mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 12:53:38 +00:00
Update administer-security-policy-settings.md
Updates markdown for Notes. Created markdown tables in stead of HTML tables. General tidying up.
This commit is contained in:
@ -20,7 +20,8 @@ ms.date: 04/19/2017
|
|||||||
# Administer security policy settings
|
# Administer security policy settings
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
This article discusses different methods to administer security policy settings on a local device or throughout a small- or medium-sized organization.
|
This article discusses different methods to administer security policy settings on a local device or throughout a small- or medium-sized organization.
|
||||||
|
|
||||||
@ -30,90 +31,46 @@ Security settings policies are rules that you can configure on a device, or mult
|
|||||||
|
|
||||||
Security settings can control:
|
Security settings can control:
|
||||||
|
|
||||||
- User authentication to a network or device.
|
- User authentication to a network or device.
|
||||||
- The resources that users are permitted to access.
|
- The resources that users are permitted to access.
|
||||||
- Whether to record a user’s or group’s actions in the event log.
|
- Whether to record a user's or group's actions in the event log.
|
||||||
- Membership in a group.
|
- Membership in a group.
|
||||||
|
|
||||||
For info about each setting, including descriptions, default settings, and management and security considerations, see [Security policy settings reference](security-policy-settings-reference.md).
|
For info about each setting, including descriptions, default settings, and management and security considerations, see [Security policy settings reference](security-policy-settings-reference.md).
|
||||||
|
|
||||||
To manage security configurations for multiple computers, you can use one of the following options:
|
To manage security configurations for multiple computers, you can use one of the following options:
|
||||||
- Edit specific security settings in a GPO.
|
|
||||||
- Use the Security Templates snap-in to create a security template that contains the security policies you want to apply, and then import the security template into a Group Policy Object. A security template is a file that represents a security configuration, and it can be imported to a GPO, or applied to a local device, or it can be used to analyze security.
|
|
||||||
|
|
||||||
## <a href="" id="what-s-changed-in-how-settings-are-administered-"></a>What’s changed in how settings are administered?
|
- Edit specific security settings in a GPO.
|
||||||
|
- Use the Security Templates snap-in to create a security template that contains the security policies you want to apply, and then import the security template into a Group Policy Object. A security template is a file that represents a security configuration, and it can be imported to a GPO, or applied to a local device, or it can be used to analyze security.
|
||||||
|
|
||||||
|
## <a href="" id="what-s-changed-in-how-settings-are-administered-"></a>What's changed in how settings are administered
|
||||||
|
|
||||||
Over time, new ways to manage security policy settings have been introduced, which include new operating system features and the addition of new settings. The following table lists different means by which security policy settings can be administered.
|
Over time, new ways to manage security policy settings have been introduced, which include new operating system features and the addition of new settings. The following table lists different means by which security policy settings can be administered.
|
||||||
<table>
|
|
||||||
<colgroup>
|
|
||||||
<col width="50%" />
|
|
||||||
<col width="50%" />
|
|
||||||
</colgroup>
|
|
||||||
<thead>
|
|
||||||
<tr class="header">
|
|
||||||
<th align="left">Tool or feature</th>
|
|
||||||
<th align="left">Description and use</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p><a href="#bkmk-secpol" data-raw-source="[Security Policy snap-in](#bkmk-secpol)">Security Policy snap-in</a></p></td>
|
|
||||||
<td align="left"><p>Secpol.msc</p>
|
|
||||||
<p>MMC snap-in designed to manage only security policy settings.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p><a href="#bkmk-secedit" data-raw-source="[Security editor command line tool](#bkmk-secedit)">Security editor command line tool</a></p></td>
|
|
||||||
<td align="left"><p>Secedit.exe</p>
|
|
||||||
<p>Configures and analyzes system security by comparing your current configuration to specified security templates.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p><a href="#bkmk-scm" data-raw-source="[Security Compliance Manager](#bkmk-scm)">Security Compliance Manager</a></p></td>
|
|
||||||
<td align="left"><p>Tool download</p>
|
|
||||||
<p>A Solution Accelerator that helps you plan, deploy, operate, and manage your security baselines for Windows client and server operating systems, and Microsoft applications.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p><a href="#bkmk-scw" data-raw-source="[Security Configuration Wizard](#bkmk-scw)">Security Configuration Wizard</a></p></td>
|
|
||||||
<td align="left"><p>Scw.exe</p>
|
|
||||||
<p>SCW is a role-based tool available on servers only: You can use it to create a policy that enables services, firewall rules, and settings that are required for a selected server to perform specific roles.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p><a href="#bkmk-scmtool" data-raw-source="[Security Configuration Manager tool](#bkmk-scmtool)">Security Configuration Manager tool</a></p></td>
