0% found this document useful (0 votes)
16 views11 pages

Windows Active Directory

Chapter 6 provides an overview of Windows Active Directory, detailing its introduction, structure, and installation process. It explains the physical and logical structures, including components like organizational units, domains, trees, and forests, as well as the installation requirements and configuration options for domain controllers. The chapter also covers Active Directory management tools, object types, recovery options, and the replication process to maintain consistency across domain controllers.

Uploaded by

yxellep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views11 pages

Windows Active Directory

Chapter 6 provides an overview of Windows Active Directory, detailing its introduction, structure, and installation process. It explains the physical and logical structures, including components like organizational units, domains, trees, and forests, as well as the installation requirements and configuration options for domain controllers. The chapter also covers Active Directory management tools, object types, recovery options, and the replication process to maintain consistency across domain controllers.

Uploaded by

yxellep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Chapter 6 – Active Directory

Windows Active Directory – Introduce in Windows Server 2000


 Directory Service - as the name suggests, stores information about a computer network and offers
features for retrieving and managing that information.
 X.500 - a suite of protocols the International Telecommunication Union (ITU) developed, is the basis for
its hierarchical structure and for how Active Directory objects are named and stored.
 Lightweight Directory Access Protocol (LDAP) - created by the Internet Engineering Task Force (IETF), is
based on the X.500 Directory Access Protocol (DAP). DAP required the seldom used, high-overhead
Open Systems Interconnection (OSI) protocol stack for accessing directory objects. LDAP became a
streamlined version of DAP, using the more efficient and widely used TCP/IP—hence the term
“lightweight” in the protocol’s name.
 There are two aspects of Active Directory’s structure:
Physical Structure
 The physical structure consists of sites and servers configured as domain controllers.
 An Active Directory site is nothing more than a physical location in which domain controllers
communicate and replicate information regularly. Specifically, Microsoft defines a site as one or
more IP subnets connected by high-speed LAN technology.
 Typically, each physical location with a domain controller operating in a common domain connected
by a WAN constitutes a site. The main reasons for defining multiple sites are to control the
frequency of Active Directory replication and to assign policies based on physical location.
 Another component of the physical structure is a server configured as a domain controller, which is
a computer running Windows Server 2012/R2 with the Active Directory Domain Services role
installed. Although an Active Directory domain can consist of many domain controllers, each
domain controller can service only one domain. Each domain controller contains a full replica of the
objects that make up the domain and is responsible for the following functions:
 Storing a copy of the domain data and replicating changes to that data to all other domain
controllers throughout the domain
 Providing data search and retrieval functions for users attempting to locate objects in the
directory
 Providing authentication and authorization services for users who log on to the domain and
attempt to access network resources
Logical Structure
 There are four organizing components of Active Directory: Organizational units, Domains, Trees,
Forests
 Organizational Unit (OU) - is an Active Directory container used to organize a network’s users and
resources into logical administrative units. An OU contains Active Directory objects, such as user
accounts, groups, computer accounts, printers, shared folders, applications, servers, and domain
controllers. OUs can represent policy boundaries, in which different sets of policies can be applied
to objects in different OUs.
 Domain - is Active Directory’s core structural unit. It contains OUs and represents administrative,
security, and policy boundaries
 Tree - is less a container than a grouping of domains that share a common naming structure. A
tree consists of a parent domain and possibly one or more child domains (also called
“subdomains”) that have the same second-level and top-level domain names as the parent
domain.
 Forest - is a collection of one or more trees. A forest can consist of a sin gle tree with a single
domain, or it can contain several trees, each with a hierarchy of parent and child domains. Each
tree in a forest has a different naming structure. A forest’s main purpose is to provide a common
Active Directory environment, in which all domains in all trees can communicate with one
another and share information yet allow independent operation and administration of each
domain.

