group Policy Changes ( Harold W)
Win  Connections    Group  Policy  Changes ( Harold W)Win  Connections    Group  Policy  Changes ( Harold W)
Win Connections Group Policy Changes ( Harold W)
 
Using GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune DesktopsUsing GPOs to Configure and Tune Desktops
Using GPOs to Configure and Tune Desktops
 
Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
 
70 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 04100970 640 Lesson08 Ppt 041009
70 640 Lesson08 Ppt 041009
 
(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage
 
Deploying office 2010 via group policy
Deploying office 2010 via group policyDeploying office 2010 via group policy
Deploying office 2010 via group policy
 
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best PracticesConnect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
 
How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10How To Troubleshoot Group Policy in Windows 10
How To Troubleshoot Group Policy in Windows 10
 
Domain wide organisation policy
Domain wide organisation policyDomain wide organisation policy
Domain wide organisation policy
 
usbblocking in desktop laptop
usbblocking in desktop laptopusbblocking in desktop laptop
usbblocking in desktop laptop
 
Citrix group policy troubleshooting for xen app and xendesktop
Citrix group policy troubleshooting for xen app and xendesktopCitrix group policy troubleshooting for xen app and xendesktop
Citrix group policy troubleshooting for xen app and xendesktop
 
Citrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktopCitrix Group Policy Troubleshooting for XenApp and XenDesktop
Citrix Group Policy Troubleshooting for XenApp and XenDesktop
 
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
Citrix TechEdge 2014 - Citrix Group Policy Troubleshooting for XenApp and Xen...
 
FSlogix ODFC POC Guide (version 1.3)
FSlogix ODFC POC Guide (version 1.3)FSlogix ODFC POC Guide (version 1.3)
FSlogix ODFC POC Guide (version 1.3)
 

Recently uploaded

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 

Recently uploaded (20)

