Module 11: Implementing Group Policy
Module 11: Implementing Group Policy
Contents:
Module Overview
Module Overview
This module provides an overview of Group Policy and provides details about how to
implement Group Policy.
Objectives
You can use Group Policy to control the settings of the computing environment. It is
important to understand how Group Policy functions, so you can apply Group Policy
correctly. This lesson provides an overview of Group Policy structure, and defines local and
domain-based GPOs. It also describes the types of settings available for users and groups.
Lesson Objectives
After completing this lesson, you should be able to:
Group Policy settings are configuration settings that allow administrators to enforce settings
by modifying the computer-specific and user-specific registry settings on domain-based
computers. You can group together Group Policy settings to make GPOs, which you can then
apply to users or computers.
GPOs
A GPO is an object that contains one or more policy settings that apply configuration setting
for users, computers, or both. GPO templates are stored in SYSVOL, and GPO container
objects are
stored in Active Directory® Domain Services (AD DS). You can manage GPOs by using the
Group Policy Management Console (GPMC). Within the GPMC, you can open and edit a
GPO by using the Group Policy Management Editor window. GPOs are linked to Active
Directory containers, and apply settings to the objects in those containers.
A Group Policy setting is the most granular component of Group Policy. It defines a specific
configuration setting to apply to an object (a computer, a user, or both) within AD DS. Group
Policy has thousands of configurable settings. These settings can affect nearly every area of
the computing environment.
However, you cannot apply all settings to all versions of Windows Server® and Windows®
operating systems. Each new version introduces new settings and capabilities that only apply
to that specific version. If a computer has a Group Policy setting applied that it cannot process,
it simply ignores the setting.
• Not Configured. The GPO does not modify the existing configuration of the particular
setting for the user or computer.
Note: Some settings are multivalued or have text string values, and you can use them
to provide specific configuration details to apps or operating-system components. For
example, a setting might provide the URL of the home page that Windows Internet
Explorer® uses or the path to blocked apps.
The effect of a configuration change depends on the policy setting. For example, if you enable
the Prohibit Access to Control Panel policy setting, users cannot open Control Panel. If you
disable the policy setting, you ensure that users can open Control Panel. Notice the double
negative in this policy setting. You disable a policy that prevents an action, thereby allowing
the action.
• User settings. The settings that modify the HKey Current User hive of the registry.
• Computer settings. The settings that modify the HKEY Local Machine hive of the registry.
User and computer settings each have three areas of configuration, which the following table
describes.
Section Description
Software settings Contain software settings that you can deploy to the user or the computer. Software
that you deploy to a user is specific to that user. Software that you deploy to the
computer is available to all users of that computer.
Windows operating system Contain script settings and security settings for both user and computer, and Internet
settings Explorer maintenance settings for the user configuration.
Administrative templates Contain hundreds of settings that modify the registry to control various aspects of the
user and computer environment. Microsoft® or other vendors may create new
administrative templates, such as Microsoft Office templates, which you can
download from the Microsoft website, and then add to the Group Policy Management
Editor.
The Group Policy Management Editor window displays the individual Group Policy settings
that are available in a GPO. The window displays the settings in an organized hierarchy that
begins with the division between computer and user settings, and then expands to show the
Computer Configuration and User Configuration nodes. The Group Policy Management
Editor window is where you configure all Group Policy settings and preferences.
A Preferences node is present under both the Computer Configuration and User Configuration
nodes in the Group Policy Management Editor window. The Preferences node provides even
more capabilities with which to configure the environment, and a later section in this module
details them.
Local Group Policy
All systems that are running Microsoft Windows client or server operating systems also have
available local GPOs. Local policy settings only apply to the local machine, but you can
export and import them to other computers.
Windows Server 2012 R2 offers several new or updated Group Policy settings and features for
computers that run Windows Server® 2012 R2 or Windows® 8.1. These settings and features
include:
• Faster processing by using the Group Policy Caching settings. These new settings allow
computers to rely on a local cache of a GPO when running in synchronous mode, which is
the default mode for Group Policy processing.
