+ All Categories
Home > Documents > Module 7: Managing the User Environment by Using Group Policy.

Module 7: Managing the User Environment by Using Group Policy.

Date post: 02-Jan-2016
Category:
Upload: marjory-wiggins
View: 215 times
Download: 2 times
Share this document with a friend
Popular Tags:
28
Module 7: Managing the User Environment by Using Group Policy
Transcript
Page 1: Module 7: Managing the User Environment by Using Group Policy.

Module 7: Managing the User Environment by Using Group Policy

Page 2: Module 7: Managing the User Environment by Using Group Policy.

Overview

Configuring Group Policy Settings

Assigning Scripts with Group Policy

Restricting Group Membership and Access to Software

Configuring Folder Redirection

Determining Applied GPOs

Page 3: Module 7: Managing the User Environment by Using Group Policy.

Lesson: Configuring Group Policy Settings

Why Use Group Policy?

What Are Enabled and Disabled Group Policy Settings?

Practice: Configuring Group Policy Settings

Page 4: Module 7: Managing the User Environment by Using Group Policy.

Why Use Group Policy?

Use Group Policy to:Use Group Policy to:

Manage users and computers

Deploy software

Enforce security settings

Enforce a consistent desktop environment

Enforce loopback processing

Manage users and computers

Deploy software

Enforce security settings

Enforce a consistent desktop environment

Enforce loopback processing

Page 5: Module 7: Managing the User Environment by Using Group Policy.

What Are Enabled and Disabled Group Policy Settings?

Enable / DisableEnable / Disable Multivalued settingsMultivalued settings

Page 6: Module 7: Managing the User Environment by Using Group Policy.

Practice: Configuring Group Policy Settings

In this practice, you will:

Create a GPO to configure a standard user desktop

Create a GPO to reverse a setting in the standard desktop GPO for the Legal department

Page 7: Module 7: Managing the User Environment by Using Group Policy.

Lesson: Assigning Scripts with Group Policy

What Are Group Policy Script Settings?

Why Use Group Policy Scripts?

Practice: Assigning Scripts with Group Policy

Page 8: Module 7: Managing the User Environment by Using Group Policy.

What Are Group Policy Script Settings?

Group Policy script settings can be used to assign:

For computers

Startup scripts

Shutdown scripts

For users

Logon scripts

Logoff scripts

Page 9: Module 7: Managing the User Environment by Using Group Policy.

Why Use Group Policy Scripts?

Group Policy scripts can:

Perform tasks that cannot be done through other Group Policy settings

Clean desktops and return computers to their original state

Provide a secure environment by clearing temp folders and page files

Page 10: Module 7: Managing the User Environment by Using Group Policy.

Practice: Assigning Scripts with Group Policy

In this practice, you will:

Use Group Policy to assign a script to map a drive

Test the script

Page 11: Module 7: Managing the User Environment by Using Group Policy.

Lesson: Restricting Group Membership and Access to Software

Restricting Group Membership

What Is a Software Restriction Policy?

Software Restriction Rules

Practice: Restricting Group Membership and Access to Software

Page 12: Module 7: Managing the User Environment by Using Group Policy.

Restricting Group Membership

Group Policy can control group membership:

For any group on a local computer

For any group in Active Directory

Page 13: Module 7: Managing the User Environment by Using Group Policy.

What is a Software Restriction Policy?

A policy-driven mechanism that identifies and controls software on a client computer

A mechanism restricting software installation and viruses

A component with two parts:

A default rule with two options:Unrestricted

Disallowed

Exceptions to the default rule

Page 14: Module 7: Managing the User Environment by Using Group Policy.

