In
Ali said:
Ok here is the deal. We are just very confused. First of
all Creating the GP on the domain level..we have seen
different things happening:
1. The GP does not filter properly down to an OU
2. Upon creating the GP at the domain level...and blocking
such things as access to "control panel", "run in the
start menu"...the administrator loses access to these
things as well.
3. We did somehow get the GP to work properly for a test
user. However, we logged in as the user on two different
test pc's and on one PC the user has no access to run,
control panel. On the 2nd PC the user has access to those
things. What is going on?
I have been able to create a GP and place it into an
actual OU and get everything to function properly.
However, doesnt that defeat the purpose?
So I guess my question is whether or not we should be
creating the GP and applying it at the domain level or
just place it in each OU(which seems to work).
As for creating users...as you know we have created OU's.
We want to have the ability to place a users into multiple
OU's...for example an 'ADMIN' person might also need to be
within 'OFFICE staff'. Do we create groups within the OU
to do this?
We are relatively in-experienced when it comes to AD. Is
there something drawn out step by step. We are just
looking for simple security measure which allow us to
control what the users have access to. Of course....all
admin ppl need to retain their access.
Thanks again.
OUs are designed for you to organize your domain objects. This includes
Users, Groups and Computers. To do what you are doing by setting a blanket
setting at the domain level would affect ALL objects domain wide, including
your domain controllers (which you DO NOT want this to occur). This will
involve numerous GPO filtering (by denying apply on the GPO) for the objects
that do not require it (such as your admins, DCs and other objects, which
you are just making it very difficult and complex to adminster and keep
track of.
The idea behind OUs is to group certain objects for certain reasons, such as
GPO application and/or delegation. You can create OUs for grouping objects
based on remote location, department or function.
I would highly suggest to group whatever users you want by OUs (by
department or function) and then apply these certain restrictive settings
you want to give those users at the OU level. If you don't want your admins
to be affected by this GPO, put them in their own OU. If separating by
remote locations, and there are specific admins at each location, then
create a child OU under the remote location's OU, called 'admins' and block
inheritance on their OU so they won't get the GPO you applied at that
specifi parent OU. But I would not suggest to do all this at the Domain
level. You'll be setting yourself up for problems due to the complexity you
are subjecting yourself with the way you're currently thinking and
attempting to do it.
FYI: Password settings and password policies will ONLY work at the Domain
level, they do NOT work at the OU level. Normally most admins (depending on
your scenario) will only set these settings here and create OUs to govern
the other objects with GPOs, as I mentioned above.
Here's an example:
Domain - Default Domain GPO
Password set to min 8 characters
Password Complexity Requirements
No Override
No Network Neighborhood
No Run Command
No Favorites
Above, you have your Domain, and under that we created a Philly OU, with a
GPO with restrictions, and then we created two Child OUs under Philly OU. So
what will happen above is when a user logs in from Philly (assuming you ahve
all the Philly users in this OU), they will get No Control Panel access,
they won't see My Network PLaces, they will not have a Run command
available, and they will have no Favorites on their STart menu. But the
admins, when they login will have nor restrictions. All users in the whole
domain will have a required min password length or 8 characters with
complexity requirements. The password stuff also affects the Philly admins
because the No Override at the domain level is forced even though they have
Block Inheritance. This assures domain level 'required' settings go to
everyone.
Make sense?
Block Inheritance and No Override are designed to control GPO inheritance. I
wouldn't be scared in using them, if I were you, since that's all they do
and will make it easier for you to accomplish your end goal. There is a tool
called 'gpresults.exe' in the resource kit that you can run at a client
machine to see what GPOs have applied to it. There is a 3rd party tool
called FAZAM 2000 by Full Armor (
www.fullarmor.com) that will give you a
complete administrative control for all GPOs. In W2k3, there's a new tool
called GPMC that gives you similar features but not as feature rich as
FAZAM.
Desiging your AD domain is part of the whole AD process.
With all due respect, there are a couple classes that exist for W2k and W2k3
on AD which have comprehensive sections (Modules) on how to use GPOs. They
are VERY informative if you choose to attend one, and then you can see how
easy they really are to use. If interested in what these classes are, post
back and I can give you specific course numbers and you can check with
Microsoft's site for a center that delivers them near you.
--
Regards,
Ace
Please direct all replies to the newsgroup so all can benefit.
This posting is provided "AS-IS" with no warranties and confers no
rights.
Ace Fekay, MCSE 2000, MCSE+I, MCSA, MCT, MVP
Microsoft Windows MVP - Active Directory