How to use Group Policy to make USB drives read only on Windows XP
One of the great new features with Windows 7 was Bitlocker to Go that enabled IT Administrators to ensure that all data written to USB drives is encrypted. In conjunction with this new feature Microsoft also added another option called â€œDeny write access to removable drives not protected by BitLockerâ€ which allowed user to still read the files off USB…
How to use Group Policy to fix Adobe Reader PDF Preview in Windows 64bit
Leo Davidson recently postedÂ a fix for Adobe Reader integration on 64bitÂ Windows. His fix resolves the thumbnail and file preview feature when you install Adobe Reader (which is still only available in 32bit) in 64bit Windows which Adobe have not seemed to work out for over 3 years now. On his site he has tool that you can downloadÂ to manually apply…
How to use Group Policy Preferences to Secure Local Administrator Groups
One problem I keep seeing again and again is that IT administrator seem to never control who is a local administrator of a computer. The problem is that when someone is a local administrator on a computer they have full control and stopping them from doing the wrong thing is very hard and it is even harder to discover who is in the local admin group because you have to query every computer to find this out. So how do you give a user full admin access to a computer but stop them from adding more people to the local admin group on a computer? Use Group Policy Preference of course.
But first a bit of Historyâ€¦ Since Group Polices were first introduced with Windows 2000 there was an option called â€œRestricted Groupsâ€ which allows you to control the membership of a group. This option had two modes the â€œMembersâ€ option which I also call the â€œIron Fistâ€ option and â€œMembers Ofâ€ option which is much more gentler option. The â€œMembersâ€ option removes any groups or users that are not explicitly specified and the â€œMembers Ofâ€ option just adds a specific group which out removing any existing groups. The â€œMembersâ€ option was really good at cleaning up those rogue members of the local admin group but its was also really hard to setup as you had to have a new group policy every time you wanted a different list of members in local group on a computer. The â€œMembers Ofâ€ option was a lot easier to maintain as you could layer multiple group policies on top of each other but this normally resulted in just adding another layer of group to the pile of groups that were already in the local administrators group. The other problem was the â€œMembersâ€ option would override the â€œMembers Ofâ€ option so there was really no way of mixing the two modes.
Well the good news is that Group Policy Preferences has Variables therefore this allows you to be very extremely granular in controlling you local admin group while still having â€œIron Fistâ€ control. Muuhhaaaahahahahah!!!
How do I setup a restricted local administrator group?
The following steps will need to be applied pretty much to any computer that you want to use Group Policy Preference to control the local administrator groups. Remember however that you must make sure you don’t have any Group Policy â€œRestricted Groupsâ€ settings applied to your computers as they will always override any group policy preferences settings.
Step 1. Open the Group Policy Management Consol and edit the group policy that is applied to the scope of computers that you want to control.
Step 2. Go to the Computer Configuration > Preferences > Control Panel Settings > Local User and Groups option (see Image 1.).
Image 1. Local User and Group
Step 3. Now click on Actions > New > Local Group
Step 4. Now you will be need to select â€œAdministrators (built-in)â€ from the group name as this allows you to secure the built-in administrators group even if you have renamed the group to obfuscate the name to enhance security on your computers.
Step 5. Tick both â€œDelete all member usersâ€ and â€œDelete all member groupsâ€. These two options will automatically remove any users or groups that are not explicitly being added to the group. You only need to do this on item number 1 in the list of settings as that setting will be processed last.
Step 6. Now you will need to make sure you have added back in the Domain Adminâ€™s and Local Administrator groups so that you don’t totally local yourself out of the computer. To do this click the â€œAddâ€¦â€ button to bring up the â€œLocal Group Memberâ€ dialogue box (see Image 2)
Image 2. Local Group Member
Step 7. Now type â€œBuiltIn\Administratorsâ€ in the Name field and click OK (see Image 3.)
Image 3. Local Administrators group added to the local administrators group
Step 8. Now as you computer is a domain added machine you should also added the Domain Adminâ€™s group into the local Administrators group as best practice. But this time we are going to use some special Variables to ensure that you always add the correct group. So Click â€œAdd…â€ again and now click in the â€œName:â€ text field and then press F3. This will now bring up the â€œSelect Variableâ€ dialogue box (See Image 4.). Click on the â€œDomainNameâ€ field and press â€œSelectâ€ and then â€œOKâ€. (alternatively you could type %DomainName% in the name field and just press OK.)
Image 4. Selecting the DomainName Variable
You should now see the the following which will now restrict the local administrator group on any computer this policy is applied to only have the Domain Admins and the local Administrator in the local Administrators group on that computer.
Image 5. Basic local administration group setting
SO WHAT? Your rightâ€¦ You can do this already with the â€œRestricted Groupsâ€ Group Policy setting and only having the local Administrator and Domain Adminâ€™s in the local admin group is not not much use unless you are willing to give everyone the local admin password or give them all Domain Adminâ€™s privileges (Like that ever happens) which is a major no no. Well this is where Group Policy Preferences comes to the rescue as you can now create another preference that will merge with the above list of allowed groups which I will go into below.
How to add individuals to a single computer?
Now we are going to go thorough how to add a uniquely named domain group to the local administrators group easily and without the need for setting up multiple group policies. This scenario is very helpful if you want to grant a single user or group to the local administrators group on a single computer but still ensure that no other users or groups are added without explicitly being approved. Say for example the computer name is DESKTOP01 and the domain name is CONTOSO we will then want to add the group â€œCONTOSO\DESKTOP01 Administratorsâ€ to the local administrator group but we also want the same to happen on DESKTOP02, DESKTOP03 and so on, each with their own uniquely named group based on the computer name.
