• Zero Administration Kit (ZAK) for Windows to Windows 2000 Upgrades
  • Windows NT 4.0 ZAK Client Upgrades
  • Primary Domain Controller Upgrade to Windows 2000 Domain Controller
  • Adding New Windows 2000 Client Computers to a ZAK Environment
  • Group Policy Settings Required to Emulate a ZAK Installation
  • Appendix A: Security Settings and User Rights
  • Security Settings in the Default Domain Controllers Policy
  • White Paper Abstract




    Download 4,15 Mb.
    bet14/16
    Sana26.12.2019
    Hajmi4,15 Mb.
    #5115
    1   ...   8   9   10   11   12   13   14   15   16

    Windows NT 4.0 Clients


    Windows 2000 has heightened security so that the local system of Windows NT 4.0 clients cannot read user security group information from the Active Directory. Prior to Service Pack 6, Windows NT 4.0 clients requested System Policies in the local system context, which means they will not get any System Policies based on security groups. Clients running Windows NT 4.0 Service Pack 6 (or later) or Windows 2000 impersonate the user rather than running in local system context when requesting System Policy. The most likely occurrence of this is in an upgrade of a Windows NT 4.0 Server to Windows 2000. The Windows NT 4.0 clients still get any user-specific or the default domain policies. If a user was previously getting policies based on group membership, and default policies exist, the client now processes only the default policies.

    For detailed information on Windows 2000 security, see the Security Services white papers at: http://www.microsoft.com/windows2000/library/technologies/security/default.asp.



    Zero Administration Kit (ZAK) for Windows to Windows 2000 Upgrades


    This section presents information on upgrading ZAK-based servers and clients to Windows 2000.

    Information on the Zero Administration Kit for Windows is available at http://www.microsoft.com/windows/zak.


    ZAK Upgrades


    The following table highlights the results of upgrading domain controllers from Windows NT 4.0 to Windows 2000, or upgrading clients from Windows NT 4.0 ZAK and Windows 98 ZAK to Windows 2000, and Windows 2000 installations and upgrades in various combinations.

    Domain Controller

    Client

    Results

    Windows NT 4.0

    Windows NT 4.0 ZAK upgrade to Windows 2000

    The upgraded ZAK client functions in the same way as the pre-upgrade ZAK client. All System Policy is applied to the client.

    Windows NT 4.0

    Windows 98 ZAK upgrade to Windows 20001.

    In order to get policy, the client will require Windows NT 4.0-style System Policy.

    Windows NT 4.0

    Clean Windows 2000 install

    Client setup will not correspond to that of a ZAK-style client2.

    Windows NT 4.0 upgrade to Windows 2000

    Windows NT 4.0 ZAK

    The client gets ZAK-style System Policy.

    Windows NT 4.0 upgrade to Windows 2000

    Windows 98 ZAK

    The client gets ZAK-style System Policy.

    Windows NT 4.0 upgrade to Windows 2000

    Windows 2000 upgrade

    In order to get policy, the client will require Group Policy.

    Windows NT 4.0 upgrade to Windows 2000

    Clean Windows 2000 install

    The client gets Group Policy.

    Windows NT 4.0 upgrade to Windows 2000

    Install Windows NT 4.0 ZAK client

    The client gets ZAK-style System Policy.

    Windows NT 4.0 upgrade to Windows 2000

    Install Windows 98 ZAK client

    The client gets ZAK-style System Policy.


    1 Clients upgraded from Windows 98 ZAK to Windows 2000 require Windows NT 4.0-style System Policies. This is because the Windows 2000 client looks for Ntconfig.pol file in the Netlogon share. Installing ZAK support for Windows NT 4.0 is recommended. It is also possible to manually copy the policy file(s) using the Zero Administration Kit for Windows instructions for Manual TaskStation or AppsStation setup.

