Training Guide:
Administering Windows
Server® 2012 R2
Orin Thomas
PUBLISHED BY
Microsoft Press
A Division of Microsoft Corporation
One Microsoft Way
Redmond, Washington 98052-6399
Copyright © 2014 by Orin Thomas
All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any
means without the written permission of the publisher.
Library of Congress Control Number: 2014937581
ISBN: 978-0-7356-8469-0
Printed and bound in the United States of America.
First Printing
Microsoft Press books are available through booksellers and distributors worldwide. If you need support related
to this book, email Microsoft Press Book Support at
[email protected]. Please tell us what you think of
this book at http://www.microsoft.com/learning/booksurvey.
Microsoft and the trademarks listed at http://www.microsoft.com/en-us/legal/intellectualproperty/Trademarks/
EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective
owners.
The example companies, organizations, products, domain names, email addresses, logos, people, places, and
events depicted herein are ictitious. No association with any real company, organization, product, domain name,
email address, logo, person, place, or event is intended or should be inferred.
This book expresses the author’s views and opinions. The information contained in this book is provided without
any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor its resellers, or
distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by
this book.
Acquisitions Editor: Anne Hamilton
Developmental Editor: Karen Szall
Editorial Production: Troy Mott, Backstop Media LLC
Technical Reviewer: Telmo Sampaio
Copyeditor: Christina Rudloff
Indexer: Judy Hoer
Cover: Twist Creative • Seattle
Contents at a glance
Introduction
xvii
CHAPTER 1
Deploying and updating Windows Server 2012 R2
1
CHAPTER 2
Managing account policies and service accounts
CHAPTER 3
Coniguring name resolution
123
CHAPTER 4
Administering Active Directory
181
CHAPTER 5
Managing Group Policy application and infrastructure
241
CHAPTER 6
Group Policy settings and preferences
281
CHAPTER 7
Administering network policies
345
CHAPTER 8
Administering remote access
417
CHAPTER 9
Managing ile services
501
CHAPTER 10
Monitoring and auditing
591
Index
659
65
This page intentionally left blank
Contents
Introduction
xvii
Chapter 1: Deploying and updating Windows Server 2012 R2
1
Before you begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Lesson 1: Coniguring and servicing Windows Server images. . . . . . . . . . . 1
Understanding Windows images
2
Coniguring Windows images
3
Servicing Windows images
4
Lesson summary
10
Lesson review
10
Lesson 2: Automatically deploying Windows Server images . . . . . . . . . . . 11
Automating installation
12
Coniguring answer iles
12
Windows Deployment Services
14
WDS requirements
15
Managing images
17
Coniguring WDS
19
Coniguring transmissions
24
Driver groups and packages
25
Lesson summary
26
Lesson review
26
Lesson 3: Servicing and updating deployed servers . . . . . . . . . . . . . . . . . . . 27
Automated update deployment with WSUS
28
New WSUS features
28
What do you think of this book? We want to hear from you!
Microsoft is interested in hearing your feedback so we can continually improve our
books and learning resources for you. To participate in a brief online survey, please visit:
www.microsoft.com/learning/booksurvey/
v
Deploy and manage WSUS
28
WSUS groups
33
WSUS policies
33
Deploying updates
35
Automatic approval rules
36
Lesson summary
38
Lesson review
38
Practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Exercise 1: Prepare update iles
40
Exercise 2: Servicing a WIM image
42
Exercise 3: Deploy Windows Deployment Services
43
Exercise 4: Conigure Windows Deployment Services
47
Exercise 5: Import driver package
52
Exercise 6: Deploy WSUS
54
Exercise 7: Conigure WSUS
56
Exercise 8: WSUS groups and rules
58
Suggested practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Lesson 1
61
Lesson 2
61
Lesson 3
62
Chapter 2: Managing account policies and service accounts
65
Before you begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Lesson 1: Implementing domain password and lockout policies . . . . . . . . 65
Domain user password policies
66
Account lockout settings
70
Account management tasks
71
Lesson summary
76
Lesson review
76
Lesson 2: Using ine–grained password policies . . . . . . . . . . . . . . . . . . . . . . 77
vi
Contents
Delegate password settings permissions
78
Fine–grained password policies
80
Lesson summary
85
Lesson review
85
Lesson 3: Mastering Group Managed Service Accounts . . . . . . . . . . . . . . . 87
GMSAs
87
Kerberos delegation
91
Kerberos policies
92
Service principal name management
94
Lesson summary
94
Lesson review
94
Practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Exercise 1: Conigure password and account lockout policies
96
Exercise 2: Conigure account lockout policies
101
Exercise 3: Group Policy Modeling
104
Exercise 4: Locate non-expiring passwords
107
Exercise 5: Create ine–grained password policies
110
Exercise 6: Prepare MEL-DC and ADL-DC
113
Exercise 7: Create and conigure GMSAs
114
Suggested practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Lesson 1
117
Lesson 2
118
Lesson 3
119
Chapter 3: Coniguring name resolution
123
Before you begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Lesson 1: Understanding DNS zones and forwarders . . . . . . . . . . . . . . . . 123
DNS zone types
124
Zone delegation
129
Split DNS
131
Forwarders and conditional forwarders
131
Stub zones
134
Lesson summary
136
Lesson review
136
Lesson 2: Coniguring WINS and managing GlobalNames zones . . . . . . 138
WINS
138
Contents
vii
GlobalNames zones
142
Peer Name Resolution Protocol (PNRP)
144
Lesson summary
145
Lesson review
146
Lesson 3: Understanding advanced DNS options . . . . . . . . . . . . . . . . . . . . 147
Resource records
147
Zone aging and scavenging
151
DNSSEC
153
Lesson summary
157
Lesson review
157
Practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Exercise 1: Manage DNS zones
159
Exercise 2: Conigure partition-based replication
161
Exercise 3: DNS delegation and secondary zones
163
Exercise 4: Conigure a secondary zone
168
Exercise 5: Single-label name resolution
171
Exercise 6: Conigure and manage DNSSEC
173
Suggested practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Lesson 1
177
Lesson 2
178
Lesson 3
179
Chapter 4: Administering Active Directory
181
Before you begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Lesson 1: Managing domain controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
viii
Contents
Managing operations masters
182
Global Catalog servers
187
Universal group membership caching
189
Read-only domain controllers
190
Domain controller cloning
197
Lesson summary
198
Lesson review
199
Lesson 2: Maintaining domain controllers . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Active Directory database optimization
200
Active Directory metadata cleanup
203
Active Directory snapshots
204
Lesson summary
206
Lesson review
207
Lesson 3: Recovering Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Active Directory Recycle Bin
208
Active Directory backup
210
Active Directory recovery
212
Lesson summary
215
Lesson review
216
Practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Exercise 1: Domain controller installation
217
Exercise 2: RODC deployment
225
Exercise 3: Transfer operations master roles
230
Exercise 4: Active Directory Recycle Bin
234
Suggested practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Lesson 1
237
Lesson 2
238
Lesson 3
239
Chapter 5: Managing Group Policy application and infrastructure 241
Before you begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Lesson 1: Maintaining Group Policy Object . . . . . . . . . . . . . . . . . . . . . . . . . 241
Managing Group Policy Objects
242
Migrate Group Policy Objects
247
Delegate GPO management
248
Lesson summary
251
Lesson review
252
Lesson 2: Managing Group Policy application. . . . . . . . . . . . . . . . . . . . . . . 253
Policy processing precedence
253
Contents
ix
Policy enforcement and blocking
254
Group Policy security iltering
255
Group Policy WMI iltering
257
Loopback processing
258
Group Policy caching
260
Force Group Policy update
261
Lesson summary
263
Lesson review
263
Practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Exercise 1: Prepare GPOs, security groups, and OUs
265
Exercise 2: Manage GPOs
268
Exercise 3: Manage Group Policy processing
271
Exercise 4: Group Policy inheritance and enforcement
274
Suggested practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Lesson 1
278
Lesson 2
279
Chapter 6: Group Policy settings and preferences
281
Before you begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Lesson 1: Folder redirection, software installation, and scripts . . . . . . . . 281
Folder Redirection
282
Software installation
285
Scripts
291
Lesson summary
293
Lesson review
293
Lesson 2: Administrative templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
x
Contents
Administrative templates
296
Administrative template settings
297
Central store
297
ADMX Migrator
299
Filter property settings
300
Lesson summary
302
Lesson review
302
Lesson 3: Group Policy preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Group Policy preference settings
303
Item-level targeting
305
Mapping network drives
306
Coniguring printers
308
Coniguring power options
309
Coniguring the registry
314
Internet options
314
Additional settings
317
Lesson summary
321
Lesson review
322
Practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Exercise 1: Prepare Folder Redirection and scripts
324
Exercise 2: Conigure Folder Redirection
325
Exercise 3: Conigure Group Policy scripts
329
Exercise 4: Conigure the central store and administrative template
iltering
330
Exercise 5: Conigure Group Policy preferences
331
Suggested practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Lesson 1
339
Lesson 2
340
Lesson 3
341
Chapter 7: Administering network policies
345
Before you begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Lesson 1: Understanding Network Policy Server policies . . . . . . . . . . . . . 345
NPS deployment
346
Connection request policies
350
Client coniguration
363
IP ilters
367
Encryption
368
IP settings
368
Creating network policies
369
Contents
xi
NPS templates
374
Lesson summary
375
Lesson review
375
Lesson 2: Understanding Network Access Protection
enforcement methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
DHCP enforcement
377
IPsec enforcement
380
802.1X enforcement
382
VPN enforcement
385
RD Gateway enforcement
387
Lesson summary
390
Lesson review
391
Lesson 3: Understanding Network Access Protection infrastructure. . . . 392
Windows Security Health Validator
392
System Health Validators and System Health Agents
395
Health policies
395
Health Registration Authorities
397
Remediation server groups
398
Lesson summary
399
Lesson review
399
Practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .400
Exercise 1: Installing the DHCP role
401
Exercise 2: Deploying the NPS role
402
Exercise 3: Coniguring Windows Security Health Validator
403
Exercise 4: Coniguring a remediation server group
405
Exercise 5: Coniguring client policies for DHCP enforcement
406
Exercise 6: Coniguring NAP DHCP enforcement
408
Suggested practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
xii
Contents
Lesson 1
413
Lesson 2
414
Lesson 3
415
Chapter 8: Administering remote access
417
Before you begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Lesson 1: Coniguring RADIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
RADIUS servers
418
RADIUS proxies
421
RADIUS clients
426
RADIUS accounting
429
Lesson summary
433
Lesson review
433
Lesson 2: Coniguring VPN and routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Deploy Routing and Remote Access
435
Conigure VPN settings
437
Conigure routing
446
Network address translation (NAT)
448
Web Application Proxy in pass-through mode
451
Lesson summary
453
Lesson review
453
Lesson 3: Coniguring DirectAccess . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
Understanding DirectAccess
455
DirectAccess infrastructure
455
Conigure DirectAccess
462
Lesson summary
473
Lesson review
474
Practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Exercise 1: Conigure a RADIUS server
475
Exercise 2: Conigure a remote RADIUS server group
477
Exercise 3: Conigure a RADIUS client
479
Exercise 4: Set up RADIUS accounting
480
Exercise 5: Install a VPN server
481
Exercise 6: Conigure a VPN server
482
Exercise 7: Prepare for Web Application Proxy
483
Exercise 8: Conigure AD FS to support Web Application Proxy
489
Contents
xiii
Exercise 9: Deploy Web Application Proxy with pass-through
preauthentication
491
Suggested practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Lesson 1
496
Lesson 2
497
Lesson 3
498
Chapter 9: Managing ile services
501
Before you begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Lesson 1: Coniguring File Server Resource Manager . . . . . . . . . . . . . . . . 501
Coniguring quotas
502
Coniguring ile screens
504
Enabling ile classiication
505
Coniguring ile management tasks
506
Generating reports
507
Lesson summary
509
Lesson review
509
Lesson 2: Coniguring a Distributed File System . . . . . . . . . . . . . . . . . . . . . 511
Understanding Distributed File System namespaces
511
Understanding DFS replication
514
Cloning the DFS Replication database
519
Understanding DFSR and database recovery
520
Lesson summary
520
Lesson review
520
Lesson 3: Coniguring ile and disk encryption . . . . . . . . . . . . . . . . . . . . . . 522
xiv
Contents
Coniguring BitLocker
522
Coniguring Network Unlock
528
Coniguring Encrypting File System
530
Using EFS with an enterprise CA
531
Key and data recovery
532
Lesson summary
533
Lesson review
534
Practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
Exercise 1: Install the File Server Resource Manager role
service and create a shared folder
536
Exercise 2: Conigure ile quotas
541
Exercise 3: Conigure ile screen
545
Exercise 4: Conigure ile expiration
549
Exercise 5: Conigure storage reports
552
Exercise 6: Install DFS
555
Exercise 7: Create a DFS namespace and add a namespace server
558
Exercise 8: Conigure DFS replication
560
Exercise 9: Install Enterprise CA
566
Exercise 10: Conigure certiicate templates
571
Exercise 11: Conigure certiicate enrollment
574
Exercise 12: Conigure EFS-related Group Policies
578
Exercise 13: Conigure BitLocker-related policies
582
Suggested practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585
Lesson 1
585
Lesson 2
586
Lesson 3
588
Chapter 10: Monitoring and auditing
591
Before you begin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Lesson 1: Monitoring servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591
Coniguring data collector sets
592
Managing alerts
597
Monitoring events with viewer
599
Coniguring event subscriptions
603
Attaching event-driven tasks
606
Performing network monitoring
609
Lesson summary
612
Lesson review
613
Contents
xv
Lesson 2: Advanced audit policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614
Coniguring advanced auditing
614
Using auditpol with auditing
619
Lesson summary
619
Lesson review
620
Practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621
Exercise 1: Conigure data collector sets
621
Exercise 2: Collect data
626
Exercise 3: Conigure alerts
628
Exercise 4: Prepare computers for event subscriptions
630
Exercise 5: Conigure event subscriptions
632
Exercise 6: Conigure network monitoring
636
Exercise 7: Using Message Analyzer
638
Exercise 8: Conigure removable device auditing
641
Exercise 9: Conigure logon auditing
645
Exercise 10: Conigure expression-based audit policies
649
Exercise 11: Conigure folder auditing
652
Suggested practice exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Lesson 1
655
Lesson 2
656
Index
659
What do you think of this book? We want to hear from you!
Microsoft is interested in hearing your feedback so we can continually improve our
books and learning resources for you. To participate in a brief online survey, please visit:
www.microsoft.com/learning/booksurvey/
xvi
Contents
Introduction
W
hen Microsoft Learning puts together exam objectives for an exam, it doesn’t randomly
select pages from TechNet. Instead, in conjunction with subject matter experts and
representatives of the product team, it puts together a list of tasks and areas of knowledge
that represents what someone in a speciic job role would do and need to know on a day-today, a weekly, or even a monthly basis.
Each exam maps to a different job role. The objectives for the 70-411 exam are a list of
tasks and areas of knowledge that describe what an administrator of the Windows Server
2012 and Windows Server 2012 R2 operating systems with several years of on-the-job
experience (managing other server operating systems as well as Windows Server 2012 and
Windows Server 2012 R2) does and understands. The objectives don’t cover everything that a
Windows Server systems administrator would know, and there will be tasks and areas that will
be relevant to one person’s real world role and not another, but the exam objectives provide
a reasonable approximation of that role.
This book covers the majority of the topics and skills that are the subject of the Microsoft
certiication exam 70-411. The idea behind this book is that by reading it, you can learn how
to perform tasks you may need to perform on a day-to-day basis in your role as a Windows
Server administrator. Using the exam objectives as a working deinition of that role has
the additional beneit of giving you a better understanding of the topics and tasks listed
on the 70-411 exam objectives. This book will assist you in preparing for the exam, but it’s
not a complete exam preparation solution. If you are preparing for the exam, you should
use additional study materials, such as practice tests and Exam Ref 70-411: Administering
Windows Server 2012 R2 (Microsoft Press, 2014) to help bolster your real-world experience.
For your reference, a mapping of the topics in this book to the exam objectives is included in
the back of the book in the Objectives Map.
By using this training guide, you will learn how to do the following:
■
Deploy, manage, and maintain servers
■
Conigure ile and print services
■
Conigure network services and access
■
Conigure a network policy server infrastructure
■
Conigure and manage Active Directory
■
Conigure and manage Group Policy
Introduction xvii
System requirements
The following are the minimum system requirements your computer needs to meet to
complete the practice exercises in this book. This book is designed assuming you will be using
Hyper-V—either the client version available with some editions of Windows 8, Windows 8.1
or the version available in Windows Server 2012 or Windows Server 2012 R2. You can use
other virtualization software instead, such as VirtualBox or VMWare Workstation, but the
practice setup instructions assume that you are using Hyper-V.
Hardware and software requirements
This section presents the hardware requirements for Hyper-V and the software requirements.
Virtualization hardware requirements
If you choose to use virtualization software, you need only one physical computer to perform
the exercises in this book. That physical host computer must meet the following minimum
hardware requirements:
■
x64-based processor that includes both hardware-assisted virtualization (AMD-V
or Intel VT) and hardware data execution protection. (On AMD systems, the data
execution protection feature is called the No Execute or NX bit. On Intel systems, this
feature is called the Execute Disable or XD bit.) These features must also be enabled
in the BIOS. (Note: You can run Windows Virtual PC without Intel-VT or AMD-V.) If
you want to use Hyper-V on Windows 8 or Windows 8.1, you need a processor that
supports Second Level Address Translation (SLAT).
■
8 GB of RAM (more is recommended).
■
80 GB of available hard disk space.
■
Internet connectivity.
Software requirements
The following software is required to complete the practice exercises:
■
xviii Introduction
Windows Server 2012 R2 evaluation. You can download an evaluation edition of
Windows Server 2012 R2 in iso format from the Windows Server and Cloud Platform
website at http://www.microsoft.com/server.
Virtual Machine setup instructions
The instructions for building the virtual machine environment that allow you to perform the
exercises in this book are located here.
This set of exercises contains abbreviated instructions for setting up the SYD-DC, MEL-DC,
ADL-DC, and CBR-DC computers used in the practice exercises in all chapters of this training
guide. To perform these exercises, irst install Windows Server 2012 R2 Standard edition using
the default coniguration, setting the administrator password to Pa$$w0rd.
Exercise 1: SYD-DC to function as a Windows Server 2012
R2 domain controller
1.
Log on to the irst computer on which you have installed Windows Server 2012 R2
using the Administrator account and the password Pa$$w0rd.
2.