Installing Active Directory


 you must install the DNS Server role if DNS isn’t already in stalled on the network
 you have the option to export the Active Directory deployment configuration settings, which creates an
XML file with the installation settings you selected. This file can be used to automate Active Directory
installations on other servers.
 After the installation is finished, you must configure Active Directory. To get started, click the
notifications flag in Server Manager and click “Promote this server to a domain controller,” which starts
the Active Directory Domain Services Configuration Wizard.
 In the Deployment Configuration window, you select from these options: Add a domain controller to an
existing domain, Add a new domain to an existing forest, and Add a new forest
 FQDN - is a domain name that includes all parts of the name, including the top-level domain.
 For the most advanced features and security, you should choose the most current functional level,
which is Windows Server 2012 R2. For the most backward-compatibility with older DCs on the network,
you should choose Windows 2008 for the forest functional level. You can’t choose a forest functional
level earlier than Windows Server 2008. If you choose the Windows Server 2012 R2 forest functional
level, you can’t run DCs that run an OS version earlier than Windows Server 2012 R2. You can, however,
still run older servers as member servers.
 You then have three options to specify capabilities for the DC:
 Domain Name System (DNS) server—For the first DC in a new domain, DNS should be installed
unless you will be using an existing DNS server for the domain.
 Global Catalog (GC)—For the first DC in a forest, this check box is selected and disabled because
the first DC in a new forest must also be a global catalog server.
 Read only domain controller (RODC)—This check box isn’t selected by default. This option is
disabled for the first DC in the domain because it can’t be an RODC.
 Directory Services Restore Mode (DSRM) - This boot mode is used to perform restore operations on
Active Directory if it becomes corrupted or parts of it are deleted accidentally.
 SYSVOL Folder - is a shared folder containing file-based information that’s replicated to other domain
controllers. Storing the database and log files on separate disks, if possible, is best for optimal
performance.
 Microsoft recommends at least two domain controllers in every domain for fault tolerance and load
balancing.

 When a new DC is added to an existing domain:


 Should you install DNS? Installing DNS is recommended if you’re installing the second DC in a
domain because one reason you want to install another DC is for fault tolerance.
 Should the DC be a global catalog (GC) server? The first DC is always configured as a GC server,
but when you’re installing additional DCs in a domain, this setting is optional. In most cases, it
makes sense to make all your DCs global catalog servers as well, particularly in a single-domain
forest.
 Should this be a read only domain controller (RODC)? An RODC is most often used in branch
office situations, where ensuring the server’s physical security is more difficult. An RODC
doesn’t store account credentials, so if an RODC is compromised, no passwords can be
retrieved.
 In which site should the DC be located? If you have more than one site defined for your
network, you can choose where you want the DC to be located.
 The preferred method of installing Active Directory in a Windows Server 2012/R2 Server Core
installation is to use the PowerShell cmdlets
 If you want to see what a PowerShell cmdlet does without actually performing the operation, use the
-WhatIf parameter. PowerShell displays the steps needed to perform the command, showing you the
default settings and prompting you for other information the command requires.
 Install from media (IFM) - This utility copies the contents of an existing DC’s Active Directory database
(and optionally the SYSVOL folder) to disk.
 If you’re creating IFM data for a standard DC (a writeable DC, not an RODC), you must use a standard
DC to create this data. If you’re creating IFM data for an RODC, you can use an RODC or a standard DC.
 On the selected DC, run the ntdsutil command-line program at an elevated command prompt. Ntdsutil
is an interactive program, where you enter commands

Inside Active Directory


 Active Directory Administrative Center (ADAC) - The ADAC is a central console for performing many
Active Directory tasks, including creating and managing user, group, and computer accounts; managing
OUs; and connecting to other domain controllers in the same or a different domain. You can also
change the domain’s functional level and enable the Active Directory Recycle Bin. ADAC is built on
PowerShell, so each command you use in ADAC issues a PowerShell command to perform the task. You
can take advantage of this new feature in Windows Server 2012 by using the Windows PowerShell
History pane in ADAC
 Active Directory Users and Computers - has two panes. In the left pane, the top node shows the server
and domain being managed. The Saved Queries folder contains a list of Active Directory queries you
can save to repeat Active Directory searches easily. The third node represents the domain and contains
all the objects that make up the domain.

Active Directory Schema


 Object - is a grouping of information that describes a network resource, such as a shared printer; an
organizing structure, such as a domain or OU; or an account, such as a user or group.
 Schema - defines the type, organization, and structure of data stored in the Active Directory database
and is shared by all domains in an Active Directory forest. The information the schema defines is
divided into two categories: schema classes and schema attributes.
 Schema Classes - define the types of objects that can be stored in Active Directory, such as user or
computer accounts.
 Schema Attributes - define what type of information is stored in each object, such as first name, last
name, and password for a user account object called attribute values

