The Active Directory Protection wizard opens when you click Add or Edit on the Active Directory Protection page. Using this wizard you can define the Active Directory objects and attributes to protect from unauthorized modifications.
Select Active Directory objects to protect page: On the first page of the wizard, enter a name for the template and select the Active Directory objects to protect. | |||||||||
After you have selected an object, click Add to add it to the list. After you have the file created, select Import, browse to the file, and click Open. The file must follow this format: Valid protection scope values include: Valid protected operations include:
The import supports the list separator defined for the locale of the operating system. | |||||||||
After you have selected an object, click Add to add it to the list. | |||||||||
Use the Options page to modify the search options used to retrieve directory objects. | |||||||||
| |||||||||
By default, the create, modify attributes and delete operations are selected. To change this use the drop-down arrow in the Operations cell and select/clear operations.
| |||||||||
By default, the scope of coverage is set to This object only. To change this setting, use the drop-down menu in the Scope cell to select a different scope. | |||||||||
(Optional) Select Attributes to Protect page: By default all attributes for the selected objects are protected. However, you can protect individual attributes or to exclude individual attributes from protection. | |||||||||
Select this option to protect all attributes for the selected object. | |||||||||
Use the Add button to move the attributes selected in the Attributes list over to the Selected Attributes list. | |||||||||
Use the Remove button to move the attributes selected in the Selected Attributes list back over to the Attributes list. | |||||||||
The list box to the right displays the attributes to be included in the protection template. | |||||||||
(Optional) Select Attribute Flags to Protect page: If you have selected to protect the userAccountControl attribute, you can select to protect specific attribute flags on this page. By default, all flags are selected. Clear the ALL checkbox to select specific flags and click Next. | |||||||||
(Optional) Select Accounts Allowed (NOT Allowed) to Access Protected Objects page: By default all users and groups are prevented from changing the Active Directory objects selected for protection. However, you can specify users or groups that are allowed (not allowed) to change the protected objects.
| |||||||||
The Allow option is selected by default indicating that the users and groups selected on this page will be the only accounts allowed to change the protected objects. Use the Browse or Search page to select the user or group accounts. | |||||||||
Select the Deny option if you would like to allow all users and groups to change the protected objects EXCEPT for those selected on this page. Use the Browse or Search page to select the user or group accounts. | |||||||||
After you have selected an account, click Add to add it to the list. | |||||||||
After you have selected an account, click Add to add it to the list. | |||||||||
Use the Options page to modify the search options used to retrieve directory objects. | |||||||||
| |||||||||
You can either select to always run the protection or run it only during specific times. The scheduling options override all other protection settings. | |||||||||
NOTE: Protect access from all unknown locations: All requests from locations that cannot be determined by the Change Auditor agent will be protected. If you have denied specific users or groups access to protected objects, but you have specified locations that can access the protected object, the denied user or group will be able to access the protected objects from these locations. The location options override all other protection settings. | |||||||||
After you have selected an account, click Add to add it to the list. | |||||||||
After you have selected an account, click Add to add it to the list. | |||||||||
Use the Options page to modify the search options used to retrieve directory objects. | |||||||||
Use the buttons located above this list box to add and remove accounts.
|
The Group Policy protection page displays when you select Group Policy from the Protection task list in the navigation pane of the Administration Tasks tab. From here, you can start the Group Policy Protection wizard to define critical group policy objects to protect from unauthorized modifications. You can also edit existing templates, disable and enable templates, and remove templates that are no longer being used.
The Group Policy Protection page contains an expandable view of all previously defined Group Policy Protection templates. To add a Group Policy container to the protection list, use the Add button. Once added, the following information is provided for each template:
NOTE: Authorization to use the administration tasks on the Administrations Tasks tab is defined using the Application User Interface page under the Configuration task list. If you are denied access to the tasks on this page, see the Change Auditor User Guide for more information about how to gain access. |
• |
Excluded from Protection — indicates that you selected the Allow option to allow only the selected accounts to change the protected objects. |
• |
Included in Protection - indicates that you selected the Deny option to allow all accounts to change the protected objects except for those selected. |
• |
• |
• |
The Group Policy protection templates are global settings and apply to all agents.
NOTE: If you are planning to use multiple Group Policy Protection templates, see the Change Auditor Technical Insight Guide for more information about how multiple protection templates are evaluated. |
2 |
Click Protection. |
3 |
Select Group Policy in the Protection task list. |
4 |
Click Add to open the Group Policy Protection wizard and specify the GPOs to protect. |
NOTE: The Search page is initially displayed which contains GroupPolicyContainer in the Find field and an * wildcard character in the Name field. Click Search to locate the Group Policy containers in your environment. |
7 |
By default, the create, modify attributes, and delete operations are selected; however, you can change this by using the drop-down arrow in the Operations cell in the list box and selecting or clearing the different operations. |
8 |
If required, enable the Do not enforce protection for GPOADmin working copy group policies option. |
NOTE: The Allow option is selected by default indicating that the selected users or groups will be allowed to change the protected objects. However, you can select the Deny option at the top of this page and select individual users or groups that are NOT allowed to change the protected objects. When using the Deny option, you are allowing all users and groups to change the protected objects except for those selected on this page. |
11 |
Click Finish to save the template, close the wizard and return to the Group Policy Protection page. |
1 |
On the Group Policy protection page, select the template to modify and click Edit to open the Group Policy Protection wizard where you can modify the current list of objects and the authorized accounts. |
2 |
Click Finish to save your changes and return to the Group Policy protection page. |
1 |
On the Group Policy protection page, place your cursor in the Status cell of the template and click the arrow control and select Disabled. |
2 |
1 |
On the Group Policy Protection page, place your cursor in the Status cell for the object, click the arrow control, and select Disabled. |
2 |
1 |
On the Group Policy Protection page, select the template and click Delete | Delete Template. |
2 |
Click Yes to confirm. |
1 |
On the Group Policy Protection page, select the object to delete and click Delete | Delete Object. |
2 |
1 |
On the Group Policy Protection page, select the account and click Delete | Delete Override Account. |
2 |
1 |
On the Group Policy Protection page, select the account and click Delete | Delete Administration Account. |
2 |
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Conditions d’utilisation Confidentialité Cookie Preference Center