Open an elevated PowerShell prompt and issue the following commands:
New-NetIPAddress -InterfaceAlias Ethernet -IPAddress 10.10.10.10 -PrefixLength 24
Rename-Computer SYD-DC
Restart-Computer
3.
Restart the computer and log back on using the Administrator account.
4.
Open an elevated PowerShell prompt and issue the following command:
Install-WindowsFeature AD-Domain-Services -IncludeManagementTools
5.
Open the Server Manager console. Click the Refresh icon.
6.
Click on the Notiications icon and then click Promote This Server to Domain
Controller.
7.
On the Deployment Coniguration page, choose Add a New Forest. Enter Contoso.
com as the root domain name and then click Next.
8.
On the Domain Controller Options page, conigure the following settings and then
click Next:
9.
■
Forest Functional Level: Windows Server 2012 R2
■
Domain Functional Level: Windows Server 2012 R2
■
Domain Name System (DNS) Server: Enabled
■
Global Catalog: Enabled
■
DSRM Password: Pa$$w0rd
On the DNS Options page, click Next.
10. On the Additional Options page, click Next.
Introduction xix
11. Accept the default settings for the Database, Log Files, and SYSVOL locations and click
Next.
12. On the Review Options page, click Next.
13. On the Prerequisites Check page, click Install.
14. The computer will restart automatically.
Exercise 2: Prepare Active Directory Domain Server (AD DS)
1.
Log on to server SYD-DC using the Administrator account.
2.
Using Active Directory Users and Computers, create a user account named don_funk
in the Users container and assign the account the password Pa$$w0rd. Conigure the
password to never expire. Add this user account to the Enterprise Admins, Domain
Admins, and Schema Admins groups.
3.
Open the DNS console and create a primary IPv4 Reverse Lookup Zone for the subnet
10.10.10.x. Ensure that the zone is stored within AD DS and is replicated to all DNS
servers running on domain controllers in the forest and allows only secure dynamic
updates.
4.
Open an elevated PowerShell prompt and issue the following command:
Set-DNSClientServerAddress -InterfaceAlias Ethernet -ServerAddresses 10.10.10.10
Exercise 3: Prepare ADL-DC
1.
Ensure that computer SYD-DC is turned on and connected to the network or virtual
network to which the second computer is connected.
2.
Log on to the second computer on which you have installed Windows Server 2012 R2
using the Administrator account and the password Pa$$w0rd.
3.
Open an elevated PowerShell prompt and issue the following commands:
New-NetIPAddress -InterfaceAlias Ethernet -IPAddress 10.10.10.20 -PrefixLength 24
Set-DNSClientServerAddress -InterfaceAlias Ethernet -ServerAddresses 10.10.10.10
Rename-Computer ADL-DC
Restart-Computer
4.
After the computer restarts, log on again using the Administrator account.
5.
Shut down the computer.
xx Introduction
Exercise 4: Prepare CBR-DC
1.
Ensure that computer SYD-DC is turned on and connected to the network or virtual
network to which the second computer is connected.
2.
Log on to the third computer on which you have installed Windows Server 2012 R2
using the Administrator account and the password Pa$$w0rd.
3.
Open an elevated PowerShell prompt and issue the following commands:
New-NetIPAddress -InterfaceAlias Ethernet -IPAddress 10.10.10.30 -PrefixLength 24
Set-DNSClientServerAddress -InterfaceAlias Ethernet -ServerAddresses 10.10.10.10
Rename-Computer CBR-DC
Restart-Computer
4.
Restart the computer and then log on again using the Administrator account.
5.
Shut down the computer.
Exercise 5: Prepare MEL-DC
1.
Ensure that computer SYD-DC is turned on and connected to the network or virtual
network to which the second computer is connected.
2.
Log on to the third computer on which you have installed Windows Server 2012 R2
using the Administrator account and the password Pa$$w0rd.
3.
Open an elevated PowerShell prompt and issue the following commands:
New-NetIPAddress -InterfaceAlias Ethernet -IPAddress 10.10.10.40 -PrefixLength 24
Set-DNSClientServerAddress -InterfaceAlias Ethernet -ServerAddresses 10.10.10.10
Rename-Computer MEL-DC
Restart-Computer
4.
Restart the computer and then log on again using the Administrator account.
5.
Shut down the computer.
Exercise 6: Checkpoint all virtual machines
1.
Checkpoint all virtual machines. This is the state that they need to be in prior to
performing exercises. Checkpoints were termed snapshots in prior versions of Hyper-V.
Acknowledgments
I’d like to thank the following people for their dedication and help in getting this book
written: Karen Szall , Troy Mott, Telmo Sampaio and Christina Rudloff.
Introduction xxi
Errata, updates, & book support
We’ve made every effort to ensure the accuracy of this book. You can access updates to this
book—in the form of a list of submitted errata and their related corrections—at:
http://aka.ms/TG411R2
If you discover an error that is not already listed, please submit it to us at the same page.
If you need additional support, email Microsoft Press Book Support at mspinput@
microsoft.com.
Please note that product support for Microsoft software and hardware is not offered
through the previous addresses. For help with Microsoft software or hardware, go to http://
support.microsoft.com.
We want to hear from you
At Microsoft Press, your satisfaction is our top priority, and your feedback our most valuable
asset. Please tell us what you think of this book at:
http://aka.ms/tellpress
The survey is short, and we read every one of your comments and ideas. Thanks in
advance for your input!
Stay in touch
Let’s keep the conversation going! We’re on Twitter: http://twitter.com/MicrosoftPress.
xxii Introduction
CHAPTER 5
Managing Group Policy
application and infrastructure
here is far more to managing Group Policy than knowing the location of speciic policy
items. After your environment has more than a couple of Group Policy Objects (GPOs),
you have to start thinking about issues such as how they apply, who can edit them, what to
do if substantive changes in policy need to be rolled back, and how you can track changes
in Group Policy over time. In this chapter, you’ll learn how to back up, restore, import, and
export GPOs. You’ll learn how to delegate the process of editing and applying GPOs, and
how to resolve coniguration problems related to the application of Group Policy.
T
Lessons in this chapter:
241
■
Lesson 1: Maintaining Group Policy Object
■
Lesson 2: Managing the application of Group Policy
253
Before you begin
To complete the practice exercises in this chapter:
■
You need to have deployed computers SYD-DC, MEL-DC, and ADL-DC, as described
in the Introduction, using the evaluation edition of Windows Server 2012 R2.
Lesson 1: Maintaining Group Policy Object
As an experienced systems administrator pursuing certiication, you have a reasonable
idea of how to use Group Policy. The administration of Group Policy doesn’t just occur at
the level of coniguring individual policies. In large organizations with many policies, it’s
necessary to have a maintenance strategy. Ensuring that important Group Policy Objects
(GPOs) are backed up and recoverable is as important as backing up and recovering other
critical services such as DNS and Dynamic Host Coniguration Protocol (DHCP). In this
lesson, you’ll learn how to back up, restore, import, and copy GPOs. You’ll also learn how to
delegate the management of GPOs.
241
After this lesson, you will be able to:
■
Back up, import, copy, and restore GPOs.
■
Migrate GPOs between domains and forests.
■
Delegate GPO management.
Estimated lesson time: 45 minutes
Managing Group Policy Objects
As an experienced systems administrator, you are aware that GPOs enable you to conigure
settings for multiple users and computers. After you get beyond editing GPOs to conigure
settings, you need to start thinking about issues such as GPO maintenance. For example, if an
important document is lost, you need to know how to recover it from backup. Do you know
what to do if someone accidentally deletes a GPO that has hundreds of settings conigured
over a long period of time?
The main tool you’ll use for managing GPOs is the Group Policy Management Console
(GPMC), shown in Figure 5-1. You can use this console to back up, restore, import, copy, and
migrate. You can also use this console to delegate GPO management tasks.
FIGURE 5-1 GPMC
There are also a substantial number of cmdlets available in the Windows PowerShell Group
Policy module, including the following:
242
■
Get-GPO
■
Backup-GPO
Enables you to back up GPOs.
■
Import-GPO
Enables you to import a backed-up GPO into a speciied GPO.
Chapter 5
Enables you to view GPOs. The output of this cmdlet is shown in Figure 5-2.
Managing Group Policy application and infrastructure
■
New-GPO
Enables you to create a new GPO.
■
Copy-GPO
Enables you to copy a GPO.
■
Rename-GPO
Enables you to change a GPO’s name.
■
Restore-GPO
Enables you to restore a backed-up GPO to its original location.
■
Remove-GPO
Enables you to remove a GPO.
FIGURE 5-2 Output of the Get-GPO cmdlet
Backing up a GPO enables you to create a copy of a GPO as it exists at a speciic point in
time. A user must have read permission on a GPO to back it up. When you back up a GPO,
the backup version of the GPO is incremented. It is good practice to back up GPOs prior to
editing them so that if something goes wrong, you can revert to the unmodiied GPO.
REAL WORLD
BACKING UP GPOS
If your organization doesn’t have access to the Microsoft Desktop Optimization Pack
(MDOP), you should back up GPOs before you or other people modify them. If a problem
occurs, it’s quicker to restore a backup than it is to reconigure the modiied GPO with
the existing settings. MDOP provides the ability to use GPO versioning as well as other
advanced functionality.
To back up a GPO, perform the following steps:
Lesson 1: Maintaining Group Policy Object
CHAPTER 5
243
1.
Open the GPMC.
2.
Right-click the GPO that you want to back up, and click Back Up.In the Back Up Group
Policy Object dialog box, shown in Figure 5-3, enter the location of the backup and a
description for the backup.
FIGURE 5-3 Backing up a GPO
You can restore a GPO using the Restore-GPO cmdlet. Restoring a GPO overwrites the
current version of the GPO if one exists or re-creates the GPO if the GPO has been deleted.
To restore a GPO, right-click the Group Policy Objects node in the GPMC, and click Manage
Backups. In the Manage Backups dialog box, shown in Figure 5-4, select the GPO that you
want to restore and click Restore. If multiple backups of the same GPO exist, you can select
which version of a GPO to restore.
244
Chapter 5
Managing Group Policy application and infrastructure
FIGURE 5-4 Restoring a GPO from backup
Import and copy GPOs
Importing a GPO enables you to take the settings in a backed-up GPO and import them into
an existing GPO. To import a GPO, perform the following steps:
1.
Right-click an existing GPO in the GPMC and click Import Settings.
2.
In the Import Settings Wizard, you are given the option of backing up the destination
GPO’s settings. This enables you to roll back the import.
3.
Specify the folder that hosts the backed-up GPO.
4.
On the Source GPO page of the Import Settings Wizard, shown in Figure 5-5, select the
source GPO. You can view the settings that have been conigured in the source GPO
prior to importing it. Complete the wizard to inish importing the settings.
Lesson 1: Maintaining Group Policy Object
CHAPTER 5
245
FIGURE 5-5 Importing GPO settings
Remember that when you import settings from a backed-up GPO, the settings in the
backed-up GPO overwrite the settings in the destination GPO.
Key
Copying a GPO creates a new GPO and copies all coniguration settings from the original
to the new. You can copy GPOs from one domain to another. You can also use a migration
table when copying a GPO to map security principals referenced in the source domain to
security principals referenced in the destination domain.
To copy a GPO, perform the following steps:
1.
Right-click the GPO that you want to copy and click Copy.
2.
Right-click the location that you want to copy the GPO to and click Paste.
3.
In the Copy GPO dialog box, choose between using the default permissions and
preserving the existing permissions assigned to the GPO (see Figure 5-6).
FIGURE 5-6 Copying a GPO
Fixing GPO problems
Windows Server 2012 and Windows Server 2012 R2 include command line utilities that allow
you to repair GPO after you perform a domain rename or recreate default GPOs. If you need
to recreate the default GPOs for a domain, use the DCGPOFix.exe command. If you perform
246
Chapter 5
Managing Group Policy application and infrastructure
a domain rename, you can use the GPFixup.exe command to repair name dependencies in
GPOs and Group Policy links.
Migrate Group Policy Objects
When moving GPOs between domains or forests, you need to ensure that any domainspeciic information is accounted for, so locations and security principals in the source domain
aren’t used in the destination domain. You can account for these locations and security
principals using migration tables. You use migration tables when copying or importing GPOs.
Migration tables enable you to alter references when moving a GPO from one domain to
another, or from one forest to another. An example is when you are using GPOs for software
deployment and need to replace the address of a shared folder that hosts a software
installation ile so that it is relevant to the target domain. You can open the Migration Table
Editor (MTE), shown in Figure 5-7, by right-clicking Domains in the GPMC, and clicking Open
Migration Table Editor.
FIGURE 5-7 Opening the MTE
When you use the MTE, you can choose to populate from a GPO that is in the current
domain, or choose to populate the MTE from a backed-up GPO. When you perform this
action, the MTE will be populated with settings that reference local objects. If, when you
perform this action, there are no results, then no local locations are referenced in the GPO
that you are going to migrate.
MORE INFO
WORKING WITH MIGRATION TABLES
You can learn more about working with migration tables at http://technet.microsoft.com/
en-us/library/cc754682.aspx.
Lesson 1: Maintaining Group Policy Object
CHAPTER 5
247
Delegate GPO management
Key
In larger environments, there is more than one person in the IT department. In very large
organizations, one person’s entire job responsibility might be creating and editing GPOs.
Delegation enables you to grant the permission to perform speciic tasks to a speciic user
or group of users. You can delegate some or all of the following Group Policy management
tasks:
■
GPO creation
■
GPO modiication
■
GPO linking to speciic sites, organizational units (OUs), or domains
■
Permission to perform Group Policy Modeling analysis at the OU or domain level
■
Permission to view
■
Group Policy Results information at the OU, or domain level
■
Windows Management Instrumentation (WMI) ilter creation
Users in the Domain Admins and Enterprise Admins groups can perform all Group Policy
management tasks. Users that are members of the Group Policy Creator Owners domain
group can create GPOs. They also have the right to edit and delete any GPOs that they have
created.
You can delegate permissions to GPOs directly using the GPMC, as shown in Figure 5-8.
FIGURE 5-8 Group Policy permissions
248
Chapter 5
Managing Group Policy application and infrastructure
Creating GPOs
If you want to delegate the ability for users to create GPOs, you can add them to the Group
Policy Creator Owners group. You can also explicitly grant them permission to create GPOs
using the GPMC. To do this, perform the following steps:
1.
Open the GPMC from the Tools menu of Server Manager.
2.
Expand the domain in which you want to delegate the ability to create GPOs, click
Group Policy Objects, and click the Delegation tab.
3.
Click Add and select the group or user that you want to give the ability to create GPOs
in that domain.
Quick check
■
What group should you add users to if you want to enable them to create GPOs in the
domain, but not add them to the Domain Admins or Enterprise Admins groups?
Quick check answer
■
Add them to the Group Policy Creator Owner group.
Editing GPOs
To edit a GPO, users must be either a member of the Domain Admins or Enterprise Admins
group. They can edit a GPO if they created it. They can also edit a GPO if they have been
given Read/Write permissions on the GPO through the GPMC.
To grant a user permission to edit a GPO, perform the following steps:
1.
Click the GPO in the GPMC.
2.
Click the Delegation tab, as shown in Figure 5-9.
3.
Click Add, specify the user or group that should have permission to edit the GPO, and
then specify the permissions that you want to give this user or group. You can choose
from one of the following permissions:
■
Read
■
Edit Settings
■
Edit Settings, Delete, Modify Security
Lesson 1: Maintaining Group Policy Object
CHAPTER 5
249
FIGURE 5-9 Delegating permissions
Linking GPOs
To enable a user to link a GPO to a speciic object, you need to edit the permission on that
object. You can perform this task in the GPMC, as shown in Figure 5-10. For example, to grant
a user or group permission to link a GPO to an OU, select the OU in the GPMC, select the
Delegation tab, click Add, and then select the user or group to which you want to grant this
permission.
FIGURE 5-10 Delegating link GPO permission
250
Chapter 5
Managing Group Policy application and infrastructure
Modeling, results, and WMI ilters
Key
Delegating permissions to perform tasks related to Group Policy Modeling and Group Policy
Results is performed at the domain level, as shown in Figure 5-11. You can delegate the
ability to create WMI ilters by selecting the WMI Filters node in the GPMC and granting the
permission on the Delegation tab.
FIGURE 5-11 Delegating Group Policy Modeling and Group Policy Results permissions
Lesson summary
■
Each time you back up a GPO, it creates a copy of that GPO at a particular point in
time.
■
Restoring a GPO overwrites the existing GPO if it still exists, or recovers it if it has been
deleted.
■
Importing a GPO overwrites the settings in the destination GPO with the settings from
the imported GPO.
■
Copying a GPO creates a duplicate of the GPO.
■
You use migration tables when moving GPOs between domains and forests to account
for local references in the source domain.
■
You can delegate the permission to create, edit, and link using the GPMC. Nonadministrative users can then perform some Group Policy tasks, such as editing
policies, without giving them unnecessary privileges.
Lesson 1: Maintaining Group Policy Object
CHAPTER 5
251
Lesson review
Answer the following questions to test your knowledge of the information in this lesson. You
can ind the answers to these questions and explanations of why each answer choice is correct
or incorrect in the “Answers” section at the end of this chapter.
You have 200 individual GPO settings in a backed-up GPO named Melbourne-2012
that you want to include in an existing GPO named Sydney-2013. Which of the
following Windows PowerShell cmdlets should you use to accomplish this goal?
1.
a.
Backup-GPO
B.
Import-GPO
C.
Restore-GPO
D.
Copy-GPO
Prior to editing a Group Policy, your assistant makes a backup of the GPO that she is
going to edit. Unfortunately, she makes a mistake in coniguring the GPO. You need
to revert the GPO to the state it was in prior to your assistant’s edits. Which of the
following Windows PowerShell cmdlets should you use to accomplish this goal?
2.
a.
Copy-GPO
B.
Restore-GPO
C.
Import-GPO
D.
Backup-GPO
You want to copy a GPO from one domain to another in a forest. Which tool should
you use to ensure that references to objects in the source domain updated are relevant
to the destination domain? (Choose all that apply.)
3.
a.
Active Directory Sites and Services
B.
Active Directory Users and Computers
C.
Migration Table Editor
D.
Group Policy Management Editor
Which of the following security groups have the right to create GPOs by default?
(Choose all that apply.)
4.
a.
Group Policy Creator Owners
B.
Enterprise Admins
C.
Domain Admins
D.
Domain Controllers
You are about to make substantial modiications to the default domain GPO. You want
to ensure that you can return to the current state of the GPO if the modiications cause
problems. Which of the following Windows PowerShell cmdlets should you use?
5.
a.
252
Chapter 5
Copy-GPO
Managing Group Policy application and infrastructure
B.
Restore-GPO
C.
Import-GPO
D.
