MDM & GP Tips Blog

Sep 2010
27

Internet Explorer 9 (Beta) Group Policy Settings

IE9-banner2

Guest Post by Alan Burchill (Enterprise Mobility MVP) from the Group Policy Center.

Microsoft has now released to the public the newest version of Internet Explorer 9 Beta to the public. If the new functionality alone is not enough to get you to use it is just remember that it is now a Fully Hardware accelerated which makes it much faster than any other browser on the market!!

With any new version IE there comes new features and with new features comes new group policy settings so below I go through the new policy settings and how you can get started right now with managing IE9 using Group Policy.

To get started you will need to download and install IE9 on whatever computer you are using Group Policy Management Console (a.k.a. GPMC) to edit your Group Policy settings as with anything to do with Group Policy it is normally best to make changes from a systems that has the newest software on it in your organisation.

WARNING: This software is still Beta so you are strongly recommended to isolate any testing you do with IE9 and Group Policy from your production environment.

Internet Explorer 9 Administrative Template Group Policy Settings

There are only 8 new Admin Template group policy setting but remember that just like previous version most of the  other older IE policy settings will still apply to this newer of IE. Theses settings are of course not final and Microsoft could change or added/remove more setting before the product goes RTW.

As IE 9 only supports Windows Vista and Windows 7 you now only get ADMX files for the new policy settings which will automatically get placed into the C:WindowsPolicyDefenitions folder on the computer you install IE9. Note: You will need to upload inetres the ADMX and ADML file to the central store (if you are using a admin template central store.) So once the new ADMX / ADML files are loaded you will be able to configured the new IE setting under Administrative Templates in the Group Policy Editor. Sweet!

To save you the time of trying to find where the new policy settings are yourself I have listed the 8 new Administrative Template settings with the location that they can be found so you can check them out yourself.

Disable add-on performance notification

Administrative Templates > Windows Components > Internet Explorer

image

Turn off Managing SmartScreen Filter

Administrative Templates > Windows Components > Internet Explorer

image

Allow Internet Explorer 8 Shutdown Behaviour

Administrative Templates > Windows Components > Internet Explorer

image

Automatically enable newly installed add-ons

Administrative Templates > Windows Components > Internet Explorer

image

Prevent Deleting Download History

Administrative Templates > Windows Components > Internet Explorer > Delete Browsing History

image

Enable WebM software (when available)

Administrative Templates > Windows Components > Internet Explorer > Advanced Settings > Multimedia

image

Prevent configuration of search from the Address bar

Administrative Templates > Windows Components > Internet Explorer > Advanced Settings > Searching

image

Install binaries signed by MD2 and MD4 signing technologies

Administrative Templates > Windows Components > Internet Explorer > Security Features > Binary Behaviour Security Restrictions

image

Internet Explorer 9 Internet Explorer Maintenance Group Policy

The other way you can configured IE9 with Group policy is by going to Windows Settings > Internet Explorer Maintenance section and as with previous version you can configure you IE setting (e.g. Home Page) or you can Import the current Program and/or Security using the Import Program Setting option.

image

Internet Explorer 9 Group Policy Preferences Group Policy

Umm… err… Unfortunately at this point in time there is no support for Group Policy Preferences with Internet Explorer 9. This may or may not change in the future but at least for now you can use Admin Templates and IE Maintenance mode to keep you going.

As the beta has only just been released then it is highly likely that there will be more information coming soon…

This article was original posted on the Group Policy Center at http://www.grouppolicy.biz/2010/09/internet-explorer-9-beta-group-policy-settings/

Sep 2010
15

GPanswers.com: It's fun to steal (or... The art of search.)

I really can’t take credit for this one. I’m going to just give the shout outs “in advance” to my friends who made this blog entry possible: Alex Verboon, Alan Burchill GP MVP, Darren Mar-Elia GP MVP, Mark Heitbrink GP MVP and the Group Policy Team itself.

Okay, with that out of the way, here’s “Jeremy’s 100% ripped-off guide to searching for stuff in Group Policy.”