|
|
||||||
<td align="left"><p>This tool set allows you to create, apply, and edit the security for your local device, organizational unit, or domain.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p><a href="#bkmk-grouppolicy" data-raw-source="[Group Policy](#bkmk-grouppolicy)">Group Policy</a></p></td>
|
|
||||||
<td align="left"><p>Gpmc.msc and Gpedit.msc</p>
|
|
||||||
<p>The Group Policy Management Console uses the Group Policy Object editor to expose the local Security options, which can then be incorporated into Group Policy Objects for distribution throughout the domain. The Local Group Policy Editor performs similar functions on the local device.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Software Restriction Policies</p>
|
|
||||||
<p>See <a href="https://technet.microsoft.com/library/hh994606.aspx" data-raw-source="[Administer Software Restriction Policies](https://technet.microsoft.com/library/hh994606.aspx)">Administer Software Restriction Policies</a>.</p></td>
|
|
||||||
<td align="left"><p>Gpedit.msc</p>
|
|
||||||
<p>Software Restriction Policies (SRP) is a Group Policy-based feature that identifies software programs running on computers in a domain, and it controls the ability of those programs to run.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>AppLocker</p>
|
|
||||||
<p>See <a href="/windows/device-security/applocker/administer-applocker" data-raw-source="[Administer AppLocker](/windows/device-security/applocker/administer-applocker)">Administer AppLocker</a>.</p></td>
|
|
||||||
<td align="left"><p>Gpedit.msc</p>
|
|
||||||
<p>Prevents malicious software (malware) and unsupported applications from affecting computers in your environment, and it prevents users in your organization from installing and using unauthorized applications.</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|Tool or feature |Description and use |
|
||||||
|
|---------|---------|
|
||||||
|
|[Security Policy snap-in](#using-the-local-security-policy-snap-in)|Secpol.msc <br> MMC snap-in designed to manage only security policy settings.|
|
||||||
|
|[Security editor command line tool](#using-the-secedit-command-line-tool) |Secedit.exe <br> Configures and analyzes system security by comparing your current configuration to specified security templates.|
|
||||||
|
|[Security Compliance Manager](#using-the-security-compliance-manager)|Tool download <br> A Solution Accelerator that helps you plan, deploy, operate, and manage your security baselines for Windows client and server operating systems, and Microsoft applications.|
|
||||||
|
|[Security Configuration Wizard](#using-the-security-configuration-wizard)|Scw.exe <br> SCW is a role-based tool available on servers only: You can use it to create a policy that enables services, firewall rules, and settings that are required for a selected server to perform specific roles.|
|
||||||
|
|[Security Configuration Manager tool](#working-with-the-security-configuration-manager)|This tool set allows you to create, apply, and edit the security for your local device, organizational unit, or domain.|
|
||||||
|
|[Group Policy](#working-with-group-policy-tools)|Gpmc.msc and Gpedit.msc <br> The Group Policy Management Console uses the Group Policy Object editor to expose the local Security options, which can then be incorporated into Group Policy Objects for distribution throughout the domain. The Local Group Policy Editor performs similar functions on the local device.|
|
||||||
|
|Software Restriction Policies <br> See [Administer Software Restriction Policies](https://docs.microsoft.com/en-us/windows-server/identity/software-restriction-policies/administer-software-restriction-policies)|Gpedit.msc <br> Software Restriction Policies (SRP) is a Group Policy-based feature that identifies software programs running on computers in a domain, and it controls the ability of those programs to run.|
|
||||||
|
|Administer AppLocker <br> See [Administer AppLocker](/windows/device-security/applocker/administer-applocker)|Gpedit.msc <br> Prevents malicious software (malware) and unsupported applications from affecting computers in your environment, and it prevents users in your organization from installing and using unauthorized applications.|
|
||||||
|
|
||||||
## <a href="" id="bkmk-secpol"></a>Using the Local Security Policy snap-in
|
## <a href="" id="bkmk-secpol"></a>Using the Local Security Policy snap-in
|
||||||
|
|
||||||
The Local Security Policy snap-in (Secpol.msc) restricts the view of local policy objects to the following policies and features:
|
The Local Security Policy snap-in (Secpol.msc) restricts the view of local policy objects to the following policies and features:
|
||||||
|
|
||||||
- Account Policies
|
- Account Policies
|
||||||
- Local Policies
|
- Local Policies
|
||||||
- Windows Firewall with Advanced Security
|
- Windows Firewall with Advanced Security
|
||||||
- Network List Manager Policies
|
- Network List Manager Policies
|
||||||
- Public Key Policies
|
- Public Key Policies
|
||||||
- Software Restriction Policies
|
- Software Restriction Policies
|
||||||
- Application Control Policies
|
- Application Control Policies
|
||||||
- IP Security Policies on Local Computer
|
- IP Security Policies on Local Computer
|
||||||
- Advanced Audit Policy Configuration
|
- Advanced Audit Policy Configuration
|
||||||
|
|
||||||
Policies set locally might be overwritten if the computer is joined to the domain.