    2 If administrators want to have ZAK-like functionality in a Group Policy environment, they can either install ZAK and then upgrade to Windows 2000, or use Group Policy and Folder Redirection to create a ZAK client. For more information, see the upcoming section called Adding New Windows 2000 Client Computers to a ZAK Environment.

    The following section summarizes the results of upgrading Windows 98 ZAK clients and Windows NT 4.0 ZAK servers and clients to Windows 2000:


    Windows NT 4.0 ZAK Client Upgrades


    Windows 2000 upgrade clients that are managed by a Windows NT 4.0 domain controller continue to get System Policy. ZAK policies will work correctly; all functionality as a ZAK client is preserved.

    Windows 98 ZAK Client Upgrades


    Windows 2000 upgrade clients that are managed by a Windows NT 4.0 domain controller will not get their previous Windows 98 policy. Windows 2000 clients in a Windows NT 4.0 domain do not recognize the Config.pol file but instead look for the Ntconfig.pol file in the Netlogon share. You can ensure these clients continue to get System Policy by creating an NTconfig.pol file that has the same settings that were contained in the Config.pol file.

    Primary Domain Controller Upgrade to Windows 2000 Domain Controller


    The upgrade and promotion to domain controller processes work seamlessly, but because the domain is now Windows 2000, any Windows 2000 ZAK upgrade clients will cease processing System Policy and will need to have equivalent Group Policy applied. See the section called ZAK in Group Policy for the GPO-based policy settings required.

    Adding New Windows 2000 Client Computers to a ZAK Environment


    A clean installed Windows 2000 computer joined to a Windows NT 4.0 ZAK domain will not be set up correctly to be a ZAK-style client. If administrators want a Windows 2000 ZAK-style client, they can install Windows NT 4.0 ZAK client software first, and then upgrade the client to Windows 2000.

    Alternatively, administrators can set up a clean install Windows 2000 computer as a ZAK client by redirecting the Start menu and Programs folders to point to the Netapps share on the ZAK server. It is also necessary to apply the Group Policy settings specified in the upcoming section called ZAK in Group Policy. In addition, the user account for this new computer should be set up in accordance with the instructions given in the Administrator's Guide for the Zero Administration Kit (found at http://www.microsoft.com/windows/zak/getzak.htm), in the section called Organizing Files, Shares and User Accounts on the Server. Finally, it is also necessary to redirect AppData to the Users account share.

    ZAK in Group Policy


    In the case of a domain controller being upgraded to Windows 2000 with upgraded clients, it will be necessary to create a Group Policy object to specify policy settings.

    To prevent all users in the domain from getting these policy settings, it is recommended that administrators create a security group for the targeted users and computers, and then use this group to filter the application of the GPO to the group members.


    Group Policy Settings Required to Emulate a ZAK Installation


    To emulate a ZAK installation, administrators must enable the Group Policy settings listed in this section.


    Component and
    Group Policy snap-in namespace location


    Policy settings to be enabled

    Internet Explorer: Internet Control Panel Settings

    Located under User Configuration\Administrative Templates\Windows Components/Internet Explorer\Internet Control Panel node



    Disable the General Page

    Disable the Security Page

    Disable the Contents Page

    Disable the Connections Page

    Disable the Programs Page

    Disable the Advanced Page



    Internet Explorer: Toolbars Settings

    Located under User Configuration\Administrative Templates\Windows Components/Internet Explorer\Toolbars node



    Disable Customizing Browser Toolbar buttons

    Disable Customizing Browser Toolbars



    Windows Explorer Settings

    Located under User Configuration\Administrative Templates\Windows Components\Windows Explorer node



    Enable Classic Shell

    Remove Folder Options menu item from the Tools Menu

    Remove “Map Network Drive” and “Disconnect Network Drive”

    Disable Windows Explorer Default context menu

    Hide the manage item on the Windows Explorer context menu

    Hide these specified drives on My Computer [Hide all Drives]