Item 1: Online Group Policy Search
——

There’s a new “online” ability to search for Group Policy settings and items. It’s DUN-DUN-DUN… “In the cloud!” Aiighh.. Run for your life !! Okay, not really. It’s just a web page. Go to this address, and start searching for new Group Policy settings you didn’t know existed:

http://gps.cloudapp.net/

Item 1B: Online Group Policy Search, now inside Explorer
——————————————————–

I first came across this tip in a post from Alex Verboon. I’m not sure if Alan Burchill, Enterprise Mobility MVP had the same idea at the same time, or what, but they both discovered how you can link that “cloud app” to Windows 7 Explorer’s search. So, you can search for Group Policy settings, right from Windows Explorer.

Weird. Geeky. Neat.

The writeup is here:

http://www.grouppolicy.biz/2010/06/msdn-group-policy-search-out-now/

Item 2A:  Searching for GPOs… with comments.. Using Powershell
————————————————————–

The Group Policy team has a new blog entry which talks about the first two items I’ve listed. –And-  that blog entry continues to talk about Group Policy cmdlets in PowerShell.

The idea is that you can use the Group Policy cmdlets to search for attributes about GPOs themselves. Neat.

They’ve got a big ol’ PowerShell script you can use if you like right there.

However, my pal Jeff Hicks, PowerShell MVP helped me get it down to one quick line if you want to try it out. (Actually, it’s two lines.) Remember, you need a Windows 7 or Windows Server 2008 R2 machine with PowerShell installed to try this out.

Line 1: Import-Module GroupPolicy
Line 2:  get-gpo -all | where {$_.description} | Select Displayname,Description

When I run this command, I get the following output.. Neat !

DisplayName                      Description
———–                     ———–
OU 1                           Yep. Here’s a comment.

Item 2B: Searching for GPOs.. with comments .. No PowerShell
————————————————————

PowerShell isn’t for everyone; thought it is becoming the “de facto” way of doing lots of scripting. Mark Heitbrink, Enterprise Mobility MVP supplied this little nugget of goodness.

Note that this requires that you’ve got the Group Policy Scripts installed from here.

After that, you can use these canned VB scripts to run a command like…

cscript getreportforallgpos /c:gpo-report | find /i “something” c:gpo-report*.html

Final thoughts…
——————

That’s it. That’s all the stealing I’m doing for one day. Thanks to all my helpers.

PS: The inspiration of the title of this blog entry is from a song on of my favorite albums that no one ever heard of. Track 2; there’s a preview if you want to listen.
http://www.amazon.com/Its-Fun-Steal-Mono-Puff/dp/B0000069SW

PS: One seat left in Chicago with the FIRST7CHICAGO $300 off discount. Get the GP Training you need to rollout and secure your Windows 7 and Server 2008 R2 machines. Use that coupon code at checkout. https://www.gpanswers.com/training Don’t be that guy or gal who missed out. You can also call Diane at 302-351-4903 if you don’t want to sign up online.

Aug 2010
04

GPMC on Windows Server 2008 R2 and PowerShell

Team:

I’m racing toward getting out the door for my 30+ day trip to tour Australia and speak at Microsoft TechEd Australia and New Zealand.

But, I had a quick second to share a fun little PowerShell + GP tip… If you’ve NEVER used PowerShell before.. try this one. It’s fun and easy.

If you want to install the GPMC on a Windows Server 2008 R2 machine via command line, you can use PowerShell. The commands are as follows:

  • Import-Module Servermanager
  • Add-WindowsFeature GPMC

Then, if you then run the following command you will see the status as installed

  • Get-WindowsFeature GPMC

Try it.. something “special” that’s unexpected and neat happens. It’s super-fun !

Also.. I came across this super-nice write up of my latest book. I can’t even figure out the person’s name to thank him for such a nice review..  but, Thank You Mr. or Ms. Whomever you are.

Here’s the review:
http://www.anotherwindowsblog.com/2010/08/book-highlight-group-policy.html

Now, get your signed copies at:
www.GPanswers.com/book

Limited number, since I’m running out the door, and won’t have any to sign for a month !

Talk soon.. Gotta run !

Jeremy Moskowitz
GPanswers.com (Group Policy Community)
PolicyPak.com    (PolicyPak Software)

Jul 2010
13

GP "must knows" - 4 of them !

Last week was a big week over here at the Group Policy HQ.

Here’s four fun and informative things that I think you’ll want to know.

