Managing Workstation Access


Besides controlling where files and folders are stored, group policy can also be used to control access to workstations and other network resources.

Logon Restrictions

Group policy can be used to enforce the logon time restrictions that you apply to a user or a group of them using Active Directory.

This can not only help you prevent unauthorized access after-hours from employees, but it also protects your network from being vulnerable through an user's account by creating a specific time window where logons can occur.

To configure logon restrictions, follow these steps:

1.

Open the Group Policy Management Console (GPMC) from Server Management. Expand smallbizco.local, right-click Group Policy Objects, select New, and name it Logon Restrictions.

2.

On the right pane, right-click the Logon Restriction Policy and select Edit to open the Group Policy Editor. From there expand Computer Configuration, Windows Settings, Security Settings, Local Policies, and then click Security Options.

3.

On the right pane of the Security Options screen right-click Microsoft Network Server: Disconnect Clients When Logon Hours Expire and select Properties.

4.

Select the Define This Policy box and set it to Enabled. Click OK and close the editor.

Alternatively, you could add this item to an existing policy instead of creating a new one (this reduces network overhead by not having to process many separate group policies).

Locking Down Users

With thousands of group policy settings and numerous administrative templates, sometimes it's difficult to find the specific settings that will enhance the security of your network.

Fortunately, several guidelines are available to help administrators use group policy to lock down users depending on how much control you need or want to give to the user. This section highlights some of policies that you should consider configuring if you want to greatly reduce the ability of your users to modify the settings in Windows.

Tables 21.2 and 21.3 show some of the most common user configuration and computer configuration group policies used to manage workstations. All the values provided are suggestions, and some of these policies might not even apply in your case. Consider which policies are really required and modify them.

Table 21.2. User Configuration Group Policy Settings for Managed Workstations

Policy

Setting

User Configuration, Administrative Templates, Control Panel

 

Prohibit access to the Control Panel

Enabled

Control Panel, Add or Remove Programs

 

Remove Add or Remove Programs

Enabled

Control Panel, Display

 

Remove Display in Control Panel

Enabled

Control Panel, Printers

 

Prevent addition of printers

Enabled

Prevent deletion of printers

Enabled

Desktop

 

Don't save settings at exit

Enabled

Prevent adding, dragging, dropping, and closing the Taskbar's toolbars

Enabled

Prohibit user from changing My Documents path

Enabled

Desktop, Active Desktop

 

Disable Active Desktop

Enabled

Network, Network Connections

 

Ability to Enable/Disable a LAN connection

Disabled

Prohibit access to properties of a LAN connection

Enabled

Prohibit access to the New Connection Wizard

Enabled

Prohibit TCP/IP advanced configuration

Enabled

Start Menu and Taskbar

 

Gray unavailable Windows Installer programs Start Menu shortcuts

Enabled

Prevent changes to Taskbar and Start Menu Settings

Enabled

Remove access to the context menus for the taskbar

Enabled

Remove Drag-and-drop context menus on the Start Menu

Enabled

Remove links and access to Windows Update

Enabled

Remove Network Connections from Start Menu

Enabled

Remove programs on Settings menu

Enabled

Remove Run menu from Start Menu

Enabled

System

 

Prevent access to Registry editing tools

Enabled

Prevent access to the command prompt

Enabled

Disable the command prompt script processing also?

No

Turn off Autoplay

Enabled

Turn off Autoplay on:

CD-ROM drives

System, Ctrl+Alt+Del Options

 

Remove Task Manager

Enabled

Windows Components, Internet Explorer

 

Disable changing Advanced page settings

Enabled

Disable changing Automatic Configuration settings

Enabled

Disable changing certificate settings

Enabled

Disable changing connection settings

Enabled

Disable changing proxy settings

Enabled

Disable changing ratings settings

Enabled

Windows Components, Internet Explorer

 

Disable external branding of Internet Explorer

Enabled

Disable Internet Connection Wizard

Enabled

Windows Components, Internet Explorer, Browser Menus

 

Disable Save this program to disk option

Enabled

Windows Components, Internet Explorer, Internet Control Panel

 

Disable the Advanced page

Enabled

Disable the Connections page

Enabled

Disable the Programs page

Enabled

Disable the Security page

Enabled

Windows Components, Microsoft Management Console

 

Restrict the user from entering author mode

Enabled

Restrict users to the explicitly permitted list of snap-ins

Enabled

Windows Components, Task Scheduler

 

Hide Advanced Properties Checkbox in Add Scheduled Task Wizard

Enabled

Hide Property Pages

Enabled

Prevent Task Run or End

Enabled

Prohibit Browse

Enabled

Prohibit Drag-and-Drop

Enabled

Prohibit New Task Creation

Enabled

Prohibit Task Deletion

Enabled

Windows Components, Windows Explorer

 

