4 Understanding The Architecture of Group Policy Processing
4 Understanding The Architecture of Group Policy Processing
Section Objectives
Section Overview
Troubleshooting Group Policy involves more than knowing when to use which tool. You also
need to understand the Group Policy infrastructure, the GPO structure, and the Group Policy
deployment order. This section describes the concepts that you must grasp in order to
troubleshoot Group Policy. This section also describes the options that are available to change
the standard Group Policy processing sequence.
1/32
16/11/2014
Sysvol Folder
2/32
16/11/2014
Sysvol Details
The domain where the user account is located also contains the Group Policy settings of the
authenticating user. These settings are stored in the Sysvol folder on each domain controller
and replicated throughout the domain using the FRS.
The FRS monitors and updates the changes to Group Policy, startup and shutdown scripts,
and logon and logoff scripts. If your Active Directory is made up of multiple sites (subnets),
the location of your Sysvol folders will be separated by WAN links.
If you have multiple sites, and each site contains multiple domain controllers, your network
map can get very complicated and much more dependent on the replication process.
PDC Emulator
3/32
16/11/2014
You can use the Dcgpofix command-line tool to restore the Default Domain
Policy and Default Domain Controllers OU policy to their original state. This tool works only
in Windows 2003 or later domains.
Client-Side Extensions
Although the components of each GPO are stored in Active Directory, the client itself
processes each linked GPO using client-side extensions. Client-side extensions are a
collection of local DLLs that have one specific job task: to process all enabled GPOs found on
the server at logon or at a specific processing time.
The available policy settings are grouped into specific categories including administrative
templates, security, folder redirection, wireless, IPSec, EFS, and software installation. After
the client determines which GPOs to apply, each GPO is passed to the client-side extensions.
The following topic describes registry client-side extensions, which apply the settings from
within the Administrative Templates section to a client computer.
Registry Client-Side Extensions
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize=
4/32
16/11/2014
Registry client-side extensions deal with the Group Policy settings contained in the
Administrative Templates section. Note that some settings are hidden by default; these
hidden settings are defined as true policies. The settings that are available and loaded by
default are called preferences and are listed in Figure 83.
GUID
25537BA6-77A8-11D2-9B6C 0000F8080861
Folder redirection
3610EDA5-77EF-11D2-8DC5-00C04FA31A66
Disk quota
42B5FAAE-6536-11D2-AE5A-0000F87571E3
Scripts
827D319E-6EAC-11D2-A4EA-00C04F79F83A
Security
B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A
EFS recovery
C6DC5466-785A-11D2-84D0-00C04FB169F7
Application management
A2E30F80-D7DE-11d2-BBDE-00C04F86AE3B
35378EAC-683F-11D2-A89A-00C04FBBCFA2
Registry settings
e437bc1c-aa7d-11d2-a382-00c04f991e27
IP Security
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize=
5/32
16/11/2014
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize=
6/32
16/11/2014
Contents
Active Directory
Container
Active Directory
GPC
Sysvol\Policies\GUID\User or
GPT
GPT
Machine\registry.pol
Sysvol\Policies\GUID\User or
Machine\Custom Folder\Custom File(s)
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize=
7/32
16/11/2014
GPO Versioning
You can use the Replication Monitor to display the sync status of all GPOs using
the Show Group Policy Object Status context menu option.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize=
8/32
16/11/2014
The following topic describes how the GPO version information is used once the GPO has
been created.
How Version Information Is Used
After the GPOs have been created, the respective site, domain, or OUs link to the created
GPOs using the Active Directory attribute found on each container object that references the
GUID of each site, domain, or OU.
After a policy is linked to a site, domain, or OU, the DN of the policy is entered into the
gPLink property on the selected site, domain, or OU.
A Windows client then uses the GetGPOList API to discover which GPOs it should process
on the client. It also uses the computer name and IP address to identify the site that the user is
in, determining which GPOs to associate with the computer system. In addition, the Windows
client also uses the domain and OU location of the computer system to build the master list of
which GPOs to apply.
Next, the version information and other GPO options (disabled, no override, and block
policy inheritance) are read to determine what, if any, processing will take place. By default,
if the current GPO settings have already been deployed, no reprocessing will be done unless
mandated.
The needed client-side extension DLLs then swing into processing mode and apply their
associated GPO settings.
FRS Replication
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize=
9/32
16/11/2014
When changes are made to Group Policy, the PDC emulator is located and the settings
are read from its Sysvol folder into cache.
2.
After changes have been made, the Group Policy settings are saved back to the Sysvol
folder on the PDC emulator. These changes signal the FRS to replicate the changes.
3.