Item 1: Quick, Informative Interview
Matt Hester, Tech Evangelist from Microsoft sits down with me and asks “What’s new and cool in modern GP?” When my wife saw this video, she dubbed it “Schmoozin’ with the Mosk.” Anyway, it’s fun and it’s here: 
https://moskowitzinc.infusionsoft.com/link/33465afc20/b8a1a0

2. My TechEd 2010 speech Replay — Application Smackdown with Applocker This was the #5 top-most rated session within all of the 900+ sessions at TechEd 2010. You get to check it out, for free! Learn how to smack down your apps.. Now! Here’s the link:
https://moskowitzinc.infusionsoft.com/link/33465afc20/bbaee0

Of course, when you’re ready for hands-on AppLocker training, I’ve got it in my GP Workshop, of course! (www.GPanswers.com/training) — in my GP 2.0 Catchup Class.. and more information in the newest book (www.GPanswers.com/book) in Chapter 8 — Implementing Security with Group Policy !

3. An article I wrote that found it’s way into Network world This was tweeted about 80 billion times last week… “Seven tips for using group policy in Windows 7”
https://moskowitzinc.infusionsoft.com/link/33465afc20/bebc20

And.. Lastly…
4. I’ve received lots of questions asking me: “Hey Moskowitz, is your book available as an e-Book somewhere?”

Yes, and yes again. Here’s what’s what:

1. If you want to get the newest book as a Kindle edition, you can get it from Amazon. Click here:
http://www.amazon.com/dp/0470581859/

2. There are some EXTRA (free) bonus chapters for the GREEN (newest) book here:
http://dev.gpanswers.com/books/extra-echapters.html#tabs
(look left)

3. I also have some (older, but still relevant!) eChapter (pay) PDF downloads at the same link:
http://dev.gpanswers.com/books/extra-echapters.html#tabs
(look right)

Also… if you buy the Kindle edition, I’m happy to sign your Kindle’s or iPad screen with a sharpie next time I see you. Just ask!

PS: Holy cow! HUUGE Class in DC coming up next week.. Super crazy excited. If you still want to come, I think we have a spot left. You MUST CALL at this point if you want to secure a seat. 302-351-8408.

PPS: I’ve had some upcoming “extra time” suddenly materialize after the DC class. If you think you / your company might be interested in a PRIVATE On-Site class, where I teach your team — PERSONALLY — how to overcome GP and desktop management challenges…  then just buzz me. I’m at 302-351-8408. We can talk about what your challenges are and how a GP class can help you out. Then, we’ll fit it into YOUR schedule. Talk with you soon. (The sooner you call, the sooner you’ll get over the issue your company has and you’ll be happier and more productive.)

Jul 2010
07

I Practice Safe Group Policy

Sometimes I get asked if there is anything that we can do to be “safer” around Group Policy usage.

The answer is a resounding “Yes.” Here are some quick tips for you to put into practice NOW, if you’re not already on the right track:

Tip 1: Create, link, then disable a GPO

Sounds counter-intuitive, but this tip can be a quick fix to a big problem. I don’t usually like “big fat GPOs with lots of stuff in them.” That’s not my preferred method of GPO creation. But there are clearcut times when you NEED multiple policy settings or multiple preference settings WITHIN a GPO .. and that’s a-ok.

The problem is, you won’t be able to “implement all the settings at once.” So, in essence you’ll have “half-created” GPOs replicating around with your clients getting those partially completed GPOs.

The tip is: Disable the GPO, add what you need to add, then ENABLE it. (You can choose your method: on the LINK, or on the GPO itself.)

So, if you’re working on setting up a GPO which dictates Firewall Rules, you want to ensure that they get ALL the firewall rules one time, instead of possibly downloading the GPO (incomplete) then re-downloading it later.

Tip 2: Think, then name.

 

This tip is easy to understand. Don’t name your GPOs “Our wonderful desktop settings” or “Everyone’s security settings” because that’s not descriptive enough. Surely there’s something SPECIFIC these GPOs could be named, like “Sales: Desktop Background” or “Marketing: Firewall Settings.” Clarity, clarity, clarity. You likely don’t work alone, so it’s important to be clear and deliberate in how you name your GPOs.