Step 9. First go back and repeat steps 1 to 6 until you get to the Local Group Member dialogue box (see Image 6.)
Image 6. Add Local Group Member
Step 10. Type â€œ%DomainName%\%ComputerName% Administratorsâ€ in the Name text field and click â€œOKâ€. Now you should see something similar to (Image 7.)
Image 7. Configuration to automatically unique group to local administrators group
Now this will now automatically add a domain group called â€œDOMAINNAME\COMPUTERNAME Administratorsâ€ to the local administrators group on the computer to which the policy is applied.
This group policy setting combined with the other setting made earlier (see Image 5.) will mean that the local administrator group on the computer DESKTOP01 in the CONTOSO domain will have the following members automatically added to the group:
But ANY other users or groups will be automatically removed after the next group policy refresh. This does mean there is a slight window of opportunity for someone to slip in an un-authorised account into the local administrators group but normally this gets cleaned up before they realise what is going on. The great thing about doing this is that the users almost never complain as they realise what they are doing and BIG BROTHER must have been watching them and removed their access.
However the â€œCONTOSO\DESKTOP01 Administrators” group will only be added to the local administrators group on the computer DESKTOP01 if that group is already exists. Therefore you do not need to create the group until the need arises to add an individual user or group to just a single computer.
AWSOME!!!! I hear you sayâ€¦ but wait there is moreâ€¦
How do I add additional broader groups to the local administrators group?
Now that you are able to granuarlly add a single user or group to the local administrators group on a computer you might run into problems id you have more than a 1000 computers due to AD Token Bloat Issues . So to get around this we can setup some more broadly applied administrator groups to the computer that will give admin access to only a subset of computers such as workstations or perhaps only the SQL Servers in your organisation.
Workstations Admin Groups
To apply a Workstation administrators group to the local administrators group on all workstations make sure you have a group policy only targeted to your workstations. This is normally pretty easy as most companies isolate their workstations computer accounts to one (or a select) number of Organisational Unit.
Step 11. Go back and repeat steps 6 and 7 but this time add the group â€œ%DomainName%â€\Workstations Administratorsâ€ in the name field. This will added the additional group â€œCONTOSO\Workstation Administratorsâ€ to the local admin group on all the workstations in your domain which will allow you to easily add all the Desktop Administrators in your organisation access to all the workstations without having to give them the local admin password or domain adminâ€™s privileges.
Server Role Admin Groups
In these steps we are going to automatically added a domain group called â€œCONTOSO\SQL Server Administratorsâ€ to all the servers you have that have SQL Server installed on them. This will be very handy to making sure SQL service accounts or database administrators have admin access to all the servers that have Microsoft SQL Server installed
Step 12. First make sure you are editing a group policy that is applied to all your servers in your organisation.
Step 13. Now repeat Step 9 and 10 and then we open the properties of the new policy setting and specify the group but this time we type â€œ%DomainName%\SQL Server Administratorsâ€ in the name field.
Step 14. Now click on the â€œCommonâ€ tab and then tick â€œItem Level Targetingâ€ and click the â€œTargetingâ€¦â€ button.
Step 15. Click on the â€œNew Itemâ€ in the menu bar and select the option you want to use to target all the SQL servers in your organisation. This could be an Organisation Unit that has all the computer accounts of all the SQL servers in the organisation OR a security group that has all the SQL Servers computer accounts as members.
But for this example we are going to select the â€œFile Matchâ€ option to look in the Program Files folder and see if a sub-folder exists called â€œMicrosoft SQL Serversâ€ (See Image 8). This is normally true for any server that has Microsoft SQL Server installed and so it will then automatically apply the SQL Server Admin group to that server if it was installed.
Image 8. Testing to see if Microsoft SQL Server is installed.
Now any computer that SQL Server, MSDE or SQL Express installed will get the group â€œCONTOSO\SQL Server Administratorsâ€ automatically added to the local admin group.
This really nice thing about this is that if SQL is installed on the server at some point in the future the SQL Admin group will be added automatically at the next group policy refresh without you having to do a thing.
Finally now you have tight control of the local administrator groups on all the computers in your domain it is now important to monitor and secure the domain groups that are being added to the local administrator groups as they are now control who has admin access to all your computers. But I will save how to do that for another blog postâ€¦
How to make Adobe Reader 9 more secure using Group Policy
Update: I have since reposted this article with new registry keys that makes configured Adobe updater a lot easer. Check it out at Â https://www.grouppolicy.biz/2010/06/updated-how-to-make-adobe-reader-more-secure-using-group-policy/ Recently there have been a number of critical security issues that have been associated with Adobe Reader (see below). http://securitygarden.blogspot.com/2010/04/critical-adobe-and-adobe-acrobat-update.html http://securitygarden.blogspot.com/2010/01/adobe-readeracrobat-critical-update.html http://securitygarden.blogspot.com/2009/10/adobe-reader-and-acrobat-critical.html http://securitygarden.blogspot.com/2009/05/critical-update-adobe-reader-and.html http://securitygarden.blogspot.com/2009/12/critical-adobe-pdf-vulnerability.html http://securitygarden.blogspot.com/2010/01/adobe-readeracrobat-critical-update.html http://www.adobe.com/support/security/advisories/apsa09-07.html To see a complete list of current updates for Adobe…