|
Policies set locally might be overwritten if the computer is joined to the domain.
|
||||||
|
|
||||||
@ -123,12 +80,12 @@ The Local Security Policy snap-in is part of the Security Configuration Manager
|
|||||||
|
|
||||||
The secedit command-line tool works with security templates and provides six primary functions:
|
The secedit command-line tool works with security templates and provides six primary functions:
|
||||||
|
|
||||||
- The **Configure** parameter helps you resolve security discrepancies between devices by applying the correct security template to the errant server.
|
- The **Configure** parameter helps you resolve security discrepancies between devices by applying the correct security template to the errant server.
|
||||||
- The **Analyze** parameter compares the server’s security configuration with the selected template.
|
- The **Analyze** parameter compares the server's security configuration with the selected template.
|
||||||
- The **Import** parameter allows you to create a database from an existing template. The Security Configuration and Analysis tool does this also.
|
- The **Import** parameter allows you to create a database from an existing template. The Security Configuration and Analysis tool does this also.
|
||||||
- The **Export** parameter allows you to export the settings from a database into a security settings template.
|
- The **Export** parameter allows you to export the settings from a database into a security settings template.
|
||||||
- The **Validate** parameter allows you to validate the syntax of each or any lines of text that you created or added to a security template. This ensures that if the template fails to apply syntax, the template will not be the issue.
|
- The **Validate** parameter allows you to validate the syntax of each or any lines of text that you created or added to a security template. This ensures that if the template fails to apply syntax, the template will not be the issue.
|
||||||
- The **Generate Rollback** parameter saves the server’s current security settings into a security template so it can be used to restore most of the server’s security settings to a known state. The exceptions are that, when applied, the rollback template will not change access control list entries on files or registry entries that were changed by the most recently applied template.
|
- The **Generate Rollback** parameter saves the server's current security settings into a security template so it can be used to restore most of the server's security settings to a known state. The exceptions are that, when applied, the rollback template will not change access control list entries on files or registry entries that were changed by the most recently applied template.
|
||||||
|
|
||||||
## <a href="" id="bkmk-scm"></a>Using the Security Compliance Manager
|
## <a href="" id="bkmk-scm"></a>Using the Security Compliance Manager
|
||||||
|
|
||||||
@ -136,10 +93,10 @@ The Security Compliance Manager is a downloadable tool that helps you plan, depl
|
|||||||
|
|
||||||
**To administer security policies by using the Security Compliance Manager**
|
**To administer security policies by using the Security Compliance Manager**
|
||||||
|
|
||||||
1. Download the most recent version. You can find out more info on the [Microsoft Security Guidance](https://blogs.technet.com/b/secguide/) blog.
|
1. Download the most recent version. You can find out more info on the [Microsoft Security Guidance](https://blogs.technet.com/b/secguide/) blog.
|
||||||
2. Read the relevant security baseline documentation that is included in this tool.
|
1. Read the relevant security baseline documentation that is included in this tool.
|
||||||
3. Download and import the relevant security baselines. The installation process steps you through baseline selection.
|
1. Download and import the relevant security baselines. The installation process steps you through baseline selection.
|
||||||
4. Open the Help and follow instructions how to customize, compare, or merge your security baselines before deploying those baselines.
|
1. Open the Help and follow instructions how to customize, compare, or merge your security baselines before deploying those baselines.