    Hide hardware tab

    No “Computers near me” in My Network Places

    No “Entire Network” in My Network Places




    Component and
    Group Policy snap-in namespace location


    Policy settings to be enabled

    Task Scheduler Settings

    Located under User Configuration\Administrative Templates\Windows Components\Task Scheduler node



    Hide Property Pages

    Prevent Task Run or End

    Disable Drag-and-Drop

    Disable New Task Creation

    Disable Task Deletion

    Disable Advanced Menu

    Prohibit Browse


    Start Menu and Taskbar Settings

    Located under User Configuration\Administrative Templates\Start Menu & Taskbar node



    Remove Users folder from Start Menu

    Disable and Remove Links to Windows Update

    Remove Common Program Groups from Start Menu

    Disable Programs in Settings Menu

    Remove Network & Dialup Connections from Start Menu

    Remove Favorites from Start Menu

    Remove Search menu from Start Menu

    Remove Run menu from Start Menu

    Disable and Remove Shutdown Command

    Disable Drag-and-Drop context menus on the Start Menu

    Disable Changes to Taskbar & Start Menu Settings

    Disable Context menus for the Taskbar

    Disable Personalized Settings

    Disable User Tracking

    Disable Add “Run in separate memory space” checkbox to Run Dialog box


    Active Desktop Settings

    Located under User Configuration\Administrative Templates\Desktop\Active Desktop node



    Hide All Items

    Desktop Settings

    Located under User Configuration\Administrative Templates\Desktop node



    Hide all icons on Desktop

    Prohibit User from changing My Documents path

    Disable adding, dragging, dropping and closing the Taskbar Toolbars

    Don’t save setting on exit



    Control Panel: Add/Remove Programs Settings

    Located under User Configuration\Administrative Templates\Control Panel\Add/Remove Programs node



    Disable Add/Remove Programs



    Component and
    Group Policy snap-in namespace location


    Policy settings to be enabled

    Control Panel: Display Settings

    Located under User Configuration/Administrative Templates/Control Panel/Display node



    Disable Display in Control Panel

    Control Panel: Regional Options Settings

    Located under User Configuration\Administrative Templates\Control Panel\Regional Options node



    Restrict Selection of Windows 2000 Menus and Dialogs Language

    System: Logon/Logoff Settings

    Located under User Configuration\Administrative Templates\System\Logon/Logoff node



    Disable Task Manager

    Run Logon Scripts Synchronously



    Task Scheduler Settings

    Located under Computer Configuration\Administrative Templates\Windows Components\Task Scheduler node



    Hide property page

    Prohibit Browse




    Appendix A: Security Settings and User Rights




    This appendix lists the Security Settings that are defined by default in the Default Domain Policy GPO. This GPO is created when the first domain controller in the domain is installed by DCPromo. If this first domain controller is upgraded from a Windows NT 4.0 domain controller, then the values defined for the Windows NT 4.0 domain are used instead.

    These domain-wide account policy settings (Password Policy, Account Lockout Policy and Kerberos Policy) are enforced by the domain controller computers in the domain; therefore, all domain controllers always retrieve the values of these account policy settings from the Default Domain Policy GPO.

    For a detailed description of each policy setting, refer to the Windows 2000 Server Resource Kit Online Help file for Group Policy, GP.CHM.

    Policy

    Default Value

    Comment

    Password Policy

    Enforce password history

    1 password remembered




    Maximum password age

    42 days




    Minimum password age

    0 days




    Minimum password length

    0 characters




    Passwords must meet complexity requirements

    Disabled




    Store password using reversible encryption for all users in the domain

    Disabled




    Account Lockout Policy

    Account Lockout Threshold

    0




    Kerberos Policy

    Since Kerberos support was not available in previous versions of Windows NT, the following Kerberos policies are always defined for the first domain controller of a Windows 2000 domain, regardless of whether it was upgraded or not.



    Enforce user logon restrictions.