• Increased support for IPv6. New Internet Protocol version 6 (IPv6) settings include the
ability to push IPv6 printers and IPv6 virtual private network (VPN) connections to
computers. Additionally, item-level targeting is available for IPv6.
• Extended logging for Group Policy operations. The Group Policy Operational event log
contains more details of operational events, including the length of processing time and the
amount of time for downloading policies, than previous versions. This log is available at
Event Viewer\Applications and Services\Microsoft\Windows\GroupPolicy\Operational.
• Many new settings for Windows 8.1 and Windows Server 2012 R2, including settings for
managing the Start screen layout, configuring charms, and customizing background colors.
Group Policy templates are the actual collection of settings that you can change. The Group
Policy template includes files that are stored in the SYSVOL of each domain controller.
SYSVOL is in the %SystemRoot% \SYSVOL\Domain\Policies\GPOGUID path, where
GPOGUID is the globally unique identifier (GUID) of the Group Policy container. When you
create a GPO, a new Group Policy template is created in the SYSVOL folder, and a new
Group Policy container is created in AD DS.
The Group Policy container is an Active Directory object that is stored in the Active Directory
database. Each Group Policy container includes a GUID attribute that identifies the object
uniquely within AD DS. The Group Policy container defines basic attributes of the GPO, such
as links and version numbers, but it does not contain any of the settings.
By default, during a Group Policy refresh, the Group Policy client-side extensions only apply
GPO settings if the GPO has been updated.
The Group Policy client can identify an updated GPO by its version number. A GPO has a
version number that increments when a GPO settings change occurs. The GPO version
number is stored as an attribute of the Group Policy container. Additionally, it is stored in a
text file named GPT.ini, in the Group Policy Template folder. The Group Policy Client is
aware of the version number of every GPO that it has applied previously. If, during Group
Policy refresh, the Group Policy client establishes that the version number of the Group Policy
container has changed, it notifies the client-side extensions that the GPO has been updated.
When editing a GPO, the version that you are editing is the version on the domain controller
that has the primary domain controller (PDC) emulator flexible single master operations, or
FSMO, role. It does not matter what computer you are using to perform the editing, the GPMC
focuses on the PDC emulator by default. However, you can change the focus of the GPMC to
edit a version on a different domain controller.
What Are Group Policy Preferences?
Group Policy preferences are a Group Policy feature, which includes more than 20 Group
Policy extensions that expand a GPO’s range of configurable settings. Configuring these
preferences helps reduce the need for logon scripts.
Characteristics of Preferences
• Are not enforced, unlike Group Policy settings. Users can change the configurations that
these preferences establish.
• Can be applied only once at startup or during sign in, and can be refreshed at intervals.
• Are not removed when the GPO is no longer applied, unlike Group Policy settings.
However, you can change this behavior.
• Allow you to target certain users or computers by using a variety of methods, such as by the
user’s security group membership or by the operating-system version.
• Does not have a disabled user interface, unlike a Group Policy setting.
You can configure many settings through Group Policy preferences. However, common uses
for configuring Group Policy preferences include to:
• Map printers.
• Schedule tasks.
Available Settings
Starter GPOs contain settings from only the Administrative Templates node of either the User
Configuration section or the Computer Configuration section. The Software Settings and
Windows Settings nodes of Group Policy are not available, because these nodes involve
interaction of services, and are more complex and domain-dependent.
You can export starter GPOs to a cabinet file (.cab), and then load that .cab file into another
environment that is completely independent of the source domain or forest. By exporting a
starter GPO, you can send the .cab file to other administrators, who can use it in other areas.
For example, you might create a GPO that defines Internet Explorer security settings. If you
want all sites and domains to employ the same settings, you could export the starter GPO to
a .cab file, and then distribute it.
The most common situation in which you would use a starter GPO is when you want a group
of settings for a type of computer role. For example, you might want all corporate laptops to
have the same desktop restrictions, or you might want all file servers to have the same baseline
Group Policy settings, but you want to enable variations for different departments.