|
||||||
|
|
||||||
## <a href="" id="bkmk-scw"></a>Using the Security Configuration Wizard
|
## <a href="" id="bkmk-scw"></a>Using the Security Configuration Wizard
|
||||||
|
|
||||||
@ -155,62 +112,36 @@ The following are considerations for using SCW:
|
|||||||
- SCW detects server role dependencies. If you select a server role, it automatically selects dependent server roles.
|
- SCW detects server role dependencies. If you select a server role, it automatically selects dependent server roles.
|
||||||
- All apps that use the IP protocol and ports must be running on the server when you run SCW.
|
- All apps that use the IP protocol and ports must be running on the server when you run SCW.
|
||||||
- In some cases, you must be connected to the Internet to use the links in the SCW help.
|
- In some cases, you must be connected to the Internet to use the links in the SCW help.
|
||||||
> **Note** The SCW is available only on Windows Server and only applicable to server installations.
|
> [!NOTE]
|
||||||
|
> The SCW is available only on Windows Server and only applicable to server installations.
|
||||||
|
|
||||||
The SCW can be accessed through Server Manager or by running scw.exe. The wizard steps you through server security configuration to:
|
The SCW can be accessed through Server Manager or by running scw.exe. The wizard steps you through server security configuration to:
|
||||||
|
|
||||||
- Create a security policy that can be applied to any server on your network.
|
- Create a security policy that can be applied to any server on your network.
|
||||||
- Edit an existing security policy.
|
- Edit an existing security policy.
|
||||||
- Apply an existing security policy.
|
- Apply an existing security policy.
|
||||||
- Roll back the last applied security policy.
|
- Roll back the last applied security policy.
|
||||||
|
|
||||||
The Security Policy Wizard configures services and network security based on the server’s role, as well as configures auditing and registry settings.
|
The Security Policy Wizard configures services and network security based on the server's role, as well as configures auditing and registry settings.
|
||||||
|
|
||||||
For more information about SCW, including procedures, see [Security Configuration Wizard](https://technet.microsoft.com/library/cc754997.aspx).
|
For more information about SCW, including procedures, see [Security Configuration Wizard](https://docs.microsoft.com/previous-versions/orphan-topics/ws.11/cc754997(v=ws.11)).
|
||||||
|
|
||||||
## <a href="" id="bkmk-scmtool"></a>Working with the Security Configuration Manager
|
## <a href="" id="bkmk-scmtool"></a>Working with the Security Configuration Manager
|
||||||
|
|
||||||
The Security Configuration Manager tool set allows you to create, apply, and edit the security for your local device, organizational unit, or domain.
|
The Security Configuration Manager tool set allows you to create, apply, and edit the security for your local device, organizational unit, or domain.
|
||||||
|
|
||||||
For procedures on how to use the Security Configuration Manager, see [Security Configuration Manager](https://technet.microsoft.com/library/cc758219(WS.10).aspx).
|
For procedures on how to use the Security Configuration Manager, see [Security Configuration Manager](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2003/cc758219(v=ws.10)).
|
||||||
|
|
||||||
The following table lists the features of the Security Configuration Manager.
|
The following table lists the features of the Security Configuration Manager.
|
||||||
<table>
|
|
||||||
<colgroup>
|
|
||||||
<col width="50%" />
|
|
||||||
<col width="50%" />
|
|
||||||
</colgroup>
|
|
||||||
<thead>
|
|
||||||
<tr class="header">
|
|
||||||
<th align="left">Security Configuration Manager tools</th>
|
|
||||||
<th align="left">Description</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p><a href="#bkmk-seccfgana" data-raw-source="[Security Configuration and Analysis](#bkmk-seccfgana)">Security Configuration and Analysis</a></p></td>
|
|
||||||
<td align="left"><p>Defines a security policy in a template. These templates can be applied to Group Policy or to your local computer.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p><a href="#bkmk-sectmpl" data-raw-source="[Security templates](#bkmk-sectmpl)">Security templates</a></p></td>
|
|
||||||
<td align="left"><p>Defines a security policy in a template. These templates can be applied to Group Policy or to your local computer.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p><a href="#bkmk-secextensions" data-raw-source="[Security Settings extension to Group Policy](#bkmk-secextensions)">Security Settings extension to Group Policy</a></p></td>
|
|
||||||
<td align="left"><p>Edits individual security settings on a domain, site, or organizational unit.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p><a href="#bkmk-localsecpol" data-raw-source="[Local Security Policy](#bkmk-localsecpol)">Local Security Policy</a></p></td>
|
|
||||||
<td align="left"><p>Edits individual security settings on your local computer.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Secedit</p></td>
|
|
||||||
<td align="left"><p>Automates security configuration tasks at a command prompt.</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|Security Configuration Manager tools |Description |
|
||||||
|
|---------|---------|
|
||||||
|
|[Security Configuration and Analysis](#security-configuration-and-analysis) |Defines a security policy in a template. These templates can be applied to Group Policy or to your local computer.|
|
||||||
|
|[Security templates](#security-templates) |Defines a security policy in a template. These templates can be applied to Group Policy or to your local computer.|
|
||||||
|
|[Security Settings extension to Group Policy](#security-settings-extension-to-group-policy) |Edits individual security settings on a domain, site, or organizational unit.|
|
||||||
|
|[Local Security Policy](#local-security-policy)|Edits individual security settings on your local computer.|
|
||||||
|
|Secedit |Automates security configuration tasks at a command prompt.|
|
||||||
|
|
||||||
### <a href="" id="bkmk-seccfgana"></a>Security Configuration and Analysis
|
### <a href="" id="bkmk-seccfgana"></a>Security Configuration and Analysis
|
||||||
|
|
||||||
Security Configuration and Analysis is an MMC snap-in for analyzing and configuring local system security.
