Windows Server 2008 R2 Unleashed (205 page)

BOOK: Windows Server 2008 R2 Unleashed
8.41Mb size Format: txt, pdf, ePub

.
Behavior of the Elevation Prompt for Standard Users—
Prompt for

credentials

.
Detect Application Installations and Prompt for Elevation—
Enabled

.
Only Elevate Executables That Are Signed and Validated—
Disabled

.
Only Elevate UIAccess Applications That Are Installed in Secure

Locations—
Enabled

.
Run All Administrators in Admin Approval Mode—
Enabled

.
Switch to the Secure Desktop When Prompting for Elevation—
Enabled

1048

CHAPTER 27

Group Policy Management for Network Clients

.
Virtualize File and Registry Write Failures to Per-User Locations—

Enabled

9. To disable all UAC functionality using domain policies, create and link a new GPO

for UAC and edit the setting named Run All Administrators in Admin Approval

Mode, and configure the setting value to Disabled. If this setting is configured as

Disabled, all other UAC settings are ignored. Also, this setting change will be applied

during startup, shutdown, and background refresh, but a reboot will be required to

complete the setting change.

10. To disable UAC prompts when logged on with an account with Local Administrator

rights and leave all other settings functional, using domain policies, create and link

a new GPO for UAC and edit the setting named Behavior of the Elevation Prompt

for Administrators in Admin Approval Mode, and configure the setting value to

Elevate Without Prompting, as shown in Figure 27.6. Click OK to save the setting

and close the Group Policy Management Editor window.

ptg

FIGURE 27.6

Configuring User Account Control to allow administrators to elevate privileges

without prompting.

11. After the GPO is configured as desired, save the GPO and link it to an organizational

unit that has a test Windows Vista, Windows 7,Windows Server 2008, or Windows

Server 2008 R2 system to verify that the desired functionality has been achieved.

12. After the testing is completed, configure security filtering and possibly also WMI fil-

tering to limit the application scope of this policy and link it to the desired organiza-

tional unit(s).

Managing Computers with Domain Policies

1049

Creating a Software Restriction Policy

Many business owners and organizations want to ensure that their employees are as

productive as possible. This might require restricting users from playing computer games

and surfing the Internet, or just providing a highly reliable computer system. Due to the

restrictive nature of previous Windows operating systems and poor development practices

by software vendors and independent programmers, many applications also required end

users to have local administrator rights. When local users have the ability, through admin-

istrative group membership or reduced file system security, to perform administrative

tasks, it can be helpful to implement software restriction policies to prevent users from

running undesired programs that might impact system configuration and reliability. One

important point to note about software restriction policies is that even after the policy is

applied, the system will need to be rebooted before the new policy settings are applied.

For example, restricting access to a certain Registry path, Registry editor, or any particular

executable application can reduce undesired system configuration changes. Group Policy

contains very specific Microsoft Management Console policy settings, but for undefined or

standard built-in utilities and applications, it might be necessary to define and enforce a

specific software restriction policy.

NOTE

ptg

For Windows 7 and Windows Server 2008 R2 only, new settings within domain policies

named “application control policies” replace software restriction policies and this is

discussed in the next section. Although software restriction policies will be processed

and applied to Windows 7 and Windows Server 2008 R2 systems, it is recommended

to use AppLocker on these systems and software restriction policies for all older oper-

27

ating systems.

To create a software restriction policy for a computer using a domain group policy,

perform the following steps:

1. Log on to a designated Windows Server 2008 R2 administrative server.

2. Open the Group Policy Management Console from the Administrative Tools menu.

3. Add the necessary domains to the GPMC as required.

4. Expand the Domains node to reveal the Group Policy Objects container.

5. Either create a new GPO or edit an existing GPO.

6. After the GPO is opened for editing in the Group Policy Management Editor, expand

the Computer Configuration node, expand the Policies node, expand the Windows

Settings node, and select the Security Settings node.

7. Expand the Security Settings node, and select Software Restriction Policies.

8. Right-click on the Software Restriction Policies node in the tree pane, and select New

Software Restriction Policies.

1050

CHAPTER 27

Group Policy Management for Network Clients

9. After the previous task is completed, two subordinate policy setting nodes are

created as well as three settings. In the Settings pane, double-click the Enforcement

setting to open the properties of that setting.

