6.6 Picking the Right Policies
Which policies are appropriate for
you? It depends on how your network's built, who uses it, and
what they should--and shouldn't--be able to do. As
you can tell from the preceding tables, the built-in policy templates
offer a pretty wide range of capabilities, and you can roll your own
templates to give you centralized control over almost anything whose
behavior is controlled by Registry entries.
The following sections suggest which policies might be appropriate
for various situations; you can pick and choose to build a set of
policies that's right for you.
6.6.1 Policies for Anybody
Most administrators who use policies do so
to prevent users from doing things they shouldn't. First on the
list is probably preventing users from running unapproved
applications, which you can do with the "Run only approved
Windows applications" and "Remove Run command from Start
menu" policies. In addition, you might want to consider using
the floplock program from the Resource Kit to
prevent user access to the floppy drives.
Most administrators hate to spend time fixing things like display
resolution settings. Consequently, you may be interested in the
Control Panel\Display policy category, since it allows you to prevent
users from changing display settings.
6.6.2 Policies for a Lab Network
Many schools and universities have lab networks that students can use
to do their classwork. Many companies have something similar: test
labs, training classrooms, and so on. These environments share a
central feature: a varying group of users have access to the
machines, and they should probably be prevented from changing many of
the things they might otherwise be able or tempted to modify.
In addition to restricting which applications may be run, most labs
need to protect the desktop from changes. This prevents students from
using their own wallpaper, changing the desktop colors to neon green
with fuschia accents, or otherwise leaving a mess for the next user.
The "Control Panel\Display" and "Desktop"
policies are great for this.
For labs that share a network segment with production machines, you
may also find it useful to restrict what users can see over the
network. The "Shell\Restrictions" category offers several
ways to prevent casual network browsing, including hiding the Network
Neighborhood altogether.
For performance reasons, you should use the options in "Windows
NT User Profiles" to control how profiles get transferred and
whether slow connections are automatically flagged as such.
6.6.3 Policies for an "Ordinary" Office
Anything goes! The policies you set for machines in an ordinary
office environment varies by user, machine, and group; what's
appropriate for HR may not be appropriate for engineering, and vice
versa. In general, the most frequently used policy components in
office networks tend to be those dealing with custom Start menu
folders and security settings, such as those found in "Windows
NT System\Logon."
In some cases, it may be necessary or desirable to restrict display
and desktop changes too, especially on public machines.
|