Tip 3: Use GP Comments

You can implement comments about the GPO itself and the settings within the GPOs. So don’t miss out by leaving “breadcrumbs” behind for “the next person” who edits those GPOs. Explain WHY you did something inside the GP comments. Your “future friend” will thank you !

I know you’re looking for more best practices, base-hits and big-wins you can use TODAY to make your world safer and more predictable.

I have exactly 4 spots left for my upcoming 5-day Group Policy Master Class (near Dulles Airport, airport code: IAD.)

I know the takeaways you get from the class will be mega-valuable and I guarantee this will help you with your upcoming Windows 7 rollout, create a smoother transition from XP and relieve the pain around desktop and security management. The best part is you’ll get the hands-on training you need for your real-world problems of today and tomorrow.

Knowing that budgets are tight, I’ve set up class at a hotel with a free airport shuttle (so no rental car needed) and a killer nightly hotel rate.

If you’re thinking about making it.. now is the time. Before the end of this week if you want a guaranteed seat.

Dates: July 19th (Monday) – July 22nd (Friday).

Ensure your seat by:

1. https://www.gpanswers.com/training/sign-up-now-live/
(I know the website says “The class is full” but I can take 4 more people !)

2. Calling 302-351-4903 and Diane will help you if you need an invoice for a PO. We need the PO in hand to guarantee your seat.

Also… !

“Manager’s Special” PolicyPak Webinar – Today at 2.30 PM EST.

Bring your IT Manager to my “PolicyPak: Save Time, Money, and Effort (and increase security and santity)” talk today. He / She only needs to stay for 15 minutes of the full 60 minute talk. So agenda is:

() “Manager-speak” (how the company will save Time, Money, and Effort) for 15-minutes
() “Geek speak” for 45-minutes with me and learn how to use my free PolicyPak software to make your life easier.

You BOTH need to sign up at https://www.policypak.com/demo

I’ll draw a free book for one lucky geek who brings his/her IT manager along!
Or… One lucky IT pro who brings his/her geek along!

That’s it. See you in the July 19th class or today online !

Jeremy Moskowitz
GPanswers.com (Group Policy Community)
PolicyPak.com    (PolicyPak Software)

May 2010
26

Full Disk / Bitlocker Security Hackable

Team:

Thanks to those folks who wrote in and thanked me for waving the banner around this issue.

Also, thanks to those folks who asked some clarifying questions. Okay, here are my summarized thoughts (basically, answers to your questions):

1. Sure, it would be great if copy machines could JOIN the Windows domain. Then, heck yeah, you could possibly use some GP trickery to make them more secure. BUT, that wasn’t what I was implying. ?

2. I supplied some GP-based security tips yesterday. One that encrypted the page file, and another one which totally removed it at shutdown. I also said that the best (bestest?) way to get protected is via full disk encryption. So, I totally stand by that.. Full disk encryption is arguably, the best (fastest / intermediate) way to get “pretty darn secure.” I would however, also suggest that I would only perform the “remove page file at shutdown” for machines where there is no other possible solution for security.

Heck, let’s break this “are we secure?” problem down .. way way down, just for fun here.

 

Question :Okay… Does NTFS provide “security” ?
Answer: Sorry. No. So, in short, if I steal your laptop, and it’s got no full disk encryption, then I can boot it from a USB stick, CD-ROM, or just rip the hard drive out and mount it in my non-Windows (ie: Linux machine) and.. bingo.. I have your files.

Question: Does applying either / both of those policy settings I suggested yesterday really make you more “secure”?
Answer: It’s better than NOTHING for desktops that HAVE to be out in the open, and for whatever reason can not get full disk encryption. And even then, it only protects the page file, which may or may not contain interesting stuff. To be super clear, I would suggest against enabling the “remove page at logoff” for servers at all costs, because rebooting your servers (or workstations with large page files) could take a loooong time.

Question: Does EFS (encrypting file system) provide “security” ?
Answer:  While I haven’t personally attempted to “bypass” EFS, I’ve seen several writeups of how to bypass it. Indeed, this one tool (found by quick Internet search) claims to immediately make child’s play of EFS. (Again, untested.. http://tinyurl.com/2buburp)
PS: I swear I didn’t do anything special to get that TinyURL.. that was auto-assigned to me.