Active Directory Container Objects


 Organizational Units - An OU is the primary container object for organizing and managing resources in
a domain. You can delegate administrative authority for an OU to a user, thereby allowing the user to
manage objects in the OU without giving the user wider authority. When a new DC is installed in the
domain, a new computer object representing it is placed in the Domain Controllers OU by default. A
GPO is linked to the Domain Controllers OU and used to set security and administrative policies that
apply to all DCs in the domain.
 Folder Objects - When Active Directory is installed, five folder objects are created:
 Builtin – Houses default groups created by Windows and is mainly used to assign permissions to
users who have administrative responsibilities in the domain.
 Computers – The default location for computer accounts created when a new computer or
server becomes a domain member.
 ForeignSecurityPrincipals - Initially empty but later contains user accounts from other domains
added as members of the local domain’s groups.
 Managed Service Accounts - Added to the schema in Windows Server 2008 R2; created
specifically for services to access domain resources. In this account, the password is managed
by the system, alleviating the administrator of this task. This folder is empty initially.
 Users - Stores two default users (Administrator and Guest) and several default groups.
 Domain Objects - The domain is the core logical structure container in Active Directory. Domains
contain OU and folder container objects but can also contain leaf objects, such as users, groups, and so
forth. A domain typically reflects the organization of the company in which Active Directory is being
used, but in large or geographically dispersed organizations, you can create multiple domains, each
representing a business unit or location. The main reasons for using multiple domains are to allow
separate administration, define security boundaries, and define policy boundaries.

Active Directory Leaf Objects


 A leaf object doesn’t contain other objects and usually represents a security account, network resource, or GPO.
Security account objects include users, groups, and computers.
 Network resource objects include servers, domain controllers, file shares, printers, and so forth.
 User Account - object contains information about a network user. Typically, when a user account is created, the
administrator enters at least the user’s name, logon name, and password.
 local user account - defined on a local computer, is au thorized to access resources only on that
computer. Local user accounts are mainly used on stand-alone computers or in a workgroup network
with computers that aren’t part of an Active Directory domain.
 domain user account - created in Active Directory, provides a single logon for users to access all
resources in the domain they’re authorized for.
 built in user accounts - automatically: Administrator and Guest. They can be local user accounts or
domain user accounts, depending on the computer where they’re created. On a workgroup or stand-
alone Windows computer, these two accounts are created when Windows is installed, and they’re local
accounts that have access to resources only on the local computer. When Active Directory is installed on
a Windows Server 2012/R2 computer, these two accounts are converted from local user accounts to
domain user accounts.
 Group object - represents a collection of users with common permissions or rights requirements on a computer
or domain.
 Permissions define which resources users can access and what level of access they have.
 right specifies what types of actions a user can perform on a computer or network.
 Computer account - object represents a computer that’s a domain controller or domain member and is used to
identify, authenticate, and manage computers in the domain.
 Computer accounts are created automatically when Active Directory is installed on a server or when a
server or workstation becomes a domain member.
 By default, domain controller computer accounts are placed in the Domain Controllers OU, and domain
member computer accounts are placed in the Computers folder.
 Like user accounts, computer accounts have a logon name and password, but a com puter account
password is managed by Active Directory instead of an administrator.
 Other Leaf Objects:
 Contact – person who is associated with the company but is not a network user.
 Printer – a shared printer in the domain. Printers shared on Windows 2000 or later computers
that are domain members can be added to Active Directory automatically.
 Shared Folder - folder—Represents a shared folder on a computer in the network. Shared folder
objects can be added to Active Directory manually or by using the publish option when creating
a shared folder
 Both printer and shared folder objects enable users to access shared printers and folders on any
computer in the domain without knowing exactly which computer the resource was created on.

Recovering Objects with the Active Directory Recycle Bin


 Active Directory Recycle Bin is disabled by default; it can be enabled in Active Directory Administrative
Center (ADAC).
 After it’s enabled, the Recycle Bin can’t be disabled without reinstalling all domain controllers in the
forest.
 To use the Recycle Bin, all DCs in the forest must be running Windows Server 2008 R2 or later, and the
forest functional level must be at least Windows Server 2008 R2.

Locating Active Directory Objects


 you can search for users, contacts, groups, computers, printers, shared folders,
 you can search in a single domain or in the entire directory (all domains).
 However, not all objects are available to all users, depending on the object’s security settings and its
container.