The GPMC includes a link to create a Starter GPO folder, which contains a number of
predefined starter GPOs. These policies provide preconfigured, security-oriented settings for
Enterprise Clients (EC), in addition to Specialized Security–Limited Functionality (SSLF)
clients for both user and computer settings on Windows Vista® and Windows XP with
Service Pack 2 (SP2) operating systems. You can use these policies as starting points when
you design security policies.
For example, a user who manages a particular organizational unit (OU) could be tasked with
performing reporting and analysis duties, while the help desk group is allowed to edit GPOs
for that OU. A third group made up of developers might oversee creation of the Windows
Management Instrumentation (WMI) filters.
Members of the Group Policy Creator Owners group can create new GPOs and edit or delete
GPOs that they have created.
By default, the following users and groups have full access to manage Group Policy:
• Domain Admins
• Enterprise Admins
• Creator Owner
• Local System
The Authenticated User group has Read and Apply Group Policy permissions only.
By default, only Domain Admins, Enterprise Admins, and Group Policy Creator Owners can
create new GPOs. You can use two methods to grant a group or user this right:
• Explicitly grant the group or user permission to create GPOs by using the GPMC
Permissions for Editing GPOs
To edit a GPO, the user must have both Read and Write access to the GPO. You can grant this
permission by using the GPMC.
The ability to link GPOs to a container is a permission that is specific to that container. In the
GPMC, you can manage this permission by using the Delegation tab on the container. You can
also delegate it through the Delegation of Control Wizard in Active Directory Users and
Computers.
You can delegate the ability to use the reporting tools either through the GPMC or through the
Delegation of Control Wizard in Active Directory Users and Computers.
You can delegate the ability to create and manage WMI filters either through the GPMC or
through the Delegation of Control Wizard in Active Directory Users and Computers.
• Sign in to LON-DC1 as Administrator with the password Pa$$w0rd, and create a policy
named Prohibit Windows Messenger.
• In Windows PowerShell, import the grouppolicy module, and then use the following New-
GPO cmdlet:
Understanding how Group Policy is applied is the key to being able to develop a Group Policy
strategy. This lesson shows you how Group Policy is associated with Active Directory objects,
how it is processed, and how to control the application of Group Policy. After creating the
GPOs and configuring the settings that you want to apply, you must link them to containers.
GPOs are applied in a specific order, and this order can determine what settings are applied to
objects. Two default policies are created automatically, and you can use them to deliver
password and security settings for the domain and for domain controllers. You also can
control policy application by using security filtering.
Lesson Objectives
After completing this lesson, you should be able to:
GPO Links
Once you have created a GPO and defined all the settings that you want it to deliver, the next
step is to link the policy to an Active Directory container. A GPO link is the logical
connection of the policy to a container. You can link a single GPO to multiple containers by
using the GPMC, including the following container types:
• Sites
• Domains
• OUs
Once you link a GPO to a container, by default the policy is applied to all of the container’s
objects and all the child containers under that parent object. This is because the default
permissions of the GPO are such that Authenticated Users have Read and Apply Group Policy
permission. You can modify this behavior by managing permissions in the GPO.
You can disable links to containers, which removes the configuration settings. You also can
delete links, which does not delete the actual GPO, only the logical connection to the
container.
You cannot link GPOs directly to users, groups, or computers. Furthermore, you cannot link
GPOs to the system containers in AD DS, including Builtin, Computers, Users, or Managed
Service Accounts. The AD DS system containers receive Group Policy settings from GPOs
that are linked to the domain level only.
Applying GPOs
Computer configuration settings are applied at startup, and then are refreshed at regular
intervals. Any startup scripts run at computer startup. The default interval is every 90 minutes,
but this is configurable. The exceptions to this default interval are domain controllers, which
have their settings refreshed every five minutes.
User settings are applied at logon and are refreshed at regular, configurable intervals. The
default for this is 90 minutes. Prior to Windows 8.1 and Windows Server 2012 R2, all logon
scripts run at sign-in. By default, in Windows 8.1 and Windows Server 2012 R2, logon scripts
run five minutes after sign-in. You can use Group Policy to remove this delay by modifying
the Computer Configuration\Policies\Administrative Templates\System \Group
Policy\Configure Logon Script Delay setting.