Software Restriction Rules

Certificate Rule

Checks for digital signature on application

Use when you want to restrict Win32 applications and ActiveX content

Certificate Rule

Checks for digital signature on application

Use when you want to restrict Win32 applications and ActiveX content

Internet Zone Rule

Controls how Internet Zones can be accessed

Use in high-security environments to control access to Web applications

Internet Zone Rule

Controls how Internet Zones can be accessed

Use in high-security environments to control access to Web applications

Hash Rule

Use to employ MD5 or SHA1 hash of a file to confirm identity

Use to allow or prohibit a certain version of a file from being run

Hash Rule

Use to employ MD5 or SHA1 hash of a file to confirm identity

Use to allow or prohibit a certain version of a file from being run

Path Rule

Use when restricting the path of a file

Use when multiple files exist for the same application

Essential when SRPs are strict

Path Rule

Use when restricting the path of a file

Use when multiple files exist for the same application

Essential when SRPs are strict

Page 15: Module 7: Managing the User Environment by Using Group Policy.

Practice: Restricting Group Membership and Access to Software

In this practice, you will:

Define the membership of the local Administrators group for DEN-CL1

Restrict access to Outlook Express for the domain

Page 16: Module 7: Managing the User Environment by Using Group Policy.

Lesson: Configuring Folder Redirection

What Is Folder Redirection?

Folders That Can Be Redirected

Settings That Configure Folder Redirection

Security Considerations for Configuring Folder Redirection

Practice: Configuring Folder Redirection

Page 17: Module 7: Managing the User Environment by Using Group Policy.

What Is Folder Redirection?

Folder Redirection allows:

Redirection to folders on the local computer or on a network drive

Folders on a server appear as if they are located on the local drive

Page 18: Module 7: Managing the User Environment by Using Group Policy.

Folders That Can Be Redirected

My Documents

Application Data

Desktop

Start Menu

Page 19: Module 7: Managing the User Environment by Using Group Policy.

Settings That Configure Folder Redirection

Use basic Folder Redirection for common files and limited-access files

With advanced Folder Redirection, the server hosting the folder location is based on group membership

AccountingUsers

AccountsN-Z

AccountsA-M

AccountingManagers

Anne

MistyPrivate

Private

Page 20: Module 7: Managing the User Environment by Using Group Policy.

Security Considerations for Configuring Folder Redirection

NTFS permissions for Folder Redirection root folder

Shared folder permissions for Folder Redirection root folder

NTFS permissions for each user’s redirected folder

Page 21: Module 7: Managing the User Environment by Using Group Policy.

Practice: Configuring Folder Redirection

In this practice, you will:

Create a shared folder

Create a GPO to redirect the My Documents folder

Test the Folder Redirection

Page 22: Module 7: Managing the User Environment by Using Group Policy.

Lesson: Determining Applied GPOs

What Are gpupdate and gpresult?

What Is Group Policy Reporting?

What Is Group Policy Modeling?

What Are Group Policy Results?

Practice: Determining Applied GPOs

Page 23: Module 7: Managing the User Environment by Using Group Policy.

What Are gpupdate and gpresult?

Use gpupdate to:

Manually refresh updated Group Policy settings

Force the refresh of all Group Policy settings

Force a reboot or logoff if required to refresh the settings

Use gpresult to:

Display the resulting set of policies for a user or computer

Redirect the resulting set of policies information to a file

Page 24: Module 7: Managing the User Environment by Using Group Policy.

What Is Group Policy Reporting?

Page 25: Module 7: Managing the User Environment by Using Group Policy.

What Is Group Policy Modeling?

Page 26: Module 7: Managing the User Environment by Using Group Policy.

What Are Group Policy Results?

Page 27: Module 7: Managing the User Environment by Using Group Policy.

Practice: Determining Applied GPOs

In this practice, you will:

Refresh GPO settings with gpupdate

Use Group Policy reporting to view the settings in a GPO and save the report

Create a Group Policy Results report

Page 28: Module 7: Managing the User Environment by Using Group Policy.

Lab: Managing the User Environment by Using Group Policy

After completing this lab, you will be able to:

Create and apply a GPO to the Graphics organizational unit

Assign a logon script to connect to the Graphics1 printer

Use a GPO to configure the membership of the Backup Operators group

Use the Group Policy Results Wizard to verify the policy settings


Recommended