Post by fpbearThanks Roger for the clarification. I wonder if we are doing something
non-standard because I can't find this info in the Microsoft documents.
We put the file system NTFS permissions in the GPO to lock down the client
systems. However the client system application can be installed in any
path specified during the Installshield.
I wonder if we are we doing something against best practices this way? Is
there a more efficient way of managing the file permissions via some other
group policy mechanism that wouldn't even need to use environment
variables for the unique client install paths?
Or do most professional apps just forget about using GPOs for this and set
the permissions once during install time? We like the GPO approach as it
gives flexibility and visibility to centrally manage the DACLs without
having to tweak with the client machines.
The docs are fairly dark on many aspects of GPO processing,
and what we have been speaking of has not always been as it
now is. Also, it is my belief that most admins do not do anything
with the filesystem section.
I think that most apps just accept defaults when they define new
directories during install, and if they do not then they do a one
time set of the DACL.
I also, as you, like to use the capability to manage NTFS permissions.
However, I do not do this via GPO but via templates and application
of these via either secedit or the Config and Analysis snapin. But
then I am dealing with servers mostly. My reasons for this are basically
two. Once set there is little reason to set again, but that is what GPO
based use would do, at least whenever that GPO is reapplied, plus the
on disk ACLing can be changed and stay that way for extended times as
the GP process does not monitor this and reapply on need. The template
allows me to analyze to see if anything is different from the expected, and
this is something probably more or at least as important to me as is having
the NTFS ACLing restored to the defined. I mean, I cannot count on the
GPO keeping the NTFS ACLs as defined anyway. Then there is also the
overhead if the ACLing is over a large store and the GPO carries a number
of other policy settings so that it becomes more likely that it is seen as
changed and reapplied. If I use this via GPO, which I agree with you does
have advantages such as central visibility and one-to-many management,
then I start with the template (so I can still analyze) and import this into
a GPO used for this purpose, perhaps carrying other policy settings, so
that I pretty much know it is not being reapplied (needlessly?) when the
GPO is seen as changed due to edits of other settings (I can always force
a reapplication by an innocent edit to bump the GPO version).
I have never seen discussion of usage of filesystem section in a best
practices type doc. I consider use of some form of this capability to
be a good practice for servers. It is certainly of high value on anything
where compliance and auditing is part of the picture. There may be
discussions on this out there somewhere, but I cannot refer you.
Roger