    Enabled




    Maximum lifetime that a user ticket can be renewed

    7 days



    Maximum user ticket lifetime

    10 hours




    Maximum service ticket lifetime

    60 minutes




    Maximum tolerance for synchronization of computer clocks

    5 minutes




    Security Options

    Automatically logoff users when logon time expires

    Disabled

    This is a domain-wide setting even though it appears under the Security Options area.


    Security Settings in the Default Domain Controllers Policy


    This section lists the Security Settings that are defined by default in the Default Domain Controller Policy GPO. This GPO is created when the first domain controller in the domain is installed via DCPromo. If this first domain controller is upgraded from a Windows NT 4.0 domain controller, then the values defined for the Windows NT 4.0 domain are used instead.

    By default, these settings apply to all domain controllers in the domain. For a detailed description of each policy setting, refer to the Windows 2000 Server Resource Kit Online Help file for Group Policy, GP.CHM.



    Policy

    Default Value

    Comment

    Security Options

    Digitally sign server-side communication when possible

    Enabled




    Audit Policy

    Audit Account Logon events

    No Auditing




    Audit Account Management

    No Auditing




    Audit Directory Service Access

    No Auditing




    Audit Logon Events

    No Auditing




    Audit Object Access

    No Auditing




    Audit Policy Change

    No Auditing




    Audit Privilege Use

    No Auditing




    Audit Process Tracking

    No Auditing




    Audit System Events

    No Auditing




    User Rights Policy

    Access this computer from the network

    Administrators, Authenticated Users, Everyone


    If the following groups were given this right prior to running DCPromo, then they are removed: Backup Operators, Guests, Guest, and Users.

    If a Windows NT 4.0 domain controller is upgraded as the first Windows 2000 domain controller using a slipstreamed setup of Windows 2000 + Service Pack 1, then the Authenticated Users group is automatically given this right.



    Act as part of the operating system







    Add workstations to the domain

    Authenticated Users

    This User Right is for the support of legacy APIs. You can also allow users to create computer accounts by using this User Right. Authenticated Users can only create 10 computer accounts using this User Right.

    Back up files and directories

    Administrators, Backup Operators, Server Operators




    Bypass traverse checking

    Administrators, Authenticated Users, Everyone


    If the following groups were given this right prior to running DCPromo, then they are removed: Backup Operators, Users.

    Change the system time

    Administrators, Server Operators




    Create a pagefile

    Administrators





    Create a token object







    Create permanent shared objects







    Debug programs

    Administrators





    Force shutdown from a remote system

    Administrators, Server Operators





    Generate security audits







    Increase quotas

    Administrators





    Increase scheduling priority

    Administrators





    Load and unload device drivers

    Administrators





    Lock pages in memory







    Log on as a batch job







    Log on as a service







    Log on locally

    Account Operators, Administrators, Backup Operators, Server Operators, Print Operators

    If the following groups were given this right prior to running DCPromo, then they are removed: Authenticated Users, Guests, Guest, Users, and Everyone.

    Manage auditing and security log

    Administrators





    Modify firmware environment variables

    Administrators





    Profile single process

    Administrators





    Profile system performance

    Administrators





    Replace a process-level token







    Restore files and directories

    Administrators, Backup Operators, Server Operators





    Shut down the system

    Account Operators, Administrators, Backup Operators, Server Operators, Print Operators


    If the following groups were given this right prior to running DCPromo, then they are removed: Authenticated Users, Guests, Guest, Users, and Everyone.

    Take ownership of files or other objects

    Administrators





    Deny Logon Locally







    Deny logon as a batch job







    Deny logon as a service







    Deny Access to this computer from network







    Remove Computer from Docking Station

    Administrators

    If the following groups were given this right prior to running DCPromo, then they are removed: Users.

    Synchronize directory service data







    Enable computer and user accounts to be trusted for delegation

    Administrators


    If the following groups were given this right prior to running DCPromo, then they are removed: Users.



    Download 4,15 Mb.
    1   ...   8   9   10   11   12   13   14   15   16




    Download 4,15 Mb.