10. In the Enforcement Properties dialog box, define whether this software restriction

policy should apply to all users or if local administrators should be excluded from

the policy, as shown in Figure 27.7. Click OK when finished.

ptg

FIGURE 27.7

Excluding local administrators from the software restriction policies.

11. Open the Security Levels settings node to reveal the three default levels of

Disallowed, Basic User, or Unrestricted. The default configuration is the Unrestricted

security level, which defines that all software will run based on the access rights of

the user. If this is acceptable, do not make any changes; otherwise, select the desired

security level, right-click the level, and select Set as Default.

12. Regardless of which security level was selected as the default, additional rules will

most likely need to be defined to block or allow access. For this example, the ability

to block access to the Remote Desktop Connection client is outlined. Right-click on

the Additional Rules node in the tree pane beneath Software Restriction Policies, and

select New Hash Rule.

13. When the New Hash Rule window opens, click the Browse button to locate the

desired file. For this example, the filename is mstsc.exe and is located in the

c:\windows\system32 folder. After the file is located, select it and click Open to add

it to the hash rule.

Managing Computers with Domain Policies

1051

14. Select the desired security level of Disallowed for this particular file, and then click

OK to complete the creation of the new hash rule, as shown in Figure 27.8.

ptg

FIGURE 27.8

Configuring the security level for a software restriction hash rule.

15. The file properties will be used to generate the hash rule and will be added to the

Additional Rules, and this completes the software restriction policy for this exercise.

Close the Group Policy Management Editor window.

27

NOTE

A hash rule uses the filename and the file’s specific properties when the rule is creat-

ed. If a specific application or file needs to be restricted with a hash rule, each version

of that file stored on the computer’s operating system should be added to the policy

because different versions of the same file will exist in client and server operating sys-

tems and in different service pack levels.

16. Back in the Group Policy Management Console, link the new software restriction

GPO to an OU with a computer that can be used to test the policy.

17. Log on to a test system that the new policy has been applied to, reboot the system,

and verify that the software restriction policy is working by attempting to launch

the Remote Desktop client on the test system.

18. If the policy is working as desired, the user will receive a message stating that the

program is blocked by Group Policy.

1052

CHAPTER 27

Group Policy Management for Network Clients

Creating Application Control Policies (AppLocker)

Application control policies are new for Windows 7 Enterprise and Ultimate Editions and

all editions of Windows Server 2008 R2. Application control policies are similar in func-

tion to software restriction policies but they should not be deployed in the same policy

that has software restriction policies defined. As a best practice, configure policies with

application control policies to be processed by machines only running Windows 7

Enterprise and Ultimate operating systems and/or Window Server 2008 R2 systems.

Application control policies or AppLocker, when enabled, will not allow users to run any

executables except those defined as allowed. This can, of course, cause serious functional-

ity issues if deployed improperly, so Microsoft has developed an audit-only mode that can

be used to test a policy with AppLocker settings to start gathering a list of applications end

users need to run to perform their job.

Before AppLocker policies can function and be applied to the desired Windows 7 and

Windows Server 2008 R2 systems, the Application Identity service needs to be running.

This service can be set to automatic startup on the desired systems by configuring and

applying domain policies. To configure this service to automatic startup on the desired

systems, create a new domain policy and in the Computer Configuration node beneath

Windows Settings and System Services, locate the Application Identity service, define the

policy setting, and set the startup mode to Automatic. Apply this policy to the desired

ptg

systems but understand that the service, even when set to automatic, will not start until

the next reboot or until the service is started by a local user, through a remote manage-

ment console or script, or through the use of a scheduled or immediate task, which is

discussed later in this chapter.

To configure AppLocker settings, perform the following steps:

1. Log on to a designated Windows Server 2008 R2 administrative server.

2. Open the Group Policy Management Console from the Administrative Tools menu.

3. Add the necessary domains to the GPMC as required.

Other books

Santa Fe Fortune by Baird, Ginny
Egg Dancing by Liz Jensen
Bad Blood by Mary Monroe
The Amanda Project: Book 4: Unraveled by Amanda Valentino, Cathleen Davitt Bell
The Assassins by Lynds, Gayle
Sam's Legacy by Jay Neugeboren
The Scent of Death by Andrew Taylor