Windows Server Administration Course - I: Itcstc Restricted
Windows Server Administration Course - I: Itcstc Restricted
Table of Contents
CHAPTER 5 .............................................................................................................................................. 2
Group Policy ............................................................................................................................................ 2
5.1 Group Policy Object ...................................................................................................................... 2
5.2 Group Policy .................................................................................................................................. 2
5.3 Group Policy Block Inheritance and Enforcement ........................................................................ 3
5.4 Default Domain Policy ................................................................................................................... 4
5.4.1 Account Policies .................................................................................................................. 4
5.5 Group Policy Settings .................................................................................................................. 11
ITCSTC Page 1
Restricted
Windows Server Administration Course - I
CHAPTER 5
Group Policy
This chapter covers the following topics:
• Group Policy Object
• Group Policy
• Group Policy Enforcement and Inheritance
• How to create Group Policy Object and link to OU
ITCSTC Page 2
Restricted
Windows Server Administration Course - I
to the computer. Both settings have policies and preferences. Policies are defined as software
settings, windows settings and Administrative Templates.
Software settings can be deployed to users or computers by the administrator.
Software settings contain software specific group policies: this setting is empty by default.
Windows settings contain local security settings. It can be applied to users or
computers in order to modify the windows environment by using GPO. For example, password
policy, firewall policy, account lockout policy, scripts and so on.
Administrative Templates can control how the local computer behaves in many ways.
For example, specifying the desktop wallpaper, disabling access to non-essential areas of the
computers such as Network desktop icon/ control panel, and so on.
Preferences of a GPO setting is enabling to deploy desired configurations to computers
and users without limiting the user from choosing a different configuration. Preferences are a
group policy extension to map with network components such as network drivers and printers,
and to configure internet options and so on.
Group policies are stored in active directory and they can be configured by using the
Group Policy Management Console (GPMC). Group policy settings have three states:
Enabled, Disabled and Not Configured.
Group Policy Enforcement prevents GPOs from being overridden by other GPOs.
Such GPOs cannot be blocked if the administrator wants to block using Block Inheritance.
ITCSTC Page 3
Restricted
Windows Server Administration Course - I
When GPO settings are applied on an OU, they may be conflicted. The settings of the
GPO links at the higher level (parent) are overwritten by settings in GPOs linked to child
organizational units. The administrator can prevent such override by using Enforcement. In
previous Windows Server versions, the GPO enforced option used to be called No Override.
To enable the GPO enforced option, right-click on a particular GPO and click on the
Enforced option.
ITCSTC Page 4
Restricted
Windows Server Administration Course - I
1. Go to Server Manager > Tools > Group Policy Management > Group Policy
Objects under the Domain > right-click on Default Domain Policy > Edit.
a. Password Policy
A password policy is a set of rules designed to enhance computer security by
encouraging users to employ strong passwords and use them properly. These passwords help
prevent the compromise of user accounts and administrative accounts by unauthorized users
who use manual methods or automated tools to guess weak passwords.
To add a password policy, Click Account Policies > Password Policy.
ITCSTC Page 5
Restricted
Windows Server Administration Course - I
The security setting determines the number of unique new passwords that have to be
associated with a user account before an old password can be reused. The value must be
between 0 and 24 passwords.
This policy enables administrators to enhance security by ensuring that old passwords
are not reused continually. Default: 24 on domain controllers, 0 on stand-alone servers.
To maintain the effectiveness of password history, the policy does not allow passwords
to be changed immediately after users were just changed, by also enabling the Minimum
password age security policy setting. For information about the minimum password age
security policy setting, see Minimum password age in the chapter.
To configure > double-click on Enforce password history > click Define this policy
setting > set password history (10) > Apply > OK.
ITCSTC Page 6
Restricted
Windows Server Administration Course - I
ITCSTC Page 7
Restricted
Windows Server Administration Course - I
ITCSTC Page 8
Restricted
Windows Server Administration Course - I
ITCSTC Page 9
Restricted
Windows Server Administration Course - I
ITCSTC Page 10
Restricted
Windows Server Administration Course - I
c. Kerberos Policy
Kerberos is the authentication protocol used in a Windows domain environment to
authenticate logons and grant accounts access to domain resources. An account can be a user
or a computer because computers must also authenticate to the domain. Kerberos provides
mutual authentication between a client and server or between two servers.
ITCSTC Page 11
Restricted
Windows Server Administration Course - I
An editor window will show up. On the left pane, go to User Configuration > Policies
> Administrative Templates > Desktop > Desktop > double-click on Desktop Wallpaper
setting.
Change the option to Enabled, and then specify the wallpaper location and style. Under
“Options”, type the path of the image you want to set as a default background (\\Svr-
01\wp\wallpaper.jpg) and select the style > Apply > OK.
Fully qualified path and name of the file that stores the wallpaper image must be used
in this setting. For example, C:\Windows\web\wallpaper\home.jpg or
\\Server\Share\Corp.jpg.
ITCSTC Page 12
Restricted
Windows Server Administration Course - I
Verify that Wallpaper Policy is now listed under the “Student OU”.
Once you complete these steps, you'll need to restart your computer to see the changes.
The alternative way is using command gpupdate /force to apply and command gpresult /r to
verify this policy. When the policy “Wallpaper Policy” under the section “Applied Group
Policy Objects” is applied, the desktop background wallpaper is changed.
a. Moderating Access to Control Panel
Setting limits on a computers’ Control Panel creates a safer business environment.
Through Control Panel, you can control all aspects of your computer. So, by moderating who
has access to the computer, you can keep data and resources safe. Follow the step by step below
to deny access to Control Panel on “Student OU” using Group Policy:
1. Creating the Group Policy Object
ITCSTC Page 13
Restricted
Windows Server Administration Course - I
To create a GPO, in Server Manager, click Tools > Group Policy Management >
expand the forest and domain > right click on Group Policy Objects > select “New”. And give
a name “Deny Control Panel” for the new policy object.
Right click on the setting Prohibit access to Control Panel and PC settings and click
Edit. This setting prevents Control.exe and SystemSettings.exe, the program files for Control
Panel and PC settings, from starting. As a result, users cannot start Control Panel or PC settings,
or run any of their items. Click Enabled > Apply > OK.
ITCSTC Page 14
Restricted
Windows Server Administration Course - I
ITCSTC Page 15
Restricted