Working with Forests, Trees, and Domains

Active Directory Replication


 Replication is the process of maintaining a consistent database of information when the database is
distributed among several locations.
 Active Directory contains several databases called partitions that are replicated between domain
controllers by using intrasite replication or intersite replication.
 Intrasite replication takes place between domain controllers in the same site; Intrasite replication
occurs 15 seconds after a change is made on a domain controller, with a 3-second delay between each
replication partner.
 intersite replication occurs between two or more sites. The replication process differs in these two
types,
 multimaster replication for replicating Active Directory objects, such as user and computer accounts,
which means changes to these objects can occur on any DC and are propagated (replicated) to all other
domain controllers.
 Knowledge Consistency Checker (KCC) runs on every DC to determine the replication topology, which
defines the domain controller path through which Active Directory changes flow. This path is
configured as a ring (or multiple rings, if there are enough domain controllers), with each DC in the
path constituting a hop. The KCC is designed to ensure there are no more than three hops between any
two domain controllers, which can result in multiple rings,
 replication partner is a pair of domain controllers configured to replicate with one another.

Directory Partitions
 Each section of an Active Directory database is referred to as a directory partition. There are five
directory partition types in the Active Directory database:
 Domain directory partition Contains all objects in a domain, including users, groups,
computers, OUs, and so forth. There’s one domain directory partition for each domain in the
forest. Changes made to objects in domain directory partitions are replicated to each DC in the
domain. Some object attributes are also replicated to global catalog servers (described later in
“The Importance of the Global Catalog Server”) in all domains. Changes to the domain directory
partition can occur on any DC in the domain except read-only domain controllers.
 Schema directory partition Contains information needed to define Active Directory objects and
object attributes for all domains in the forest. The schema directory partition is replicated to all
domain controllers in the forest. One domain controller in the forest is designated as the
schema master domain controller (discussed in the next section) and holds the only writeable
copy of the schema.
 Global catalog partition The global catalog partition holds the global catalog, which is a partial
replica of all objects in the forest. It stores the most commonly accessed object attributes to
facilitate object searches and user logons across domains. The global catalog is built
automatically by domain replication of object attributes flagged for inclusion. Administrators
can’t make changes to this partition.
 Application directory partition - Used by applications and services to hold information that
benefits from automatic Active Directory replication and security. DNS is the most common
service to use an application directory partition for the DNS database. The information in this
partition can be configured to replicate to specific domain controllers rather than all domain
controllers, thereby controlling replication traffic. There can be more than one application
directory partition.
 Configuration partition—By default, the configuration partition holds configuration information
that can affect the entire forest, such as details on how domain controllers should replicate with
one another. Applications can also store configuration information in this partition. This
partition is replicated to all domain controllers in the forest, and changes can be made to
information stored in this partition on all domain controllers.

Operations Master Roles


A number of operations in a forest require having a single domain controller, called the operations master, with
sole responsibility for the function. In most cases, the first DC in the forest takes on the role of operations
master for these functions. How ever, you can transfer the responsibility to other domain controllers when
necessary. There are five operations master roles, referred to as Flexible Single Master Operation (FSMO)
roles, in an Active Directory forest:
 Schema master—As mentioned, the schema partition can be changed on only one DC, the schema
master. This DC is responsible for replicating the schema directory partition to all other domain
controllers in the forest when changes occur.
 Infrastructure master—This DC is responsible for ensuring that changes made to object names in one
domain are updated in references to these objects in other domains. By default, the first DC in each
domain is the infrastructure master for that domain.
 Domain naming master—This DC manages adding, removing, and renaming domains in the forest.
There’s only one domain naming master per forest, and the DC with this role must be available when
domains are added, deleted, or renamed.
 RID master—All objects in a domain are identified internally by a security identifier (SID). An object’s
SID is composed of a domain identifier, which is the same for all objects in the domain, and a relative
identifier (RID), The RID master is responsible for issuing unique pools of RIDs to each DC, thereby
guaranteeing unique SIDs throughout the domain. The RID master must be available when adding a DC
to an existing domain. There’s one RID master per domain.
 PDC emulator master—This role provides backward-compatibility with Windows NT servers configured
as Windows NT backup domain controllers or member servers. In addition, the PDC emulator master
manages password changes to help make sure user authentication occurs without lengthy delays. To
reduce this problem, password changes are replicated immediately to the PDC emulator master, and if
authentication fails at one DC, the attempt is retried on the PDC emulator master.
 Because domain controllers that manage FSMO role data are, by definition, single masters, special
attention must be paid to them. When removing domain controllers from a forest, make sure these
roles aren’t removed from the network accidentally.