Backup-GPO
Lesson 2: Managing Group Policy application
For environments in which you need to apply more than one Group Policy, understanding
the rules of precedence is critical. Not only do you need to understand that where you apply
a Group Policy determines its overall inluence but also that GPOs may or may not apply due
to inheritance blocks, security iltering, or loopback processing. In this lesson, you’ll learn the
rules on Group Policy application and how to determine which Group Policy settings have
precedence in complex environments.
After this lesson, you will be able to:
■
Determine policy processing order and precedence.
■
Conigure policy enforcement and blocking.
■
Perform Group Policy security iltering.
■
Conigure WMI iltering.
■
Enable loopback processing.
■
Conigure slow-link processing.
Estimated lesson time: 45 minutes
Policy processing precedence
Key
In organizations with large Group Policy deployments, multiple GPOs might apply to a single
user account or computer account; or when a user is signed on to a speciic computer, to
both. Group Policy processing precedence is the set of rules that determines which Group
Policy items apply when multiple GPOs are conigured.
Group Policies are processed in the following manner:
■
■
Local Settings conigured at the local level apply irst. If multiple local policies apply,
settings in machine policies apply irst, settings in admin and nonadmin local policies
override them, and settings in per-user policies override any conigured at the machine
and admin/nonadmin level.
Site Policies based on location apply next. Any settings conigured at the site
level override settings conigured at the local level. You can link multiple GPOs at
the site level. When you do this, policies with a lower numerical link order override
policies with a higher numerical link order. For example in Figure 5-12, settings in
Lesson 2: Managing Group Policy application
CHAPTER 5
253
the Melbourne-Computer policy override settings conigured in the Melbourne-User
policy.
FIGURE 5-12 GPO link order
■
Domain Settings applied at the domain level override settings applied at the site and
local levels. You can link multiple GPOs at the domain level. The Default Domain Policy
is linked at this level.
■
Organizational unit (OU) Settings applied at the organizational unit level override
settings applied at the domain, site, and local levels. When an account is a member of
a child OU, policies applied at the child OU level override policies applied at the parent
OU level. You can apply multiple GPOs at the OU level. Policies with a lower numerical
link order override policies with a higher numerical link order.
Group Policy processing precedence is relevant only when there are conlicts in policies. If
policy A applies at the domain level, and policy B applies at the OU level, both policy A and
policy B apply.
Policy enforcement and blocking
When coniguring a Group Policy, you can choose to enforce that policy. To enforce a Group
Policy, right-click that policy at the location in which you link the policy and then click
Enforced. When you choose to enforce a policy, that policy will apply and override settings
conigured at other levels. For example, normally a policy linked at the OU level would
override a policy linked at the domain level. If you conigure the policy at the domain level as
Enforced, it instead overrides the policy linked at the OU level.
254
Chapter 5
Managing Group Policy application and infrastructure
Key
The Block Inheritance function enables you to block policies applied at earlier levels.
For example, you can use Block Inheritance at the OU level to block policies applied at the
domain and site level. Block Inheritance does not stop the application of policies conigured
as Enforced. For example, Figure 5-13 shows the Research OU conigured with the Block
Inheritance setting. The Melbourne-Computer policy, applied at the domain level as Enforced,
still applies because a setting of Enforced overrides a setting of Block Inheritance.
FIGURE 5-13 Override versus Enforced
Group Policy security iltering
Key
Security iltering enables you to conigure permissions on GPOs. By default, Group Policies
apply to the Authenticated Users group. By changing the default permissions, you can make
the Group Policy apply only to a speciic group. For example, if you remove the Authenticated
Users group and add another security group such as the Melbourne-Users group (shown in
Figure 5-14), the Group Policy applies to only that conigured security group.
Lesson 2: Managing Group Policy application
CHAPTER 5
255
FIGURE 5-14 Security filtering
When considering whether to use security iltering, keep the following in mind:
■
■
A security ilter applies to the GPO, so it applies wherever the GPO is linked. You can’t
have one security ilter apply to the GPO when linked at the domain level, and another
security ilter apply to the GPO when linked at the OU level.
Filtered policies still need to be checked during the Group Policy processing process,
which can increase the amount of time spent on Group Policy processing. Startup and
logon times may increase.
It is also possible to apply a Deny permission on the basis of security account or group.
Deny permissions override Allow permissions. You block a particular security group from
receiving a Group Policy by setting the Apply Group Policy (Deny) advanced permission, as
shown for the Sydney-Users group for the Melbourne-General GPO in Figure 5-15. You can
do this on the Delegation tab of a GPO’s properties instead of the Scope tab.
256
Chapter 5
Managing Group Policy application and infrastructure
FIGURE 5-15 Security filtering
Quick check
■
How would you block a GPO from applying to members of a particular security group?
Quick check answer
■
Conigure an Apply Group Policy (Deny) advanced permission on the Delegation
tab of a GPO’s properties.
Group Policy WMI iltering
WMI iltering enables you to ilter the application of policy based on the results of a WMI
query. For example, you might write a WMI query to determine whether a computer has an
x86 or x64 processor, or whether there is more than a certain amount of disk space available.
WMI queries are often used with policies related to software deployment to determine
whether the target computer has the appropriate system resources to support the installation
of the application.
The drawback of WMI queries is that they are complicated for systems administrators who
are unfamiliar with programming beyond simple scripting. WMI queries also cause signiicant
delays in Group Policy processing. In environments in which sophisticated logic needs to be
applied to targeted application distribution, products such as Microsoft System Center 2012
Coniguration Manager are more appropriate. System Center 2012 Coniguration Manager
enables administrators performing software deployment to conigure ways of checking
hardware coniguration prior to software deployment that do not require writing queries in
WMI Query Language (WQL).
Lesson 2: Managing Group Policy application
CHAPTER 5
257
You can create WMI ilters by using the New WMI Filter dialog box (shown in Figure 5-16).
FIGURE 5-16 Creating a WMI filter
MORE INFO
WMI QUERIES
You can learn more about WMI queries at http://msdn.microsoft.com/en-us/library/
ms186146(VS.80).aspx.
Loopback processing
As you are aware, each GPO has two distinct sections: Computer Coniguration and User
Coniguration (see Figure 5-17). The resultant policies for a user are based on the cumulative
user coniguration settings in GPOs that apply to the user’s accounts at the site, domain, and
OU setting. The resultant computer policies are applied based on the cumulative computer
coniguration settings in GPOs that apply to the computer’s account at the site, domain, and
OU level.
FIGURE 5-17 GPO structure
258
Chapter 5
Managing Group Policy application and infrastructure
Key
In some situations, you’ll want only the GPOs that apply to the computer account to apply.
You might want to do this with conference room computers, for which you want people to be
able to sign on with domain accounts but to have a very controlled coniguration. When you
enable loopback processing, user settings are determined based on the settings in the User
Coniguration settings area of GPOs that apply to the computer account.
There are two types of loopback processing that you can conigure by setting the Group
Policy loopback processing mode policy, shown in Figure 5-18, and located under Computer
Coniguration\Administrative Templates\System\Group Policy: Replace And Merge.
■
■
Replace When you conigure Replace, only the GPOs that apply to the computer
account will apply. Settings in the User Coniguration area of the GPOs that apply to
the computer account will apply.
Merge The settings in the User Coniguration area of GPOs that apply to the user
account will still apply, but will be overridden by settings in the User Coniguration area
of GPOs that apply to the computer account.
FIGURE 5-18 Loopback processing policy
Lesson 2: Managing Group Policy application
CHAPTER 5
259
Key
Slow-link processing enables you to conigure Group Policy application to be performed
in a different manner, depending on the speed of the connection from the client to the
domain controller. It enables you to block activities such as software deployment when
the connection between Active Directory and the client is detected as falling below a
particular threshold. You conigure slow link detection by coniguring the Group Policy
slow link detection policy, as shown in Figure 5-19. This policy is located under Computer
Coniguration\Administrative Templates\System\Group Policy. When a slow link is detected,
registry settings from administrative templates, security policies, EFS recovery policy,
and IPsec policies are applied. Policies related to application deployment, scripts, folder
redirection, and disk quotas will not be applied.
FIGURE 5-19 Slow link detection
Group Policy caching
Group Policy caching reduces the amount of time taken to process Group Policy during
computer startup and user sign on. Rather than retrieve the Group Policies that apply to the
computer from a domain controller when a computer starts up or a user signs on, the client
will use a cached copy of the last Group Policies downloaded from the domain controller.
After this initial application of the cached policies during startup and user sign on, policies will
260
Chapter 5
Managing Group Policy application and infrastructure
be retrieved and applied normally from a domain controller. You enable Group Policy caching
by coniguring the Conigure Group Policy Caching policy as shown in Figure 5-20. This policy
is located under Computer Coniguration\Policies\Administrative Templates\System\Group
Policy. Group Policy caching applies only to computers running Windows Server 2012 R2,
Windows 8.1, or Windows RT 8.1.
FIGURE 5-20 Configure Group Policy caching
MORE INFO
GROUP POLICY CACHING
You can learn more about Group Policy caching by reading this blog post by Group
Policy MVP Darren Mar-Elia at http://sdmsoftware.com/group-policy-blog/group-policy/
understanding-group-policy-caching-in-windows-8-1/.
Force Group Policy update
Windows Server 2012 and later support remote Group Policy update. Remote Group Policy
update allows you to force a remote computer to perform a Group Policy update without
having to sign on to the computer and run the GPUpdate.exe command. Remote Group
Lesson 2: Managing Group Policy application
CHAPTER 5
261
Policy update will work on clients running the Windows Vista and later operating system.
Remote Group Policy requires the following irewall rules be enabled on clients:
■
Remote Scheduled Tasks Management (RPC)
■
Remote Scheduled Tasks Management (RPC-EPMAP)
■
Windows Management Instrumentation (WMI-In)
You can run remote Group Policy update from the Group Policy Management Console by
right-clicking on a container or OU. An update will run on all computers within the container
or OU as well as on any computer accounts stored within child OUs. Figure 5-21 shows the
result of running remote Group Policy update on the Domain Controllers container. You can
also use the Invoke-GPUpdate Windows PowerShell cmdlet to trigger a remote Group Policy
update. The advantage of the Windows PowerShell cmdlet is that you can target a speciic
computer rather than all computer accounts in an OU.
FIGURE 5-21 Remote Group Policy update
262
Chapter 5
Managing Group Policy application and infrastructure
MORE INFO
USING REMOTE GPUPDATE
You can learn more about remote Group Policy update at https://blogs.technet.com/b/
grouppolicy/archive/2012/11/27/group-policy-in-windows-server-2012-using-remotegpupdate.aspx.
Lesson summary
■
Group Policies are processed in the following order: local, site, domain, and OU.
Policies processed later override policies processed earlier.
■
When there are parent and child OUs, and the user or computer account is a member
of the child OU, the policy applied at the child OU overrides policies applied at the
parent OU.
■
■
■
■
■
Policy processing order is important only when policies conlict.
A policy with the Override setting will override other policies in the processing order,
including when Block Inheritance has been conigured.
Security iltering applies on a GPO, no matter where it is linked.
Loopback processing enables GPO settings applied to the computer account to
override GPO settings applied to the user account.
Slow-link processing enables you to conigure policies not to be processed when low
bandwidth connections to Active Directory are detected.
■
Group Policy caching allows cached copies of GPOs that apply to users and computers
to be applied at startup and sign on.
■
Remote Group Policy update allows you to force a Group Policy update on a remote
client. Remote Group Policy update requires that 3 irewall rules be conigured on
clients.
Lesson review
Answer the following questions to test your knowledge of the information in this lesson. You
can ind the answers to these questions and explanations of why each answer choice is correct
or incorrect in the “Answers” section at the end of this chapter.
1.
You want to ensure that a Group Policy applies only to computers that have more
than 2 gigabytes (GB) of disk space. Which of the following should you conigure to
accomplish this goal?
a.
Security iltering
B.
WMI iltering
C.
Loopback processing
D.
Slow-link processing
Lesson 2: Managing Group Policy application
CHAPTER 5
263
A Group Policy named Alpha applies at the site level. A Group Policy named Beta is
assigned link order 2 at the domain level. A Group Policy named Gamma is assigned
link order 1 at the domain level. A Group Policy named Delta is assigned to the
Research OU. A computer account is located in the Research OU. If the same setting
is conigured differently in the Alpha, Beta, Gamma, and Delta GPOs, which GPO’s
version of this setting will apply to the computer?
2.
a.
Alpha
B.
Beta
C.
Gamma
D.
Delta
A Group Policy named Alpha applies at the site level. A Group Policy named Beta is
assigned link order 2 at the domain level. A Group Policy named Gamma is assigned
link order 1 at the domain level. A Group Policy named Delta is assigned to the
Research OU. A computer account is located in the Research OU. GPO Gamma is
conigured with the No Override setting. If the same setting is conigured differently in
the Alpha, Beta, Gamma, and Delta GPOs, which GPO’s version of this setting will apply
to the computer?
3.
a.
Alpha
B.
Beta
C.
Gamma
D.
Delta
A Group Policy named Alpha applies at the site level. A Group Policy named Beta
is assigned link order 2 at the domain level. A Group Policy named Gamma is
assigned link order 1 at the domain level. A Group Policy named Delta is assigned
to the Research OU. A computer account is located in the Research OU. GPO Beta is
conigured with the No Override setting. OU Research is conigured with the Block
Inheritance setting. If the same setting is conigured differently in GPOs Alpha, Beta,
Gamma, and Delta, which GPO’s version of this setting will apply to the computer?
4.
a.
Alpha
B.
Beta
C.
Gamma
D.
Delta
You have a policy applied at the domain level that you don’t want applied to ive
computers in your organization. Which of the following should you conigure to
accomplish this goal?
5.
264
a.
Security iltering
B.
WMI iltering
C.
Loopback processing
D.
Slow-link processing
Chapter 5
Managing Group Policy application and infrastructure
Practice exercises
The goal of this section is to provide you with hands-on practice with the following:
■
Creating, backing up, and restoring GPOs
■
Delegating GPO permissions
■
Enabling loopback processing
■
Coniguring blocking and enforcement
■
Coniguring GPO security iltering
To perform the exercises in this section, you need access to an evaluation version of
Windows Server 2012 R2. You should also have access to virtual machines SYD-DC, MEL-DC,
CBR-DC, and ADL-DC, the setup instructions for which are described in the Introduction. You
should ensure that you have a checkpoint of these virtual machines that you can revert to at
the end of the practice exercises. You should revert the virtual machines to this initial state
prior to beginning these exercises.
Exercise 1: Prepare GPOs, security groups, and OUs
In this exercise, you prepare GPOs. To complete this exercise, perform the following steps:
1.
Sign in to SYD-DC with the Contoso\Administrator account.
2.
In Server Manager, click the Tools menu, and click Group Policy Management.
3.
Expand the Forest: Contoso.com\Domains\Contoso.com node and click Group Policy
Objects, as shown in Figure 5-22.
FIGURE 5-22 Clicking Group Policy Objects
Practice exercises
CHAPTER 5
265
4.
On the Action menu, click New.
5.
In the New GPO dialog box, type Melbourne, as shown in Figure 5-23, and click OK.
FIGURE 5-23 New GPO dialog box
6.
Repeat steps 4 and 5 to create new GPOs named Sydney and Adelaide.
7.
Verify that there are ive GPOs listed, as shown in Figure 5-24.
FIGURE 5-24 Three new GPOs
266
8.
In Server Manager, click Active Directory Administrative Center.
9.
In Active Directory Administrative Center, click Contoso (Local), and then click Users, as
shown in Figure 5-25.
Chapter 5
Managing Group Policy application and infrastructure
FIGURE 5-25 Users container
10. In the Tasks pane, click New, and click Group.
11. In the Create Group dialog box, type the group name Melbourne_GPO_Editors; click
Security, Global, and Protect From Accidental Deletion, as shown in Figure 5-26; then
click OK.
FIGURE 5-26 Creating a security group
Practice exercises
CHAPTER 5
267
12. Repeat steps 10 and 11 to create the Adelaide_Computers security group.
13. In the Active Directory Administrative Center, in the Tasks pane, under Contoso (Local),
click New, and then click Organizational Unit.
14. In the Create Organizational Unit dialog box, type the name Melbourne_Computers,
as shown in Figure 5-27, and click OK.
FIGURE 5-27 Create Organizational Unit dialog box
15. Close the Active Directory Administrative Center.
16. On the taskbar, click File Manager.
17. In File Manager, click Computer, and then double-click Local Disk (C:) .
18. On the title bar of the Local Disk (C:) window, click the New Folder icon.
19. Name the new folder GPO_Backup.
20. Close the Local Disk (C:) window.
Exercise 2: Manage GPOs
In this exercise, you perform several Group Policy management-related tasks. To complete
this exercise, perform the following steps:
268
1.
In the GPMC, click the Melbourne GPO.
2.
When the Melbourne GPO is selected, click the Delegation tab, as shown in Figure
5-28.
Chapter 5
Managing Group Policy application and infrastructure
FIGURE 5-28 OU Delegation tab
3.
On the Delegation tab, click Add.
4.
In the Select User, Computer, Or Group dialog box, type Melbourne_GPO_Editors,
click Check Names, and click OK.
5.
In the Add Group Or User dialog box, use the drop-down menu to select Edit Settings,
Delete, Modify Security, as shown in Figure 5-29, and click OK.
FIGURE 5-29 OU Delegation tab
6.
In the GPMC, click the Sydney GPO.
7.
On the Action menu, click Back Up.
8.
In the Back Up Group Policy Object dialog box, type C:\GPO_Backup as the location,
as shown in Figure 5-30, and click Back Up.
Practice exercises
CHAPTER 5
269
FIGURE 5-30 Back Up Group Policy Object dialog box
9.
In the Backup dialog box, click OK.
10. In the GPMC, click the Sydney GPO.
11. On the Action menu, click Delete.
12. In the Group Policy Management dialog box, click Yes.
13. Verify that the Sydney GPO is no longer listed under Group Policy Objects, as shown in
Figure 5-31.
FIGURE 5-31 Verify deleted GPO
14. Click Group Policy Objects. On the Action menu, click Manage Backups.
270
Chapter 5
Managing Group Policy application and infrastructure
15. In the Manage Backups dialog box, click the Sydney GPO, as shown in Figure 5-32, and
click Restore.
FIGURE 5-32 Manage Backups dialog box
16. In the Group Policy Management dialog box, click OK.
17. In the Restore dialog box, click OK.
18. In the Manage Backups dialog box, click Close.
19. Verify the presence of the Sydney GPO in the list of Group Policy Objects.
Exercise 3: Manage Group Policy processing
In this exercise, you perform Group Policy management tasks related to Group Policy
processing. To complete this exercise, perform the following steps:
1.
