Friday 10 March 2017

Active Directory Group Policy-I

 
In Starting was not comfort with power shell commands but these days, every daily task or repetitive task is getting done by power shell, because of its greatness :). Even you can do big task with a power shell script. Only the thing that make sure it does what you want or for what activity you made it. In Active directory too, there are so  many reports or task is being done by power shell. Instead of going to server and open any console just run the script and you got the output.Now we will be doing here a couple of task with power shell as well from group policy management console. 

Lab Setup: 
Domain Controller: Windows Server 2008R2,Windows Server2012R2 and Windows Server 2016
Client Side: Windows 7 for Test Purpose.
 

 Here am creating one group policy for Wallpaper for all users.The Details tab contains information describing who created the GPO (the owner) and the status (Enabled, Disabled, or Partially Disabled) as well as some nuts-and-bolts information about its underlying representation in Active Directory (the GUID)
 

 
You can bypass restriction error by adding security_mmc.exe as a trusted website or turn off Internet Explorer Enhanced Security Configuration.
 


 
 
The Delegation Tab: The Delegation tab lets you specify who can do what with GPOs, their links, and their properties. You’ll find the Delegation tab in a lot of places, such as when you do the following:
a. Click a GPO link or click a GPO in the Group Policy Objects container
b. Click a site
c. Click a domain
d. Click an OU
First select WMI Filters node then WMI (Windows Management Instrumentation)
and then Click on the Starter GPOs section.
The Settings Tab: The Settings tab gives you an at-a-glance view of what’s been set inside the GPO. In our example, you can see the Enabled and Disabled status of the two policy settings we manipulated. You can click Hide (or Show) to contract and expand all the configured policy settings. 
You can use PowerShell to save a report of a specific Group Policy Object or all GPOs using the cmdlet Get-GPOReport. For example, 
 type:  Get-GPOReport –Name GPO123 –ReportType HTML –Path C:\temp\out1.html then replace -Name GPO123 with -ALL and you can get all group policies applied to Domain will be pulled as report in html format. Make sure if you have many policies ignore ALL options.
 
This pop up just remind you that you are going to do some thing with speific this policy.
 
Disabling the Link Enabled Status:Remember that all GPOs are contained in the Group Policy Objects container.you link back to the GPO. So,the quickest way to prevent a GPO’s contents from applying is to remove its Link Enabled status.
 
what if i disabled here user or computer option. Let me explain you, its not any magic that effect or impact will you show right now but on back ground there is a performance enhancement.Suppose there are 1000 computers and any policy set on 1000 numbers, so what will happen. I hope you understand what am trying to say.
 
Delete the GPO: Remove-GPO -name "PolicyName"
This power shell command will delete the policy from Domain
 
Block Inheritance: Use the Block Inheritance feature to prevent all GPOs (and the policy settings within them) from all higher levels from affecting your users and computers.
 
power shell commnad: Set-GPinheritance -Target "ou=OUName,dc=all4techie,dc=in" -IsBlocked Yes
and after that you can blue exclamation.
 Here i created a new OU with APAC and under that India OU, to ignore accidently delete the objects, In 2008 that is great option available that if you selected this option that will not allow you to delete the specific object. 

You can see here Block Inheritance option is not applied.
 
The Enforced Function: The Enforced function is simple: It guarantees that policy settings within a specific GPO from a higher level are always inherited by lower levels. It doesn’t matter if the lower administrator has blocked inheritance or has a GPO that tries to disable or modify the same policy setting or settings.
powershell: Set-GPlink –Name "PolicyName" –Target "dc=all4techie, dc=in" –Enforced Yes 
 
Security Filtering and Delegation with the GPMC: Its not recommended that all admins have access to modify the settings in Domain Infrastructure,as well atleast a group of senior should have :)
Group Policy infrastructure will be always good if you plan and do everything in proper way, and it will be worst to worst if you are not taking care of the policies. It will mess up all the domain stuffs.
Always prefer on the base of group, where the policy require and where not. Like Wallpaper policy is subject to based on company standard it will apply for all but what for a specific deptt and there mapped folder, printer access, folder access and many more. So always recommend to put all the yes user to one security group and remove the other from scope and setting details of Group Policy.As and when you remove the other users they would not have read access to group policy and the specific policy will not apply for them.
If you see on any policy you will found authenticated users group, which having read access to group policy. 
 
Learn, Earn and Share the Knowledge. Please comment if any query with feedback. I will be very happy to listen from your side.Thank U So much for Support.
 

1 comment:

  1. Thanks for sharing active directory management tips. for more info i rfer cion systems active directiry mangement tools in USA.

    ReplyDelete