Chapter 7. Managing Desktops

Managing desktops can be simplified using some of the tools and services available in Windows Server 2003 and XP Workstation Professional. However, desktop administrators still need to understand the different aspects of desktop administration, including maintenance tasks and administrative functions. Windows Server 2003 provides administrators the capability to select the appropriate method of administration to reduce or automate repetitive tasks and to provide task scalability to reduce the overall number of workstation visits or issues.

This chapter covers administrative tools and concepts that can be used to ensure data redundancy and facilitate the data restore process. Different scenarios to deploy images of and manage Microsoft Windows XP Professional desktops are discussed. Securing the desktop and deploying security patches are discussed as well. Also, remote administration and remote application installation are detailed in this chapter.

Automating Backup of Desktop Data

Knowledge workers’ workdays revolve around data, their data. If something happens to prevent them from accessing their data or their data is lost and not quickly available, it quickly can become what the system administrator’s day revolves around. Two tools to help effectively manage user data and provide some level of redundancy are Shadow Copy of Shared Folders and Intellimirror’s folder redirection component of Group Policy. These tools are designed to keep data off of the desktop and on network shares that can easily be backed up and allow users the capability to perform their own data restores when needed.

Shadow Copy of Shared Folders

The VSS application Volume Shadow Copy Restore provides users with the capability to recover previous versions of data mistakenly deleted, updated, or corrupted. Shadow copies provide instant, point-in-time copies of a specified volume at a scheduled time. Data is then backed up from the shadow volume as opposed to from the original volume; this allows the original volume to continue to accept changes, allowing users to continue working and accessing data while the backup is in process.

One of the nicest features of Shadow Copy Restore is the capability of the end user to restore his own data lost through accidental deletion, unwanted saved changes, or corruption. The bonus here is that once Shadow Copy Restore is configured and users are trained to restore their own data, you can enjoy fewer technical support calls.

The Shadow Copy Feature

The Shadow Copy feature can be enabled only on NTFS volumes; it cannot be enabled on FAT formatted volumes.

To give the end user this capability, install the shadow copies of Shared Folders client pack on the desktop. Upon installation of the Shadow Copies of Shared Folders client software a Previous Versions tab, shown in Figure 7.1, is added to the Properties dialog box of files and folders on network shares. Users access shadow copies via Windows Explorer by selecting one of three options from the Previous Versions tab: View, Copy, or Restore.

Accessing shadow copy files.

Figure 7.1. Accessing shadow copy files.

Viewing the properties of files and folders, using the Previous Versions tab, users are presented with a read-only, point in time, history of the folder or file. Users can view content of past versions of a file or folder and then copy or restore the chosen version.

Not to be Considered an Alternative

Shadow copies are not to be considered an alternative to regularly scheduled backups. Shadow copies are intended only to aid in the restoration of file-related accidents caused by human error such as accidental deletion, editing, or corruption of data.

Setting Up Shadow Copies Client

A default feature to Windows Server 2003, Windows XP requires that Twcli32.msi be run from the Windows Server 2003 server. The application plug-in can be found at %windir%System32clientsTwclientx86Twcli32.msi. You can install Twcli32.msi manually from a Windows Server 2003 server to a small group of desktops, or use the software distribution component of Group Policy for larger deployments.

Recovery of Files and Folders

Three general scenarios in which the end user might find the need to use the Previous Versions tab includes accidental file deletion (most common), accidental file replacement, or file corruption. The Volume Shadow Copy feature enables the user to easily recover from any of these scenarios without having to call the administrator for support.

The Client Must Be Running...

Windows XP, Windows 2000 Service Pack 3 (SP3) or later, or Windows 98 in order to support the Shadow Copy client. The client software does not support Windows Me or Windows NT 4.0. The Previous Versions client, which provides the same functionality as the Shadow Copy client, can only be installed on Windows XP Professional.

Recovering Deleted Files

To take advantage of the Volume Shadow Copy feature, perform the following steps to recover a deleted file:

Volume Shadow Copy Service Stores Up to 64 Versions of a Share

The Volume Shadow Copy service stores up to 64 versions of a share, depending on disk space. When the service creates the 65th shadow copy (or if you’ve used all the disk space allotted for shadow copies), the service deletes the oldest shadow copy to make space for the newest shadow copy.

  1. In Windows Explorer navigate to the folder in which the deleted file had been stored.

  2. Right-click in the blank space of the folder displayed in the right-hand pane of Explorer; select Properties and then select the Previous Versions tab.