|
Security Configuration and Analysis is an MMC snap-in for analyzing and configuring local system security.
|
||||||
@ -238,19 +169,19 @@ To apply a security template to your local device, you can use Security Configur
|
|||||||
|
|
||||||
Security templates can be used to define:
|
Security templates can be used to define:
|
||||||
|
|
||||||
- Account Policies
|
- Account Policies
|
||||||
- Password Policy
|
- Password Policy
|
||||||
- Account Lockout Policy
|
- Account Lockout Policy
|
||||||
- Kerberos Policy
|
- Kerberos Policy
|
||||||
- Local Policies
|
- Local Policies
|
||||||
- Audit Policy
|
- Audit Policy
|
||||||
- User Rights Assignment
|
- User Rights Assignment
|
||||||
- Security Options
|
- Security Options
|
||||||
- Event Log: Application, system, and security Event Log settings
|
- Event Log: Application, system, and security Event Log settings
|
||||||
- Restricted Groups: Membership of security-sensitive groups
|
- Restricted Groups: Membership of security-sensitive groups
|
||||||
- System Services: Startup and permissions for system services
|
- System Services: Startup and permissions for system services
|
||||||
- Registry: Permissions for registry keys
|
- Registry: Permissions for registry keys
|
||||||
- File System: Permissions for folders and files
|
- File System: Permissions for folders and files
|
||||||
|
|
||||||
Each template is saved as a text-based .inf file. This enables you to copy, paste, import, or export some or all of the template attributes. With the exceptions of Internet Protocol security and public key policies, all security attributes can be contained in a security template.
|
Each template is saved as a text-based .inf file. This enables you to copy, paste, import, or export some or all of the template attributes. With the exceptions of Internet Protocol security and public key policies, all security attributes can be contained in a security template.
|
||||||
|
|
||||||
@ -260,15 +191,15 @@ Organizational units, domains, and sites are linked to Group Policy Objects. The
|
|||||||
|
|
||||||
Security settings or security policies are rules that are configured on a device or multiple device for protecting resources on a device or network. Security settings can control:
|
Security settings or security policies are rules that are configured on a device or multiple device for protecting resources on a device or network. Security settings can control:
|
||||||
|
|
||||||
- How users are authenticated to a network or device
|
- How users are authenticated to a network or device
|
||||||
- What resources users are authorized to use.
|
- What resources users are authorized to use.
|
||||||
- Whether or not a user's or group's actions are recorded in the event log.
|
- Whether or not a user's or group's actions are recorded in the event log.
|
||||||
- Group membership.
|
- Group membership.
|
||||||
|
|
||||||
You can change the security configuration on multiple computers in two ways:
|
You can change the security configuration on multiple computers in two ways:
|
||||||
|
|
||||||
- Create a security policy by using a security template with Security Templates, and then import the template through security settings to a Group Policy Object.
|
- Create a security policy by using a security template with Security Templates, and then import the template through security settings to a Group Policy Object.
|
||||||
- Change a few select settings with security settings.
|
- Change a few select settings with security settings.