Question: Does full disk encryption provide “security” ?
Answer: It’s an excellent start. Again, it’s the best thing we can do for the majority of attacks. But there are still vulnerabilities.  

Question: Okay.. what vulnerabilities am I still exposed to?
Answer: Three parts

() This one I knew about (which was discovered at Princeton University):
This vulnerability is based on the idea that you can “copy” the memory of a PC. Very interesting.
http://www.youtube.com/watch?v=JDaicPIgn9U

() This one I didn’t. This uses Firewire to slurp out the computer’s memory via DMA:
http://tinyurl.com/2pea3y
Thanks to Darren Mar-Elia, fellow GP MVP for this lead.

() A little internet searching came up with this commercial tool to bust Bitlocker / Truecrypt:
http://www.lostpassword.com/kit-forensic.htm
This actually seems to be similar to the Princeton attack; and requires memory to be “captured.” Or, you can try a lengthy “brute force” attack if the machine was fully shutdown.

Also, I think  reasonable reading as well, is the Microsoft response to the Princeton attack, and you can find that here:

http://windowsteamblog.com/windows/b/windowssecurity/archive/2009/12/07/windows-bitlocker-claims.aspx

In short, I am in agreement with Microsoft’s summary of the assessment:

“This sort of targeted attack poses a relatively low risk to folks who use BitLocker in the real world.”

Agreed.

If you’re concerned about attack #1 and #3, then make sure your computers settings are configured (using GP, of course!) to make the computer fully shut down (hibernate) on idle. Then require the Bitlocker password pin or USB key at startup. Yes, this is kind of a pain in the neck. But it is the way to prevent that attack.

If you’re concerned about attack #2, then use GP (again!) to disable built-in Firewire ports unless absolutely necessary.

To be superduper, crazy clear.. there is no “magic bullet” for security. Here’s some reading to get into the concept of “defense in depth.”

http://www.amazon.com/Protect-Your-Windows-Network-Perimeter/dp/0321336437

The book isn’t “super technical” in a “click here, do this” kind of way. But it did “get it into my thick skull” that I need to be doing everything I can, at multiple layers to thwart the bad guys and protect my network and keep my company safe.

So.. hopefully this article helps you out.

Here are some I can help you get more secure.

1) I do cover how to do both hardware lockout and power configuration (among many, many security items that I cover) in my GP class (coming soon to Washington, DC — July 19th! www.GPanswers.com/training !) A handful of seats left.

and

2) This whole “defense in depth” idea is why I designed PolicyPak. Group Policy does a great job configuring some of the in-the-box operating system items. But what about the rest of the operating system and add-on applications? Hope to see you today or next week online (www.PolicyPak.com/demo)

and

3) Of course, you can get a book. ? www.GPanswers.com/book

That’s it. Talk with you soon!

May 2010
25

Copier Machine Threat - Hard Drive Scare / Encryption

I came across this little piece of reporting by CBS news.

I have to admit.. I was totally caught off guard by this one.

Seems “gobsmackingly obvious” now that I think about it. But I never did.

This is a report on how all the major brands of copiers STORE the images on local hard drives. Making it SUPER EASY for the bad guys to get your (recycled) copiers and get your important corporate data. Watch this, then, please, figure out who to contact in your company and decide HOW your copy machines are recycled.

https://moskowitzinc.infusionsoft.com/link/3043060c20/b28720

What else can you do? Well, from a Group Policy perspective, on our Windows PCs (and not copy machines) here are three ideas:

Idea 1:
Computer Configuration | Policies | Administrative Templates … | System | File System | Enable NTFS pagefile encryption

Idea 2:
“Clear Page File at Shutdown”…
Check out http://support.microsoft.com/kb/314834
(not a group policy setting, but can be delivered as a registry preference.)
PS: This one likely wouldn’t beat the forensics apps, but it’s better than nothing.

Idea 3:
You could of course, go “Full disk encryption” like BitLocker or TrueCrypt.. that would do the trick as well.

So, that’s three things to at least CONSIDER in thoughts around this problem for high security machines that COULD be recycled.  True.. I’ve seen companies that literally “shred” the drives in a big “drive cruncher machine”.. but, that seems extreme considering there are software solutions to this very problem.

