Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to apply group policy security settings

2025-02-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/01 Report--

This article will explain in detail how to apply the security settings of group policy. The editor thinks it is very practical, so I share it with you as a reference. I hope you can get something after reading this article.

As system administrators, we all know that the way to protect the windows environment is to use group policy. There are hundreds of security settings in Group Policy objects (GPO), and using Group Policy objects is a very effective and automated way of security protection. But are the security settings for Group Policy objects applied correctly? This article will provide you with some tools, commands, and techniques to ensure the correct use of Group Policy object security settings.

Which settings are Security Settings?

Since there are more than 5000 settings in the Group Policy object, we first need to make clear which settings are discussed in this article. There is a special security section in the group policy object, and of course there are other security-related sections, but we will only discuss this security section in this article.

First, you need to open a Group Policy object, which can be opened through the Group Policy Management console (GPMC), because the security settings of the local Group Policy object are different from those in Active Directory. After opening the group policy object in the editor, you need to open Computer ConfigurationPoliciesWindows SettingsSecurity Settings

You will find many settings here, including registry keys, user permissions, file / folder / registry permissions, wireless security and group membership. Most of these settings are controlled by the secure client extension, and as long as one setting fails, all settings may fail. In addition, as long as you use one of the settings, you can easily set the other settings.

In the Group Policy Management console (on any machine where you have administrative rights), you can use the Group Policy results (Group Policy Results) tools, which are built into the Group Policy Management console, so you don't need to do anything special. Through the Group Policy Management console, you can determine the security settings on the target computer (the computer related to the security settings deployed in the Group Policy object).

To find the Group Policy results node in the Group Policy Management console, you need to look at the bottom of the Group Policy console, where you will find the Group Policy results node

In this tool, you can select "user account" and "computer account". Right-click the group policy result node and select the wizard. When the wizard is complete, you will see the results listed under the group policy result node.

In this interface, you can check the use of group policy objects and security settings, and you can click on the right pane to view different results. Checking Group Policy objects ensures that they are used correctly and that they are not rejected for some reason. Second, you can check the component status for errors related to the secure client extender. * check the security settings area and the tabs of the settings used

You can also run RSOP.msc on your computer, which will show you the same information as figure 4, except for a different interface. Figure 5 shows running the RSOP.msc command on the target computer to display the Group Policy object settings in the same format as the Group Policy object configured in the editor. In this way, you don't need to worry about the path of the security settings, you can go directly to the node of the group policy object to view the results.

To see more information about group policy objects and client extenders, you need to delve deeper into this interface. Right-click the computer configuration node to select the properties menu option. Then, you will see the deployed Group Policy object, and you can view the following node information

GPO and filtering

Administrative scope of Group Policy objects

Revision information about Group Policy object

This information can help you find out why group policy objects and related settings are not used.

To view client details, you need to select the error messages tab, where you will see why a CSE is not used, which indirectly explains why the settings do not appear in the RSOP.msc interface.

If you just want to see the security settings, not all the settings deployed from the Group Policy object, you can run secpol.msc on the target computer, which will display a subset of the Group Policy objects in the same format as the original Group Policy object Editor

There are two main questions about this tool. First, the tool displays more than just information about security settings. Through this tool, you can view all the security settings on your computer, not just those deployed from Group Policy objects. You can immediately know which settings come from Active Directory Group Policy objects and which are locally deployed security settings. In figure 8, you can see that there are two different icons to display the settings.

The second problem is that the information displayed by the secpol.msc tool is not as detailed as the RSOP.msc tool shows, so we need to choose the appropriate tool to display the information according to our specific needs.

This is the end of this article on "how to apply Group Policy Security Settings". I hope the above content can be helpful to you, so that you can learn more knowledge. if you think the article is good, please share it for more people to see.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report