At the allotted replication time (up to 15 minutes), the FRS replicates the settings to the
other domain controllers throughout the domain.
DFS-R
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
10/32
16/11/2014
If you have installed a new Windows Server 2012 Domain, the DFS-R replication process will
be enabled automatically.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
11/32
16/11/2014
Local Group Policy settings are deployed first: Local administrators or administrators
can configure local policies from the domain. Local policies can always be overridden by
conflicting options from other levels and, therefore, have the least amount of precedence.
2.
Site policies are applied next: Enterprise administrators can configure site policies.
These policies apply to the subnet IDs that match the site that the computer or user is
located within. This allows for location-based GPO deployment.
3.
Domain policies are applied after the site policies: Enterprise administrators and
domain administrators can configure domain policies. These policies apply to all users
and computers in the same domain. A Default Domain policy already exists at this
level. Additional policies can be applied to the domain; however, they should be limited
because they can impact such a large portion of the environment.
4.
OU policies are applied last: All Administrators and any users that have been delegated
permissions to the OU can configure OU policies. OU policies apply to all users and
computers in the OU that the policy is linked to. Assigning policies to OUs provides more
granularity and flexibility when it comes to determining the users and computers for
which the policies should be effective.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
12/32
16/11/2014
Site GPOs
A GPO created within a site applies to all users and computers in the site. A site is one or
multiple subnets joined together under an Active Directory site name.
Any Group Policy settings deployed at the Active Directory site level that are different from
any previously applied local Group Policy overwrite the previously applied local settings. For
example, if you enable a local setting to remove the Settings tab from the properties of the
Display icon in Control Panel, it is deployed first.
If the exact same setting at the site level GPO is set to Not Configured, the end result at this
point of the deployment cycle is that the Setting tab is now available.
Domain GPOs
A GPO created at the domain properties is applied to all users and computers in the domain,
and to all users and computers in all child OUs and user containers.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
13/32
16/11/2014
If a conflict occurs with a previously applied local or site setting, the domain settings overwrite
the local and site settings.
Organizational Unit
The OU settings are deployed next, potentially overwriting the local, site, and domain settings
if a conflict occurs with a previously applied setting.
Child OU
If you use multiple OUs in your Active Directory design, any Group Policy settings deployed
at the top of an OU tree flow down through the OU child domains, similar to the
enforcement of permissions on an NTFS partition.
If you have multiple Group Policy settings applied from multiple sources, you have an
effective Group Policy built from the multiple GPOs applied to your network.
Note
For Group Policy to operate properly, the three key components that must be
working are: Active Directory, DNS, and the FRS. Each Active Directory client uses the
FQDN to attach to the domain controller and read the GPO.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
14/32
16/11/2014
15/32
16/11/2014
will automatically be inherited by all child and grandchild OUs. Leverage this default behavior
so that settings that really should apply to a broad range of users and computers are applied at
a higher parent level, while settings that should affect only a subset of accounts are applied at
a child OU.
Structuring the OUs appropriately can make this process much easier.
An example of a useful corporate standard GPO is: Only authorized users can access the
command prompt or the registry editor. One way to define this GPO is to set the Prevent
access to the command prompt, and Prevent access to registry editing tools policy
settings and link these settings to an OU, for example Domain_User_Accounts OU. This
action will result in these settings being applied to all users in the Domain_User_Accounts OU.
Then create a GPO, such as an Administrator_Policy GPO, which explicitly allows
administrators access to the command prompt and registry editing through a security group
filter applied to the Administrator_Policy GPO. Therefore, the GPO linked to the
Administrator_Policy GPO will override the settings configured in the Standard User Policy
GPO.
If another group of users requires access to the command prompt, but not the registry, you
can create another child GPO that allows access. Access to the registry editing tools is still
denied because the new GPO does not override the registry tools setting made in the
Domain_User_Accounts GPO.
When you set the default values for security-related settings, such as restricted group
membership and file system access and registry access permissions, remember that these
settings work on a last-write-wins principle; the settings in this case are not merged.
Changes to a GPO are saved immediately and, therefore, could be applied prematurely if a
client computer refreshes its policies. It is a good idea to keep the GPO unlinked from its
production location (site, domain, or OU) until you have fully tested the policy. While you are
developing the GPO, keep it either unlinked or linked to a test OU.
Sometimes, the default processing is not desired, and can therefore be disrupted using several
mechanisms. The following topics discuss ways to modify Group Policy processing.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
16/32
16/11/2014
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
17/32
16/11/2014
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
18/32
16/11/2014
Because only broadly applicable settings should be linked here, it might be acceptable to let
the administrators receive these settings; otherwise, you can set the Block Inheritance
option on the Administrators OU.