Note: A number of user settings require two sign-ins before the user sees the effect of
the GPO. This is because multiple users signing in to the same computer use cached
credentials to speed up sign-ins. This means that, although the policy settings are
delivered to the computer, the user is signed in already. Therefore, the settings do not
take effect until the next time the user signs in. The Folder Redirection setting is an
example of this.
You can change the refresh interval by configuring a Group Policy setting. For computer
settings, the refresh interval setting is found in the Computer
Configuration\Policies\Administrative Templates \System\Group Policy node. For user
settings, the refresh interval is found at the corresponding settings under User Configuration.
An exception to the refresh interval is the security settings. The security settings section of the
Group Policy is refreshed at least every 16 hours, regardless of the interval that you set for the
refresh interval.
You also can refresh Group Policy manually. The command-line tool, Gpupdate, refreshes
and delivers any new Group Policy configurations. The Gpupdate /force command refreshes
all Group Policy settings. There also is a new Windows PowerShell Invoke-Gpupdate
cmdlet, which performs the same function.
A new feature in Windows Server 2012 and in Windows 8 is Remote Policy Refresh. This
feature allows administrators to use the GPMC to target an OU and force Group Policy refresh
on all of its computers and their currently signed-in users. To force a Group Policy refresh,
right-click any OU, and then click Group Policy Update. The update occurs within 10 minutes.
2. Site GPOs. Policies that are linked to sites are processed next.
3. Domain GPOs. Policies that are linked to the domain are processed next. There are often
multiple polices at the domain level. These policies are processed in order of preference.
4. OU GPOs. Policies linked to OUs are processed next. These policies contain settings that
are unique to the objects in that OU. For example, the Sales users might have special
required settings. You can link a policy to the Sales OU to deliver those settings.
5. Child OU policies. Any policies that are linked to child OUs are processed last.
Objects in the containers receive the cumulative effect of all polices in their processing order.
In the case of a conflict between settings, the last policy applied takes effect. For example, a
domain-level policy might restrict access to registry editing tools, but you could configure an
OU-level policy and link it to the IT OU to reverse that policy. Because the OU-level policy is
applied later in the process, access to registry tools would be available.
Note: Other methods such as Enforcement and Inheritance Blocking can change the
effect of policies on containers.
If multiple policies are applied at the same level, the administrator can assign a preference
value to control the order of processing. The default preference order is the order in which the
policies were linked.
The administrator also can disable the user or computer configuration of a particular GPO. If
one section of a policy is empty, you should disable it to speed up policy processing. For
example, if there is a policy that only delivers user desktop configuration, the administrator
could disable the computer side of the policy.
What Are Multiple Local GPOs?
In Windows operating systems prior to Windows Vista, there was only one available user
configuration in the local Group Policy. That configuration was applied to all users who
logged on from that local computer. This is still true, but Windows Vista and newer Windows
client operating systems, and Windows Server 2008 and newer Windows Server operating
systems, have an added feature: multiple local GPOs. Since Windows 8 and Windows Server
2012, you also can have different user settings for different local users, but this is only
available for users’ configurations that are in Group Policy. In fact, there is only one set of
computer configurations available that affects all users of the computer.
Since Windows 8 and Windows Server 2012, Computers that run Windows provide this
ability with the following three layers of local GPOs:
Note: The exception to this feature is domain controllers. Due to the nature of their
role, domain controllers cannot have local GPOs.
Note: Domain administrators can disable processing local GPOs on clients that are
running Windows client operating systems and Windows Server operating systems by
enabling the Turn Off Local Group Policy Objects Processing policy setting.
Note: Currently, fine-grained password policies are the typical enterprise method of
enforcing password policies and account lockout settings, although they are beyond
the scope of this module.
The Default Domain Controllers Policy is linked to the Domain Controllers OU, and should
only affect domain controllers. This policy provides auditing settings and user rights, and you
should not use it for other purposes.
GPO Security Filtering
By nature, a GPO applies to all the security principals in the container, and all child containers
below the parent. However, you might want to change that behavior and have certain GPOs
apply only to particular security principals. For example, you might want to exempt certain
users in an OU from a restrictive desktop policy. You can accomplish this through security
filtering.