In the GPMC, click the Adelaide GPO.
2.
On the Action menu, click Edit.
3.
In the Group Policy Management Editor, expand the Computer Coniguration\
Administrative Templates\System\Group Policy node and select the Conigure User
Group Policy loopback processing mode policy, as shown in Figure 5-33.
Practice exercises
CHAPTER 5
271
FIGURE 5-33 Select Group Policy loopback processing mode policy
4.
On the Action menu, click Edit.
5.
In the Conigure User Group Policy Loopback Processing Mode dialog box, click
Enabled. Set the mode to Replace, as shown in Figure 5-34, and click OK.
FIGURE 5-34 Configure replace mode
272
Chapter 5
Managing Group Policy application and infrastructure
6.
Close the Group Policy Management Editor.
7.
In the GPMC, click the Adelaide GPO, and click the Scope tab.
8.
On the Scope tab, click the Authenticated Users group, and click Remove.
9.
In the Group Policy Management dialog box, click OK.
10. Under Security Filtering, click Add.
11. In the Select User, Computer, Or Group dialog box, type Adelaide_Computers, click
Check Names, and click OK.
12. Verify that the security iltering properties of the Adelaide GPO match those in Figure
5-35.
FIGURE 5-35 Configuring security filtering properties
13. In the GPMC, click Contoso.com, and click the Linked Group Policy Objects tab.
14. Click Contoso.com. On the Action menu, click Link An Existing GPO.
15. In the Select GPO dialog box, click Adelaide, as shown in Figure 5-36, and click OK.
Practice exercises
CHAPTER 5
273
FIGURE 5-36 Selecting the GPO to link
16. In the GPMC, verify that the Adelaide GPO and the Default Domain Policy GPO are
linked to the domain, as shown in Figure 5-37.
FIGURE 5-37 GPOs linked to the domain
Exercise 4: Group Policy inheritance and enforcement
In this exercise, you will perform Group Policy management tasks related to Group Policy
processing. To complete this exercise, perform the following steps:
274
Chapter 5
Managing Group Policy application and infrastructure
1.
In the GPMC, click the Melbourne_Computers OU.
2.
On the Action menu, click Block Inheritance.
3.
In the GPMC, click Contoso.com.
4.
On the Action menu, click Link An Existing GPO.
5.
In the Select GPO dialog box, click Melbourne, and then click OK.
6.
Click the Melbourne GPO under Contoso.com.
7.
On the Action menu, click Enforced.
8.
Verify that the GPMC shows the Melbourne policy as Enforced and the Melbourne_
Computers OU set to Block Inheritance, as shown in Figure 5-38.
FIGURE 5-38 Block Inheritance and Enforced GPOs
9.
In the GPMC, click the Group Policy Modeling node.
10. On the Action menu, click Group Policy Modeling Wizard.
11. On the Welcome page of the Group Policy Modeling Wizard, click Next.
12. On the Domain Controller Selection page, click This Domain Controller, and click SYD-
DC.contoso.com. Click Next.
13. On the User And Computer Selection page, click Browse next to Container in the
Computer Information section.
14. In the Choose Computer Container dialog box, click Melbourne_Computers, and click
OK.
15. Verify that the User And Computer Selection page matches Figure 5-39, and click Next.
Practice exercises
CHAPTER 5
275
FIGURE 5-39 Group Policy Modeling Wizard
16. On the Summary Of Selections page, click Next, and then click Finish.
17. In the Warning dialog box, click OK.
18. Verify that the report for the Melbourne_Computers OU matches Figure 5-40, and that
only the Melbourne GPO is listed.
FIGURE 5-40 Group Policy Modeling results
276
Chapter 5
Managing Group Policy application and infrastructure
Suggested practice exercises
The following additional practice exercises are designed to give you more opportunities to
practice what you’ve learned and to help you successfully master the lessons presented in this
chapter.
■
■
Exercise 1 Conigure GPO settings in the Melbourne GPO. Import these settings into
the Sydney GPO.
Exercise 2 Conigure the Melbourne GPO so that it will not apply to members of the
Adelaide_Computers group.
Suggested practice exercises
CHAPTER 5
277
Answers
This section contains the answers to the lesson review questions in this chapter.
Lesson 1
1.
2.
3.
4.
278
Correct answer: B
a.
Incorrect. You use the Backup-GPO cmdlet to back up an existing GPO.
B.
Correct. You use the Import-GPO cmdlet to import settings from a backed-up
GPO to an existing target GPO.
C.
Incorrect. You use the Restore-GPO cmdlet to restore a backed-up GPO to a
previous state.
D.
Incorrect. You use the Copy-GPO cmdlet to create a copy of an existing GPO.
Correct answer: B
a.
Incorrect. You use the Copy-GPO cmdlet to create a copy of an existing GPO.
B.
Correct. You use the Restore-GPO cmdlet to restore a backed-up GPO to a
previous state.
C.
Incorrect. You use the Import-GPO cmdlet to import settings from a backedup GPO to an existing target GPO. Although it would import the settings from
the backed-up GPO, it is possible that other settings not included in the original
backed-up GPO were conigured by your assistant.
D.
Incorrect. You use the Backup-GPO cmdlet to back up an existing GPO.
Correct answer: C
a.
Incorrect. You use the Active Directory Sites and Services console to manage
Active Directory sites. You can’t use this console to conigure GPO migration
settings.
B.
Incorrect. You use this console to manage Active Directory security principals and
containers. You can’t use this console to conigure GPO migration settings.
C.
Correct. You use this tool to conigure the migration table, which is necessary
when migrating objects from one domain or forest to another.
D.
Incorrect. You use this to edit GPOs. You can’t use this console to conigure GPO
migration settings.
Correct answers: A, B, and C
a.
Correct. Members of the Group Policy Creator Owners group can create GPOs by
default.
B.
Correct. Members of the Enterprise Admins group can create GPOs by default.
C.
Correct. Members of the Domain Admins group can create GPOs by default.
CHAPTER 5
Managing Group Policy application and infrastructure
D.
5.
Incorrect. The Domain Controllers group is a group for the accounts of domain
controllers. It does not grant any permissions on GPOs.
Correct answer: D
a.
Incorrect. You use the Copy-GPO cmdlet to create a copy of an existing GPO. It
does not allow you to revert the default domain GPO to its original state.
B.
Incorrect. You use the Restore-GPO cmdlet to restore a backed-up GPO to a
previous state. You need to create the backup irst.
C.
Incorrect. You use the Import-GPO cmdlet to import settings from a backed-up
GPO to an existing target GPO.
D.
Correct. You use the Backup-GPO cmdlet to back up an existing GPO.
Lesson 2
1.
2.
3.
Correct answer: B
a.
Incorrect. You use Security Filtering to ilter GPO application based on security
group membership.
B.
Correct. You can use a WMI query to ilter GPO application based on the
properties of a target computer, such as how much disk space it has available.
C.
Incorrect. You use loopback processing to enforce settings that apply to the
computer account rather than the user account.
D.
Incorrect. You use slow-link processing to conigure Group Policy not to apply
across low-bandwidth connections.
Correct answer: D
a.
Incorrect. In this scenario, GPO Delta has precedence over the other GPOs.
B.
Incorrect. In this scenario, GPO Delta has precedence over the other GPOs.
C.
Incorrect. In this scenario, GPO Delta has precedence over the other GPOs.
D.
Correct. In this scenario, GPO Delta has precedence over the other GPOs.
Correct answer: C
a.
Incorrect. In this scenario, the No Override setting on GPO Gamma means that it
has precedence.
B.
Incorrect. In this scenario, the No Override setting on GPO Gamma means that it
has precedence.
C.
Correct. In this scenario, the No Override setting on GPO Gamma means that it
has precedence.
D.
Incorrect. In this scenario, the No Override setting on GPO Gamma means that it
has precedence.
Answers
CHAPTER 5
279
4.
5.
280
Correct answer: B
a.
Incorrect. No Override settings override Block Inheritance, so the setting in GPO
Beta applies to the computer.
B.
Correct. No Override settings override Block Inheritance, so the setting in GPO
Beta applies to the computer.
C.
Incorrect. No Override settings override Block Inheritance, so the setting in GPO
Beta applies to the computer.
D.
Incorrect. No Override settings override Block Inheritance, so the setting in GPO
Beta applies to the computer.
Correct answer: A
a.
Correct. You use Security Filtering to ilter GPO application based on security
group membership. In this case, you conigure the Apply Group Policy (Deny)
advanced permission.
B.
Incorrect. You can use a WMI query to ilter GPO application based on the
properties of a target computer, such as how much disk space it has available.
C.
Incorrect. You use loopback processing to enforce settings that apply to the
computer account rather than the user account.
D.
Incorrect. You use slow-link processing to conigure Group Policy not to apply
across low-bandwidth connections.
CHAPTER 5
Managing Group Policy application and infrastructure
CHAPTER 10
Monitoring and auditing
P
roperly monitoring servers is a critical component in administering them. If you monitor
servers correctly, you’ll know well in advance if the server is under resource pressure
from lack of disk space, RAM, or processor resources. You’ll be able to deal with those issues
before they start to affect the people that use the servers on a day-to-day basis. Auditing
servers enables you to track object access and coniguration changes, from modiications to
security settings, to users who are accessing a particularly sensitive spreadsheet.
In this chapter, you will learn how to monitor and conigure auditing for computers
running the Windows Server 2012 and Windows Server 2012 R2 operating system.
Lessons in this chapter:
591
■
Lesson 1: Monitoring servers
■
Lesson 2: Coniguring advanced audit policies
614
Before you begin
To complete the practice exercises in this chapter:
■
You need to have deployed computers SYD-DC, MEL-DC, and ADL-DC, as described
in the Introduction, using the evaluation edition of Windows Server 2012 R2.
Lesson 1: Monitoring servers
Unwatched servers, like unwatched children, invariably end up in a chaotic state. Monitoring
a server using data collector sets, alerts, and events enables you to keep an eye on the
server’s performance and coniguration. Although effective monitoring is unlikely to stop a
server from ever experiencing problems, it often provides warning signs about developing
problems, giving you a chance to resolve them before they cause a service disruption. In
this lesson, you learn how to conigure data collector sets, manage alerts, monitor events,
and perform network monitoring.
591
After this lesson, you will be able to:
■
Conigure data collector sets.
■
Manage alerts.
■
Monitor events.
■
Conigure event subscriptions.
■
Attach event-driven tasks
■
Perform network monitoring.
Estimated lesson time: 45 minutes
Coniguring data collector sets
Key
Data collector sets enable you to collect performance data, system coniguration information,
and statistics into a single ile. You can use Performance Monitor or other third-party tools
to analyze this information to make a determination about how well a server is functioning
against an assigned workload.
You can conigure data collector sets to include the following:
■
■
■
Performance counter data The data collector set not only includes speciic
performance counters but also the data generated by those counters.
Event trace data Enables you to track events and system activities. Event trace data
can be useful when troubleshooting misbehaving applications or services.
System coniguration information Enables you to track the state of registry keys
and record any modiications made to those keys.
Windows Server 2012 and Windows Server 2012 R2 include the following built-in data
collector sets, as shown in Figure 10-1.
592 Chapter 10
Monitoring and auditing
FIGURE 10-1 Built-in data collector sets
■
Active Directory diagnostics Available if you have installed the computer as a
domain controller; it provides data on Active Directory health and reliability.
■
System diagnostics
and STOP errors.
■
System performance Enables you to diagnose problems with sluggish system
performance. You can determine which processes, services, or hardware may be
causing performance bottlenecks.
Enables you to troubleshoot problems with hardware, drivers,
To create a data collector set, perform the following steps:
1.
Open Performance Monitor from the Tools menu of the Server Manager console.
2.
Expand Data Collector Sets.
3.
Click User Deined. On the Action menu, click New, and click Data Collector Set.
4.
You are given the option of creating the data collector set from a template, which
enables you to select from an existing data collector set, or to create a data collector
set manually. If you choose to create a data collector set manually, you have the option
of creating a data log, which can include a performance counter, event trace data, and
system coniguration information; or a performance counter alert. This choice is shown
in Figure 10-2.
Lesson 1: Monitoring servers
CHAPTER 10
593
FIGURE 10-2 Creating a new data collector set
5.
If you select Performance Counter, you then choose which performance counters to
add to the data collector set. You also specify how often Windows should collect data
from the performance counters. Figure 10-3 shows data being collected once every 15
seconds.
FIGURE 10-3 Setting an interval for the data collector set
594 Chapter 10
Monitoring and auditing
6.
If you choose to include event trace data, you need to enable event trace providers. As
Figure 10-4 shows, a large number of event trace providers are available with Windows
Server 2012 R2. You use event trace providers when troubleshooting a speciic
problem. For example, the Microsoft Windows-AppLocker event trace provider helps
you diagnose and troubleshoot issues related to AppLocker.
FIGURE 10-4 Event trace providers
7.
If you choose to monitor system coniguration information, you can select registry keys
to monitor, as shown in Figure 10-5. Selecting a parent key enables you to monitor all
registry changes that occur under that key while the data collector set is running.
Lesson 1: Monitoring servers
CHAPTER 10
595
FIGURE 10-5 Setting registry keys to record
8.
You then specify where you want data collected by the data collector set to be stored.
The default location is the %systemdrive%\PerfLogs\Admin folder. If you intend to run
the data collector set for an extended period of time, you should store the data on a
volume separate from the one that hosts the operating system.
9.
The inal step in setting up a data collector set is to specify the account under which
the data collector set runs. The default is Local System, but you can conigure the data
collector set to use any account for which you have the credentials.
You can schedule when a data collector set runs by coniguring the Schedule tab of a data
collector set’s properties as shown in Figure 10-6.
596 Chapter 10
Monitoring and auditing
FIGURE 10-6 Configure data collector set schedule
MORE INFO
DATA COLLECTOR SETS
For more information about data collector sets, consult the following TechNet article at
http://technet.microsoft.com/en-us/library/cc749337.aspx.
Managing alerts
Key
Performance counter alerts enable you to conigure a task to run when a performance
counter, such as available disk space or memory, falls under or exceeds a speciic value. To
conigure a performance counter alert, you create a new data collector set, choose the Create
Manually option, and select the Performance Counter Alert option, as shown in Figure 10-7.
Lesson 1: Monitoring servers
CHAPTER 10
597
FIGURE 10-7 Configuring the performance counter alert
You add the performance counter, threshold value, and whether the alert should be
triggered if the value exceeds or falls below this value. Figure 10-8 shows an alert that is
triggered when the amount of available memory falls below 512 megabytes.
FIGURE 10-8 Setting an alert threshold
598 Chapter 10
Monitoring and auditing
When you create an alert, all it does when triggered is to add an event to the event log.
You can also conigure an alert to run a scheduled task when triggered. You do this by editing
the properties of the alert and specifying the name of the scheduled task on the Task tab, as
shown in Figure 10-9.
FIGURE 10-9 Running a scheduled task
Monitoring events with viewer
Key
Event Viewer, shown in Figure 10-10, enables you to access recorded event information.
The Windows Server 2012 and Windows Server 2012 R2 Event Viewer differs from the
Event Viewer in earlier versions of the Windows Server operating system, such as Windows
Server 2003, in that it not only offers the application, security, setup, and system logs, but
it also contains separate application and service Logs. These logs are designed to provide
information on a per-role or per-application basis, rather than having all application and role
service-related events funneled into the application log. When searching for events related to
a speciic role service, feature, or application, check to see whether that role service, feature,
or application has its own application log.
Lesson 1: Monitoring servers
CHAPTER 10
599
FIGURE 10-10 Event Viewer
MORE INFO
EVENT VIEWER
For more information about Event Viewer, consult the following TechNet article at http://
technet.microsoft.com/en-us/library/cc766042.aspx.
Event log ilters
Filters and event logs enable you to view only those events that have speciic characteristics.
Filters apply only to the current Event Viewer session. If you constantly use a speciic ilter or
set of ilters to manage event logs, you should instead create a custom view. Filters apply only
to a single event log. You can create ilters on a log based on the following properties:
Enables you to specify the time range for the ilter.
■
Logged
■
Event Level Enables you to specify event levels. You can choose the following
options: Critical, Warning, Verbose, Error, and Information.
■
Event Sources
■
Event IDs
IDs.
Enables you to ilter based on event ID. You can also exclude speciic event
■
Keywords
Enables you to specify keywords based on the contents of events.
■
User Enables you to limit events based on user.
■
Computer
600 Chapter 10
Enables you to choose the source of the event.
Enables you to limit events based on the computer.
Monitoring and auditing
To create a ilter, perform the following steps:
1.
Open Event Viewer and select the log that you want to ilter.
2.
Determine the properties of the event that you want to ilter.
3.
On the Actions pane, click Filter Current Log.
4.
In the Filter Current Log dialog box, shown in Figure 10-11, specify the ilter properties.
FIGURE 10-11 Specifying filter properties
Event log views
Key
Event log views enable you to create customized views of events across any event log stored
on a server, including events in the forwarded event log. Rather than looking through each
event log for speciic items of interest, you can create event log views that target only those
speciic items. Event Viewer includes a custom view named Administrative Events. This view
displays critical, warning, and error events from a variety of important event logs such as the
application, security, and system logs.
Views differ from ilters in the following ways:
■
Persistent You can use a view across multiple Event Viewer sessions. If you conigure
a ilter on a log, it is not available the next time you open the Event Viewer.
■
Include multiple logs A custom view can display events from separate logs. Filters
are limited to displaying events from one log.
■
Exportable
You can import and export event log views between computers.
Lesson 1: Monitoring servers
CHAPTER 10
601
Creating an event log view is a similar process to creating a ilter. The primary difference
is that you can select events from multiple logs, and you give the event log view a name and
choose a place to save it. To create an event log view, perform the following steps:
1.
Open Event Viewer.
2.
Click the Custom Views node, and then click Create Custom View from the Actions
menu.
3.
In the Create Custom View dialog box, shown in Figure 10-12, select the properties of
the view, including:
■
When the events are logged
■
The event level
■
Which event log to draw events from
■
Event source
■
Task category
■
Keywords
■
User
■
Computer
FIGURE 10-12 Creating a custom view
4.
602 Chapter 10
In the Save Filter To Custom View dialog box, enter a name for the custom view and a
location in which to save the view (see Figure 10-13). Click OK.
Monitoring and auditing
FIGURE 10-13 Entering the custom view name
5.
Verify that the new view is listed as its own separate node in the Event Viewer.
You can export a custom event log view by selecting the event log view and clicking
Export Custom View. Exported views can be imported on other computers running Windows
Server 2012 and Windows Server 2012 R2.
MORE INFO
EVENT LOG VIEWS
For more information about event log views, consult the following TechNet article at
http://technet.microsoft.com/en-us/library/cc766522.aspx.