|
||||||
|
|
||||||
### <a href="" id="bkmk-localsecpol"></a>Local Security Policy
|
### <a href="" id="bkmk-localsecpol"></a>Local Security Policy
|
||||||
|
|
||||||
@ -276,59 +207,61 @@ A security policy is a combination of security settings that affect the security
|
|||||||
|
|
||||||
With the local security policy, you can control:
|
With the local security policy, you can control:
|
||||||
|
|
||||||
- Who accesses your device.
|
- Who accesses your device.
|
||||||
- What resources users are authorized to use on your device.
|
- What resources users are authorized to use on your device.
|
||||||
- Whether or not a user’s or group's actions are recorded in the event log.
|
- Whether or not a user's or group's actions are recorded in the event log.
|
||||||
|
|
||||||
If your local device is joined to a domain, you are subject to obtaining a security policy from the domain's policy or from the policy of any organizational unit that you are a member of. If you are getting a policy from more than one source, conflicts are resolved in the following order of precedence.
|
If your local device is joined to a domain, you are subject to obtaining a security policy from the domain's policy or from the policy of any organizational unit that you are a member of. If you are getting a policy from more than one source, conflicts are resolved in the following order of precedence.
|
||||||
|
|
||||||
1. Organizational unit policy
|
1. Organizational unit policy
|
||||||
2. Domain policy
|
1. Domain policy
|
||||||
3. Site policy
|
1. Site policy
|
||||||
4. Local computer policy
|
1. Local computer policy
|
||||||
|
|
||||||
If you modify the security settings on your local device by using the local security policy, then you are directly modifying the settings on your device. Therefore, the settings take effect immediately, but this may only be temporary. The settings will actually remain in effect on your local device until the next refresh of Group Policy security settings, when the security settings that are received from Group Policy will override your local settings wherever there are conflicts.
|
If you modify the security settings on your local device by using the local security policy, then you are directly modifying the settings on your device. Therefore, the settings take effect immediately, but this may only be temporary. The settings will actually remain in effect on your local device until the next refresh of Group Policy security settings, when the security settings that are received from Group Policy will override your local settings wherever there are conflicts.
|
||||||
|
|
||||||
### Using the Security Configuration Manager
|
### Using the Security Configuration Manager
|
||||||
|
|
||||||
For procedures on how to use the Security Configuration Manager, see [Security Configuration Manager How To](https://technet.microsoft.com/library/cc784762(WS.10).aspx). This section contains information in this topic about:
|
For procedures on how to use the Security Configuration Manager, see [Security Configuration Manager How To](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2003/cc784762(v=ws.10)). This section contains information in this topic about:
|
||||||
|
|
||||||
- [Applying security settings](#bkmk-applysecsettings)
|
- [Applying security settings](#applying-security-settings)
|
||||||
- [Importing and exporting security templates](#bkmk-impexpsectmpl)
|
- [Importing and exporting security templates](#importing-and-exporting-security-templates)
|
||||||
- [Analyzing security and viewing results](#bkmk-anasecviewresults)
|
- [Analyzing security and viewing results](#analyzing-security-and-viewing-results)
|
||||||
- [Resolving security discrepancies](#bkmk-resolvesecdiffs)
|
- [Resolving security discrepancies](#resolving-security-discrepancies)
|
||||||
- [Automating security configuration tasks](#bkmk-autoseccfgtasks)
|
- [Automating security configuration tasks](#automating-security-configuration-tasks)
|
||||||
|
|
||||||
### <a href="" id="bkmk-applysecsettings"></a>Applying security settings
|
### <a href="" id="bkmk-applysecsettings"></a>Applying security settings
|
||||||
|
|
||||||
Once you have edited the security settings, the settings are refreshed on the computers in the organizational unit linked to your Group Policy Object:
|
Once you have edited the security settings, the settings are refreshed on the computers in the organizational unit linked to your Group Policy Object:
|
||||||
|
|
||||||
- When a device is restarted, the settings on that device will be refreshed.
|
- When a device is restarted, the settings on that device will be refreshed.
|
||||||
- To force a device to refresh its security settings as well as all Group Policy settings, use gpupdate.exe.
|
- To force a device to refresh its security settings as well as all Group Policy settings, use gpupdate.exe.