Each GPO has an access control list (ACL) that defines permissions to that GPO. The default
permission is for Authenticated Users to have the Read and Apply Group Policy permissions
applied.
By adjusting the permissions in the ACL, you can control which security principals receive
permission to have the GPO settings applied. There are two approaches that you can take to do
this:
Note: The Authenticated Users group includes all user and computer accounts that
have authenticated to AD DS.
If most security principals in the container should receive the policy settings but some should
not, then you can exempt particular security principals by denying them access to the Group
Policy. For example, you might have a Group Policy that all the users in the Sales OU should
receive except the Sales Managers group. You can exempt that group (or user) by adding that
group (or user) to the ACL of the GPO, and then setting the permission to Deny.
Limit Permissions to Group Policy
Alternatively, if you have created a GPO that you want to apply only to a few security
principals in a container, you can remove the Authenticated Users group from the ACL, add
the security principals that should receive the GPO settings, and then grant the security
principals the Read and Apply Group Policy permissions. For example, you might have a
GPO with computer configuration settings that should only apply to laptop computers. You
could remove the Authenticated Users group from the ACL, add the computer accounts of the
laptops, and then grant the security principals the Read and Apply Group Policy permission.
The ACL of a GPO is accessed in the GPMC by selecting the GPO in the Group Policy Object
folder, and then clicking the Delegation>Advanced tab.
Note: As a best practice, you should never deny access to the Authenticated User
group. If you do, then security principals would never receive the GPO settings.
Scenario
• GPO2 has settings to lock down the desktops of the Sales Users OU, and configure printers
for Sales Users.
• GPO3 configures power options for laptops in the Sales Laptops OU.
• GPO4 configures a different set of power options to ensure that the servers never go into
power save mode.
Some users in the Sales OU have administrative rights on their computers, and have created
local policies to grant access specifically to Control Panel.
Discussion Questions
Question: What power options will the laptops in the Sales Laptops OU receive?
Question: What power options will all other computers in the domain receive?
Question: Will users in the Sales Users OU who have created local policies to grant
access to Control Panel be able to access Control Panel?
Question: If you needed to grant access to Control Panel to some users, how would you
do it?
• Use the Group Policy Modeling Wizard to simulate a policy application for users in the
Managers OU who sign in to any computer.
Larger organizations might have many GPOs with multiple administrators that manage them.
When an administrator edits a GPO, the template files are pulled from the local workstation.
The central store provides a single folder in SYSVOL that contains all of the templates
required to create and edit GPOs.
This lesson discusses the files that make up the templates, and covers how to create a central
store location to provide consistency in the templates that administrators use.
Lesson Objectives
After completing this lesson, you should be able to:
The central store addresses this issue. The central store provides a single point from which
administration workstations can download the same ADMX and ADML files when editing a
GPO. The central store is detected automatically by Windows operating systems (Windows
Vista or newer or Windows Server 2008 or newer). Because of this automatic behavior, the
local workstation that the administrator uses to perform administration always checks to see if
a central store exists before loading the local ADMX and ADML files in the Group Policy
Management Editor window. When the local workstation detects a central store, it then
downloads the template files from there. In this way, there is a consistent administration
experience among multiple workstations.
You must create and provision the central store manually. First you must create a folder on a
domain controller, name the folder PolicyDefinitions, and store the folder at
C:\Windows\SYSVOL\sysvol \{Domain Name}\Policies\. This folder is now your central
store. You must then copy all the contents of the C:\Windows\PolicyDefinitions folder to the
central store. The ADML files in this folder also are in a language-specific folder, such as en-
US.
What Are Administrative Templates?
• ADMX files that specify the registry setting to change. AMDX files are language-neutral.
• ADML files that generate the user interface to configure the Administrative Templates
policy settings in the Group Policy Management Editor window. ADML files are language-
specific.
ADMX and ADML files are stored in the %SystemRoot%\PolicyDefinitions folder or in the
central store. You can also create your own custom administrative templates in XML format.
