Solved

What is the best way to apply targeted group policies?

Posted on 2014-09-24
1
233 Views
Last Modified: 2014-10-07
How should we deal with Active Directory Group Policy Objects that have limited scope? We have a newly-created, global Active Directory forest that has been built with scalability and ease of management in mind. We started with a global IP addressing change so that all our offices and datacenters can co-exist on the same WAN and have a logical layout so that we can predict what a particular ip address would be simply by knowing the physical location and purpose of the device to which the ip address is assigned. We then built our Active Directory Sites and subnets around this global ip infrastructure. Now it is time to expand our Group Policies a bit and we want to use the same care in planning them as we did in planning our Active Directory environment.

We have decided that at a global level we should create as few policies as possible. ('Global Policy - Users', 'Global Policy - Computers', 'Global Policy - Servers', etc.)

Some settings are not appropriate to be applied globally but work well for sites, such as setting dns search domain names or mapping printers, so we have some Site GPOs as well.

For managing servers, it is reasonable to control certain things via group policy that are not universally applicable for all servers. The instance that has arisen lately is controlling Remote Desktop Services connection policies for our terminal servers. There are several ways to apply certain policies to only the Terminal Servers. Here are the ones that I have considered:
Create sub-OUs, move the Terminal Server computer objects into them and apply GPOs to the sub-OU(s). It seems at first glance to be an effective solution but there are two problems:
1. It adds complexity to the OU structure.
2. Some servers would potentially need to belong to multiple OUs to get all applicable policies but this is only possible if the OUs are nested.
Apply the GPOs universally but use Security Filtering to target specific servers by group membership.
1. This is an elegant solution but it can be difficult to keep track of which policies apply to which server objects.
Modify the local Group Policy on every computer that needs the specific policy.
1. This is the preferred method for testing but it isn't scalable nor centrally managed.

I know that there are probably as many opinions as there are A/D engineers, but I'm looking for just that -- your opinion, the logic behind it and examples where you have already implemented your suggested solution.
0
Comment
Question by:Eric Quackenbush
1 Comment
 
LVL 39

Accepted Solution

by:
Aaron Tomosky earned 500 total points
ID: 40348633
I'll take a shot at a few suggestions.  

- I just redid my printers using location tracking and it made a big difference. By using the location scheme suggested, it can auto populate based on sites and services location. http://technet.microsoft.com/en-us/library/bb727034.aspx

- terminal services (rds) servers: these really need their own gpo, so they should have their own OU. Id suggest putting all of them in an OU, or maybe a sub-OU under their location OU. If there is something in an OU above them you can't have, block inheritance and add the ones you want. This way you can easily see what policies apply without getting into security settings.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Background Information Recently I have fixed file server permission issues for one of my client. The client has 1800 users and one Windows Server 2008 R2 domain joined file server with 12 TB of data, 250+ shared folders and the folder structure i…
Synchronize a new Active Directory domain with an existing Office 365 tenant
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question