  3. Select the version of the folder that contains a copy of the file before it was deleted, and then click View.

  4. Select the file that will be recovered.

  5. Drag and drop, or cut and paste, the shadow copy to the desktop or folder on the end user’s local machine.

Recovering Overwritten or Corrupted Files

Recovering an overwritten or corrupted file is easier than recovering a deleted file. To recover an overwritten or corrupted file perform the following steps:

  1. In Windows Explorer navigate to the folder in which the deleted file had been stored.

  2. Right-click on the overwritten or corrupted file; select Properties and then select the Previous Versions tab.

  3. To view the old version, click View. To copy the old version to another location, click Copy. To replace the current version with the older version, click Restore.

Recovering Folders

To recover a folder, perform the following steps:

  1. In Windows Explorer, navigate to the folder that will be recovered.

  2. Right-click in blank space of the folder displayed in the right-hand pane of Explorer; select Properties and then select the Previous Versions tab.

  3. Choose either Copy or Restore.

  4. Choosing Restore enables the user to recover everything in that folder as well as all subfolders. Selecting Restore will not delete any files.

Folder Redirection

Folder redirection is a feature of Intellimirror that can be used to redirect certain folders on the network client’s desktop to network locations. There are five special folders located under Documents and Settings: Application Data, Desktop, My Documents, My Pictures, and Start Menu.

The benefits of folder redirection that exist to both user and administrator include the following:

  • User data is always available even when users access data from multiple computers on the network.

  • Data stored on the network share can be scheduled for routine backups that require no action from the user.

  • Data is safe in the event of local machine system or hard drive failure.

  • Disk quotas can be set through Group Policy limiting the space used by user data.

  • Having all users redirect their personal data to the network allows for easier administration of the backup and recovery of user data.

By default in Windows XP redirected folders are automatically made available offline. The benefit here is, as the name states, files stored on the network are available when the computer is offline. This is most beneficial to mobile computer users who need to access their data while on the road. It also benefits the desktop users in the event that the network or server that hosts the data is no longer available.

To override the default behavior of redirected folders automatically being made available offline, which is not recommended because it can prevent users from accessing their data, you can enable the policy Do Not Automatically Make Redirected Folders Available Offline. This setting is found in the Group Policy Editor under User Configuration, Administrative Templates, Network, Offline Files.

Decreasing the Logon and Logoff Times of Users

Folder redirection when used in conjunction with roaming user profiles has the added benefits of decreasing the logon and logoff times of users and a realized performance gain over low-speed network connections because only the data that user accesses is transferred.

The following are some basic rules of thumb to guide the system administrator when using folder redirection:

  • Allow the system to create the folders for each user. Set the correct permissions on the root folder and the system will create the folder for you with the correct permissions. If you create the folders yourself, the folders will not have the correct permissions.

  • Use fully qualified (UNC) paths incorporating %username%. For example, use \servershare\%username%. Although paths like C:foldername can be used, the path might not exist on all your target networking clients, and redirection would fail.

  • Enable client-side caching. This is important for users with portable computers.

  • Have My Pictures follow My Documents. This is the default behavior; leave as is unless there is a good reason to change.

When organizing user data on the file server(s) by group, time can be saved by redirecting data via Group Policy. For example, within Group Policy, User Configuration, Windows Settings, Folder Redirection, My Documents on the Target tab, shown in Figure 7.2, you can set the users’ My Documents folder to redirect to a specified directory by group membership. Again, use the UNC path incorporating the %username% to let the system create the folder.

Redirecting My Documents via Group Policy.

Figure 7.2. Redirecting My Documents via Group Policy.

Accelerating Deployments with Workstation Images

When considering deployment options for medium-to-large desktop deployments, you will find automated installations to be faster, easier, less expensive, and more consistent than manual installations. Windows Server 2003 and Windows XP provide several automated installation methods for automated operating system deployment. The following sections discuss unattended installations, Sysprep Installations, and RIS installations.

Unattended Installation

The unattended installation is an optimal deployment method when the goal is to perform a large number of installations while keeping user involvement to a minimum. Preparing for an unattended installation begins with creating the answer file that contains answers to the installation questions that are prompted by Windows Setup.

Creating an answer file can be done using a text editor or by using Setup Manager (Setupmgr.exe). Building an answer file with a text editor (Notepad) is faster and easier than Setup Manager, but is more prone to user error. Setup Manager will prompt for answers and build an answer file based on the responses.

After creating the answer file, a distribution share can be created on a server that the destination computers can access, which contains installations files, device drivers, and any other files required for the custom installation. A distribution share is not required for unattended installations using the operating system CD-ROM.

Unattended Installation Files

Unattended installation files are now located in the ref.chm file located in the deploy.cab file. In Windows 2000 the unattended installation information was found in unattended.doc.