|
||||||
|
|
||||||
**Precedence of a policy when more than one policy is applied to a computer**
|
**Precedence of a policy when more than one policy is applied to a computer**
|
||||||
|
|
||||||
For security settings that are defined by more than one policy, the following order of precedence is observed:
|
For security settings that are defined by more than one policy, the following order of precedence is observed:
|
||||||
|
|
||||||
1. Organizational Unit Policy
|
1. Organizational Unit Policy
|
||||||
2. Domain Policy
|
1. Domain Policy
|
||||||
3. Site Policy
|
1. Site Policy
|
||||||
4. Local computer Policy
|
1. Local computer Policy
|
||||||
|
|
||||||
For example, a workstation that is joined to a domain will have its local security settings overridden by the domain policy wherever there is a conflict. Likewise, if the same workstation is a member of an Organizational Unit, the settings applied from the Organizational Unit's policy will override
|
For example, a workstation that is joined to a domain will have its local security settings overridden by the domain policy wherever there is a conflict. Likewise, if the same workstation is a member of an Organizational Unit, the settings applied from the Organizational Unit's policy will override
|
||||||
both the domain and local settings. If the workstation is a member of more than one Organizational Unit, then the Organizational Unit that immediately contains the workstation has the highest order of precedence.
|
both the domain and local settings. If the workstation is a member of more than one Organizational Unit, then the Organizational Unit that immediately contains the workstation has the highest order of precedence.
|
||||||
> **Note** Use gpresult.exe to find out what policies are applied to a device and in what order.
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Use gpresult.exe to find out what policies are applied to a device and in what order.
|
||||||
For domain accounts, there can be only one account policy that includes password policies, account lockout policies, and Kerberos policies.
|
For domain accounts, there can be only one account policy that includes password policies, account lockout policies, and Kerberos policies.
|
||||||
|
|
||||||
**Persistence in security settings**
|
**Persistence in security settings**
|
||||||
|
|
||||||
Security settings may still persist even if a setting is no longer defined in the policy that originally applied it.
|
Security settings may still persist even if a setting is no longer defined in the policy that originally applied it.
|
||||||
|
|
||||||
Persistence in security settings occurs when:
|
Persistence in security settings occurs when:
|
||||||
|
|
||||||
- The setting has not been previously defined for the device.
|
- The setting has not been previously defined for the device.
|
||||||
- The setting is for a registry object.
|
- The setting is for a registry object.
|
||||||
- The setting is for a file system object.
|
- The setting is for a file system object.
|
||||||
|
|
||||||
All settings applied through local policy or a Group Policy Object are stored in a local database on your device. Whenever a security setting is modified, the computer saves the security setting value to the local database, which retains a history of all the settings that have been applied to the device. If a policy first defines a security setting and then no longer defines that setting, then the setting takes on the previous value in the database. If a previous value does not exist in the database, then the setting does not revert to anything and remains defined as is. This behavior is sometimes called "tattooing."
|
All settings applied through local policy or a Group Policy Object are stored in a local database on your device. Whenever a security setting is modified, the computer saves the security setting value to the local database, which retains a history of all the settings that have been applied to the device. If a policy first defines a security setting and then no longer defines that setting, then the setting takes on the previous value in the database. If a previous value does not exist in the database, then the setting does not revert to anything and remains defined as is. This behavior is sometimes called "tattooing."
|
||||||
|
|
||||||
@ -350,42 +283,14 @@ Security Configuration and Analysis performs security analysis by comparing the
|
|||||||
|
|
||||||
Security Configuration and Analysis displays the analysis results by security area, using visual flags to indicate problems. It displays the current system and base configuration settings for each security attribute in the security areas. To change the analysis database settings, right-click the entry, and then click **Properties**.
|
Security Configuration and Analysis displays the analysis results by security area, using visual flags to indicate problems. It displays the current system and base configuration settings for each security attribute in the security areas. To change the analysis database settings, right-click the entry, and then click **Properties**.