Coniguring event subscriptions
Key
Event log forwarding enables you to centralize the collection and management of events
from multiple computers. Rather than having to examine the event log of each computer by
making a remote connection to that computer, event log forwarding enables you to do one
of the following:
■
■
Conigure a central computer to collect speciic events from source computers. Use
this option in environments in which you need to consolidate events from only a small
number of computers.
Conigure source computers to forward speciic events to a collector computer. Use
this option when you have a large number of computers from which you want to
consolidate events. You conigure this method using Group Policy.
Event log forwarding enables you to conigure the speciic events that are forwarded
to the central computer. This enables the computer to forward important events. It isn’t
Lesson 1: Monitoring servers
CHAPTER 10
603
necessary to forward all events from the source computer. If you discover something that
warrants further investigation from the forwarded trafic, you can log on to the original
source computer and view all the events from that computer in a normal manner.
REAL WORLD
OPERATIONS MANAGER
In large environments, you use Microsoft System Center 2012 R2 Operations Manager as a
way of monitoring large numbers of computers for important events, instead of searching
through the event log manually looking for events that require further investigation.
Event log forwarding uses Windows Remote Management (WinRM) and the Windows
Event Collector (wecsvc). You need to enable these services on computers that function as
event forwarders and event collectors. You conigure WinRM using the winrm quickconig
command. You conigure wecsvc using the wecutil qc command. If you want to conigure
subscriptions from the security event log, you need to add the computer account of the
collector computer to the local Administrators group on the source computer.
To conigure a collector-initiated event subscription, conigure WinRM and Windows
Event Collector on the source and collector computers. In the Event Viewer, conigure the
Subscription Properties dialog box, shown in Figure 10-14, with the following information:
■
Subscription Name
■
Destination Log
■
Subscription Type And Source Computers: Collector Initiated Use the Select
Computers dialog box to add the computers that the collector will retrieve events
from. The collector must be a member of the local Administrators group or the Event
Log Readers group on each source computer, depending on whether access to the
security log is required.
■
Events To Collect Create a custom view to specify which events are retrieved from
each of the source computers.
604 Chapter 10
The name of the subscription.
The log where collected events will be stored.
Monitoring and auditing
FIGURE 10-14 Configuring a collector-initiated event subscription
If you want to instead conigure a source computer-initiated subscription, you need to
conigure the following group policies on the computers that will act as the event forwarders:
■
■
Conigure Forwarder Resource Usage This policy determines the maximum event
forwarding rate in events per second. If this policy is not conigured, events will be
transmitted as soon as they are recorded.
Conigure Target Subscription Manager
of the collector computer.
MORE INFO
This policy enables you to set the location
EVENT SUBSCRIPTIONS
For more information about event subscriptions, see http://technet.microsoft.com/en-us/
library/cc749183.aspx.
Both of these policies are located in the Computer Coniguration\Policies\Administrative
Templates\Windows Components\Event Forwarding node. When coniguring the subscription,
you must also specify the computer groups that hold the computer accounts of the
computers that will be forwarding events to the collector. You do this in the Computer Groups
dialog box, as shown in Figure 10-15.
Lesson 1: Monitoring servers
CHAPTER 10
605
FIGURE 10-15 Configuring subscription computer groups for the subscription
Quick check
■
You want to view speciic events across multiple event logs. What tool should you use
to accomplish this goal?
Quick check answer
■
You should use custom views.
Attaching event-driven tasks
Event Viewer enables you to attach tasks to speciic events. A drawback to the process of
creating event-driven tasks is that you need to have an example of the event that triggers the
task already present in the event log. Events are triggered based on an event having the same
log, source, and event ID.
To attach a task to a speciic event, perform the following steps:
1.
Open Event Viewer. Locate and select the event upon which you want to base the new
task.
2.
On the Event Viewer Actions pane, click Attach Task To This Event. The Create Basic
Task Wizard displays.
3.
On the Create A Basic Task page, review the name of the task that you want to create.
By default, the task is named after the event. Click Next.
606 Chapter 10
Monitoring and auditing
4.
On the When An Event is Logged page, review the information about the event. This
will list the log from which the event originates, the source of the event, and the event
ID. Click Next.
5.
On the Action page, shown in Figure 10-16, you can choose the task to perform. The
Send An E-Mail and Display A Message tasks are deprecated, and you get an error if
you try to create a task using these actions. Click Next.
FIGURE 10-16 Attaching a task to a specific event
6.
On the Start A Program page, shown in Figure 10-17, specify the program or script that
should be automatically triggered as well as additional arguments.
Lesson 1: Monitoring servers
CHAPTER 10
607
FIGURE 10-17 Specifying a triggered script
7.
608 Chapter 10
After you complete task creation, you can modify the task to specify the security
context under which the task executes. By default, event tasks run only when the user
is signed on. You can conigure the task to run whether the user is signed on or not, as
shown in Figure 10-18.
Monitoring and auditing
FIGURE 10-18 Run your task if the user is logged on or off
REAL WORLD
IT’S NOT ABOUT SENDING EMAIL, IT’S ABOUT SENDING A MESSAGE
Even though the Send An Email task is deprecated, you can use the Start A Program option
to execute a Windows PowerShell script that sends an email. In many cases, however,
instead of sending a message to an administrator so the administrator can perform a task,
it’s better to have the task directly called wherever possible. Creating automated tasks that
resolve problems without requiring direct intervention saves time and money. You should
send email messages only when you need to notify yourself about an issue that cannot be
resolved by running a script.
Performing network monitoring
Key
Network monitoring enables you to track how a computer interacts with the network.
Through network monitoring, you can determine which services and applications are using
speciic network interfaces, which services are listening on speciic ports, and the volume
of trafic that exists. There are two primary tools through which you can perform network
monitoring on computers running Windows Server 2012 and Windows Server 2012 R2:
■
Resource Monitor
■
Message Analyzer
Lesson 1: Monitoring servers
CHAPTER 10
609
Resource Monitor
Key
Resource Monitor enables you to monitor how a computer running the Windows Server
2012 and Windows Server 2012 R2 operating system uses CPU, memory, disk, and network
resources. Resource Monitor provides real time information. You can’t use Resource Monitor
to perform a trafic capture and review activity that occurred in the past. You can use
Resource Monitor to view activity that is currently occurring. The Network tab of Resource
Monitor is shown in Figure 10-19.
FIGURE 10-19 Resource Monitor Network tab
Resource Monitor provides the following information that is relevant to network
monitoring:
■
Processes With Network Activity This view lists processes by name and ID; and
provides information on bits sent per second, bits received per second, and total bits
per second.
■
Network Activity Lists network activity on a per-process basis, but also lists the
destination address, sent bits per second, received bits per second, and total bits per
second.
■
TCP Connections Provides information on connections on the basis of local address,
port, and remote address and port.
■
Listening Ports Lists the ports and addresses that services and applications are
listening on. Also provides information about the irewall status for these roles and
services.
610 Chapter 10
Monitoring and auditing
Message Analyzer
Microsoft Message Analyzer is the successor to Network Monitor. You can use Message
Analyzer to perform network trafic capture and analysis. Message Analyzer also functions
as a replacement for LogParser, which enables you to manage system messages, events, and
log iles. When performing a capture, you select the scenario that best represents the type
of event about which you are interested in capturing trafic. For example, the LAN scenario,
shown in Figure 10-20, enables you to capture trafic on local area network (LAN) interfaces.
FIGURE 10-20 LAN scenario
When performing certain types of network trafic capture, you need to run Message
Analyzer using an account that is a member of the local Administrators group. After the
capture has been performed, you can analyze the content of each message, as shown in
Figure 10-21. By applying appropriate ilters, you can locate network trafic that has speciic
characteristics, such as using a particular TCP port, source, or destination address.
Lesson 1: Monitoring servers
CHAPTER 10
611
FIGURE 10-21 Message Analyzer
MORE INFO
MESSAGE ANALYZER
You can ind out more about Microsoft Message Analyzer by consulting the Microsoft
Message Analyzer Operating Guide at http://technet.microsoft.com/en-us/library/jj649776.
aspx.
Lesson summary
■
Data collector sets enable you to collect performance counter data, event trace data,
and system coniguration information.
■
Performance counter alerts enable an event to be written to the event log and a
command to be run when a speciied performance counter exceeds or falls below a
conigured value.
■
■
■
■
612 Chapter 10
Event log ilters apply to a single event log and are not persistent.
Event log views are persistent, can include items from multiple event logs, and can be
imported and exported.
Event subscriptions enable you to conigure one computer to consolidate the event
logs of multiple computers.
Event-driven tasks enable you to conigure a program or script to be run when a
speciic event is written to the event log.
Monitoring and auditing
■
Message Analyzer, which is the successor to Network Monitor, enables you to capture
and analyze network trafic.
Lesson review
Answer the following questions to test your knowledge of the information in this lesson. You
can ind the answers to these questions and explanations of why each answer choice is correct
or incorrect in the “Answers” section at the end of this chapter.
1.
2.
3.
4.
You want to collect processor, memory, and network interface utilization data over
the course of several hours. You need to be able to review the data at a later period in
time. Which of the following tools should you use to accomplish this goal?
a.
Resource Monitor
B.
Task Manager
C.
Data collector set
D.
Message Analyzer
A particular network service on a computer running Windows Server 2012 R2 that you
are responsible for managing is not functioning correctly. You suspect that the service
is listening on a TCP port that Windows Firewall is conigured to block, but you don’t
know which TCP port the service uses. Which of the following tools should you use to
determine this information?
a.
Task Manager
B.
Resource Monitor
C.
Message Analyzer
D.
Data collector set
Which of the following tools can you use to capture and analyze network trafic?
a.
Data collector set
B.
Message Analyzer
C.
Resource Monitor
D.
Task Manager
You are coniguring event log subscriptions. Computer MEL-DC will function as the
event log collector, and computers MEL-A, MEL-B, and MEL-C will function as the event
log sources. You want MEL-DC to collect events from the security logs on computers
MEL-A, MEL-B, and MEL-C. To which of the following security groups on MEL-A, MEL-B,
and MEL-C should you add the computer account of MEL-DC?
a.
Backup operators
B.
Power users
C.
Event log readers
D.
Administrators
Lesson 1: Monitoring servers
CHAPTER 10
613
Lesson 2: Advanced audit policies
Auditing enables you to track both actual and attempted access and changes to objects
and policies. Auditing enables you to verify that the policies that you’ve put in place to
secure your organization’s network infrastructure are actually being enforced, from tracking
modiications to sensitive user accounts through to access to sensitive iles and folders. In this
lesson, you will learn about advanced audit policy, how to conigure expression-based audit
policies, and how you can use auditpol.exe to manage auditing.
After this lesson, you will be able to:
■
Understand advanced audit policies.
■
Conigure auditing using Group Policy.
■
Use auditpol.exe to manage auditing.
Estimated lesson time: 45 minutes
Coniguring advanced auditing
Key
There are two sets of audit policies in a Group Policy Object (GPO): traditional audit policies
and advanced audit policies. The traditional audit policies are located in the Computer
Coniguration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policies node
and are shown in Figure 10-22. They are the audit policies that have been available with the
Windows Server operating system since Windows 2000. The drawback of these policies is that
they are general, and you can’t be speciic in the way you conigure auditing. When you use
these policies, you’ll not only audit the events that you’re interested in but you’ll also end up
auditing many events that you don’t need to know about.
FIGURE 10-22 General auditing policies
614 Chapter 10
Monitoring and auditing
REAL WORLD
NEEDLES AND HAYSTACKS
The trick of implementing a successful audit policy is to reduce the size of the haystack
so that inding the needles is easier. An audit policy that records only activity that you are
interested in produces fewer events than a more general audit policy, in which interesting
events can get lost in the clutter.
The advanced audit policies enable you to be more speciic in the types of activity you
audit. The advanced audit policies are located under the Computer Coniguration\Policies\
Windows Settings\Security Settings\Advanced Audit Policy Coniguration node, as shown in
Figure 10-23.
FIGURE 10-23 Advanced audit policies
There are 10 groups of audit policy settings and 58 individual audit policies available
through Advanced Audit Policy Coniguration. The audit policy groups contain the following
settings:
You can audit credential validation and Kerberos-speciic operations.
■
Account Logon
■
Account Management You can audit account management operations, such as
changes to computer accounts, user accounts, and group accounts.
■
Detailed Tracking You can audit encryption events, process creation, process
termination, and RPC events.
■
DS Access
■
Logon/Logoff You can audit logon, logoff, and other account activity events,
including IPsec and Network Policy Server (NPS) events.
■
You can audit Active Directory access and functionality.
Object Access You can audit access to objects including iles, folders, applications,
and the registry.
Lesson 2: Advanced audit policies
CHAPTER 10
615
■
Policy Change You can audit changes to audit policy.
■
Privilege Use
■
System
■
Global Object Access Auditing
for iles and the registry.
REAL WORLD
You can audit the use of privileges.
You can audit changes to the security subsystem.
You can conigure expression-based audit policies
CONFIGURE AN AUDIT POLICY
Determine what you want to audit irst and then enable the policies to audit that type of
activity. A mistake that many administrators make is that they aren’t entirely sure what
they should be auditing, so they audit everything. They become frustrated with the process
because the auditing events that they might be interested in get lost in the vast sea of
auditing events that they are not interested in.
Implementing expression-based audit policies
Traditional object audit policies involve specifying a group and coniguring the type of
activities that will trigger an event to be written to the security log. Specifying that an audit
event will be written each time a member of the Managers group accesses a ile in a speciic
folder is a good example.
Key
Expression-based audit policies enable you to go further. These policies enable you to
put conditions as to when auditing might occur. For example, you might want to conigure
auditing so that members of the Managers group have access to sensitive iles tracked only
when they access iles from computers that aren’t part of the Managers_Computers group.
Figure 10-24 shows auditing conigured in this way. This way, you don’t bother tracking access
when members of this group access sensitive iles from within the ofice, but you do track
all access to those sensitive iles when members of this group are accessing them from an
unusual location.
616 Chapter 10
Monitoring and auditing
FIGURE 10-24 Expression-based audit policies
You can integrate expression-based audit policies with Dynamic Access Control (DAC) to
create targeted audit policies that are based on user, computer, and resource claims. Instead
of just adding claims based on user or device group membership, the claim can be based
on document metadata such as conidentiality settings and site location. You can conigure
expression-based audit policies at the ile or folder level, or apply them through Group
Policy using policies in the Global Object Access Auditing node of Advanced Audit Policy
Coniguration.
Quick check
■
What type of auditing should you conigure if you want to audit ile access by a speciic
group of people only when they aren’t signed on to a speciic group of computers?
Quick check answer
■
You conigure an expression-based audit policy to audit ile access by a speciic group
of people who are accessing iles from computers other than those in a speciic group.
Lesson 2: Advanced audit policies
CHAPTER 10
617
Coniguring ile and folder auditing
After you conigure auditing of object access, either through the traditional or advanced audit
policies, you can conigure auditing at the ile and folder level. The simplest way to conigure
auditing is at the folder level because you can then conigure all folders and subfolders to
inherit those auditing settings. If you change the auditing settings at the folder level, you can
use the Replace All Child Object Auditing Entries option to apply the new auditing settings to
the folder’s child iles and folders.
You can conigure auditing for a speciic ile and folder through the Advanced button
on the Security tab of the object’s properties. You can conigure basic success and failure
auditing, as shown in Figure 10-25. You can also conigure expression-based auditing so that
activity by members of a speciic security group are audited only if other conditions, such as
membership of other security groups, are also met.
FIGURE 10-25 Configuring basic success and failure auditing
The advantage of using Global Object Access Auditing is that when you have it conigured,
you can use ile classiication to apply metadata to iles and then automatically have auditing
enabled for those iles. For example, using ile classiication and DAC, you can conigure a
Windows Server 2012 R2 ile server so that all iles that contain the phrase “code secret” are
marked as Sensitive. You can then conigure Global Object Access Auditing so that all access
to iles marked as Sensitive are automatically audited. Instead of having an administrator
track down all the iles that are sensitive and coniguring auditing on those iles, the process is
automatic. All that needs to happen to trigger it is the inclusion of the phrase “code secret” in
the ile.
618 Chapter 10
Monitoring and auditing
Using auditpol with auditing
Key
Auditpol.exe is a command-line utility that you can use to conigure and manage audit
policy settings from an elevated command prompt. You can use auditpol.exe to perform the
following tasks:
■
View the current audit policy settings with the /Get subcommand
■
Set audit policy settings with the /Set subcommand
■
Display selectable policy elements with the /List subcommand
■
Back up and restore audit policies using the /Backup and /Restore subcommands
■
Delete all per-user audit policy settings and reset the system policy settings using the
/Clear subcommand
■
Remove all per-user audit policy settings and disable all system policy settings using
the /Remove subcommand
For example, to enable success and failure auditing for the File System subcategory of
Object Access, execute this command.
Auditpol.exe /set /subcategory:”File System” /success:Enable /failure:Enable
To view the current audit policy settings for all audit policies, issue this command.
Auditpol.exe /get /category:*
To view the current audit policy settings for a speciic category, such as Object Access,
issue this command.
Auditpol.exe /get /category:”Object Access”
MORE INFO
AUDITPOL.EXE
To learn more about auditpol.exe, consult the following TechNet article at http://technet
.microsoft.com/en-us/library/cc731451(v=ws.10).aspx.
Lesson summary
■
■
■
■
Advanced audit policies enable you to perform more granular auditing than is possible
with the traditional auditing policies available in earlier versions of Windows server.
Expression-based audit policies enable you to conigure auditing based on object
metadata. You can also use expression-based audit policies to perform conditional
auditing.
After you have enabled the auditing of object access, you can conigure auditing at
the ile and folder level. File-level and folder-level auditing supports expression-based
audit policies.
You can use the auditpol.exe command-line utility from an elevated command prompt
to conigure and manage audit policy settings.
Lesson 2: Advanced audit policies
CHAPTER 10
619
Lesson review
Answer the following questions to test your knowledge of the information in this lesson. You
can ind the answers to these questions and explanations of why each answer choice is correct
or incorrect in the “Answers” section at the end of this chapter.
Which of the following commands should you use to enable success and failure
auditing for all audit policies under the Object Access category on a computer running
Windows Server 2012 R2?
1.
a.
Auditpol.exe /set /subcategory:"File System" /success:Enable /failure:Enable
B.
Auditpol.exe /set /Category:"Object Access" /success:Enable /Failure:Enable
C.
Auditpol.exe /get /Category:"Object Access" /success:Disable /Failure:Disable
D.
Auditpol.exe /get /Category:"Object Access" /success:Disable /Failure:Enable
You want to enable failure auditing, but not success auditing, for all audit policies
under the Object Access category on a computer running Windows Server 2012 R2.