To perform a clean unattended installation from the operating system CD-ROM, perform the following steps:

  1. Confirm the computer is connected to the network.

  2. The unattended answer file must be renamed to Winnt.sif and copied to floppy disk.

  3. In BIOS, set CD-ROM as the first startup device.

  4. Add a [DATA] section to Winnt.sif with the following entries:

    MSDosInitiated=0
    UnattendedInstall=Yes
    
  5. Add an [Unattended] section to Winnt.sif with the following entries:

    OemPreinstall=No
    UnattendSwitch=Yes
    

To perform a clean unattended installation with MS-DOS startup disk perform the following steps:

  1. Confirm the computer is connected to the network.

    MS-DOS contains device drivers to connect to network or load drivers for CD or DVD drive.

  2. In BIOS, set floppy disk as the first startup device.

  3. If you are installing from a distribution share, set permissions to allow proper access to the distribution share.

  4. The answer file is saved on an MS-DOS startup disk or distribution share.

Using the Systems Preparation Tool (Sysprep) for Server Images

The Systems Preparation Tool (Sysprep) is the optimal tool when performing image-based installations with the identical operating system and software configuration on multiple computers as quickly as possible. Sysprep allows for hardware and software differences among computers, minimizes end-user interaction, and reduces the number of images needed.

There are four modes of operation for Sysprep in Windows XP:

  • Audit—Used for verification of hardware and software installation while running in Factory mode.

  • Factory—Allows for customization of software installation, driver updates, Registry updates, and .INI files such as Sysprep.inf. Use the sysprep -factory command to start in this mode.

  • Reseal—This is run after Sysprep has run in factory mode and is ready for delivery to the end user. Use the sysprep -reseal command to start in this mode.

  • Clean—Cleans the critical device database, a Registry listing of devices and services that have to start for Windows XP to boot successfully. Use the sysprep -clean command to start in this mode.

When preparing the master installation always start with a clean installation of the operating system and any software applications needed. Be sure to create the master installation on drive C. Also, confirm that the HAL on the master computer is compatible with the HAL of the destination computers.

A typical scenario for creating a master image would be to first run sysprep -factory on a clean installation creating your base master image. By rebooting the system in Factory Mode you can then install any software, drivers, or configuration changes required. When all installation and configuration has been completed run Sysprep -reseal to remove machine-specific information such as the SID, computer name, and so on. The system is now ready to be imaged and deployed en masse to multiple workstations, which requires using a third-party tool.

Some of the advantages of the Sysprep utility include the following:

  • Master image can be copied to CD-ROM, duplicated, and then distributed for installation, thus reducing load on network.

  • Enables the implementation of a standard desktop image containing a standard desktop, policies, and restrictions throughout the organization.

  • Does not perform plug and play enumeration thus reducing installation time.

Deploying Server Images with Remote Installation Service

Windows Server 2003 includes a server and workstation imaging and deployment product called Remote Installation Service (RIS). RIS can be used to store multiple images on a RIS Server, which can then be downloaded over a network connection to the client computer. RIS is very handy, but before desktops are deployed using this product, some testing and planning should be performed.

Installing RIS is a fairly simple process but planning your RIS deployment begins with the installation of RIS itself. As a best practice install RIS and RIS images on separate physical disks than the operating system to improve imaging performance.

Planning how the RIS server will be used can help ensure a successful implementation. Considerations for RIS include deciding how many systems the RIS server should deliver installation images to simultaneously.

Upon initial configuration, consider what the appropriate number of RIS servers will be for the environment. A small, nonrouted, LAN environment, for example, would require only a single RIS server to service all requests up to any network bandwidth or server resource limitations that might exist. In a routed environment set the DHCP forwarding option to allow routers to forward client requests to the RIS servers. Do not use RIS over low-speed links. Offices located on the WAN over a slow link will require their own RIS server. Use the settings that are available when prestaging the client machine to direct the client to be serviced by the RIS server that is in closest proximity on the network to it.

Another consideration during the initial configuration is that restricting installation options increases the number of successful operating systems that can be completed without assistance from the administrator. The default is one installation option and one operating system option to the user.

RIS client computers must support remote boot either with a boot-up disk or using Pre-Boot eXecution Environment (PXE) on compatible systems. Follow best practices for Network Security on any network that includes PXE-enabled computers. Because RIS servers will try to deliver the image to clients as fast as the network can handle, limit RIS server access to LAN clients to avoid having the RIS server saturate WAN links while imaging client computers. Storage is always a big concern for imaging servers and third-party imaging software stores each image in a separate file, which can take up a lot of storage space. Although many times these image files compress fairly well, RIS stores images in their native file formats and replaces duplicate files with file pointers or links to save storage space.

Also, during this process the first installation image will be created. This image is based on a clean OS installation of the particular operating system version. For example, a Windows XP Professional CD could be used for the first image on a Windows Server 2003 RIS server.

