Talk:Group Policy
From Wikipedia, the free encyclopedia
The "Best Practices for Designing Group Policies" section either needs to be dumped or rewritten. Part of the section deals with the author's idea of "Best Practice" while the rest alludes to where (and what) GPOs can be applied but omits to state why. No mention is made of GPOs working at a per attribute level.
RyanG
[edit] Best practice section deleted from main article
Best Practices for Designing Group Policies
- Write the policy as high as possible. (at Domain or OU level)
- Work with e-Security to define policy. Security policies defined at highest level.
- Define Generic Policies as high as possible.
- The policies do not affect default administrator accounts
- Block inheritance at OU if needed. Can be Enforced at parent level. Enforced policies can not be blocked.
- Higher Policy in list takes precedence. (order in the list is important)
- Deny Apply Group Policy at Group level for IT Management Team
- Staging environment for Group Policies. Good Idea!
- You can NOT write policy at:
- Built in
- Computers
- Users
- Groups
- You CAN write policies at:
- OU Level
- Create an OU Design that requires least GPOs.
- Site Level GPOs requires enterprise administrations permissions.
- Domain Level GPOs requires domain administrations permissions.
- OU Level GPOs requires appropriate permissions. Delegation of Administration.
- GPOs take effect in the following order:
- Local Machine
- Sites
- Domain
- OU
- Machine Based Policy take effect on Reboot
- User Based Policy take effect on Logon
RyanG 14:52, 25 August 2005 (UTC)
[edit] Disadvantages
I think we should talk about the disadvange of using it, which is that if the user logs in and disconnects from the network some of the group policys don't load. —Preceding unsigned comment added by 219.88.3.50 (talk) 03:28, 20 October 2007 (UTC)
[edit] Are you sure?
Someone recently added this:
Security A problem with the per-user policies is that they're only enforced voluntarily by the targeted applications. A malvolent user can interfere with the application that it cannot successfully read its Group Policy settings (thus enforcing potentially lower security defaults) or eve return arbitrary values. The user can also create a copy of the application at a writable location, and modify it such that it ignores the settings. One should rather see it that the Group Policy helps the user provide some safe defaults to help him enforcing security for himself.
However, many group policy settings apply to windows itself, and cannot be over-ridden. Most policies are things such as disabling registry editing, disallowing the task manager, etc. This type of policy typically cannot be overcome. What do others think? --Tech Nerd 01:55, 6 November 2007 (UTC)
- if you create a copy of cmd.exe or taskmgr.exe that don't check to see if they are disabled, they will run fine. they are referring to the fact that even windows apps must enforce the settings that apply to them, not that the system will somehow stop them. PidGin128 from 149.168.240.7 (talk) 14:45, 2 June 2008 (UTC)