Which of the following commands should you use to accomplish this goal?
2.
a.
Auditpol.exe /get /Category:"Object Access" /success:Disable /Failure:Enable
B.
Auditpol.exe /get /Category:"Object Access" /success:Disable /Failure:Disable
C.
Auditpol.exe /set /Category:"Object Access" /success:Enable /Failure:Enable
D.
Auditpol.exe /set /subcategory:"File System" /success:Enable /failure:Enable
You want to enable success and failure auditing only for the File System subcategory.
Which of the following commands should you use to accomplish this goal?
3.
a.
Auditpol.exe /set /Category:"Object Access" /success:Enable /Failure:Enable
B.
Auditpol.exe /get /Category:"Object Access" /success:Disable /Failure:Enable
C.
Auditpol.exe /set /subcategory:"File System" /success:Enable /failure:Enable
D.
Auditpol.exe /get /Category:"Object Access" /success:Disable /Failure:Disable
You want to disable all success and failure auditing on all auditing subcategories under
the Object Access category. Which of the following commands should you use to
accomplish this goal?
4.
a.
Auditpol.exe /get /Category:"Object Access" /success:Disable /Failure:Disable
B.
Auditpol.exe /get /Category:"Object Access" /success:Disable /Failure:Enable
C.
Auditpol.exe /set /Category:"Object Access" /success:Enable /Failure:Enable
D.
Auditpol.exe /set /subcategory:"File System" /success:Enable /failure:Enable
620 Chapter 10
Monitoring and auditing
Practice exercises
The goal of this section is to provide you with hands-on practice with the following:
■
Conigure data collector sets
■
Conigure alerts
■
Manage event subscriptions
■
Perform network monitoring
■
Conigure removable device auditing
■
Conigure logon auditing
■
Conigure expression-based audit policies
■
Enable folder auditing
To perform the exercises in this section, you need access to an evaluation version of
Windows Server 2012 R2. You should also have access to virtual machines SYD-DC, MEL-DC,
CBR-DC, and ADL-DC, the setup instructions for which are described in the Introduction. You
should ensure that you have a checkpoint of these virtual machines that you can revert to at
the end of the practice exercises. You should revert the Virtual Machines (VMs) to this initial
state prior to beginning these exercises.
Exercise 1: Conigure data collector sets
In this exercise, you conigure data collector sets. To complete this exercise, perform the
following steps:
1.
Start SYD-DC, and sign on as CONTOSO\Don_Funk.
2.
On SYD-DC, click Performance Monitor in the Tools menu of Server Manager.
3.
In the Performance Monitor console, expand the Performance\Data Collector Sets\User
Deined, as shown in Figure 10-26.
Practice exercises
CHAPTER 10
621
FIGURE 10-26 Accessing data collector sets
4.
On the Action menu, click New, and click Data Collector Set.
5.
In the Create New Data Collector Set dialog box, type the name SYD-DCPerformance-Measurement and click Create Manually (Advanced), as shown in
Figure 10-27. Click Next.
FIGURE 10-27 Entering the data collector set name
622 Chapter 10
Monitoring and auditing
6.
On the What Type Of Date Do You Want To Include? page, click Performance Counter,
as shown in Figure 10-28, and click Finish.
FIGURE 10-28 Selecting Performance Counter
7.
In the Performance Monitor console, click SYD-DC-Performance-Measurement.
8.
In the details pane, click DataCollector01.
9.
On the Action menu, click Properties.
10. In the DataCollector01 Properties dialog box, shown in Figure 10-29, click Add.
Practice exercises
CHAPTER 10
623
FIGURE 10-29 Performance counters
11. In the Available Counters dialog box, click Logical Disk, and click Add.
12. Click Memory, click the arrow, click Available Mbytes, and click Add.
13. Click Network Interface, and click Add.
14. Click Processor, and click Add.
15. Verify that the list of added counters matches Figure 10-30, and click OK.
624 Chapter 10
Monitoring and auditing
FIGURE 10-30 Matching added counters
16. In the DataCollector01 Properties dialog box, set the Sample Interval to 15 seconds
(see Figure 10-31), and click OK.
FIGURE 10-31 Setting the interval
Practice exercises
CHAPTER 10
625
17. In Performance Monitor, click Data Collector Sets\User Deined\SYD-DC-Performance-
Measurement.
18. On the Action menu, click Properties.
19. On the Schedule tab of the SYD-DC-Performance-Measurement Properties dialog box,
click Add.
20. On the Folder Action dialog box, set a time of 3:00:00 AM, and click OK.
21. Verify that the Schedule tab appear similar to Figure 10-32, and click OK
FIGURE 10-32 Configure data collector set schedule
Exercise 2: Collect data
In this exercise, you collect data from the data collector set. To complete this exercise,
perform the following steps:
1.
In Performance Monitor, click Data Collector Sets\User Deined\SYD-DC-PerformanceMeasurement.
2.
On the Action menu, click Start.
3.
After 2 minutes, on the Action menu, click Stop.
4.
Expand Reports, expand User Deined, and click SYD-DC-Performance-Measurement.
5.
Double-click the report listed in the details pane, as shown in Figure 10-33.
626 Chapter 10
Monitoring and auditing
FIGURE 10-33 Selecting a report
6.
Click Change Graph Type, and click Report.
7.
View the report, as shown in Figure 10-34.
FIGURE 10-34 Viewing the report
Practice exercises
CHAPTER 10
627
Exercise 3: Conigure alerts
In this exercise, you conigure a free disk space alert. To complete this exercise, perform the
following steps:
1.
In Performance Monitor, click User Deined under Data Collector Sets.
2.
On the Action menu, click New, and click Data Collector Set.
3.
On the Create New Data Collector Set page, type Disk Space Alert, click Create
Manually (Advanced), and click Next.
4.
On the Create New Data Collector Set page, click Performance Counter Alert, as shown
in Figure 10-35, and click Next.
FIGURE 10-35 Choosing Performance Counter Alert
5.
On the Which Performance Counters Would You Like To Monitor? page, click Add.
6.
In the Available Counters dialog box, click LogicalDisk, click %Free Space, click C:, and
click Add, as shown in Figure 10-36. Click OK.
628 Chapter 10
Monitoring and auditing
FIGURE 10-36 Selecting LogicalDisk
7.
Set the Alert When menu to Below.
8.
Set the Limit value to 5, as shown in Figure 10-37, and click Next.
FIGURE 10-37 Setting the limit value
9.
Click Finish.
Practice exercises
CHAPTER 10
629
Exercise 4: Prepare computers for event subscriptions
In this exercise, you conigure computers to support event log subscriptions. To complete this
exercise, perform the following steps:
1.
On SYD-DC, right-click Windows PowerShell on the task bar, and click Run As
Administrator.
2.
Enter the following command and press Enter.
Wecutil qc
3.
When prompted, press Y, and press Enter.
4.
Close the Windows PowerShell prompt.
5.
Sign on to MEL-DC as Administrator.
6.
Open the Windows PowerShell prompt and type the following commands.
Add-Computer -DomainName contoso.com
7.
In the Windows PowerShell Credentials dialog box, type
[email protected] and
Pa$$w0rd, and click OK.
8.
Type the following command at the Windows PowerShell prompt to restart the
computer.
Restart-Computer
9.
Sign on to MEL-DC as Contoso\don_funk.
10. On the Tools menu on Server Manager, click Computer Management.
11. In the Computer Management console, expand Local Users And Groups, click Groups,
and then click Administrators, as shown in Figure 10-38.
630 Chapter 10
Monitoring and auditing
FIGURE 10-38 Accessing Administrators
12. On the Actions pane, click More Actions, and click Properties under Administrator.
13. In the Administrators Properties dialog box, click Add.
14. In the Select Users, Computers, Service Accounts, Or Groups dialog box, click Object
Types.
15. In the Object Types dialog box, enable the Computers check box, as shown in Figure
10-39, and click OK.
FIGURE 10-39 Selecting Computers
16. In the Select Users, Computers, Service Accounts, Or Groups dialog box, type SYD-DC,
click Check Names, and click OK.
Practice exercises
CHAPTER 10
631
17. Verify that the Administrators Properties dialog box matches Figure 10-40 and click
OK.
FIGURE 10-40 Administrators Properties dialog box
18. Restart MEL-DC.
Exercise 5: Conigure event subscriptions
In this exercise, you conigure event subscriptions. To complete this exercise, perform the
following steps:
1.
In the Server Manager console on SYD-DC, open the Tools menu, and click Event
Viewer.
2.
In Event Viewer, click the Subscriptions node, as shown in Figure 10-41.
632 Chapter 10
Monitoring and auditing
FIGURE 10-41 Clicking the Subscriptions node
3.
On the Actions pane, click Create Subscription.
4.
In the Subscription Properties dialog box, type the name as Subscription-Alpha, click
Collector Initiated, and click Select Computers.
5.
In the Computers dialog box, click Add Domain Computers.
6.
In the Select Computer dialog box, type MEL-DC, click Check Names, and click OK.
7.
Verify that the Computers dialog box matches Figure 10-42, and click Test.
FIGURE 10-42 Computers dialog box
Practice exercises
CHAPTER 10
633
8.
In the Event Viewer dialog box, click OK.
9.
In the Computers dialog box, click OK.
10. Click Select Events.
11. In the Query Filter dialog box, select Critical, Error, Warning, and Information.
12. Click the Event Logs menu, and click Windows Logs.
13. Verify that the Query Filter appears the same as Figure 10-43, and click OK.
FIGURE 10-43 The Query Filter dialog box
14. In the Subscription Properties dialog box, click Advanced.
15. In the Advanced Subscription Settings dialog box, click Minimize Latency, as shown in
Figure 10-44, and click OK.
634 Chapter 10
Monitoring and auditing
FIGURE 10-44 Advanced Subscription Settings dialog box
16. Verify that the Subscription Properties – Subscription-Alpha dialog box matches Figure
10-45, and then click OK.
FIGURE 10-45 Subscription Properties dialog box
17. Restart server MEL-DC.
18. Expand the Windows Logs node, and click Forwarded Events.
19. Verify the presence of items in the event log, as shown in Figure 10-46.
Practice exercises
CHAPTER 10
635
FIGURE 10-46 Event log
20. Close Event Viewer.
Exercise 6: Conigure network monitoring
In this exercise, you monitor the processes and services that use network interfaces. To
complete this exercise, perform the following steps:
1.
On the Tools menu of the Server Manager console on SYD-DC, click Resource Monitor.
2.
On the Network tab, click the arrow next to TCP Connections, as shown in Figure 10-47.
636 Chapter 10
Monitoring and auditing
FIGURE 10-47 Network tab of the Resource Monitor
3.
Click the arrow next to Listening Ports to list the ports on which different services are
listening (see Figure 10-48).
FIGURE 10-48 Listing the different ports.
Practice exercises
CHAPTER 10
637
Exercise 7: Using Message Analyzer
In this exercise, you use Message Analyzer to perform network monitoring. To perform this
exercise, you need to download Message Analyzer from the following website: http://www.
microsoft.com/en-au/download/details.aspx?id=40308 (or just use a search engine to locate
the installer) and then install it on MEL-DC. Ensure that you do not run the program and that
you sign off after installation. To complete this exercise, perform the following steps:
1.
Ensure that you are signed on to MEL-DC as contoso\don_funk.
2.
In the Server Manager on MEL-DC, click Local Server, and then select IE Enhanced
Security Coniguration.
3.
In the Internet Explorer Enhanced Security Coniguration dialog box, set the
Administrators setting to Off, as shown in Figure 10-49, and click OK.
FIGURE 10-49 Internet Explorer security
4.
In the Search charm on MEL-DC, type Microsoft Message Analyzer.
5.
Click Microsoft Message Analyzer in the results list.
6.
On the Welcome To The Microsoft Message Analyzer dialog box, click Do Not Update
Items, and click OK.
7.
On the File menu, click Capture Trace, and click SMB2 Server Full PDU (Windows 8/
Windows Server 2012 or later) as shown in Figure 10-50, and click Start With.
638 Chapter 10
Monitoring and auditing
FIGURE 10-50 SMB Server Full PDU
8.
On the taskbar, click File Explorer.
9.
In File Explorer, click Computer, and then double-click Local Disk (C:).
10. On the title bar, click New Folder. Name the new folder TEST.
11. Right-click the TEST folder, click Share With, and click Speciic People.
12. In the File Sharing dialog box, click Share, and then click Done.
13. In Microsoft Message Analyzer, click Analysis Grid, and verify that messages have been
recorded, and click the inal message, as shown in Figure 10-51.
Practice exercises
CHAPTER 10
639
FIGURE 10-51 Verifying that messages have been recorded
14. Use File Explorer to navigate to C:\TEST.
15. Create a text ile in C:\TEST named secretile.txt. The content of the ile should be the
words “secret secret.”Switch to SYD-DC.
16. On SYD-DC, in the Search charm, type \\MEL-DC\TEST\secretile.txt and click
Secretile.txt in the Results pane.
17. Switch to MEL-DC.
18. Verify that additional trafic has been recorded.
19. Examine the message data for network addresses, such as server MEL-DC (see Figure
10-52).
640 Chapter 10
Monitoring and auditing
FIGURE 10-52 Examining message data
20. Close Microsoft Message Analyzer.
21. When prompted to save the captured trace, click No.
Exercise 8: Conigure removable device auditing
In this exercise, you conigure a GPO so that removable device usage is audited. To complete
this exercise, perform the following steps:
1.
On SYD-DC, click Group Policy Management on the Tools menu of Server Manager.
2.
Expand Forest: Contoso.com\Domains\contoso.com\Group Policy Objects, and click
Default Domain Policy, as shown in Figure 10-53.
Practice exercises
CHAPTER 10
641
FIGURE 10-53 Clicking Default Domain Policy
3.
On the Action menu, click Edit.
4.
In the Group Policy Management Editor, navigate to the Computer Coniguration\
Policies\Windows Settings\Security Settings\Advanced Audit Policy Coniguration\
Audit Policies\Object Access node and click Audit Removable Storage, as shown in
Figure 10-54.
642 Chapter 10
Monitoring and auditing
FIGURE 10-54 Clicking Audit Removable Storage
5.
Double-click Audit Removable Storage.
6.
In the Audit Removable Storage Properties dialog box, select Conigure The Following
Audit Events, Success, and Failure; then click OK (see Figure 10-55).
Practice exercises
CHAPTER 10
643
FIGURE 10-55 Auditing properties
7.
Close the Group Policy Management Editor.
8.
On the taskbar, right-click Windows PowerShell, and click Run As Administrator.
9.
In the Windows PowerShell window, type the following command and press Enter.
Gpupdate /force
10. In the Windows PowerShell window, type the following command and press Enter.
Auditpol /get /category:”Object Access”
11. Verify that Removable Storage is conigured for Success And Failure auditing, as shown
in Figure 10-56.
644 Chapter 10
Monitoring and auditing
FIGURE 10-56 Configuring Removable Storage
Exercise 9: Conigure logon auditing
In this exercise, you conigure logon auditing. To complete this exercise, perform the
following steps:
1.
In the Group Policy Management Console (GPMC) on SYD-DC, right-click the Default
Domain Policy, and click Edit.
2.
In the Group Policy Management Editor, navigate to the Computer Coniguration\
Policies\Windows Settings\Security Settings\Advanced Audit Policy Coniguration\
Audit Policies\Logon/Logoff, and click Audit Logon, as shown in Figure 10-57.
Practice exercises
CHAPTER 10
645
FIGURE 10-57 Selecting Audit Logon
3.
On the Action menu, click Properties.
4.
In the Audit Logon Properties dialog box, select Conigure The Following Audit Events,
Success, and Failure (see Figure 10-58). Click OK.
646 Chapter 10
Monitoring and auditing
FIGURE 10-58 Setting audit properties
5.
Close the Group Policy Management Editor.
6.
On the Tools menu of the Server Manager console, click Active Directory Users And
Computers.
7.
In Active Directory Users And Computers, select Users, and then click Administrator.
8.
On the Action menu, click Copy.
9.
In the Copy Object – User dialog box, conigure the following information, as shown in
Figure 10-59, and click Next.
■
First Name: Gabe
■
Last Name: Frost
■
User Logon Name: Gabe_Frost
Practice exercises
CHAPTER 10
647
FIGURE 10-59 Setting copy object data
10. Type Pa$$w0rd in the Password and Conirm Password text boxes, ensure User Must
Change Password At Next Logon is not selected, click Next, and click Finish.
11. Close Active Directory Users And Computers.
12. In Windows PowerShell, type the following command and press Enter.
Gpupdate /force
13. In Windows PowerShell, type the following command and press Enter.
Auditpol /get /category:”Logon/Logoff”
14. Verify that Logon is conigured for Success And Failure auditing, as shown in Figure
10-60.
FIGURE 10-60 Logon for Success And Failure auditing
15. Switch to MEL-DC.
648 Chapter 10
Monitoring and auditing
16. Sign out and sign on as contoso\gabe_frost with the password Pa$$w0rd.
17. Switch to SYD-DC.
18. On the Tools menu of the Server Manager console, click Event Viewer.
19. Expand Windows Logs\Security Logs and click the most recent event with Event ID
4624.
20. Click the Details pane and verify that the TargetUserName Gabe_Frost is listed, as
shown in Figure 10-61. You may need to scroll through several events to ind this
TargetUserName.
FIGURE 10-61 TargetUserName Gabe Frost
Exercise 10: Conigure expression-based audit policies
In this exercise, you conigure expression-based audit policies in Group Policy. To complete
this exercise, perform the following steps:
1.
On SYD-DC, open Active Directory Users And Computers from the Tools menu of the
Server Manager console.
2.
Right-click the Users container, click New, and click Group.
3.
In the New Object – Group dialog box, type the name Jupiter, as shown in Figure
10-62, and click OK.
Practice exercises
CHAPTER 10
649
FIGURE 10-62 Typing the group name
4.
Right-click the Users container, click New, and click Group.
5.
In the New Object – Group dialog box, type the name Saturn and click OK.
6.
Right-click the Users container, click New, and click Group.
7.
In the New Object – Group dialog box, type the name Neptune and click OK.
8.
Right-click the Users container, click New, and click Group.
9.
In the New Object – Group dialog box, type the name Mars and click OK.
10. Close Active Directory Users And Computers.
11. In the GPMC, right-click Default Domain Policy, and click Edit.
12. In the Group Policy Management Editor, navigate to the Computer Coniguration\
Policies\Windows Settings\Security Settings\Advanced Audit Policy Coniguration\
Audit Policies\Global Object Access Auditing and click File System, as shown in Figure
10-63.