Trust Relationships
 trust relationship defines whether and how security principals from one domain can access network
resources in another domain.
 Trust relationships are established automatically between all domains in a forest.
 trusts must be configured only when your Active Directory environ ment includes two or more forests
or when you want to integrate with other OSs.

The Role of Forests


 The Active Directory forest is the broadest logical component of the Active Directory structure. Forests
contain domains that can be organized into one or more trees. All domains in a forest share some
common characteristics:
 A single schema—The schema defines Active Directory objects and their attributes and can be
changed by an administrator or an application to best suit the organization’s needs. All domains
in a forest share the same schema, so a change to the schema affects objects in all domains.
This shared schema is one reason that large organizations or conglomerates with diverse
business units might want to operate as separate forests. With this structure, domains in
different forests can still share information through trust relationships, but changes to the
schema—perhaps from installing an Active Directory– integrated application, such as Microsoft
Exchange—don’t affect the schema of domains in a different forest.
 Forest-wide administrative accounts—Each forest has two groups defined with unique rights to
perform operations that can affect the entire forest: Schema Admins and Enter prise Admins.
Members of Schema Admins are the only users who can make changes to the schema.
Members of Enterprise Admins can add or remove domains from the forest and have
administrative access to every domain in the forest. By default, only the Administrator account
for the first domain created in the forest (the forest root domain) is a member of these two
groups.
 Operations masters—As discussed, certain forest-wide operations can be performed only by a
DC designated as the operations master. Both the schema master and the domain naming
master are forest-wide operations masters, meaning only one DC in the forest can perform
these roles.
 Global catalog—There’s only one global catalog per forest, but unlike operations masters,
multiple domain controllers can be designated as global catalog servers. Because the global
catalog contains information about all objects in the forest, it’s used to speed searching for
objects across domains in the forest and to allow users to log on to any domain in the forest.
 Trusts between domains—These trusts allow users to log on to their home domains (where
their accounts are created) and access resources in domains throughout the forest without
having to authenticate to each domain.
 Replication between domains—The forest structure facilitates replicating important
information between all domain controllers throughout the forest. Forest-wide replication in
cludes information stored in the global catalog, schema directory, and configuration partitions.

The Importance of the Global Catalog Server


 The first DC installed in a forest is always designated as a global catalog server, but you can use Active
Directory Sites and Services to configure additional domain controllers as global catalog servers for
redundancy. The follow ing are some vital functions the global catalog server performs:
 Facilitates domain and forest-wide searches—As discussed, the global catalog is contacted to
speed searches for resources across domains.
 Facilitates logon across domains—Users can log on to computers in any domain by using their
user principal name (UPN). A UPN follows the format username@domain. Because the global
catalog contains information about all objects in all domains, a global catalog server is contacted
to resolve the UPN. Without a global catalog server, users could log on only to computers that
were members of the same domain as their user accounts.
 Holds universal group membership information—When a user logs on to the network, all the
user’s group memberships must be resolved to determine rights and permissions. Global
catalog servers are the only domain controllers that hold universal group membership
information, so they must be contacted when a user logs on.

Forest Root Domain


 when the first domain is created in a Windows network, the forest root is also created. In fact, the first
domain is the forest root and is referred to as the forest root domain.
 It has a number of important responsibilities and serves as an anchor for other trees and domains
added to the forest.
 Certain functions that affect all domains in the forest are conducted only through the forest root
domain, and if this domain becomes inoperable, the entire Active Directory structure ceases
functioning.
 Some functions the forest root domain usually handles include the following:
 DNS server
 Global catalog server
 Forest-wide administrative accounts
 Operations masters
 The DNS server and global catalog server functions can be installed on other servers in other domains
for fault tolerance. However, the forest-wide operations masters and forest-wide administrative
accounts can reside only on a DC in the forest root domain.