Note, of course, that enabling these items could slow down your system (especially that second one at shutdown time.) But it might be worth it depending on the situation. For what it’s worth, I’m using BitLocker on one machine, TrueCrypt on another and notice no appreciable slowdown.

Speaking of security, and “doing all you can” to thwart the bad guys… I’m doing my weekly PolicyPak demonstration tomorrow at 2.00 PM Eastern. If you want “extra thumbscrews” to ensure that your security is maintained at all times, then join me for this free informative talk.

Here’s the link:
www.policypak.com/demo

Thanks.

PS: And my pants are already back on, thank you very much.

Jeremy Moskowitz
GPanswers.com (Group Policy Community)
PolicyPak.com    (PolicyPak Software)

May 2010
19

Group Policy: Disabled

Hey Team:

Short sweet tip, and a short sweet announcement.

Short sweet tip first:

You are the King or Queen of your castle, er, domain.

I like to think of every policy setting as a little “edict” that I’m forcing my user population to embrace.

Well, on the Policy side of the house there are a zillion policy settings that can be set to one of three states:

– Enabled,
– Disabled,
-or Not Configured.

Enabled means: “Do this thing, and do it at the level I’m currently working within.”

So, if you’ve got a GPO, link it over to the domain (thus affecting all user accounts in the domain) and Enable a policy setting like “Prohibit Access to the Control Panel.” Then, as expected, everyone in your kingdom will magically embrace the stone-cold fact that their days of messing around within the Control Panel are now over!

Huzzah! Mission accomplished! You and your other network sovereigns cry out with joy!

Except this decree affects YOU as well. Oops… Seems like you poured the burning hot oil on yourself on this one.

Okay.. Great. What are you to do?

Disable that same policy setting from earlier — but now, at a level that affects YOUR (the King and Queen’s men) accounts.

That’s right. Disable.

Disabled’s job isn’t (generally) to “disable” stuff. No, no!

The “Disabled” setting’s job is to “invert” a higher-level policy.

So, assuming you had an OU called “Exalted Leaders OU” and your account was in there, you could simply create a new GPO, link it over to the GPO named “Exalted Leaders OU” and edit the policy setting for the SAME SETTING — “Prohibit Access to the Control Panel.”

Except this time.. instead of ENABLING the policy — you’ll DISABLE it, thus rendering it innocuous to your user account.

It’s like your own “suit of armor” to avoid the burning hot oil.

Try it out and let me know what you think, either in the comments of this blog post on GPanswers.com.

Okay.. and now for the short, sweet announcement:

That is.. the upcoming Washington DC (Northern VA) class — July 19th is OFFICIALLY ON.

We already have 10 people signed up with guaranteed seats, and another 9 people “swearing on a stack of Group Policy Bibles” that they are working on POs and whatnot.

Since we only have so many seats, ensure your butt is in the right place by securing your seat before they’re all claimed!

Go to www.GPanswers.com/training.

And to answer your question before you ask it: Yes, yes.. the class is fully updated for WS08 and Win7. The result is that after the class is over, you’ll actually KNOW WHAT TO DO when you’re rolling out and managing Windows 7 and Windows Server 2008 and R2.

On that page, you can:

[] Read what the class is all about, and check out the hands-on lab content.
[] Watch the 20+ video testimonials.
[] Click SIGN UP and we’ll send you a Welcome letter. 

Oh, again: Everyone taking the class gets my newly updated book (Which, by the way, is FLYING off the shelves here at GP H.Q. Thank you, thank you, and sincerely thank YOU for being so enthusiastic and supportive.  My publisher says thanks, too.  ?  )

On Amazon it’s ranked #2 in “Networking books.”  Awesome!!

() Get your own signed copy: www.GPanswers.com/book.
() Get it on Amazon.. http://www.amazon.com/gp/bestsellers/books/377894011/

PS: Hey.. who’s gonna help me out and write some nice stuff on Amazon about the book? ? Thanks in advance !

Apr 2010
29

What is AGPM4?

(Note: This tip may look familiar. It’s a “re-do” of something I blogged about back in 2008, but I wanted to re-talk about it, adding some new 2010 Juice to this 2008 discussion.)