Have administrators use separate administrative accounts only when administrative tasks are
being carried out. Therefore, when not performing administrative tasks, they would still be
managed by the applied Group Policy settings.
19/32
16/11/2014
WMI is powerful, but is not appropriate in every situation. To help you create WMI filters,
you can obtain the free WBEMTest tool from Microsoft. Once you have created the WMI
filter, you must link it to a GPO.
Restrictions
WMI filtering has many conditions associated with it, making it unsuitable at present for
deployment in mixed-mode networks. Here is what you should know:
Windows 2000 Professional clients (and earlier) ignore WMI filters and always apply
policies just as if the WMI filter did not exist.
Only Windows Server 2003 and later domains that have been prepped via the adprep
/domainprep command support WMI filters.
WMI filters are domain-local in scope; that is, you cannot link a WMI filter to a GPO in a
different domain.
Any given GPO can have only one associated WMI filter. (That is not too much of a
restriction when you consider that a filter might have a long list of queries contained within
it.)
20/32
16/11/2014
You can use the WBEMTest tool to become familiar with the structure of WMI. The GPMC
does not provide any method to browse the WMI repository. The WBEMTest tool can be
used to display the WMI structure as a reference to build a filter from.
Viewing WMI Classes
A good way to become familiar with the WMI classes is to use the graphical WBEMTest tool,
which you can run from a command prompt.
You will need to specify the namespace via the Open Namespace button, if it is anything
other than root\cimv2.
To view all of the classes beneath a root namespace, click the Enum Classes button, select
Recursive, and then click OK. You will see a dialog box like the one shown in Figure 97.
The WBEMTest Query Result Dialog Box
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
21/32
16/11/2014
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
22/32
16/11/2014
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
23/32
16/11/2014
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
24/32
16/11/2014
In the GPMC, right-click the WMI Filters node and select New.
2.
Name the filter, provide a description, and create your queries using WQL.
3.
Note
WQL is similar to SQL, so if you are familiar with SQL, all you need are the
specifics for the WMI data classes.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
25/32
16/11/2014
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
26/32
16/11/2014
27/32
16/11/2014
Acronyms
The following acronyms are used in this section:
ACL
ADSI
API
BIOS
CD
compact disc
CPU
DLL
dynamic-link library
DN
distinguished name
DNS
EFS
FQDN
FRS
GPC
GPT
GUID
IP
Internet Protocol
IPSec
IP Security
MSI
NTFS
OS
operating system
OU
organizational unit
PDC
SNMP
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
28/32
16/11/2014
SQL
WAN
WMI
Windows Management
Instrumentation
WQL
Section Review
Summary
Group Policy is based on the following components:
Sysvol folder: A system folder that is located in the NTFS file system of every Active
Directory domain controller. It contains administrative templates, security settings,
applied scripts, and details about MSI packages that will be installed.
PDC emulator: A single domain controller per domain is assigned the role of a PDC
emulator. This role is automatically assigned to the first domain controller in an Active
Directory domain.
Group Policy Container: Stores the policy setting information for a GPO. It stores the
details of every GPO that is created in Active Directory. The GPC contains the version
number of each GPO, its current status, and the installed components.
Group Policy template: Stores the files that are created by the GPO in the Sysvol
folder on the PDC emulator for each domain. It stores computer and user scripts, the
GPO template files, and the Registry.pol files.
Group Policy is deployed in the following order:
1. Local Group Policy settings
2. Site policies
3. Domain policies
4. OU policies
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
29/32
16/11/2014
Knowledge Check
1.
2.
3.
Match each method used to modify Group Policy processing with its correct description.
Write the letter of the description in the Answer column.
Answer
Method
Description
1.________
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
30/32
16/11/2014
2.________
Security
B.Controls the order in which GPOs are applied within each domain, site,
Filtering
or OU.
WMI Filters
C.Configures the user policy settings based on the computer location that
3.________
4.________
Block
Inheritance
WQL.
Option
5.________
Loopback
Processing
users or groups.
2.
3.
Match each method used to modify Group Policy processing with its correct description.
Write the letter of the description in the Answer column.
Answer
Method
Description
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
31/32
16/11/2014
1.
2.
Security Filtering
B.Controls the order in which GPOs are applied within each domain, site,
3.
WMI Filters
4.
Block Inheritance
Option
WQL.
5.
Loopback
Processing
users or groups.
or OU.
C.Configures the user policy settings based on the computer location that
the users log on to.
https://skillpipe.courseware-marketplace.com/reader/en-GB/Book/BookPrintView/b6175ac1-149e-4f52-83bd-6350c9133320?ChapterNumber=5&FontSize
32/32