Allow only per user or approved shell extensions

Enabled

Do not request alternate credentials

Enabled

Hide these specified drives in My Computer

Enabled

Pick one of the following combinations

Restrict all drives

Hides the Manage item on the Windows Explorer context menu

Enabled

No "Computers Near Me" in My Network Places

Enabled

No "Entire Network" in My Network Places

Enabled

Prevent access to drives from My Computer

Enabled

Pick one of the following combinations

Restrict all drives

Remove "Map Network Drive" and "Disconnect Network Drive"

Enabled

Remove DFS tab

Enabled

Remove File menu from Windows Explorer

Enabled

Remove Hardware tab

Enabled

Remove Search button from Windows Explorer

Enabled

Remove UI to change menu animation setting

Enabled

Remove Windows Explorer's default context menu

Enabled

Removes the Folder Options menu item from the Tools menu

Enabled

Windows Components, Windows Explorer, Common Open File Dialog

 

Hide the common dialog places bar

Enabled

Windows Components, Windows Installer

 

Prevent removable media source for any install

Enabled


Table 21.3. Computer Configuration Group Policy Settings for Managed Workstations

Policy

Setting

Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options

Accounts: Rename administrator account

"!%Admin%!"

Accounts: Rename guest account

"!%Guest%!"

Devices: Allowed to format and eject removable media

Administrators

Devices: Prevent users from installing printer drivers

Enabled

Devices: Restrict CD-ROM access to locally logged-on user only

Enabled

Devices: Restrict floppy access to locally logged-on user only

Enabled

Devices: Unsigned driver installation behavior

Do not allow installation

Interactive logon: Do not display last username

Enabled

Interactive logon: Do not require CTRL+ALT+DEL

Disabled

Interactive logon: Number of previous logons to cache (in case domain controller is not available)

10 logons

Interactive logon: Prompt user to change password before expiration

14 days

Interactive logon: Smart card removal behavior

Lock Workstation

Microsoft network server: Disconnect clients when logon hours expire

Enabled

Network access: Do not allow anonymous enumeration of SAM accounts and shares

Enabled

Recovery console: Allow automatic administrative logon

Disabled

Recovery console: Allow floppy copy and access to all drives and all folders

Disabled

Shutdown: Allow system to be shut down without having to log on

Disabled

Shutdown: Clear virtual memory pagefile

Enabled

Event Log

 

Maximum application log size

10240 kilobytes

Maximum security log size

10240 kilobytes

Maximum system log size

10240 kilobytes

Prevent local guests group from accessing application log

Enabled

Prevent local guests group from accessing security log

Enabled

Prevent local guests group from accessing system log

Enabled

Administrative Templates, Network, Network Connections

Prohibit use of Internet Connection Sharing on your DNS domain network System

Enabled

Turn off Autoplay

Enabled

Turn off Autoplay on:

CD-ROM drives

System, Logon

 

Don't display the Getting Started welcome screen at logon

Enabled

Run these programs at user logon

Disabled

Windows Components, Internet Explorer

 

Disable Automatic Install of Internet Explorer components

Enabled

Disable Periodic Check for Internet Explorer software updates

Enabled

Disable showing the splash screen

Enabled

Disable software update shell notifications on program launch

Enabled

Security Zones: Do not allow users to add/delete sites

Enabled

Security Zones: Do not allow users to change policies

Enabled

Windows Components, NetMeeting

 

Disable remote Desktop Sharing

Enabled

Windows Components, Task Scheduler

 

Hide Advanced Properties Checkbox in Add Scheduled Task Wizard

Enabled

Hide Property Pages

Enabled

Prevent Task Run or End

Enabled

Prohibit Browse

Enabled

Prohibit Drag-and-Drop

Enabled

Prohibit New Task Creation

Enabled

Prohibit Task Deletion

Enabled

Windows Components, Windows Installer

 

Remove browse dialog box for new source

Enabled


For more in-depth information about each policy setting and an extended list of templates for managing workstations using group policy download the following installation package: http://www.microsoft.com/downloads/details.aspx?familyid=354B9F45-8AA6-4775-9208-C681A7043292&displaylang=en

In most cases Terminal Servers (due to their nature) require extensive use of group policy to limit user activities. Although locking down Terminal Servers is outside the scope of this book, the principles are the essentially same as locking down a workstation, and there are several good resources on the Internet on how to accomplish this task. The following link provides a starting point:

http://www.microsoft.com/downloads/details.aspx?FamilyID=7f272fff-9a6e-40c7-b64e-7920e6ae6a0d&DisplayLang=en

Best Practice: Lock Down Users

The SBS community at large recognizes that the single most significant threat to network security is not a compromise at your network gateway. Instead, the greatest area of concern for system administrators is the user desktop. Chapter 10, "Workstation Security," addresses some aspects of securing the user desktop. Many of those steps can be accomplished through group policy.

If you are merely beginning to look into locking down users, the most important thing you can do early on is, when choosing a user template, choose only the minimum rights and roles that person needs to perform her job.





Microsoft Small Business Server 2003 Unleashed
Microsoft Small Business Server 2003 Unleashed
ISBN: 0672328054
EAN: 2147483647
Year: 2005
Pages: 253

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net