Note: UK & European people / Aussie & New Zealand people… I have a special request at the VERY END of this email, so, please don’t ignore ! Just jump to the end right now if you only have a second.

Okay.. on with the deep thoughts of the day:

Dealing with GPOs can sometimes feel like you’re juggling grenades.

As soon as you open a GPO for editing, it’s already whizzing around your network,
replicating around your DCs and potentially available for any clients looking for
an update.

What if you’re in the middle of editing a GPO and you suddenly get called away, with, say a half-finished GPO?

Well, it’s likely at least SOME Windows machines will ask for that update and download it.

Also, I don’t know about you, but even with my daily GP comings-and-goings, I
still kinda wish there was an “Are you sure?” prompt when I’m editing stuff or
for when I’m about to do a bone-headed move.

Let’s think about all the times I wish I could put some process around my GP world. For instance, there
is no “Are you sure” when…

() Creating GPO
() Editing GPO
() Linking a GPO
() Deleting a GPO

You get the idea. There’s a lot of potential for quick damage there.

And, no way to see history of a GPO and “roll back” a set of changes once a GPO is rolled forward (though there is manual backup and restore capability.)

That’s why I like products that put a little “process” around GP management.

Microsoft’s AGPM v 4.0 was recently released as part of the MDOP subscription service (http://www.Microsoft.com/mdop) and it’s got some neat-o features. Since AGPM 3.0, there are a handful of new items, but nothing too radical.

It’s strange, but I ask a lot of people if they’ve even HEARD of Microsoft’s AGPM (Advanced Group Policy Management) product, and I often get blank stares.

So, in the interest of GP Public service, I’m here to clear up what it is and what it does. Let’s spend a quick minute discussing what it is and how to get it.

What it is: It’s one of the 6 tools which are part of the Microsoft Desktop Optimization Pak (MDOP).

What does it do: It puts “Change management” around GPOs, so you have a full trackable history of what people did plus a way to roll back if there are problems.

How to get it: MDOP is a yearly subscription service which is only available to Microsoft SA customers who then ADDITIONALLY pay about $10 a seat, PER year.

Holy moly factor: Yep. With the SA costs and the yearly ongoing $10 a sat, it can be expensive, but because MDOP is a set of 6 products, it’s actually a pretty good bargain overall. But it’s pretty understandable to have a strong reaction to the cost.

AGPM’s Philosophy: You can think of AGPM almost like a library system. (At least, that’s how I think of it.) Only one person can have a GPO “checked out” at any given time for editing. And those edits don’t happen ONLINE and LIVE. They happen OFFLINE and are trackable. Essentially removing any direct impact to live computers — until you’re ready to rock.

What’s new in AGPM 4.0 vs AGPM 3.0: There’s a smattering of stuff, but here’s the hitlist:

() Searchable names and fields within the “Change Control” node
() Windows 7 and Windows Server 2008 R2 compatibility
() Export / Import from “test lab” to “production” domain or forest

Note that two COMMON MISCONCEPTIONS about AGPM are:

1. You have to deploy some “client” or “agent” to every machine. False. Totally false. Yes, AGPM has a “client” piece, but it’s just a fancy way to describe the “GPMC-add-on” piece which shows the AGPM stuff within the GPMC.

2. You get the ability to control “more stuff” on your target machines. False. Totally false. Remember: Group Policy “magic” only occurs when you have a new CSE (client-side extension) on your target machine, which can pick up your “directives” inside the GPO. AGPM doesn’t do this. Products like Specops Deploy, BeyondTrust Priv Manager, and PolicyPak Application Manager all ship “true CSEs” which extend Group Policy’s magic and ability. AGPM does no such thing.

So, are you using AGPM? Here’s my one-question survey:

http://www.surveymonkey.com/s/TYBZXFB

PS: If you have no plans to be an SA customer and then get the MDOP suite, then, note you can get MDOP comparible functionality from 3rd party vendors, like NetIQ with their GPA product, Quest with their GPOAdmin product, or ScriptLogic with their Active Administrator product.

In the effort of full disclosure, note that some of those 3rd party vendors do occasionally advertise on GPanswers.com (but they didn’t know this email was going out until.. well, right this second.)