Administrative templates that control Microsoft Office products (such as Office Word, Office
Excel and Office PowerPoint) are also available from the Microsoft website.
• They are organized into subfolders that house configuration options for specific areas of the
environment, such as network, system, and Windows components.
• The settings in the Computer section edit the HKEY_LOCAL_MACHINE registry hive,
and settings in the User section edit the HKEY_CURRENT_USER registry hive.
•
Some settings exist for both User and Computer. For example, there is a setting to prevent
Windows Messenger from running in both the User and the Computer templates. In case of
conflicting settings, the Computer setting prevails.
• Some settings are available only to certain versions of Windows operating systems.
Double-clicking the settings displays the supported versions for that setting. The system
ignores any setting that an older Windows operating system cannot process.
ADM Files
Prior to Windows Vista, administrative templates had an .adm file extension (ADM). ADM
files were language-specific, and were difficult to customize. ADM files are stored in
SYSVOL as part of the Group Policy template. If an ADM file is used in multiple GPOs, then
the file is stored multiple times. This increases the size of SYSVOL, and therefore increases
the size of Active Directory replication traffic.
The following table details the organization of the Administrative Templates node.
Section Nodes
Computer settings
• Control Panel
• Network
• Printers
Section Nodes
• System
• Windows Components
• All Settings
User settings
• Control Panel
• Desktop
• Network
• Shared Folders
• System
• Windows Components
• All Settings
Most of the nodes contain multiple subfolders that enable you to organize settings even further
into logical groupings. Even with this organization, finding the setting that you need might be
a daunting task.
To help you locate settings in the All Settings folder you can filter the entire list of settings in
either the computer or the user section. The following filter options are available:
• Managed or unmanaged
• By keyword
• By platform
You can also combine multiple criteria. For example, you could filter to find all the configured
settings that apply to Internet Explorer 10 by using the keyword ActiveX.
• The user interface (UI) is locked, so that a user cannot change the setting. Managed policy
settings result in disabling of the appropriate UI. For example, if you configure the desktop
wallpaper through a Group Policy setting, then those settings are grayed out in the user’s
local UI.
• Changes are made in the restricted areas of the registry to which only administrators have
access. These reserved registry keys are:
• Changes made by a Group Policy setting and the UI lockout are released if the user or
computer falls out of scope of the GPO. For example, if you delete a GPO, managed policy
settings that had been applied to a user are released. Typically, the setting then resets to its
previous state. Also, the UI interface for the setting is enabled.
In contrast, an unmanaged policy setting makes a change that is persistent in the registry. If the
GPO no longer applies, the setting remains. This is often called tattooing the registry—in
other words, making a permanent change. To reverse the effect of the policy setting, you must
deploy a change that reverts the configuration to the desired state. Additionally, an unmanaged
policy setting does not lock the UI for that setting.
By default, the Group Policy Management Editor window does not show unmanaged policy
settings to discourage administrators from implementing a configuration that is difficult to
revert. Many of the settings that are available in Group Policy preferences are unmanaged
settings.
Scenario
A. Datum Corporation is a global engineering and manufacturing company with a head office
based in
London, England. An IT office and a data center are located in London to support the London
location and other locations. A. Datum has recently deployed a Windows Server 2012
infrastructure with Windows 8 clients.
In your role as a member of the server support team, you help to deploy and configure new
servers and services into the existing infrastructure based on the instructions given to you by
your IT manager.
Your manager has asked you to create a central store for ADMX files to ensure that everyone
can edit GPOs that have been created with customized ADMX files. You also need to create a
starter GPO that includes Internet Explorer settings, and then configure a GPO that applies
GPO settings for the Marketing department and the IT department.
Objectives
After completing this lab, you should be able to:
• Create GPOs.
Lab Setup
20410D-LON-CL1
Password Pa$$w0rd
For this lab, you will use the available virtual machine environment. Before you begin the lab,
you must complete the following steps:
1. On the host computer, start Hyper-V Manager.
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
o Password: Pa$$w0rd
5. Repeat steps 2 and 3 for 20410D-LON-CL1. Do not sign in until directed to do so.
Scenario
obtained the ADMX files from the vendor before creating the GPO with the configurations
settings. The settings were applied to the program as expected.