Advantages of RIS include the following:

  • Enables standardized Windows XP Professional Installations

  • Customizes and controls the end-user installation using Group Policy to configure specific choices for the end-user setup wizard.

  • No physical media required for client computers using PXE technology. Non–PXE-based clients will require a boot floppy.

  • Image size is not limited by capacity of physical media.

Use Remote Boot Floppy Generator

Use Remote Boot floppy Generator (Rbfg.exe) to create remote boot disks for client computers that are not PXE-based. Rbfg.exe can be found on the RIS server at \RISServerNameRemoteInstallAdmini386Rbfg.exe.

Creating Windows XP Images

If RIS or a third-party imaging software will be used to deploy Windows XP desktop images, some steps must be followed to ensure that an image is created as problem-free as possible. The goals of deploying a new desktop image or the goals of creating standard builds and deploying using desktop imaging software might be very different between organizations but the following sections will cover steps that should be used for image creation regardless of the project goals.

Installing Desktop Software

Unless a RIS image will be created only using the Setup Manager Wizard and the installation media for a vanilla installation, Windows XP and any additional updates and applications must be installed on a workstation. First the operating system must be installed and patched to the latest service pack and post service pack release. This will help ensure operating system reliability and security by raising the installation to the latest build and locking down known vulnerabilities.

After the OS is updated Microsoft and third-party applications should be installed and updated to the latest patch level. If necessary, open the applications to verify that all the installation steps have been completed such as registering, customizing, or activating the software.

Standardizing the Desktop

After the operating system and application software have been successfully installed and configured, the desktop settings can be customized to meet the particular deployment needs. Things that might be performed during this phase are the enabling or configuring of Windows XP programs such as Remote Desktop, Remote Assistance, or Automatic Update. If roaming user profiles are not used in the organization, the desktop settings such as desktop look and feel and including screen resolution and desktop shortcuts and start menu options should be configured. After the desktop has been configured as desired, the administrator account can copy the user profile used to create the settings to the C:Documents and SettingsDefault User folder, assuming that the XP installation is on the C drive.

The Little Things

Many times after you prepare desktop images there are a bunch of annoying things that are discovered after the image has been deployed to the enterprise. Things like leftover mapped drives or local printers or application install points that only exist in the imaging lab remain in the Registry and cause confusion when an application needs to be updated or uninstalled. Something as small as leaving a window open upon logging off of the workstation before the user profile is updated to the default user profile can prove to be very annoying or look unprofessional after image deployment. To avoid the little things that might have the end users, clients, or management view your image deployment as a failure, deploy the images to a few pilot users who will be meticulous enough to alert you of these issues before the entire user base has to experience it themselves.

Automating Software Installation

Deploying applications using the software installation services of group policy requires that the applications are packaged using a Windows Installer Package file (*.MSI). When deploying applications to users, the package can be assigned to a user or the pack can be published. When deploying applications to computers, the application can be assigned.

Assigned applications will be installed automatically when the policy is applied to the computer or user. For users, published applications will be listed in the Control Panel Add/Remove Programs applet. If a user has an application published to her, the user only needs to open the Add/Remove Programs applet and double-click on the application for it to be automatically installed. Depending on how you configure the application when defining the application deployment properties in group policy, the application can be deployed using elevated privileges and can be customized using Transform files, which are used to specify installation criteria normally answered during a manual installation. Below is a step-by-step scenario for creating a software push assigned to a group of user computers:

To create a software push via group policy, perform the following steps:

  1. From Active Directory Users and Computers, right-click the OU.

  2. Select Properties.

  3. Click the Group Policy tab.

  4. Highlight the Software Distribution GPO and click Edit to open. As a best practice, create a separate GPO to administer each software package to be pushed.

  5. Expand Computer Configuration, Software Settings.

  6. Right-click Software Installation and select New, Package.

  7. Browse to \servershare and select the folder and MSI package. You can’t browse over a local or mapped drive, you have to use the UNC path.

  8. From the Deploy Software window, select Advanced.

  9. From the General tab, name the package.

  10. From the Security tab, select Advanced.

  11. Uncheck Allow Inheritable Permissions and click Copy. Then click OK.

  12. Click Add.

  13. Add the Security Group created for this push as shown in Figure 7.3.

    Adding a security group to a software installation package.

    Figure 7.3. Adding a security group to a software installation package.

  14. Confirm the security group has Read permissions (default).

  15. Highlight the Authenticated Users group.

  16. Click Remove.

  17. Click OK to exit the Properties box.

  18. Close Active Directory Users and Computers.

For This Scenario...

it is assumed that a separate Software Distribution GPO and a security group, with all of the computers receiving the push as members, have been created.

Why Select Advanced?