Understanding Domains and Trees


 an Active Directory tree is a group of domains sharing a common naming structure.
 A tree can consist of a single domain or a parent domain and one or more child domains, which can
have child domains of their own.
 An Active Directory tree is said to have a contiguous namespace because all domains in the tree share
at least the last two domain name components: the second-level domain name and the top-level
domain name.
 Organizations operating under a single name internally and to the public are probably best served by an
Active Directory forest with only one tree.
 However, when two companies merge or a large company splits into separate business units that would
benefit from having their own identities, a multiple tree structure makes sense.
 there’s no major functional difference between domains in the same tree or domains in different trees,
as long as they’re part of the same forest.
 The only operational difference is the necessity of maintaining multiple DNS zones
 Most small and medium businesses choose a single domain for reasons that include the following:
 Simplicity
 Lower cost
 Easier Management
 Easier access to resources
 Using more than one domain makes sense or is even a necessity in the following circumstances:
 Need for differing account policies
 Need for different name identities
 Replication control
 Need for internal versus external domains
 Need for tight security

Introducing Group Policies


 Group Policy Object (GPO) is a list of settings administrators use to configure user and computer
operating environments remotely.
 They can be configured to affect an entire domain, a site, and, most commonly, users or comput ers in
an OU.
 You can link GPOs to sites, domains, and OUs, and GPOs linked to these containers affect only user or
computer accounts in the containers.
 When Active Directory is installed, two GPOs are created and linked to two containers:
 Default Domain Policy—This GPO is linked to the domain object and specifies default settings
that affect all users and computers in the domain. The settings in this policy are related mainly
to account policies, such as password and logon requirements, and some network security
policies.
 Default Domain Controllers Policy—This GPO is linked to the Domain Controllers OU and
specifies default policy settings for all domain controllers in the domain (provided the computer
objects representing domain controllers aren’t moved from the Domain Control lers OU). The
settings in this policy pertain mainly to user rights assignments, which specify the types of
actions users can perform on a DC.
 These default policies don’t define any user-specific policies; instead, they’re designed to provide
default security settings for all computers, including domain controllers, in the domain.
 In GPMC, you see only folders containing configured settings. By default, there are no configured
settings in the User Configuration node in the Default Domain Policy, which is why you don’t see a
Policies folder under User Configuration in Figure 6-31. Likewise, you don’t see the Preferences folder in
this figure because no preferences have been configured.
 Computer Configuration—Used to set policies that apply to computers within the GPO’s scope. These
policies are applied to a computer when the computer starts.
 User Configuration—Used to set policies that apply to all users within the GPO’s scope. User policies
are applied when a user logs on to any computer in the domain.
 Computer Configuration: the three folders under the Policies folder contain the following information:
 Software Settings—This folder contains an item (extension) called Software installation, which
enables administrators to install and manage applications remotely. Application installation
packages can be configured so that the next time a computer in the GPO’s scope starts, the
application is installed automatically. This feature is called “assigning” the application to the
computer.
 Windows Settings—This folder contains the Name Resolution Policy node, Scripts extension,
Security Settings node, and Policy-based QoS node. The Name Resolution Policy stores con
figuration settings for DNS security and DirectAccess. Administrators can use the Scripts ex
tension to create scripts that run at computer startup or shutdown. The Security Settings node
contains the lion’s share of policies that affect computer security, including account policies,
user rights, wireless network policies, Registry and file system permissions, and network com
munication policies, among others. The Policy-based QoS node can be used to prioritize and
control outgoing network traffic from a computer.
 Administrative Templates—This folder contains Control Panel, Network, Printers, System, and
Windows Components folders. The settings in these folders affect computer settings that apply
to all logged-on users. For example, the Network folder contains settings for configuring
Windows Firewall, and Windows Components contains settings for configuring Windows
Update. You can control hundreds of computer settings with the Administrative Templates
folder.
 User Configuration: In the User Configuration node, the Policies folder contains the same three folders
as in the Computer Configuration node. However, the policies defined here affect domain users within
the GPO’s scope, regardless of which computer the user logs on to.
 Software Settings—This folder also contains the Software installation extension. However,
application packages configured here can be assigned or published. An assigned application is
made available as an icon in the Start screen the next time a user affected by the policy logs on
to a computer in the domain. The first time the user tries to run the application or open a
document associated with it, the application is installed. A published application is made
available via Group Policy for a user to install by using Programs and Features in Control Panel.
 Windows Settings—This folder contains four items: the Scripts extension, the Security Settings
node, the Folder Redirection node, and the Policy-based QoS node.
 Administrative Templates—This folder contains a host of settings that enable administrators to
tightly control users’ computer and network environments.

How Group Policies Are Applied


 GPOs can be applied in four places: local computer, site, domain, and OU. Policies are applied in this
order, too. Policies that aren’t defined or configured are not applied at all, and the last policy to be
applied is the one that takes precedence. For example, a GPO linked to a domain affects all computers
and users in the domain, but a GPO linked to an OU over rides the domain policies if there are
conflicting settings.

You might also like