After implementation, you noticed that you are unable to modify the program’s settings in the
GPO from any location other than the workstation that was used originally by your colleague.
To resolve this issue, your manager has asked you to create a central store for administrative
templates. After you create the central store, your colleague will copy the vendor ADMX
template from the workstation into the central store.
3. In the Group Policy Object folder, open the Default Domain Policy, and then view the
location of the administrative templates.
2. Create a folder to use for the central store, with the name PolicyDefinitions.
Results: After completing this exercise, you should have configured a central store.
Scenario
After a recent meeting of the IT Policy committee, management has decided that A. Datum
will use Group Policy to restrict user access to the General page of Internet Explorer.
Your manager has asked you to create a starter GPO that can be used for all departments, with
default restriction settings for Internet Explorer. You then need to create the GPOs that will
deliver the settings for members of all departments except for the IT department.
3. Create an Internet Explorer Restrictions GPO from the Internet Explorer Restrictions
starter GPO.
5. Use security filtering to exempt the IT Department from the Internet Explorer
Restrictions policy.
1. Open the GPMC, and then create a starter GPO named Internet Explorer Restrictions.
2. Type a comment that states This GPO disables the General page in Internet Options.
1. Configure the starter GPO to disable the General page of Internet Options, and then
name it Internet Explorer Restrictions.
Hint: To select all the content, click in the details pane, and then press CTRL+A.
Task 3: Create an Internet Explorer Restrictions GPO from the Internet Explorer
Restrictions starter GPO
• Create a new GPO named IE Restrictions that is based on the Internet Explorer
Restrictions starter GPO, and then link it to the Adatum.com domain.
4. Open Internet Options to verify that the General tab has been restricted.
Task 5: Use security filtering to exempt the IT Department from the Internet
Explorer Restrictions policy
2. Configure security filtering on the Internet Explorer Restrictions policy to deny access
to the IT department.
1. Switch to LON-CL1.
4. Attempt to change your home page. Verify that the Internet Properties dialog box
opens to the General tab, and all settings are available.
Task 7: Test the Application of the GPO for other domain users
4. Open Internet Options to verify that the General tab has been restricted.
Results: After completing this lab, you should have created a GPO.
Question: The Sales Managers group should be exempted from the desktop lockdown
policy that is being applied to the entire Sales OU. All sales user accounts and sales
groups reside in the Sales OU. How would you exempt the Sales Managers group?
Question: What Windows command can you use to force the immediate refresh of all
GPOs on a client computer?
After you finish the lab, revert the virtual machines to their initial state by completing the
following steps:
2. In the Virtual Machines list, right-click 20410D-LON-DC1, and then click Revert.
Review Questions
Question: What are some of the advantages and disadvantages of using site-level GPOs?
Question: You have a number of logon scripts that map network drives for users. Not all
users need these drive mappings, so you must ensure that only the desired users receive
the mappings. You want to move away from using scripts. What is the best way to map
network drives for selected users without using scripts?
Best Practices
The following are recommended best practices:
• Do not use the Default Domain and Default Domain Controllers policies for uses other than
their default uses. Instead, create new policies.
• Limit the use of security filtering and other mechanisms that make diagnostics more
complex.
• If they have no settings configured, disable the User or Computer sections of policies.
• Add comments to your GPOs to explain what the policies are doing.
Tools
Group Policy Management Console Controls all aspects of Group Policy In Server Manager, on the Tools menu
(GPMC)
Group Policy Management Editor Configure settings in GPOs Accessed by editing any GPO
snap-in
Resultant Set of Policy (RSoP) Determine what settings are In the GPMC
applying to a user or computer
Group Policy Modeling Wizard Test what would occur if settings In the GPMC
were applied to users or computers,
prior to actually applying the
settings
Local Group Policy Editor Configure Group Policy settings Accessed by creating a new Microsoft
that apply only to the local Management Console (MMC) on the
computer local computer, and adding the Group
Policy Management Editor snap-in