This selection lets you modify a push before it is saved and applied. Because Authenticated Users is applied to a push by default, if the push was applied before you removed it, some computers might get the push that shouldn’t.

Why Remove the Authenticated Users Group?

Strangely enough, Authenticated Users actually includes both users and computers. As such, any computer that can read a push policy will get the push applied. Because Authenticated Users includes all computers in an OU, every computer would receive the push if the group were not removed.

Why Create a Separate Software Distribution GPO?

The separate GPO allows for the capability to block the policy from certain OUs, like the Domain Controllers OU, to prevent software packages meant for your desktops from being applied inadvertently to your domain controllers.

When the computers with membership in the security group have been re-booted, the software package will be installed during logon.

Slow Link Detection

Group Policy uses a built-in mechanism called Slow Link Detection, which causes some policies, software pushes being one of them, not to be applied if the link between the workstation and the domain controller does not meet certain minimum requirements.

By default, a slow link is defined as an average ping time of greater than 32ms using 2048 byte packets. To manually test whether a workstation is on a slow link, open a command prompt from that machine and type ping –l 2048 serverDC (where serverDC is your closest domain controller).

Rather than displaying ping times in Group Policy, Microsoft uses a formula to convert ping times to a Kbps rating. That formula is

16,000 / ping (ms) = Kbps

If the ping times are slower than 32ms you should lower the value of the Group Policy Slow Link Detection policy. Use the formula to figure out the required value.

For more details on slow link detection, see the section titled “Slow Link Detection” in Chapter 6, “Implementing Group Policies.”

Ensuring a Secured Managed Configuration

Most desktop management strategies have some form of security assessment and implementation involved. There are two typical areas of security; one is patch management, and the other is general desktop security policies. As an organization implements desktop management policies and practices, security planning and implementation should be reviewed and determined if they need to be applied at the time of policy rollout.

Decreasing Vulnerabilities Through Security Patches

Before Software Update Service (SUS) 1.0 there was Windows Update service, which was ultimately managed by the end-user and required elevated rights to run. To avoid this scenario most administrators chose to disable Windows Update Service and create, then re-create, images that include the latest patches as they came out. As most of you know or could guess this takes a lot of time and energy.

With the introduction of SUS there is now a free patch management solution provided by Microsoft. Using the Automatic Update client installed with Windows XP Service Pack 1 or later (also installed with Windows 2000 SP3 or later), the automatic update client allows redirection to the SUS server. There are two ways that the redirection can be applied, either the hard way by specifically modifying the desktop Registry, or the easy way, through the use of an Active Directory group policy.

Some of the best practice recommendations in the use of the Software Update Server include the following:

  • Configure Group Policy so that it points clients to SUS server

  • Configure IIS on the SUS server to log client connections

Requires IE5.5 or Later

The SUS administration page requires IE5.5 or later, however because IE5.5 is not available through Windows Update, most organizations use IE6 or later. Local Admin rights to SUS server is required to view SUS admin page.

Maximizing Security on the Desktop

Most organizations have groups or individual network clients who work with or require access to highly confidential data. Such users can be found working in the Human Resources or Payroll departments of the company. Executives in the company also fall under this category. Because these users are privileged to very sensitive information, it is important for you to secure the network accounts used to access this information as well as the means by which this data is accessed.

Because there is probably sensitive data stored on servers that are, in turn, accessed by privileged network clients, you should secure that data as it passes from server to client. Most data is not protected when it travels across the network, so employees, supporting staff members, or visitors might be able to plug into the network and copy data for later analysis. They can also mount network-level attacks against other computers. Windows Internet Protocol Security (IPSec) is a key component in securing data as it travels between two computers. IPSec is a powerful defense against internal, private network, and external attacks because it encrypts data packets as they travel on the wire.

You can create and modify IPSec policies using the IP Security Policy Management snap-in available in the Microsoft Management Console. IPSec policies can then be assigned to the Group Policy Object of a site, domain, or organizational unit. If sensitive data is located on a server, assign the predefined Secure Server policy to the server so that it always requires secure communication. Then assign the predefined Client (Respond Only) policy to the network clients that will communicate with the secure server. This policy ensures that when the network client is communicating with the secure server, the communication is always encrypted. The network client can communicate normally (unsecured) with other network servers.

To assign the Client (Respond Only) IPSec policy in the Group Policy Object, perform the following steps:

  1. Navigate to IP Security Policies on Active Directory under Computer Configuration/Windows Settings/Security Settings.

  2. In the Details pane, click Client (Respond Only).

  3. Select Action, Assign.

Though it might be okay for high-security network clients to communicate normally (unsecured) with other servers within the organization that do not contain sensitive data, there might be a need to limit that client’s ability to communicate outside the organization. There are many settings available within Group Policy to prevent a user from modifying or creating new network connections. For example, a Group Policy setting can be applied to prohibit connecting a remote access connection.

