Friday 18 September 2015

Configure Event Forwarder and Receiver

Configure Event Forwarder and Receiver

Event Forwarding uses HTTP and HTTPS

It just send copy of events to target, the source copy remains same in source server.

Event forwarding supports below Client

Windows 2008
Windows Vista / Windows 7
Windows XP / Windows Server 2003 (Along with WS-Management 1.1 install)

Client Configuration








Server Configuration













            Wait for 15 to 20 minutes to copy event from source to target and the event will be copied only which are newly generated, the existing event does not copy to forwarder.

                                                                          End



Thursday 17 September 2015

Fine Grain Password Policy

Fine Grain Password Policy

In this post we are going to test Fine Grain Password Policy (FGPP) use and it is limitations.

When Microsoft lunched directory service 2000 and 2003, there is only one password policy for entire domain, we can’t separate them as per our environment requirement.

To resolve this issue Microsoft has enhanced their password policy to their later versions from 2008 onwards called FGPP (Fine Grain Password Policy),

To enable this policy on Windows 2008, your functional level should be 2008.


In my test lab I have created 2012 server and promoted domain controller as 2012test.local and created two OU , AdminUsers for Users and Groups and AdminComputer for Computer accounts.







My default domain controller password policy configure like below.










I have created new password policy for my Desktop Admin Group like below, those who are belongs to Desktop admin group the below password policy will apply to them.

Note

1)      Precedence would specify which policy is taken effect to users, lowest one is always wins, if there is same precedence in two PSO something would win.
2)      By default when users attempt to login, which policy will taken effect. If user is member of any PSO policy, the PSO will taken effect.
3)       PSO can be configure to User or Group , if there is conflict User PSO will taken effect.

Limitations:
FGPP is domain based
PSO cannot apply to OU, Universal Group and Domain Local.


If the PSO applied to Global Group, the policy will applied to user.


Somehow, the group scope converted to Universal, what would be the result?
The PSO ignored and default domain password policy will taken effect.
But PSO still remain the group, but it will not apply to users.
The PSO  does not support to Domain Local as well .










Restricted Administrator Access via GPO by using Restricted Group

The below LAB would guide you how to restrict Administrator access your client computers.


I have Client Computer (Client01) and it is in TestOU.




I have restriceted the client computer for  Administrative access for few users by using Restricted GPO, the name of the GPO called LocalAdmin.


Assume; if we have more than 1000 computers and computer accounts are sets in various OU, if you wants to provide your helpdesk admin group to enable local administrators for all servers and computers without disturbing existing policy , the below option would help us to accomplish the task.

I have created Central Admin GPO on top of root OU, and then I added my NETAdmin group to local administrators.



Now, the Helpdesk team enabled for Administrators access for all computer accounts.



GPO Result