Microsoft KB Archive/274478

= Group Policies for Windows 2000 Professional Clients in Windows NT 4.0 Domain or Workgroups =

Article ID: 274478

Article Last Modified on 10/31/2006

-

APPLIES TO


 * Microsoft Windows 2000 Professional Edition

-



This article was previously published under Q274478



IMPORTANT: This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base:

256986 Description of the Microsoft Windows Registry



SUMMARY
This article explains how to apply group policies to Microsoft Windows 2000 Professional-based computers which are installed in a Microsoft Windows NT 4.0 domain or in a workgroup.



MORE INFORMATION
WARNING: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.

Normally, administrators use a Windows 2000 Active Directory to distribute Group Policy settings. In this situation, the administrator creates Group Policy objects which contain policy settings, and then uses Active Directory to target the delivery and application of these settings. When you use Windows 2000 clients in an environment where there is no Active Directory, you can distribute policy settings using Windows NT 4.0-style system policies or Local Group Policy.  If the needed settings are available for editing with the Poledit.exe tool, administrators can create a policy on a Windows 2000-based server with the Poledit tool and save it as a Ntconfig.pol file. On the user's workstation, the administrator has to modify the NetworkPath registry value in the following location:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Update\NetworkPath

If this value does not exist, the value must be added as a REG_SZ data type. For example, if the policy file is named Ntconfig.pol and it is saved in the shared Directory \Policies on a Windows NT server, the value of NetworkPath should contain the following universal naming convention (UNC) path: \\Servername\Policies\Ntconfig.pol.

After adding the above registry entry modify the registry entry UpdateMode(same location in the registry) to a value of 2. This sets the workstation to Manual Update mode which is what you are setting by specifying the registry information above. If this entry, UpdateMode, is not changed the workstation stays in Automatic mode which means that it will look for the NTCONFIG.pol file in the default location versus the location you have specified. For additional information about this, click the article number below to view the article in the Microsoft Knowledge Base:

168231 System Policies Are Not Applied in Windows NT

When the users log on to the workstation, Windows 2000 can read the policy file specified by NetworkPath, and then apply the appropriate policy to the computer or user.

 If the settings that the administrator wants to enable are available on the user and computer level from the Group Policy Microsoft Management Console (MMC) snap-in, the administrator should use Local Machine policies. Since it may be difficult to visit each client to distribute and configure Local Group Policy, you can use the following two methods to configure Local Group Policy on multiple clients:  Local Group Policy can be configured for a single system; then it can be cloned. The Microsoft System Preparation (Sysprep) tool can be used in conjunction with other third-party software to clone the computers. The cloned computers can retain the settings. Administrators can also configure a Local Group Policy on one client computer, and then copy the associate's pieces that make up the Local Group Policy Object (LGPO) to other clients.

NOTE: The only settings you can transfer from one client to another are the settings from Administrative Templates.

 

To edit the LGPO and to configure Local Group Policy settings on a local computer, and then to distribute to other computers, you need to perform the following steps:
 * 1) At the client requiring the policy settings, log on as an administrator and run the Group Policy snap-in (the Gpedit.msc file). Then focus the Group Policy snap-in on the Local Group Policy of the client.
 * 2) Configure the LGPO on the client.
 * 3) Edit and configure the policy settings you require.
 * 4) Take the entries found in the Local Group Policy Object which are stored in the %Systemroot%\System32\GroupPolicy folder, and then copy them to other clients where you also want to apply these Local Group Policy settings.

NOTE: The settings under User Configuration can normally take effect the next time the user logs on and the settings under Computer Configuration can normally take effect when you restart your system.
 * 1) It may be necesary to edit the %systemroot%\system32\grouppolicy\gpt.ini and change the version entry so that the policy gets applied.

The preceding settings are stored in the LGPO on that client. If this client later joins a Windows 2000 Active Directory, Active Directory can override the settings in the LGPO using Group Policy distributed from Active Directory.

Security permissions on this folder can be changed to deny access to administrators to ensure that the policy does not apply to the local administrators.

If you use the preceding method, you must exercise much care because anything that is set on the original system that is specific to that particular computer is unsuccessful on the new target computer. In particular, many of the security settings for the computer should be avoided. If you are only interested in the administrative templates settings, copy the Registry.pol file to the target computer.

The method of setting the access control lists (ACLs) on the folder to prevent the local administrators from being affected can work with any local built-in group as well. When a change to the policy settings is required, the local administrator must take ownership, change the ACLs, make the change to the LGPO, and then change the ACLs back to deny for the local administrator. A failure to do this when combined with a certain set of policies could make it impossible to make any further changes.

Consider, for example, if the &quot;Disable registry editing tools&quot; or &quot;Take ownership of files or other objects&quot; policy is set and the &quot;Deny access to this computer from the network&quot; policy is set. This can lead to a situation where administrators can find themselves locked out of a system.

In general, to avoid problems, be aware of the following suggestions:
 * Each setting variance needs to be methodically tested prior to implementation.
 * An administrator's strategy must be based on all clients having remote network access with Windows 2000.

Keywords: kbgpo kbhowto KB274478

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.