To enable Group Policy settings related to network connections in the Group Policy Editor, navigate to User Configuration/Administrative Templates/Network/Network Connections. Figure 7.4 displays the settings one can enable in this category.

Group Policy settings to restrict network connections.

Figure 7.4. Group Policy settings to restrict network connections.

If the secure network clients save sensitive data to their local workstations, additional security can be provided to this data through the Encrypting File System (EFS). Because EFS is integrated with the file system, it is easy to manage and difficult to attack. Moreover, after a user has specified that a file be encrypted, the actual process of data encryption and decryption is completely transparent to the user.

To encrypt a file or folder, follow these steps:

  1. In Windows Explorer, right-click the file or folder that you want to encrypt and then click Properties.

  2. On the General tab, click Advanced.

  3. Check the Encrypt Contents to Secure Data box.

To encrypt and decrypt files, a user must have a file encryption certificate. If the file encryption certificate is lost or damaged, access to the files is lost. Data recovery is possible through the use of a recovery agent. A user account of a trusted individual can be designated as a recovery agent so that a business can retrieve files in the event of a lost or damaged file encryption certificate or to recover data from an employee who has left the company.

One of the many advantages of using Windows Server 2003 domains is that you can configure a domain EFS recovery policy. In a default Windows Server 2003 installation, when the first domain controller (DC) is set up, the domain administrator is the specified recovery agent for the domain. The domain administrator can log on to the first DC in the domain and then change the recovery policy for the domain.

To create additional recovery agents, the user accounts must have a file recovery certificate. If available, a certificate can be requested from an enterprise Certificate Authority (CA) that can provide certificates for your domain. However, EFS does not require a CA to issue certificates, and EFS can generate its own certificates to users and to default recovery agent accounts.

To create an EFS recovery policy for a domain, follow these steps:

  1. In Active Directory Users and Computers, right-click the domain whose policy you want to change and then click Properties.

  2. Click the Group Policy tab.

  3. Right-click the default domain policy and then click Edit.

  4. Navigate to the Encrypting File System under Computer Configuration/Windows Settings/Security Settings/Public Key Policies.

  5. Right-click Encrypting File System and then click Create Data Recovery Agent to create a certificate to use as the EFS recovery certificate.

Managing Systems and Configurations

When an organization starts planning the management of its desktop systems, the initial thought is simply the management of office desktop and laptop systems. However, there are typically five different types of systems where user sessions and connections need to be managed. They include the following:

  • Managing desktops remotely

  • Managing multi-user desktops

  • Managing mobile computers

  • Managing public or kiosk workstations

  • Managing administrator workstations

Managing Desktops Remotely

For administrative tasks to be performed on workstations such as installing new hardware or configuring user profile settings that are not configured using group policy settings, you can use the tools provided with Windows Server 2003 and Windows XP. Remote Desktop can not only be used to install software remotely, but also it can be used to configure just about everything that could be performed from the local console. The only limitation is that the BIOS settings cannot be controlled so if a remote reboot is performed, and the BIOS is configured to first boot from a floppy disk, if a disk is in the drive the system might never restart and a visit to the workstation will be required.

Starting with Windows Server 2003 and Windows XP the Computer Management console can be used to perform several system-related software and hardware tasks remotely. New features include adding new hardware by scanning for hardware changes or adding local user accounts or local shares or manipulating system services. This tool is very flexible for remote administration.

Managing Multiuser Desktops

The multiuser desktop is commonly used in public access situations where the desktop experiences high traffic and must be flexible for some customization, but should remain reliable and unbreakable. Keep the following items in mind when managing multiuser desktops:

  • Some level of modification to the desktop must be allowed to the users while maintaining a high level of security. Users should not have access to hardware or connection settings.

  • Enable users to modify Internet Explorer and the desktop, run needed applications, and configure some Control Panel options.

  • Restrict users via group policy from using the command prompt or the run command, accessing network settings, accessing Add/Remove programs, or running executables from disk, CD, or the Internet.

  • Set up roaming profiles so that the user’s desktop settings follow him regardless of the workstation in use. Remove local copies of roaming profiles when the user logs off to preserve disk space. The user profile will synchronize with the network before it is removed so they will be available if the user logs on again. If a profile is not available, a new local profile will be created based on the default user profile. Computers can easily be replaced because all settings are on the network profile.

  • To conserve disk space, applications should be server-based when possible. Configure shares that store applications for automatic caching so application files are cached at the workstation. You can also enforce disk quota limits through Group Policy. To do this in the Group Policy Editor, navigate to Computer Configuration/Administrative Templates/System/Disk Quotas.

