Manage Desktop Configuration Using Group Policy
Manage Desktop Configuration Using Group Policy
NMA
tasks, such as data entry. Security settings and updates must be
delivered efficiently to all the computers and devices in the
organization. New users need to be productive quickly without costly
training. In the event of a computer breakdown or disaster, service
must be restored with a minimum of data loss and interruption. All
of these tasks, known collectively as Change and Configuration
Management, must be achieved at the lowest possible cost. You
need to be able to implement change quickly and affect large
numbers of users and computers. Group Policy is the infrastructure
that allows you to implement change on the object level in Active
Directory.
You need to be able to define configurations once and rely on the
operating system to enforce that state. With Active Directory, GPOs
can be linked to sites, domains, and OUs, allowing Group Policy
settings to be applied to users and computers. In addition, GPOs can
be used to help manage server computers, through many serverspecific operational and security settings. This infrastructure
provides a high degree of flexibility, allowing you to customize
configurations, such as delivering a specific piece of software to
specialized users based on their membership in an OU. In addition,
the Group Policy Management Console (GPMC) simplifies
implementation and management of Group Policy.
Group Policy Architecture
Group Policy uses a document-centric approach to creating, storing,
and associating Group Policy settings. Similar to the way in which
Microsoft Word stores information in .doc files, Group Policy settings
are contained in GPOs. A GPO is a virtual object; policy-setting
information is stored in two locations: the Active Directory container
to which the GPO is linked, and the Sysvol on the domain controller.
Group Policy is configured primarily through the use of two tools:
Group Policy Object Editor, (previously known as the Group Policy
snap-in, Group Policy Editor, or Gpedit) and Group Policy
Management Console (GPMC), available for download from the
Microsoft Web site. Whereas Group Policy Object Editor is used to
configure and modify settings within GPOs, GPMC is used to create,
view, and manage GPOs. Group Policy architecture is shown in the
following diagram, which shows how the primary components
interact through read or write access. Components are described in
the figure below.
Group Policy Architecture
NMA
Description
Server (Domain
Controller)
Active Directory
Group Policy
object (GPO)
NMA
Sysvol in the /Policies sub-directory. GPOs affect users and
sites, domains, and OUs.
Sysvol
Local Group
Policy object
Group Policy
Object Editor
Server-Side
Snap-Ins
Client-Side
Extensions
NMA
Winlogon
Group Policy
engine
File System
NMA
Registry
Help and
Support Center
Resultant Set of
Policy (RSoP)
infrastructure
WMI
NMA
NMA
Administrative Templates (or .adm files) enable you to control
registry settings using Group Policy, providing the means to
configure the behavior and appearance of the desktop, including the
operating system, components, and applications. Windows comes
with a predefined set of Administrative template files, which are
implemented as text files (with an .adm extension), that define the
registry settings that can be configured in a GPO. These .adm files
are stored in two locations by default: inside GPOs in
the Sysvol folder and in the %windir%\inf directory on the local
computer.
Managing Security
Group Policy is used to manage the following types of
securityoptions for users, clients, servers, and domain controllers:
Security settings. These Group Policy settings are used to
define values for various security-relevant operating system
parameters, such as password policy, user rights assignment,
audit policy, registry values, file and registry ACLs, and service
startup modes.
IPSec policies. These Group Policy settings are used to
configure IPSec services for authenticating or encrypting
network traffic. An IPSec policy consists of a set of security
rules, and each security rule consists of an IP filter with an
action.
Software restriction policies. These Group Policy settings
are used to help protect computers from code that is not
trusted by identifying and specifying which applications are
permitted to run.
Wireless network policies. These Group Policy settings are
used to configure settings for the Wireless Configuration
Service, a user-mode service that operates on each of the IEEE
802.11 wireless network adapters that are installed on a
computer.
Public Key Policies. These Group Policy settings are used to:
NMA
o Specify that computers automatically submit a certificate
request to an enterprise certification authority and install
the issued certificate.
o Create and distribute a certificate trust list.
o Establish common trusted root certification authorities.
o Add encrypted data recovery agents and change the
encrypted data recovery policy settings.
Implementing Group Policybased Software Installation
The Software Installation snap-in is used to centrally manage
software. Software can be assigned or published to users and
assigned to computers. Group Policy-based software installation can
be used to install software applications when a computer is started,
when the user logs on, or on demand. Software installation Group
Policy settings can be applied to users or computers in an Active
Directory structure.
Group Policy-based software installation can also be used to upgrade
deployed applications or remove earlier applications that are no
longer required. Users can be restricted from installing any software
from local media, such as a CD-ROM, or disk, or other unapproved
applications.
Medium and large organizations may wish to consider using Systems
Management Server (SMS). SMS provides advanced capabilities such
as inventory-based targeting, status reporting, server- and clientside scheduling, multisite facilities, complex targeting, centralized
hardware and software inventory, remote diagnostic tools, software
metering, software distribution-point population and maintenance,
support for Windows 95, Windows 98, Windows NT 4.0, Windows
2000, and Windows XP clients, and enhanced software deployment
features. SMS does not require Active Directory.
Managing Remote Operating System Installations
Remote Installation Services (RIS) is used to control the behavior of
the Remote Operating System Installation feature as displayed to
client computers. Remote Installation enables administrators to
perform a new installation of Windows on Preboot eXecution
Environment (PXE) remote boot-enabled client computers
throughout an organization. Using a customized, fully automated
installation process from a remote source, an administrator does not
NMA
have to visit the new computer to install a new operating system
and core applications.
NMA
interface, provided by rigpsnap.dll. There is no RIS client-side
extension.
Group Policy Object Editor
The settings you make in the RIS SSE determine which of the four
options the user sees in the Client Installation Wizard of the target
computer, as seen in the following figure.
NMA
This figure shows each of the options that are presented to the user
on the target computer during a remote installation of an operating
system. Because all four settings are enabled in the SSE, all four
settings appear in the wizard. Maintenance and Troubleshooting in
the wizard corresponds to Tools in the SSE.
Remote Installation Services Extension Core Scenarios
The core scenario for Remote Installation Services is operating
system installation with no involvement of the administrator during
client installation. By using the Remote Installation Services
Extension node in the Group Policy Object Editor to configure RIS
policy settings, the administrator can predetermine the options
presented to users during installation. This saves the administrator
time, and ensures consistent deployment of client computers across
the organization.
Remote Installation Services Extension Dependencies
You can edit Remote Installation Group Policy settings on any
computer that has the Group Policy Object Editor with the Remote
NMA
Installation Services node (rigpsnap.dll). However, note the following
about Remote Installation Services:
The Microsoft version of Active Directory is required.
The client computer using RIS to install an operating system must
have a network card that:
Supports Pre-boot Execution Environment (PXE), or
Is supported by the RIS remote boot floppy disk.
Windows XP Professional must have Windows Server 2003
Administration Tools Pack installed to show RIS settings in Group
Policy Object Editor.
RIS Help is not available by default in the Group Policy Management
Console (GPMC) running on Windows XP Professional. Install
Windows Help from the Windows Server 2003 CD onto the computer
running Windows XP Professional.
RIS is not included in the Windows Server 2003, Web Edition
operating system.
RIS installation image files must be located on a Windows NT File
System (NTFS) partition not containing the system or boot files.