FIGURE 10-63 Selecting File System
650 Chapter 10
Monitoring and auditing
13. On the Action menu, click Properties.
14. In the File System Properties dialog box, click Deine This Policy Setting, and click
Conigure.
15. In the Advanced Security Settings For Global File SACL dialog box, click Add.
16. In the Auditing Entry For Global File SACL dialog box, click Select A Principal Link.
17. In the Select User, Computer, Service Account, Or Group dialog box, type Jupiter, click
Check Names, and click OK.
18. On the Type drop-down menu, click All.
19. Click the Add A Condition link.
20. Click the Add Items button.
21. In the Select User, Computer, Service Account, Or Group dialog box, type Saturn, click
Check Names, and click OK.
22. Verify that the Auditing Entry For Global File SACL dialog box matches Figure 10-64
and click OK.
FIGURE 10-64 Auditing the Entry For Global File SACL dialog box
23. In the Advanced Security Settings For Global File SACL dialog box, click Add.
24. In the Auditing Entry For Global File SACL dialog box, click Select A Principal link.
25. In the Select User, Computer, Service Account, Or Group dialog box, type Mars, click
Check Names, and click OK.
26. Set the Type drop-down menu to Fail.
Practice exercises
CHAPTER 10
651
27. Click the Add A Condition link.
28. Click the Member Of Each drop-down menu, and select Not Member Of Any.
29. Click the Add Items button.
30. In the Select User, Computer, Service Account, Or Group dialog box, type Neptune,
click Check Names, and click OK twice.
31. Verify that the Advanced Security Settings For Global File SACL dialog box matches
Figure 10-65, and click OK.
FIGURE 10-65 Advanced Security Settings For Global File SACL dialog box
32. Click OK to close the File System Properties dialog box and close the Group Policy
Management Editor.
Exercise 11: Conigure folder auditing
In this exercise, you conigure expression-based audit policies at the folder level. To complete
this exercise, perform the following steps:
1.
Click File Explorer on the taskbar.
2.
Click Computer and double-click Local Disk (C:).
3.
On the title bar, click the New Folder icon.
4.
Name the new folder Audited_Files.
5.
Right-click the Audited_Files folder, and click Properties.
652 Chapter 10
Monitoring and auditing
6.
On the Security tab, click Advanced.
7.
On the Auditing tab of the Advanced Security Settings For Audited_Files dialog box,
shown in Figure 10-66, click Add.
FIGURE 10-66 Auditing tab of the Advanced Security Settings For Audited_Files dialog box
8.
In the Auditing Entry For Audited_Files dialog box, click Select A Principal link.
9.
In the Select User, Computer, Service Account, Or Group dialog box, type Neptune,
click Check Names, and click OK.
10. Change the type from Success to Fail.
11. Click the Add A Condition link.
12. Click the Add Items button.
13. In the Select User, Computer, Service Account, Or Group dialog box, type Saturn, click
Check Names, and click OK.
14. Verify that the Auditing Entry For Audited Files dialog box matches Figure 10-67, and
click OK.
Practice exercises
CHAPTER 10
653
FIGURE 10-67 Auditing Entry For Audited Files dialog box
15. Click OK twice to close all dialog boxes.
Suggested practice exercises
The following additional practice exercises are designed to give you more opportunities to
practice what you’ve learned and to help you successfully master the lessons presented in this
chapter.
■
■
654 Chapter 10
Exercise 1 Use auditpol.exe to enable File System, Registry, and File Share Success
And Failure auditing on MEL-DC.
Exercise 2 Create a test share on SYD-DC and populate it with text iles. Add user
accounts to the Mars, Jupiter, Saturn, and Neptune groups. Sign on to MEL-DC and
access the iles across the network using different accounts. Verify that the expressionbased audit policies record auditing information appropriately.
Monitoring and auditing
Answers
This section contains the answers to the lesson review questions in this chapter.
Lesson 1
1.
2.
3.
Correct answer: C
a.
Incorrect. Resource Monitor enables you to view point-in-time resource utilization
information. You can’t use this tool to record resource utilization information for
later review.
B.
Incorrect. Task Manager does enable you to view resource utilization information,
but you can’t record that data for later review.
C.
Correct. A data collector set can be used to capture performance counters and
trace information related to resource utilization for later review.
D.
Incorrect. Message Analyzer, the successor to Network Monitor, enables you
to capture and analyze network trafic. Although it can capture and record
network trafic, you can’t use this tool to record processor and memory utilization
information.
Correct answer: B
a.
Incorrect. Task Manager provides real-time information about network utilization,
but doesn’t provide information about port utilization and irewall coniguration.
B.
Correct. Resource Monitor provides information about services, the ports that
they listen on, and irewall coniguration.
C.
Incorrect. Message Analyzer enables you to capture and analyze network
trafic, but it can’t be used to determine port utilization and associated irewall
coniguration.
D.
Incorrect. A data collector set can record performance information and system
trace information, but it can’t be used to determine port utilization and associated
irewall coniguration.
Correct answer: B
a.
Incorrect. A data collector set can be used to capture performance counters
and trace information related to network trafic, but it can’t be used to capture
network trafic.
B.
Correct. Message Analyzer, the successor to Network Monitor, enables you to
capture and analyze network trafic.
C.
Incorrect. Resource Monitor enables you to view point-in-time network utilization
information. You can’t use Resource Monitor to capture and analyze network
trafic.
Answers
CHAPTER 10
655
D.
4.
Incorrect. Task Manager does enable you to view network trafic, but doesn’t
enable you to capture and analyze that trafic.
Correct answer: D
a.
Incorrect. Members of the Backup Operators group are enabled to perform
backups; they do not have access to the Security event log.
B.
Incorrect. The Power Users group is included for backward compatibility;
members of this group do not have access to the Security event log.
C.
Incorrect. Although members of the Event Log Readers group have access to the
other event logs, they don’t have access to the Security event log. Only members
of the local Administrators group have access to the Security event log.
D.
Correct. When coniguring event log subscriptions involving events in the Security
event log, it is necessary to add the account of the collector computer to the local
Administrators group on the source computer.
Lesson 2
1.
2.
3.
Correct answer: B
a.
Incorrect. This command enables success and failure auditing for the File System
subcategory.
B.
Correct. This command enables success and failure auditing for all subcategories
under the Object Access category.
C.
Incorrect. This command disables success and failure auditing for all subcategories
under the Object Access category.
D.
Incorrect. This command enables only failure auditing, not success auditing, for all
subcategories under the Object Access category.
Correct answer: A
a.
Correct. This command enables only failure auditing, not success auditing, for all
subcategories under the Object Access category.
B.
Incorrect. This command disables success and failure auditing for all subcategories
under the Object Access category.
C.
Incorrect. This command enables success and failure auditing for all subcategories
under the Object Access category.
D.
Incorrect. This command enables success and failure auditing for the File System
subcategory.
Correct answer: C
a.
Incorrect. This command enables success and failure auditing for all subcategories
under the Object Access category.
B.
Incorrect. This command enables only failure auditing, not success auditing, for all
subcategories under the Object Access category.
656 CHAPTER 10
Monitoring and auditing
4.
C.
Correct. This command enables success and failure auditing for the File System
subcategory.
D.
Incorrect. This command disables success and failure auditing for all subcategories
under the Object Access category.
Correct answer: A
a.
Correct. This command disables success and failure auditing for all subcategories
under the Object Access category.
B.
Incorrect. This command enables only failure auditing, not success auditing, for all
subcategories under the Object Access category.
C.
Incorrect. This command enables success and failure auditing for all subcategories
under the Object Access category.
D.
Incorrect. This command enables success and failure auditing for the File System
subcategory.
Answers
CHAPTER 10
657
This page intentionally left blank
Index
Symbols
802.1X enforcement, coniguring for NAP 382–385
802.1X group policies, cconiguring authentication
363–367
A
A records 148
AAAA records 148
access-based enumeration 513
accidental deletion of objects, protecting from 212
accounting, RADIUS 429–432
Account Lockout Duration policy 71
practice exercise 101
account lockout policies 70, 74
practice exercise for coniguring 101–104
Account Lockout Threshold policy 71
practice exercise 102
account management tasks 71–75
Active Directory
backing up 210–212
database optimization 200–203
defragmenting the database 200–203
domain naming master 184
metadata cleanup 203
operations masters
managing 182–187
practice exercise 230–234
recovering deleted objects 208–215
snapshots 204–206, 215
Active Directory Administrative Center
deploying an RODC 193
domain functional level, coniguring 80
enabling Recycle Bin 208
ine-grained password policies
managing 81
practice exercise 110–113
non-expiring passwords, locating 72
practice exercise 107–110
password settings, determining 84
practice exercise 234
Active Directory BitLocker recovery 526
Active Directory Domain Services (AD DS) 66
Active Directory Domain Services Coniguration Wizard
coniguring a Global Catalog server 188
deploying an RODC 191–193
practice exercise 221–225
removing domain controllers 203
Active Directory integrated zones 124–126
practice exercise 159
Active Directory Recycle Bin 208–210
practice exercise 234
Active Directory Schema 183
Active Directory Schema snap-in 183
practice exercise 232
Active Directory Users And Computers
accessing snapshots 205
cleaning up metadata 204
operations masters, managing 182–186
practice exercise 230–232
Add-ADDSReadOnlyDomainControllerAccount cmdlet
193
Add-DnsServerConditionalForwarderZone PowerShell
cmdlet 134
Add-DNSServerDirectoryPartition cmdlet 125
Add-DnsServerForwarder cmdlet 132
Add-DnsServerPrimaryZone cmdlet 127
Add-DnsServerResourceRecordA cmdlet 148
Add-DnsServerResourceRecordCName cmdlet 148
Add-DnsServerResourceRecordMX PowerShell cmdlet
149
Add-DnsServerResourceRecordPtr cmdlet 150
Add-DnsServerStubZone cmdlet 136
659
Add-DnsServerStubZone cmdlet
Add-DnsServerZoneDelegation cmdlet 130
/Add-Driver switch 6
Add-KDSRootKey cmdlet 88–90
/Add-Package switch 7
/Add-ProvisionedAppxPackage switch 8
Add Roles And Features Wizard 139
deploying an RODC 191
installing Windows Server Backup 210
practice exercise 218–221, 226
AD DS (Active Directory Domain Services) 66
Add-WsusComputer command 31
Administrative Events custom view 601
administrative templates 296–302
central store 297
practice exercise 330
iltering 300
practice exercise 330
importing in ADM format 299
ADMX format 296–300
ADMX Migrator tool 299
advanced audit policies 614–620
practice exercises 641–654
Advanced Encryption Services (AES). See AES
aging and scavenging DNS zones 151
alerts, for monitoring servers 597–599
practice exercise 628
alias (CNAME) records 148
in GlobalNames zones 143
answer iles 12–14
application directory partitions, creating 125
applications
assigning 287
publishing 288
upgrading existing 290
/Apply-Image switch 10
app packages, adding to Server images 8
Approve-WsusUpdate command 31
assigning applications using Group Policy 287
auditpol.exe utility 619
audit policies, advanced 614–620
practice exercises 641–654
authentication methods 357–359
coniguring with 802.1X group policies 363–367
for network policies 372
authentication protocols for VPN 443–446
Authentication Requirements, coniguring for HRA 349
authoritative restore for Active Directory objects
212–214
autoenrollment, enabling using EFS 531
660
automatic approval rules for WSUS 36–38
practice exercise for 58
Automatic Update Detection Frequency policy 34
automating server operating system deployment 12–14
autonomous mode, coniguring WSUS 30
Autounattend.xml ile 12
B
backing up Active Directory 210–212
backing up GPOs 243
practice exercise 269–271
Backup-GPO cmdlet 242
BitLocker 522–529
DRA (data recovery agent) 527
modes, coniguring 523–525
Network Unlock feature 528
practice exercise 566–571
recovering data 525–528
TPM (Trusted Platform Module) 523–525
BitLocker, protecting RODC virtual machines 196
BitLocker To Go 525
blocking Group Policies 254
Block Inheritance function 255
practice exercise 275
block-level replication, used by DFS 514–516
boot environment, protecting with BitLocker 522–529
boot images, used by WDS 17
boot options for WDS 21
Boot.wim ile 2
build and capture process 9
BYOD (Bring Your Own Device) scenarios 388
C
caching Group Policies 260
capture images, used by WDS 18
/Capture-Image switch 10
capturing trafic using Message Analyzer 611–613
centralized deployment 12
central store
creating 297
practice exercise 330
certiicate enrollment practice exercise 574–578
Certiication Authority (CA)
choosing 348
practice exercise 484, 566–571
using with an HRA 397
Dism.exe command-line utility
CHAP (Challenge Handshake Authentication Protocol)
444
Cisco Network Access Control (Cisco NAC) 346
client naming policy 20
cloning DFS replication databases 519
cloning domain controllers 197
CNAME records 148
in GlobalNames zones 143
collector-initiated event subscription, coniguring 604
Computer Coniguration settings 258–260
conditional forwarders, DNS 131–133
conditions
for connection request policies 353–356
for network policies 370–372
Conigure Automatic Updates policy 34
Conigure Forwarder Resource Usage policy 605
Conigure Target Subscription Manager policy 605
connection request policies 350–363
adding conditions 353–356
creating 361–363
default policy 360
forwarding 356
network access servers, specifying type 351
realm name, applying 359
constraints, coniguring for network policies 372
Control Panel settings, coniguring with Group Policy
preferences 319–321
Copy-GPO cmdlet 243
copying GPOs 246
corrupted DFS databases, recovering 520
counter alerts, for monitoring servers 597–599
practice exercise 628
Create Multicast Transmission Wizard 24
creating GPOs 249
credential roaming, enabling using EFS 531
cryptographic policies of an HRA 397
D
data collector sets, for monitoring servers 592–596
practice exercise 621–626
DCCloneConig.xml ile 198
DCGPOFix.exe command 246
Default Domain Policy GPO 67
defragmenting Active Directory database 200–203
delegating GPO management 248–251
delegating password settings permissions 78–80
Delegation Of Control Wizard 79
deleted Active Directory objects, recovering 208–215
Deny-WsusUpdate command 32
deployed servers, servicing and updating 27–39
deploying scripts to users and computers 291–293
practice exercise 329–332
deploying software using Group Policy 285–291
deploying Windows Server images 11–27
practice exercise for 43–47
Deployment Image Servicing and Management (DISM)
tool 3
deployment topologies supported by DirectAccess 456
device drivers
adding to Server images 6
importing packages into WDS 25
DFS (Distributed File System)
cloning replication databases 519
coniguring 511–521
domain-based namespaces 512
namespaces 511–513
practice exercise 558–560
practice exercise 555–558
recovering databases 520
remote differential compression 514–516
replication 514–520
practice exercise 560–566
targets, adding 516
staging folders 515
stand-alone namespaces 512
DHCP enforcement, coniguring for NAP 377–380
practice exercise 401, 406–412
DirectAccess 454–473
application servers, coniguring 473
beneits of 455
client requirements 461
coniguring a DIrectAccess server 457–460
DNS, coniguring for 463
irewall rules, coniguring 464
infrastructure 455–460
infrastructure servers, coniguring 470–472
Network Location Server (NLS) 460, 463, 470
network topologies supported 456
remote access servers, coniguring 469
Remote Access Setup diagram, coniguring with
465–473
remote clients, coniguring 467–469
Directory Services Restore Mode. See DSRM
discover images, used by WDS 15, 18
Dism.exe command-line utility 3–10
661
DISM tool
DISM tool. See Deployment Image Servicing and Management tool
Distributed File System (DFS). See DFS
DNS (Domain Name System)
coniguring, for DirectAccess 463
preparing servers for DirectAccess 459
DNSKEY record 155
DNSSEC. See Domain Name System Security Extensions
DNSSEC Key Master 155
DNS zones 123–136
Active Directory integrated zones 124–126
aging and scavenging 151
GlobalNames zones 142–144
host records in 148
mail exchanger (MX) records in 149
pointer (PTR) records in 150
practice exercise 159
primary zones 127
resource records in 147
reverse lookup zones 128–130
secondary zones 127
practice exercise 168–170
signing a zone 153
split DNS 131
stub zones 134
supporting dynamic updates 126
types of 124–130
using DNSSEC with 153–157
zone delegation 129
practice exercise 163–168
domain-based namespaces 512
domain controllers
cloning 197
Global Catalog servers 187–189
maintaining 200–207
managing 181–200
non-authoritative restore 214
operations masters 182–187
practice exercise 217–225
removing 203
RODC (read-only domain controller) 190–197
snapshots, managing 204–206
universal group membership caching (UGMC) 189
domain functional level
ine-grained password policies and 80
for GMSAs 88
Domain Name System (DNS). See DNS
Domain Name System Security Extensions (DNSSEC)
147, 153–157
662
practice exercise 173–175
domain naming master 184
domain user password policies 66–70
ine-grained 80–82
downloading software updates, practice exercise for
40–42
DRA (data recovery agent)
using with BitLocker 527
using with EFS 533
driver packages, importing into WDS 25
practice exercise for 52–54
dsamain command 205
DSRM (Directory Services Restore Mode)
and the Active Directory Recycle Bin 208
coniguring domain controller as RODC 192
performing authoritative restore 212–214
Dynamic Host Coniguration Protocol (DHCP). See DHCP
dynamic update options for DNS zones 126
practice exercise 159
E
EAP-MD5 CHAP (Extensible Authentication ProtocolMessage Digest 5 Challenge Handshake Authentication) 443
EAP Quarantine Enforcement Client policy 383, 386
EAPs (Extensible Authentication Protocols) 357
EAP-TLS (Extensible Authentication Protocol-Transport
Level Security) 443
EFS (Encrypting File System) 530–533
certiicates, coniguring 531–533
practice exercise 571–574
practice exercise 566–571, 578–582
recovering data 532
Enable Client-Side Targeting policy 34
/Enable-Feature switch 8
Encrypting File System (EFS). See EFS
encryption
using BitLocker 522–529
using EFS (Encrypting File System) 530–533
encryption, selecting types of 368
Enforce password history policy 68
practice exercise 96
Enforce User Logon Restrictions policy 93
enforcing Group Policies 254
event-driven tasks 606–609
event log ilters 600
event log forwarding 603–606
Group Policy Management Console (GPMC)
event log views 601–603
event subscriptions 603–606
practice exercise 630–635
event trace providers 595
Event Viewer 599–609
EXE format, deploying iles in 286
Export-DfsrClone Windows PowerShell cmdlet 519
expression-based audit policies 616
practice exercise 649–652
Extensible Authentication Protocols. See EAPs
F
ile classiication, FSRM 505
ile expiration, practice exercise 549–552
ile integrity check, performing 200
ile-level auditing 618
practice exercise 652–654
ile management tasks, FSRM 506
ile quotas, FSRM 502
practice exercise 541–545
ile screens, FSRM 504–506
practice exercise 545–549
File Server Resource Manager. See FSRM
iltering administrative templates 300
practice exercise 330
iltering policies for GPOs 255–257
ilters for event logs 600
ine-grained password policies 66, 77–85
practice exercise 110–113
Flexible Single Master Operations. See FSMO
folder-level auditing 618
practice exercise 652–654
folder redirection 282–285
practice exercise 324–328
folder replication, DFS 514–520
forwarders, DNS 132
forwarding connection requests 356
forwarding event logs 603–606
FSRM (File Server Resource Manager)
coniguring 501–508
practice exercise 536–541
ile classiication 505
ile expiration, practice exercise 549–552
ile management tasks 506
ile screens 504–506
practice exercise 545–549
quotas 502
practice exercise 541–545
storage reports 507
practice exercise 552–556
Full Mesh topology 516
fully qualiied domain names (FQDNs)
host records and 148
pointer (PTR) records and 150
resource record maps and 147
reverse lookup zones and 128
G
Get-ADDCCloningExcludedApplicationsList cmdlet 198
Get-ADDomain cmdlet 182
Get-ADForest cmdlet 182
Get-DfsrCloneState cmdlet 519
/Get-Features switch 8
Get-GPO cmdlet 242
/Get-ProvisionedAppxPackage switch 8
Get-Service cmdlet 91
/Get-wiminfo switch 5
Get-WsusClassiication command 32
Get-WsusComputer command 32
Get-WsusProduct command 32
Get-WsusServer command 32
Global Catalog servers 187–189
global clouds 145
GLobalNames zones 142–144
Global Object Access Auditing node 617
Global Search function, Active Directory Administrative
Center 84
GMSAs. See Group Managed Service Accounts
GPFixup.exe command 247
GPOs (Group Policy Objects) 66
Group Managed Service Accounts (GMSAs) 87–90
practice exercise 114
requirements 88
Group Policy Management Console (GPMC) 242
coniguring password policies 96–100
delegating permissions 248–251
linking GPOs 250
policy processing precedence 253
practice exercise 268–271
practice exercise, using Group Policy Modeling
104–107
remote Group Policy update 262
Group Policy Modeling
delegating permissions 251
practice exercise 275
Group Policy Objects (GPOs) 66
administrative templates 296–302
663
Group Policy Modeling
advanced audit policies 614–620
practice exercise 641–645
assigning applications 287
backing up 243
practice exercise 269–271
BitLocker, coniguring 525
practice exercise 582–584
block inheritance 254
practice exercise 275
caching 260
copying 246
creating 249
delegating management of 248–251
deploying applications 285–291
editing 249
enforcing 254
ixing problems 246
importing 245
linking 250
loopback processing 258–260
practice exercise 271
maintaining 241–251
migrating 247
.msi iles, installing applications from 286
permissions, delegating 248–251
practice exercise 265–268
processing precedence 253
publishing applications 288
redirecting folders 282–285
practice exercise 324–328
restoring 244
scripts, deploying to users 291–293
practice exercise 329–332
security iltering 255–257
practice exercise 273
slow-link processing 260
upgrading deployed packages 290
.zap iles, deploying installations with 286
Group Policy preferences 303–321
Control Panel settings 319–321
Internet Explorer, coniguring 314
item-level targeting 305
power options, coniguring 309
practice exercise 336–338
Local Users and Groups option 315
mapping network drives 306–308
mapping network printers 308
power options, coniguring 309–313
practice exercise 331–338
664
registry, coniguring 314
settings commonly used 303
Windows settings 317–319
Group Policy Results, delegating permissions 251
Group Policy, using with WSUS 33
H
HCAP (Host Credential Authorization Protocol), installing
346–350
health policies, coniguring for NAP 395
Health Registration Authority (HRA). See HRA
health validators, coniguring for Network Access Protection 392–399
Host Credential Authorization Protocol (HCAP).