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 

Useful Group Policy Concepts

  • 1. USEFUL GROUP POLICY CONCEP TS A random collection of some helpful tips. Let’s start with a review!
  • 2. Review: What is Group Policy? Group Policy provides the centralized management and configuration of Operating Systems, Apps, and user settings via Active Directory. Set Screensaver timeout
  • 3. Review: What are GPO’s good for? You can tweak things like: Password complexity settings Screensaver timeouts File/Folder Permisisons Web browser settings WiFi profiles Application-specific settings What a user can and cannot access (regedit.exe, cmd.exe, OS features) Networking characteristics Windows Update settings And much, much more!
  • 4. Managing Group Policies Open Group Policy Management Console (GPMC) from your Domain Controller Or Install the Remote Server Administration Toolkit (RSAT) on your Windows client OS Windows 10 build >= 9926: http://www.microsoft.com/en- us/download/details.aspx?id=45520 Windows 8.1: http://www.microsoft.com/en-us/download/details.aspx?id=39296 Windows 8: http://www.microsoft.com/en-us/download/details.aspx?id=28972 Windows 7: http://www.microsoft.com/en-us/download/details.aspx?id=7887 Windows Vista: http://www.microsoft.com/en-us/download/details.aspx?id=21090
  • 6. Review: What exactly are Group Policy Objects?  Group Policy Objects (GPO’s) are settings & definitions which reside on your domain controllers and replicate via DFS and FRS, stored in the sysvol folder.  These GPO’s contain settings which can manipulate a computer’s or user’s configuration/experience – as such, the settings are broken into ‘Computer Configuration’ and ‘User Configuration.’  GPO’s are then associated (aka ‘linked’) to Organizational Units (OU’s) in Active Directory. Any user or computer object in the OU tree will apply the settings from those GPO’s by default.  You can link one GPO to many OU’s if desired.  You can allow or disallow GPO application per user/computer/group by way of Security Filtering.
  • 7. Review: The order in which GPO’s are applied 1. Local computer policy (gpedit.msc) 2. Site 3. Domain 4. OU 5. Child OU (highest priority) Things change a bit if you right-click and ‘enforce’ group policies – The order of precedence now favors the enforced policy.
  • 8. Review: When Group Policies are Applied  By default they refresh at around 90 minutes for workstations and 5 minutes for domain controllers.  They are also processed at bootup/logon.  You can force a refresh by running GPUpdate /force from an elevated command prompt  You can also force a refresh from the GPMC or ADUC if you are running Windows 8 or Server 2012 (SpecOps makes a tool for this as well that works with Windows 7). http://www.specopssoft.com/product/specops-gpupdate/
  • 9. Review: Getting started with Group Policy? 1. Create a new OU 2. Move a computer/user object into the OU 3. Create a new GPO, make a change 4. Link the new GPO to your test OU. Starter tips:  Don’t modify the default domain policy (DDP) – use only for account security settings.  Don’t move your domain controllers out of the ‘Domain Controllers’ OU Nifty online reference for GPO settings: http://gpsearch.azurewebsites.net
  • 10. SOFTWARE RESTRICTIONS Yes, you don’t need to open that email from george32426@earthlink.com. Really.
  • 11. Stopping your users from running “junk” Software Restriction Policies  Allow or disallow certain programs from being run on your domain computers  Users will receive a “helpful” popup telling them that their application has been blocked  Event log entry 866 is generated
  • 12. Software Restriction Policies: How they work Block or approve applications based on file hash, path, or folder name. Decent start for preliminary defense against malware like Cryptolocker. AppLocker is the next generation of SRP, found on Windows Ultimate & Enterprise (and Server).
  • 13. Software Restriction Policies: Blacklist or Whitelist? You maintain a list of applications that are not OK to run. Everything else is allowed to execute. Good for when you need to block one or two problem apps in your environment. Easier to introduce/implement. This is tedious. Configure under Computer ConfigurationPoliciesWindows SettingsSoftware Restriction PoliciesUnrestricted You maintain a list of applications that are approved* to run. Everything else is not allowed to execute. The whitelist will set up a default set of applications that Windows needs to operate. Requires extensive testing to make sure everything works as expected. Best for overall system security. Configure under Computer ConfigurationPoliciesWindows SettingsSoftware Restriction PoliciesDisallowed Blacklisting Whitelisting
  • 14. Software Restriction Policies - where to find them In your GPMC, head to: Computer or User ConfigurationPoliciesWindows SettingsSecurity SettingsSoftware Restriction Policies
  • 15. GROUP POLICY PREFERENCES Do you have a moment to talk about our savior, Group Policy Preferences?
  • 16. Group Policy Preferences (GPP)  Printers & Mapped Drives  ODBC Data Sources  Modify local user groups  Power Plans  Scheduled Tasks & Services  Copy, Update or Remove Files/Folders  Application Shortcuts  Registry Entries  Etc.
  • 17. Group Policy Preferences – where to find them  Head to ‘Computer’ or ‘User Configuration’Preferences in your GPMC.
  • 18. Item Level Targeting: Granular Preferences Deployment of preferences and configs to computers & users based upon very specific criteria: Examples:  If a computer has a battery  If a user is or is not a member of a security group  If a computer has a specific IP address  If an object is a member of a particular OU Etc.  Or a combination of the above!
  • 19.
  • 20. Group Policy Preferences Console Shortcuts • F5 – applies all visible options (green) • F6 – applies only the option that currently has focus (green) • F7 – does not apply the option that currently has focus (dashed red) • F8 – does not apply all visible options (dashed red) Extremely useful if you only want to configure a single preference out of a large grouping.
  • 22. What do Loopback Policies do?  These are policies where you can configure user based configurations on computer objects.  I.e. lock out user access to certain items or perhaps set application specific settings only when they log into a particular computer.  Great for Kiosk/Terminal/Citrix other shared computers where every user must have the same experience on a specific computer.
  • 23. How to set up a Loopback Policy 1. Set up a group policy as you normally would, configuring items under ‘User Configuration.’ A good start would be to lock out certain desktop items. 2. Under ‘Computer Configuration,’ modify ‘Configure user Group Policy loopback processing mode’ under Windows SettingsAdministrative TemplatesSystemGroup Policy. 3. Enable ‘Replace’ mode to start with. ‘Merge’ takes longer to process and may produce unexpected results if you’re just starting out. 4. Link group policy to OU where computer object resides. 5. Log in and enjoy!
  • 25. Working with GPOs in PowerShell: What you need  Windows 7 or better: RSAT (Remote Server Administration Tools) -or-  Server 2008 R2 member server or better: with the GPMC (Group Policy Management Console) installed -or-  Server 2008 R2 Domain Controller or better At least PowerShell 2.0 (this comes with Windows 7/Server 2008 R2) Must Have AND
  • 26. When performing ‘administrative-like’ duties in PowerShell, always right-click and run PowerShell as an administrator. The more you know…
  • 27. Starter cmdlets  Get-GPO  Get-GPOReport  Backup/Restore-GPO  Get-GPResultantSetOfPolicy (like ‘GPResult /h’)  Set-GPLink
  • 28. Backup your GPO Example of output: DisplayName : Computer Policy - Test GpoId : a4bafa8d-a66d-4b08-a433-01e79086e08b Id : 004c5691-45a3-47f5-a556-77b5fb7d4109 BackupDirectory : c:temp CreationTime : 4/28/2015 10:44:26 PM DomainName : lnrdomain.local Comment : Backup-GPO –All –Path c:temp | out-file c:tempgpo-backups.txt
  • 29. The ID from the Backup-GPO cmdlet output corresponds to the GPO directory names contained the backup folder. Backup your GPO
  • 30. Restore your GPO This will restore the specified GPO via the ID back to your domain from the c:temp path. A couple things to note:  If you are restoring a GPO that was previously deleted, the restored GPO will NOT retain its original links in AD.  Restoring a GPO will restore the original GPO ID. However, when you run Backup-GPO again against this GPO, a new BackupID will be generated. Restore-GPO –BackupID 004c5691-45a3-47f5-a556-77b5fb7d4109 –Path c:temp
  • 31. Get an output of all your Policy settings You can use the following PowerShell cmdlet to export the settings for all your domain policies: This is great for a reviewing all GPOs (grab a pot of coffee!), and looks similar to the ‘GPResult.exe’ HTML output.* You can also run this against a single policy: *Note that RSoP PowerShell cmdlet is Get- GPResultantSetOfPolicy Get-GPOReport –All –ReportType Html –Path “c:tempgpo-output.html” Get-GPOReport -Name “Computer Policy – Test” –Path “c:tempcp- test.html”
  • 32. For more information relating to PowerShell and GPO’s… Use PowerShell to find more cmdlets relating to Group Policy… Want to know more about a specific cmdlet? Type the following: If you have PowerShell 3.0 or better, you can do this… Get-Help Get-GPO #<-- Or whatever cmdlet you want to know about Get-Help Get-GPO -ShowWindow Get-Command –Noun “GP*”