  • Use folder redirection to save My Documents and Application data on server shares. Use Group policy to prevent users from storing data locally.

Managing Mobile Computers

Many companies have employees who either frequently travel or are located away from the typical office environment. These mobile users differ from desktop users in that they often log on to the network through a portable computer over a slow-link dial-up modem connection. A good management strategy for this type of user should take into account the lack of local access and connecting to the network over slow-link connection.

Because mobile users spend a majority, if not all, of their time away from the local office they will often find themselves in the unique position of having to provide their own computer support. As this is the case, mobile users often require more privileges than the standard office user. To do this, apply a separate Group Policy Object to your mobile clients that would enable users to perform software and local printer installs while at the same time restricting them from critical system files that might disable their system.

Whether or not the mobile user is connected to the network mobile users will expect to have access to their critical data. Intellimirror simplifies management of the mobile user in that it enables users to work on network files when they are not connected to the network and to have the offline version and the network version synchronize upon the next time the user connects to the network. Although Offline Files is a default feature of Windows XP, you still need to select the network files and folders that will be made available offline.

Another key management concern regarding the mobile user is software installation. It is not recommended to assign or publish software to mobile users who are rarely in the office. If they periodically work in the office, one can set the Group Policy slow-link detection to the default in the user interface so that software will install when the user is connected directly to the local area network (LAN).

Set Offline Files to Synchronize

Set Offline Files to synchronize when users log on and to periodically synchronize in the background.

One can verify or adjust the connection speed for Group Policy settings in the Group Policy slow-link detection setting. To do this in the Group Policy Object Editor, navigate to Computer Configuration/Administrative Templates/System/Group Policy or User Configuration/Administrative Templates/System/Group Policy.

Mobile users should not, for the most part, be running served applications. Typically, the mobile users’ portable computers should have all the core software installed before they have to work outside the office. If users require additional software after they are in the field and cannot return to the office to have it installed, it might make sense to copy your software packages to CD to be installed locally by the mobile users with elevated privileges.

Managing Public or Kiosk Workstations

The public or kiosk workstation exists in the public environment and generally is used to provide access to one or a limited set of applications. You should implement a highly managed configuration that restricts the user from performing any data management, software installs, or system configuration.

Another aspect of the kiosk workstation is that users should not be logging on with username and password; it is better to create a user account that automatically logs on when the computer starts. All users will use this one account to allow access to the applications provided for their use. The application that is being accessed should also be loaded automatically when the computer starts up.

The user should not be able to access Windows Explorer or the command prompt because these can be used to access the system directly. The application itself should be examined to confirm that it does not allow users a backdoor to any part of the system.

Characteristics of the policies associated with locking down the Kiosk workstation include the following:

  • Desktops have a limited set of applications that the user can run. You can limit, through Group Policy, which applications the user can execute. To do this in the Group Policy Editor, navigate to User Configuration/Administrative Templates and expand the Start menu and taskbar.

  • Desktops have no Start menu and might have limited desktop icons. You need to hide Network Neighborhood and other icons that normally appear on the desktop. As shown in Figure 7.5, many options are available for limiting the Start menu and taskbar.

    Group Policy options for limiting the Start menu and taskbar of a managed workstation.

    Figure 7.5. Group Policy options for limiting the Start menu and taskbar of a managed workstation.

  • Users cannot install software. The software the users require is already installed on their computers.

  • Users cannot access the hard disk, floppy drives, or CD-ROM. Again, you will find these policy settings under User Configuration/Administrative Templates.

  • All data (if any) is stored on the network. You can implement folder redirection to satisfy this requirement.

Managing Administrator Workstations

In many companies, the administrators’ workstations have no controls in place at all. The accounts the administrators use to log on to the network give them access to control every aspect of the workstation, as well as the servers. Because these accounts have so much power over the network, it is recommended that policies be in place to protect that power. This section suggests some recommendations in the proper configuration and use of the administrator workstation.

To make changes in Active Directory, perform system maintenance, run backups and restores, and install software, administrators require a logon account that gives them elevated privileges. At the same time, administrators also perform normal network activity such as reading e-mail, writing documents, and setting schedules. For this reason, administrators should have two or more accounts. They should have an account that behaves as a normal network client account with the same privileges and subject to the same Group Policies as most normal users or power users. This account would then be used as the standard logon for the administrator workstation. Administrators should then have other accounts for workstation administration and network or domain administration that remain secure in virtue of not being used during the day-to-day network client work. Even administrators can inadvertently make damaging changes to a workstation or server configuration if they are logged in with Domain Admin privileges all the time.