See HCAP
host records in DNS zones 148
HRA (Health Registration Authority) 397
installing 346–350
Hub And Spoke topology 516
I
IKEv2 tunneling protocol 444
Import-DfsrClone cmdlet 519
Import-GPO cmdlet 242
importing GPOs 245
inactive user accounts 75
-IncludeManagementTools switch 17
infrastructure master 186
Install-ADServiceAccount cmdlet 89
install images, used by WDS 17
Install.wim ile 2
Install-WindowsFeatureWINS command 139
Internet Explorer, coniguring with Group Policy preferences 314
Invoke-GPUpdate Windows PowerShell cmdlet 262
Invoke-WsusServerCleanup command 32
IP ilters, coniguring for Network Policy Server 367
IPsec enforcement, coniguring for NAP 380–382
IP settings, coniguring 368
item-level targeting 305
power options, coniguring 309
practice exercise 336–338
connection request policies
K
Kerberos constrained delegation 91–94
key distribution services root key, creating 88–90
Key Signing Key (KSK) 156
KRA (key recovery agent), using with EFS 533
L
L2TP/IPsec tunneling protocol 445
linking GPOs 250
link-local clouds 145
Local Users and Groups option 315
practice exercise 333
lockout policies. See account lockout policies
logoff scripts 291
logon auditing practice exercise 645–649
logon scripts 291
mapping network drives 306–308
loopback processing 258–260
practice exercise 271
M
mail exchanger (MX) records in DNS zones 149
mail gateways, locating 149
Managed Service Accounts 87
mapping network drives 306–308
mapping network printers 308
Maximum Lifetime For Service Ticket policy 93
Maximum Lifetime For User Ticket policy 93
Maximum Lifetime For User Ticket Renewal policy 93
Maximum password age policy 68
practice exercise 97
Maximum Tolerance For Computer Clock Synchronization policy 93
Merge (loopback processing) 259
Message Analyzer tool 611–613
practice exercise 638–641
metadata cleanup, Active Directory 203
migrating GPOs 247
Migration Table Editor (MTE) 247
Minimum password age policy 68
practice exercise 98
Minimum password length policy 69
practice exercise 99
monitoring servers 591–611
using data collector sets 592–596
practice exercise 621–626
using Event Viewer 599–609
using network monitoring 609–612
practice exercise 636–641
using performance counter alerts 597–599
/Mount-image switch 6
mounting Windows Server images 5
Move-ADDirectoryServerOperationMasterRole cmdlet
187
MS-CHAPv2 (Microsoft Challenge Handshake Authentication Protocol version 2) 443
.msi iles, installing applications from 286
multicast transmissions 14
coniguring settings for 22, 24
N
Name Resolution Policy Table (NRPT), creating 156
namespaces, DFS 511–513
practice exercise 558–560
NAP. See Network Access Protection
NAT (network address translation) 448–451
Network Access Protection (NAP)
802.1X enforcement, coniguring 382–385
DHCP enforcement, coniguring 377–380
practice exercise 401, 406–412
enforcement methods 376–390
health policies, coniguring 395
health validators, coniguring 392–399
IPsec enforcement, coniguring 380–382
network policies, creating 369–373
RD Gateway enforcement, coniguring 387–390
remediation server groups 398
practice exercise 405, 410
SHAs and SHVs, coniguring 395
VPN enforcement, coniguring 385–387
WSHV, coniguring 392–394
practice exercise 403
network address translation (NAT) 448–451
Network Connectivity Assistant (NCA) 469
network drives, mapping 306–308
Network Location Server (NLS) 460, 463, 470
network monitoring, for monitoring servers 609–612
practice exercise 636–641
Network Policy Server (NPS) 345–376
authentication methods 357–359
coniguring with 802.1X group policies 363–367
client coniguration 363–367
connection request policies 350–363
665
Network Location Server (NLS)
adding conditions 353–356
creating 361–363
default policy 360
forwarding 356
network access servers, specifying type 351
realm name, applying 359
deploying 346–350
encryption, selecting types of 368
IP ilters, coniguring 367
IP settings, coniguring 368
network policies
adding conditions 370–372
creating 369–373
practice exercise 402
RADIUS proxy and server 346
templates 374–376
Network Policy Service (NPS)
RADIUS accounting 429–432
practice exercise 480
RADIUS clients 426–429
practice exercise 479
RADIUS proxies 421–425
RADIUS servers 418–421
practice exercise 475–478
network printers, mapping 308
network topologies supported by DirectAccess 456
network trafic, capturing using Message Analyzer
611–613
Network Unlock feature, BitLocker 528
New-ADDCCloneConig Windows PowerShell cmdlet
198
New-ADServiceAccount cmdlet 89
New Delegation Wizard 130
New-GPO cmdlet 243
New Zone Wizard 124, 135, 143
Next Secure (NSEC/NSEC3) record 155
non-authoritative restore for Active Directory objects
214
non-expiring passwords 71–73
practice exercise 107–110
NPS. See Network Policy Server
ntdsutil.exe command
creating Active Directory snapshots 204–206
defragmenting Active DIrectory database 200–203
performing authoritative restore 213
seizing FSMO roles 187
666
O
operations master
domain naming master 184
practice exercise 230–234
RID master 186
schema master 183
seizing FSMO roles 187
operations masters
managing 182–187
practice exercise 230–234
P
packages, upgrading using Group Policy 290
PAP (Password Authentication Protocol) 444
pass-through mode, Web Application Proxy in 451
Password must meet complexity requirements policy 69
practice exercise 100
Password Never Expires option 71
password policies
domain-based 66–70
ine-grained 76–84, 77–85
practice exercise 110–113
non-expiring passwords 71–73
practice exercise 107–110
practice exercise for coniguring 96–100
Password Replication Policy for RODCs 194–196
Password Settings Container (PSC) 81
Password Settings Object (PSO)
coniguring 82–84
creating 81
PDC emulator 185
Peer Name Resolution Protocol (PNRP) 144
performance counter alerts, for monitoring servers
597–599
practice exercise 628
Performance Monitor 592–595
practice exercise 621–626
permissions
setting for folder redirection 284
(PNRP) Peer Name Resolution Protocol 144
pointer (PTR) records in DNS zones 150
policy processing precedence 253
power options, coniguring 309–313
Power Options (Windows XP) 309–311
Power Plans 312
Power Scheme (Windows XP) 311
RSAT.
PPTP tunneling protocol 445
Pre-boot Execution Environment. See PXE
precedence, Group Policy processing 253
prestaging an RODC account 193
primary zones 127
PSO. See Password Settings Object
publishing applications 288
push partners and pull partners, coniguring WINS servers 140
PXE-compliant network adapters 14–16
PXE response settings, coniguring WDS with 19
Q
quotas, FSRM 502
practice exercise 541–545
R
RADIUS accounting 429–432
practice exercise 480
RADIUS clients 426–429
practice exercise 479
RADIUS, coniguring 417–434
RADIUS proxies 421–425
RADIUS proxy 346
connection request policies and 359
RADIUS server 346
connection request policies and 359
RADIUS servers 418–421
practice exercise 475–478
RD Gateway enforcement, coniguring for NAP 387–390
read-only domain controller. See RODC
realm name, applying to connection request policies
359
recovering Active Directory objects 208–215
recovering data
from BitLocker-protected volumes 525–528
from corrupted DFS databases 520
from EFS-encrypted iles 532
Recycle Bin, Active Directory 208–210
practice exercise 234
redirecting folders 282–285
practice exercise 324–328
registry keys, selecting to monitor 595
registry settings, coniguring with Group Policy preferences 314
relative identiiers (RIDs) 186
remediation server groups 398
practice exercise 405, 410
Remote Access role service
coniguring on VPN server 438–443
installing 435–437
Web Application Proxy 451
practice exercise 483–489
Remote Access Setup diagram 465–473
coniguring application servers 473
coniguring infrastructure servers 470–472
coniguring remote access servers 469
coniguring remote clients 467–469
Remote Authentication Dial-In User Service. See RADIUS
Remote Desktop Services. See RDS
remote differential compression, used by DFS 514–516
remote Group Policy update 261
Remote Server Administration Tools (RSAT) 89
managing WDS with 16
removable device auditing practice exercise 641–645
Remove-GPO cmdlet 243
/Remove-ProvisionedAppxPackage switch 8
Rename-GPO cmdlet 243
Replace (loopback processing) 259
replica mode, coniguring WSUS 30
replication, DFS 514–520
cloning databases 519
practice exercise 560–566
targets, adding 516
replication partners, coniguring WINS servers 140
replication scope
coniguring 125–127
practice exercise 161–163
Reset Account Lockout Counter After policy 71
practice exercise 103
resetting password permissions 78–80
Resource Monitor tool 610
Resource Record Signature (RRSIG) records 154
resource records in DNS zones 147
Restore-GPO cmdlet 243
restoring Active Directory objects 208–215
restoring GPOs 244
reverse lookup zones 128–130
RID (relative identiier) master 186
RODC (read-only domain controller) 190–197
Password Replication Policy 194–196
practice exercise 225–230
667
schedules, replication
Routing and Remote Access
coniguring server routing 446–448
coniguring VPN server 439–443
deploying 435–437
NAT (network address translation) 448–451
Routing Information Protocol v2 (RIP) 446
RSAT. See Remote Server Administration Tools
S
schedules, replication 517
schema master 183
scripts, deploying to users and computers 291–293
practice exercise 328–331, 329–332
secondary zones 127
practice exercise 168–170
security iltering for GPOs 255–257
practice exercise 273
security identiiers (SIDs) 186
security roles in WSUS 32
seizing FSMO roles 187
self-service password reset 79
semantic integrity check, performing 200
Server Core version of Windows Server
installing WDS on computers with 16
installing WSUS on computers with 28
Server images. See Windows Server images
servers, monitoring. See monitoring servers
service principal names (SPNs) 94
service tickets, determined by Kerberos policies 92
servicing Windows Server images 4–11
practice exercise for 42
Set-ADComputer cmdlet 92
Set-ADDomainMode Windows PowerShell cmdlet 80
Set-ADObject cmdlet 209
Set-ADObject Windows PowerShell cmdlet 213
Set-ADServiceAccount cmdlet 89, 92
Set-ADUser cmdlet 92
Set-DnsServerScavenging cmdlet 152
SetSPN command-line utility 94
Set-WsusClassiication command 32
Set-WsusProduct command 32
Set-WsusServerSynchronization command 32
shared folders, locating with DFS 511, 516
shared secret, coniguring 424, 427
SHA (System Health Agent), coniguring for NAP 395
shutdown scripts 291
SHV (System Health Validator), coniguring for NAP 395
668
signing DNS zones 153
single-label name resolution solutions
GlobalNames zones 142–144
practice exercise 171
WINS 138–142
slow-link processing 260
snapshots, Active Directory 204–206
software deployment using Group Policy 285–291
SPAP (Shiva Password Authentication Protocol) 444
Specify Intranet Microsoft Update Service Location
policy 34
split DNS 131
SQL Server logging, coniguring 430–432
SSL certiicate, obtaining for DirectAccess server 459,
463
SSTP tunneling protocol 445
staging folder, DFS 515
stale resource records in DNS zones 151
stand-alone namespaces 512
startup scripts 291
storage reports, FSRM 507
practice exercise 552–556
Store Passwords Using Reversible Encryption policy 69
stub zones 134
subscriptions, event 603–606
practice exercise 630–635
success and failure auditing, coniguring 618–620
Sysprep.exe utility 9
System Health Agent (SHA), coniguring for NAP 395
System Health Validator (SHV), coniguring for NAP 395
T
targeting categories when applying Group Policy preferences 305, 309
practice exercise 336–338
tasks, event-driven 606–609
templates for Network Policy Server (NPS) 374–376
Ticket Granting Ticket (TGT) 93
time synchronization, performed by PDC emulator 185
tombstone lifetime setting 212
tombstone reanimation 214
topologies supported by DirectAccess 456
topology, replication 516
TPM (Trusted Platform Module), using with BitLocker
523–525
transport agent policies, coniguring for an HRA 398
Trust anchors 155
WSUS
tunneling protocols, VPN 444–446
two-factor authentication, coniguring 458
U
Uninstall-ADDSDomainController cmdlet 203
universal group membership caching (UGMC) 189
/Unmount-Wim switch 9
update deployment using WSUS 28
update iles, downloading 40–42
upgrading deployed packages 290
User Coniguration settings 258–260
user password policies, domain-based 66–70
user tickets, determined by Kerberos policies 92
V
views of event logs 601–603
virtual service accounts 90
VPN authentication protocols 443–446
VPN enforcement, coniguring for NAP 385–387
VPN servers
coniguring Remote Access role service on 438–443
practice exercise 481–483
VPN settings, coniguring 437–446
VPN tunneling protocols 444–446
W
WDS. See Windows Deployment Services
Web Application Proxy 451
practice exercise 483–495
wecsvc (Windows Event Collector) 604
Windows Assessment and Deployment Kit (Windows
ADK) 12
Windows Deployment Services (WDS) 14–27
client naming policy for 20
coniguring 19–23
practice exercise for 47–51
driver packages, importing into 25
practice exercise for 52–54
images, importing into 17–19
installing on Server Core versions 16
multicast transmissions 14, 22
practice exercise for 43–47
requirements for 15
transmissions, coniguring 24
Windows Imaging (WIM) iles 2
practice exercise for servicing 42
Windows PE 17
Windows PowerShell
importing 16
support in WSUS 28, 31
Windows Security Health Validator (WSHV), coniguring
for NAP 392–394
Windows Server Backup, installing 210
Windows Server images
adding device drivers to 6
answer iles and 12
automating deployment of 12–14
build and capture process 9
committing 9
coniguring 3
deploying automatically 11–27
mounting 5
payload-removed features of 8
servicing 4–11
software updates to 6
understanding 2
Windows Server Update Services (WSUS) 27–39
automatic approval rules for 36–38
coniguring, practice exercise for 56–58
deploying 28–32
practice exercise for 54–56
deploying updates 35
groups
creating 33
practice exercise for 58
installing on Server Core versions 28
new features of 28
policies 33
replica mode, coniguring 30
security roles in 32
updating iles 30
Windows PowerShell support in 28, 31
Windows settings, coniguring with Group Policy preferences 317–319
Windows System Image Manager (Windows SIM) 12
WinRM (Windows Remote Management) 604
WINS, coniguring 138–142
wired network policies, coniguring 363–367
wired networks, coniguring 802.1X enforcement for 383
wireless network policies, coniguring 363
wireless networks, coniguring 802.1X enforcement for
384
669
.zap iles
WMI ilters
and Group Policies 257
delegating ability to create 251
WSHV (Windows Security Health Validator), coniguring
for NAP 392–394
practice exercise 403
WSUS. See Windows Server Update Services
Z
.zap iles, deploying applications with 286
zone delegation 129
practice exercise 163–168
Zone Signing Key (ZSK) 156
zone transfers
managing 127
practice exercise 168
670