Other notes:

1. My new book thoroughly covers AGPM 4.0 in a deep, deep way. And, that chapter is totally, totally FREE. Head over to http://dev.gpanswers.com/book and click eChapters and find the AGPM chapter on the LEFT (GREEN) side. It suggests a way for you test this all yourself. You’re then also in the “right place” if you wanted to get your own signed copy of the printed book to get the rest of the story.

2. I’m doing a “Do more with Group Policy and PolicyPak” LIVE demonstration TOMORROW at 11.00 AM EST (weird time, I know.). But sign up for the free live demonstration at https://www.policypak.com/demo. See you there !

3. We’ve got lots of PEOPLE COMING in my upcoming class in Washington, DC / VA July 19th. Some discount seats still left. Honestly, these will not last long. $200 + Free book for the next three people who sign up at http://dev.gpanswers.com/training/live-courses.html and use discount code FIRSTFIVEDC at checkout.

3. If you’re in UK / Europe and might want me to have a public training class over there, please click this link: http://www.surveymonkey.com/s/R62QWFJ

4. If you’re in AUS or NZ, and might want me to have a public training class over there, please click this link: http://www.surveymonkey.com/s/RH79CXY

5. If you’re “happy and you know it” .. clap your hands. Just seeing if you’re paying attention.

Thanks for reaching the end of this long email. ?

PS: Going on vacation for a week after my talk on Friday. Diane is here all week if you need a PO for the class or any other special situation. 302-351-4903. Thanks Team !

Jeremy Moskowitz
GPanswers.com (Group Policy Community)
PolicyPak.com (PolicyPak Software)

Mar 2010
16

Use the GPupdate /force (Part 2)

So, in a previous installment, we explored GPupdate /force.

One use, as we examined enabled us to move a user or computer account around in AD, and have it’s new location “magically picked up.”

Let’s examine the other use of of GPupdate /force. Let’s take a closer examination of how “GP does it’s thing.” When a user (or computer) get it’s first batch of GPOs, it has to download them.

Now, the good news is that WHAT it downloads is really, really small. Usually 1, 2, 3 or 4k ish. That’s KILOBYTES, like what my VIC-20 was packin’ back in the day.

So, okay. First myth busted: the download “payload” of Group Policy objects isn’t that big (under most circumstances.)

Now, it’s true that the stuff the GPO is DOING can have an impact. But, even then, it’s usually pretty nominal if you’re sticking mostly to GPPrefs and/or Admin Templates (registry settings.)

Okay. So, back to /force versus no /force. ?

So if your user or computer is just sitting there a while, it asks, every so often “Hey.. any updated (or new) GPOs out there for me?” If the answer is YES, it downloads JUST the new or changed GPOs and processes those.

Wow. Neat. So how does it KNOW which ones are NEW or CHANGED? The GPO Version number, of course. This is little internal counter (found on both the user and computer sides.) If either version changes, then blamo! the GPO comes down and is processed.

Okay, okay. Back to /force versus no /force.

When you run GPupdate by itself (no force) you’re “accelerating the hands of time” and forcing the user and computer side to ask “Hey.. any updated (or new) GPOs out there for me?” Again, if YES, those come down and apply.

Then why would you ever NEED /force ?

Honestly, under most circumstances.. you shouldn’t.

A key case when you WOULD need the /force would be, say, if someone with local admin rights did a no-no, like change a value that only the protected SYSTEM should get to. For example, if a local administrator deleted a registry key, which restricted access to the control panel. Now — REGULAR USERS cannot do this. But ADMINS can.

Then running a GPupdate — by itself — wouldn’t fix the problem. Only a GPupdate /force will “re-bring down” the settings — EVEN IF THE VERSION NUMBER HAS NOT CHANGED. Only this will shore up the hole that local admin has created.

That being said… On the other hand, I have seen plenty of times where GPupdate /force is like a kick to the system’s head. There is some magical quality about /force which does sometimes “jumpstart” you out of a problem, and .. whoa.. things seem to “just be all a-ok, ducky” right now.

Has the /force helped you get out of a pickle? Post your story to my GPanswers.com blog.

Ready to learn more? Group Policy University.. Live or Online.

Next Live.. the week of Seattle April 19th.
Online.. whenever you need it it.
One line: www.GPanswers.com/training