|
||||||
|
|
||||||
<table>
|
|Visual flag |Meaning |
|
||||||
<colgroup>
|
|---------|---------|
|
||||||
<col width="50%" />
|
|Red X |The entry is defined in the analysis database and on the system, but the security setting values do not match.|
|
||||||
<col width="50%" />
|
|Green check mark |The entry is defined in the analysis database and on the system and the setting values match.|
|
||||||
</colgroup>
|
|Question mark |The entry is not defined in the analysis database and, therefore, was not analyzed. <br> If an entry is not analyzed, it may be that it was not defined in the analysis database or that the user who is running the analysis may not have sufficient permission to perform analysis on a specific object or area.|
|
||||||
<thead>
|
|Exclamation point |This item is defined in the analysis database, but does not exist on the actual system. For example, there may be a restricted group that is defined in the analysis database but does not actually exist on the analyzed system.|
|
||||||
<tr class="header">
|
|No highlight |The item is not defined in the analysis database or on the system.|
|
||||||
<th align="left">Visual flag</th>
|
|
||||||
<th align="left">Meaning</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Red X</p></td>
|
|
||||||
<td align="left"><p>The entry is defined in the analysis database and on the system, but the security setting values do not match.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Green check mark</p></td>
|
|
||||||
<td align="left"><p>The entry is defined in the analysis database and on the system and the setting values match.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Question mark</p></td>
|
|
||||||
<td align="left"><p>The entry is not defined in the analysis database and, therefore, was not analyzed.</p>
|
|
||||||
<p>If an entry is not analyzed, it may be that it was not defined in the analysis database or that the user who is running the analysis may not have sufficient permission to perform analysis on a specific object or area.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Exclamation point</p></td>
|
|
||||||
<td align="left"><p>This item is defined in the analysis database, but does not exist on the actual system. For example, there may be a restricted group that is defined in the analysis database but does not actually exist on the analyzed system.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>No highlight</p></td>
|
|
||||||
<td align="left"><p>The item is not defined in the analysis database or on the system.</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
If you choose to accept the current settings, the corresponding value in the base configuration is modified to match them. If you change the system setting to match the base configuration, the change will be reflected when you configure the system with Security Configuration and Analysis.
|
If you choose to accept the current settings, the corresponding value in the base configuration is modified to match them. If you change the system setting to match the base configuration, the change will be reflected when you configure the system with Security Configuration and Analysis.
|
||||||
|
|
||||||
To avoid continued flagging of settings that you have investigated and determined to be reasonable, you can modify the base configuration. The changes are made to a copy of the template.
|
To avoid continued flagging of settings that you have investigated and determined to be reasonable, you can modify the base configuration. The changes are made to a copy of the template.
|
||||||
@ -394,11 +299,12 @@ To avoid continued flagging of settings that you have investigated and determine
|
|||||||
|
|
||||||
You can resolve discrepancies between analysis database and system settings by:
|
You can resolve discrepancies between analysis database and system settings by:
|
||||||
|
|
||||||
- Accepting or changing some or all of the values that are flagged or not included in the configuration, if you determine that the local system security levels are valid due to the context (or role) of that computer. These attribute values are then updated in the database and applied to the system when you click **Configure Computer Now**.
|
- Accepting or changing some or all of the values that are flagged or not included in the configuration, if you determine that the local system security levels are valid due to the context (or role) of that computer. These attribute values are then updated in the database and applied to the system when you click **Configure Computer Now**.
|
||||||
- Configuring the system to the analysis database values, if you determine the system is not in compliance with valid security levels.
|
- Configuring the system to the analysis database values, if you determine the system is not in compliance with valid security levels.
|
||||||
- Importing a more appropriate template for the role of that computer into the database as the new base configuration and applying it to the system.
|
- Importing a more appropriate template for the role of that computer into the database as the new base configuration and applying it to the system.
|
||||||
Changes to the analysis database are made to the stored template in the database, not to the security template file. The security template file will only be modified if you either return to Security Templates and edit that template or export the stored configuration to the same template file.
|
Changes to the analysis database are made to the stored template in the database, not to the security template file. The security template file will only be modified if you either return to Security Templates and edit that template or export the stored configuration to the same template file.
|
||||||
You should use **Configure Computer Now** only to modify security areas *not* affected by Group Policy settings, such as security on local files and folders, registry keys, and system services. Otherwise, when the Group Policy settings are applied, it will take precedence over local settings—such as account policies. In general, do not use **Configure Computer Now** when you are analyzing security for domain-based clients, since you will have to configure each client individually. In this case, you should return to Security Templates, modify the template, and reapply it to the appropriate Group Policy Object.
|
You should use **Configure Computer Now** only to modify security areas *not* affected by Group Policy settings, such as security on local files and folders, registry keys, and system services. Otherwise, when the Group Policy settings are applied, it will take precedence over local settings—such as account policies.
|
||||||
|
In general, do not use **Configure Computer Now** when you are analyzing security for domain-based clients, since you will have to configure each client individually. In this case, you should return to Security Templates, modify the template, and reapply it to the appropriate Group Policy Object.
|
||||||
|
|
||||||
### <a href="" id="bkmk-autoseccfgtasks"></a>Automating security configuration tasks
|
### <a href="" id="bkmk-autoseccfgtasks"></a>Automating security configuration tasks
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user