To perform many of the tasks required of an administrator the Windows Server 2003 Administration Tool Pack should be installed from the Windows Server 2003 CD. These tools are packaged as adminpak.msi.

Before Installing the Administration Tool Pack

Administration workstations should be at XP Service Pack 1 and have the QFE Q3289357 installed before installing the Administration Tool Pack.

The Run As feature can be used from any administrator workstation or any network client to elevate privileges temporarily to perform administrative functions. For example, while logged in to a workstation with a user account that has standard user privileges, you can run Active Directory Users and Computers using the Run As command to execute the utility from an administrative account.

To run an application with the Run As command, do the following:

  1. While holding down the Shift key on the keyboard, right-click the application you want to run.

  2. Click Run As.

  3. In the Run As Other User dialog box, type the username, password, and domain name of the administrative account.

You should also enforce a password-protected screensaver with a short timeout interval on administrator workstations. This protects the workstation from malicious users taking advantage of the administrator’s credentials should the administrator be temporarily away from the machine.

To specify a particular screensaver with password protection and timeout in a Group Policy, do the following:

  1. In the Group Policy Object Editor, navigate to User Configuration/Administrative Templates/Control Panel/Display.

  2. Enable the following settings: Screen Saver Executable Name, Password Protect the Screen Saver, and Screen Saver Timeout.

Finally, when dealing with a large organization with distributed administration, it is a good idea to delegate authority for network clients to administrator groups based on geographical location. Some organizations make the mistake of creating a global administrators group populated with every administrator in the company. Just because an administrator in the Santa Clara office requires administrative rights over the network clients in his office does not mean that he should also get administrative rights over network clients in Papua, New Guinea. Keeping administrators organized also protects the network clients from receiving improper Group Policy assignments.

Leveraging Useful Tools for Managing Desktops

The key to successful management and deployment of desktops is the administrator’s ability to automate and simplify repetitive tasks. Microsoft has provided several tools that help to simplify otherwise manual administrative steps. The following section addresses some available resource kit tools that ease the deployment of workstations.

Floplock

Floplock.exe is a utility, first introduced back in the NT 4.0 days, that puts a Discretionary Access Control List (DACL) on the floppy drive, providing the capability to lock the drive to all users except for Administrators and Power Users.

To install the FloppyLocker Service, run the Inetserv.exe utility. From a command prompt type

Instsrv FloppyLocker C:{data path}floplock.exe

After installation, use the services applet to configure the FloppyLocker service. Pick the account that the service should start up under and provide the correct password for the account. Administrator would be the obvious choice.

To remove the FloppyLocker service, type the following:

Instsrv FloppyLocker remove

The FloppyLocker Service can be a useful security feature in both the administrator workstation and kiosk workstation scenarios discussed previously in this chapter.

Netdom

Netdom.exe is another resource kit utility that was first introduced in the NT 4.0 days that has many uses. It is most commonly used in a scripted installation to join a client computer to the domain. The correct syntax is

netdom join <ComputerName> /domain:<DomainName> /userd:<UserName> /passwordd:
<UserNamePassword>

Using * in place of <UserNamePassword> will prompt the user for password.

Con2prt

Another old-school utility that is still useful today is Con2prt.exe, a command-line utility used to both connect and disconnect connections to network printers. Con2prt.exe is a useful tool for adding network printers while performing a scripted or automated XP desktop deployment.

From the command prompt type

  • CON2PRT /f—Deletes all existing printer connections.

  • CON2PRT /C \printservershare printer—Connects to specified printer.

  • CON2PRT /CD \printservershare printer—Connects to specified printer and sets it as default printer.

User State Migration Tool (USMT)

The User State Migration Tool (USMT) provides the same functionality as the Files and Settings Transfer Wizard but on a larger scale for migrating multiple users.

USMT is driven by a shared set of customized .INF files designed to manage the user’s environment and needs.

USMT consists of two executable files: ScanState.exe and LoadState.exe, and four migration rule information files: Migapp.inf, Migsys.inf, Miguser.inf, and Sysfiles.inf. These files can be found on the Windows XP CD-ROM in the ValueaddMsftUsmt folder.

To migrate user data you need to first modify the .INF files to identify which file types, folders, or specific files you wish to migrate. To then gather the specific data run ScanState.exe. ScanState.exe gathers the specified data and copies it to a specified location where it can later be retrieved. Use Loadstate.exe, via script, to then add the user data to the new location, for example a newly imaged XP workstation.

Summary

When it comes to desktop management in a Windows Server 2003 Active Directory environment, Microsoft has provided several administrative tools and options to simplify and scale these tasks. Using the Windows Server 2003 tools along with the services included with Windows XP Professional gives administrators several options for desktop management that can completely remove the need to physically visit a workstation for anything other that deploying the initial workstation image.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset