TOCBACKFORWARD

Troubleshooting and Configuring
the Windows NT/95 Registry

-31-

Managing Domain Computers with System Policy Editor

It has never been easier to manage hundreds of computers. System Policy Editor allows you to configure settings for individual computers or for every computer in your entire network. System Policy Editor focuses primarily on performance and security.

In this section, you will look at all of the possible settings in System Policy Editor in COMMON.ADM and WINNT.ADM. After that, you will look at the conflict between named computers and the default computer's settings. Then comes the best part: You will learn about what settings you should use.

The settings are listed with the categories, policies, and parts for each separated by a forward slash, like this: Network/System Policies Update/Remote Update.


NOTE: Notice the explanations for each of the settings. This embedded information makes implementing policies much easier. It is what you hoped for in REGEDT32.EXE, but did not receive.

For every item in System Policy Editor, there are three possible settings (see Figure 31.1): Ignore, Activate, and Deactivate.

Figure 31.1. Three types of entries in System Policy Editor.


If the check box is gray, as the Communities check box appears in Figure 31.1, the setting is ignored and the Registry for that item is untouched. Whatever the current setting is, it remains. If the value or key is not currently in the Registry, it will not be inserted. This setting may also be called inactive.

If the check box is checked, as the Permitted managers check box appears in Figure 31.1, the setting is activated and the necessary keys and/or values are added if required.

If the check box is cleared, as the Traps for Public community check box appears in Figure 31.1, the setting is deactivated regardless of the previous setting. Keys and/or values may be added to force the settings to an off position.


TIP: In a new policy, all of the items are set to gray (ignore). Whatever is currently set in the Registry will remain. Before you make any changes to the default computer or to any other named computer, create a specific policy for your own system (or the server on which you are running System Policy Editor). In that policy, deactivate every item. Then, if you configure settings that turn out to be disastrous, you will have at least one system that is unaffected.


NOTE: Opening a current policy or the local Registry allows you to see which items are currently selected. Some of the settings may be different, based on whether the system is a server or a workstation, and whether it is a domain controller.

Computer Policies in COMMON.ADM

Computer-related policies in COMMON.ADM are relatively few because the underlying functions of Windows NT and Windows 95 are very different. Many more of the computer-related items are in the named template files for NT and 95.

Network/System Policies Update/Remote Update

The ability to set a specific location and policy filename is critical in three different cases:

Windows NT looks in the NETLOGON share for NTCONFIG.POL. Windows 95, on the other hand, looks in NETLOGON for CONFIG.POL. If the policy file will have a different name or be in a different location, you can change the location where Windows NT looks and the filename for which it searches.


TIP: Can you use a common name for the policy file, or should you have separate files? The benefits are obvious for having a single file to manage. However, because Windows 95 cannot use the NT policy file (it is Unicode, and 95 requires a policy file in ASCII), you really have no choice. In the future, a consistent structure will allow you to make a single file and a consolidated policy.

The Remote Update setting is a little deceptive, in that it says Manual in the Update mode. There is nothing manual about the update. The Registry is automatically updated at logon, but it just uses a different path. Enter the path as shown in Figure 31.2.

Figure 31.2. Setting a location for NTCONFIG.POL.


The check box in Figure 31.3 may also be important. It allows you to select the Load Balancing option. If the location you choose to set is \\Server1\Policies\MISCONFIG.POL and SERVER1 is extremely busy, NT looks for the same path and file on other logon servers (domain controllers).


WARNING: Unless you insert the name of the file, the system will not recognize it. Be very specific.

Figure 31.3. Enabling load balancing for better performance.



TIP: You can choose any name you want for this .POL file. Put the file name in the path, and NT will use it. The only computers that will use the specified file are the ones set with an option to do so.

System/SNMP/Communities

SNMP (Simple Network Management Protocol) is used to get and set status information about a host on a TCP/IP network, including data about the user, the physical location of the host computer, and different services running on the host. (See Figure 31.4.)

Figure 31.4. SNMP options in COMMON.ADM.


A community is a group of hosts, all running the SNMP service. The community name is placed in the SNMP packet when the trap is sent. In nearly every instance, all hosts belong to Public, which is the standard name for the common community.

This setting allows you to list the additional communities to which you want the server to belong. You may list as many as you want.

System/SNMP/Permitted Managers

You can list all the managers in your system who can both change settings and generate errors for SNMP items. Valid entries include IP addresses of systems and host names.

System/SNMP/Traps for Public Community

A trap in SNMP is a block of data that indicates the failure of a request across the TCP/IP network, usually because of authentication. This can occur when the correct community name is not listed, when the host name does not match the IP address, or in other situations in which there is a failure to communicate.

Add the names of traps to use for testing authentication across the TCP/IP network.

System/Run/Run

The Run function is used to set items to be run at startup. It's better to use the Run function than to use the Startup group because the Run function requires a Registry change for the user to disable it. Most users are not able to make those changes, so the likelihood of the application running as intended is much higher.

The value name (as shown in Figure 31.5) is just text information. The only time you see the value name is if the program remains in memory. In that case, the value name text is displayed in the Taskbar. The actual program is the value. After the policy is in place, the Registry for that system is updated, as shown in Figure 31.6.


TIP: Always use the full path to the application listed in the value. If the application location isn't in the path, the function will fail.

Figure 31.5. Adding items to be run at startup.

Figure 31.6. Items entered in the System Policy Editor Run function update the Registry.

Computer Policies in WINNT.ADM

The policies in WINNT.ADM are much more specific than those in COMMON.ADM. Some of the policies in WINNT.ADM are very similar to those in WINDOWS.ADM; the main difference between the two is the location of the Registry entry.

Windows NT Network/Sharing/Create Hidden Drives Shares (Workstation or Server)

By default, NT creates hidden shares (also called administrative shares) for all fixed disk drives on all NT systems. (See Figure 31.7.) These shares are accessible (without a password) only by Administrator from the machine he has logged on to. Other users can access them with the correct password using Map Network Drive (seen in Figure 31.8), typing in the name of the share (\\SERVER1\C$, for instance).

Figure 31.7. Changing administrative share status.

Figure 31.8. Using an administrative share to gain access to a nonshared resource.


Only members of the Domain Admin global group or the local Administrators group have access to hidden shares. If any other user is logged on to the system, it is not necessary to log him off, but you will need to connect to the share as an administrator, supplying the correct password.

After the correct password is supplied, the root directory and all subdirectories and files are accessible even if they have not been shared in the normal way.

The default for NT is always to create these shares. This entry is used in System Policy Editor to disable the creation of these shares. That requires you to clear the check box.


TIP: You can manually create administrative, or hidden, shares for floppy drives, CD-ROM drives, and other removable media devices. They are not automatically created, even if this setting is turned on. To create the share, there must be a diskette or other appropriate medium in the drive. You are sharing the drive, not the medium, but the system needs access to the drive to complete the sharing process. After the share is created, any medium can be in the drive, and it can be accessed in the same way as shares on a network. This is particularly helpful if you need to use someone else's CD-ROM drive, or if you have no 5-1/4" floppy to use. NT 4.0 doesn't support older floppies anyway, but you can access that 5-1/4" floppy when it is on 3.5x on another machine on the network. You can then use it from another system across the network.

Windows NT Printers/Disable Browse Thread on this Computer

By enabling this setting at a specific system, that computer's printer shares no longer appear in the browse list in Connect Network Printer. The printers may still be accessed, but the name of the printer must be entered in order to do so. (See Figure 31.9.)

Figure 31.9. Removing the printer name from other browse lists.

Windows NT Printers/Scheduler Priority

Set this printer's priority above or below normal with this setting. When set above normal, print jobs have a higher priority in combination with foreground and background application threads. Each thread gets a priority between 1 and 14. The higher the number, the sooner the thread gets processed. Boosting this number gets print jobs done faster, but application performance may suffer. (See Figure 31.10.)

Figure 31.10. Priority scheduling for print processes.

Windows NT Printers/Beep for Error Enabled

What an annoying thought: Every time there is an error, even a simple timeout error, the system beeps at you. In that case, you might not want the system to beep at you for print errors. On the other hand, if you are not sitting at the location of the print queue, you might not know there is a problem. Your user would wonder why the print job didn't work, and send another, and another, and another, assuming that he must have done something wrong in the way it was sent. Figure 31.11 shows the setting to turn the error beep on.

Figure 31.11. Turn on the error beeping at an unmanned print server.

Windows NT Remote Access/Max Number of Unsuccessful Authentication Retries

This is one of the best ways to keep hackers out of your network. If they don't type the password correctly in the specified number of tries, they will be disconnected. This setting is made at the RAS server only. (See Figure 31.12.)

Figure 31.12. How many times will it take to get it right?

Windows NT Remote Access/Max Time Limit for Authentication

When set at the RAS Server, this setting determines how long the user can wait before entering a password and attempting a logon. It can be a valuable security item because a user who knows his password is more likely to enter it quickly than one who is guessing. The default time is 20 (seconds), but don't set it below 7, or your user may not be able to respond in time. (See Figure 31.13.)

Figure 31.13. Setting the maximum time for user input at logon.

Windows NT Remote Access/Wait Interval for Callback

One security option is to have the server call the client back. If the user is not at the correct number, he won't be able to connect. Callback can be set up on a user-by-user basis in User Manager for Domains. This is set only on the RAS Server, and the default setting of 2 (seconds) is usually sufficient except when the delay in resetting the modem after disconnection is too long. In that case, increase this number. (See Figure 31.14.)

The autodisconnect is critical for freeing incoming telephone lines. If there is no activity across the lines for 20 minutes, RAS hangs up. Change this value to increase or decrease this amount of time. In a high-demand environment, you may want to decrease it. (See Figure 31.15.)

Figure 31.14. How long should I wait before calling back?

Figure 31.15. If there is no active traffic, end the connection.


Windows NT Shell/Custom Shared Folders/Custom Shared Programs Folders

If you want all users to be able to access the same applications, you must install the applications and put shortcuts to each in the folder specified in this setting. (See Figure 31.16.)

Windows NT Shell/Custom Shared Folders/Custom Shared Desktop Icons

Some people want to use icons other than the ones that come with NT. Copy the files to the location specified in this tip to give users access to them. (See Figure 31.17.)

Figure 31.16. Setting the location for shared application shortcuts.

Figure 31.17. Setting the location for custom folder icons.

Windows NT Shell/Custom Shared Folders/Custom Shared Start Menu

Want everyone's Start menu to have the same items? Copy shortcuts of those items to this location and change the Registry with this tip. (See Figure 31.18.)

Windows NT Shell/Custom Shared Folders/Custom Shared Startup Folder

If you want to easily specify what items load at startup, you can place shortcuts in here. These programs run after Explorer launches, and appear on the Taskbar. Those that you put in the Run section in COMMON.ADM do not show on the Taskbar, and launch prior to Explorer. (See Figure 31.19.)

Figure 31.18. The correct location for a standardized Start menu.

Figure 31.19. Startup items go here.

Windows NT System/Logon/Logon Banner

Originally, this setting was used to inform users of legal rights during logon. Now, however, this setting changes HKEY_LOCAL_COMPUTER and has no bearing on the user. The caption is the text in the title bar, and the other text is the data in the dialog box. (See Figure 31.20.)


TIP: Use this setting to notify users of specific information regarding the system to which they are logging on. For example, you might warn the user to never shut down the system because it is a server and others need access to it.

Figure 31.20. Special information for your users at logon.

Windows NT System/Logon/Enable Shutdown from Authentication Dialog Box

After the system has started, you may want to require the user to log on before shutting down the system. Turning off this setting requires a logon before shutdown. Requiring the user to log on before shutting down the system can be a minor security feature if you combine it with disabling the reset and power buttons or restricting physical access to them. Then, the user must log on before he can shut the system down and restart the computer into another operating system or to a diskette-based OS that has less security. (See Figure 31.21.)

Figure 31.21. Enable shutdown from the Authentication dialog box.

Windows NT System/Logon/Do Not Display Last Logged On User Name

Normally, when you get to the logon dialog box, the only information required is the password. However, if you require a hacker to guess the user name also, it may be more difficult to break into the domain. Combine that with a complex naming scheme, and security is much stronger. (See Figure 31.22.)

Figure 31.22. Improve security by showing less at logon.

Windows NT System/Logon/Run Logon Scripts Synchronously

If this setting is disabled, some shortcuts in the startup group may start before their required drive mapping is completed. That causes errors and makes the startup process incorrect. (See Figure 31.23.)


WARNING: If your logon script calls another batch file at the end, it may not complete before the shell starts. To ensure that the shell waits for all of the commands, put them directly in the logon script file.

Figure 31.23. Make the shell wait its turn.



TIP: There is already a small delay between the time when the logon script starts and the time when the Startup group starts. You may be able to achieve the necessary results by putting all drive mapping at the very beginning of the logon script. Doing so makes your startup process faster.

Windows NT System/File System/Do Not Create 8.3 Filenames for Long Filenames

The only time an 8.3 filename (the original DOS file naming rule, with an 8-character filename and an optional 3-character extension) is required is in operating systems that cannot recognize the long filenames. The use of 16-bit Windows or DOS applications inside Windows NT is not affected by this setting. They do not use it. They get truncated filenames from the operating system on the fly. Disabling the creation of the 8.3 filenames improves performance in writing to the disk drive by eliminating the duplication of effort. (See Figure 31.24.)


TIP: Always disable the writing of 8.3 filenames for dedicated servers for SQL, Exchange, Internet Information Server, and others that will not be running any other OS or applications.

Another potential benefit is that DOS versions prior to 7.0 cannot read those long filenames. If someone gains access to your server and boots to DOS, he can't read much of what is written there.

Figure 31.24. Get rid of the past.

Windows NT System/File System/Allow Extended Characters in 8.3 Filenames

Extended characters are available in long filenames in Windows NT and Windows 95. Adding this setting allows you to use them when 8.3 filenames are created in 16-bit Windows or DOS applications. (See Figure 31.25.)

Figure 31.25. Extended characters in an 8.3 filename.



TIP: Have you ever had a file that was corrupted and you could never delete it, even though the directory seemed empty? Allowing extended characters may let you see that file and delete it, and then you can clean up your hard drive without a reformat.

Windows NT System/File System/Do Not Update Last Access Time

Even read-only files have access flags on them that indicates the last time the file was accessed. Enabling this setting shortens the writing time to the disk drive and boosts performance. It still updates the access information if the file is changed. (See Figure 31.26.)

Figure 31.26. Boost your disk drive performance.Windows NT System/Windows NT User Profiles/Delete Cached Copies of Roaming Profiles.


Roaming user profiles are stored on the domain controller. When the user logs on to the system, the user profile is loaded across the network. All the information is also cached to allow that profile to be used, even if the connection to the network is slow or does not work. The user's desktop, icons, and other environment data does not have to be re-created if the system cannot connect to the domain controller.

Delete the cached profiles only if your network is very stable and the connections are sure. (See Figure 31.27.)

Figure 31.27. Delete cached profile information.Windows NT System/Windows NT User Profiles/Automatically Detect Slow Network Connections


The default for this setting is on even without this setting. Slow network connections affect the loading of profiles, the error messaging system, and many other communication functions.


NOTE: The phrase slow network connection does not refer to ARCNet, LANTastic, or AT&T StarLAN. It refers to remote connections through routers, switches, gateways, and modems that do not respond quickly enough. After a specific threshold of time is passed, it is considered a slow network connection.

If you want the remote system to work exactly like a locally connected system, disable this setting. (See Figure 31.28.)

Windows NT System/Windows NT User Profiles/Slow Network Connection Timeout

How long is too long? How slow is too slow? You get to determine that here. The default is 2000 (milliseconds), or 2 seconds. Increase that time to cut your system a little slack. (See Figure 31.29.)

Figure 31.28. Change the detection of slow network connections.

Figure 31.29. Setting the threshold for slow network connections.

Windows NT System/Windows NT User Profiles/Timeout for Dialog Boxes

Some dialog boxes, such as the one that allows you to use a cached profile instead of downloading the profile from the server, are set to activate themselves if you do not respond to them in a specified period of time. If you set one such dialog box for a longer time, it waits for you. Set it for a shorter time and it goes on without you even if you are not there. (See Figure 31.30.)

Figure 31.30. How long will it wait?

The Short Lists

To enhance security, set the entries in Table 31.1.

Table 31.1. Entries that can be configured to enhance security.
ADM File Policy
WINNT.ADM Windows NT Network/Sharing/Create hidden drive shares
WINNT.ADM Windows NT Printers/Disable browse thread on this computer
WINNT.ADM Windows NT Remote Access/Max number of unsuccessful authentication retries
WINNT.ADM Windows NT Remote Access/Max time limit for authentication
WINNT.ADM Windows NT System/Logon/Enable shutdown from Authentication dialog box
WINNT.ADM Windows NT System/Logon/Do not display last logged-on user name
WINNT.ADM Windows NT System/File System/Do not create 8.3 filenames for long file names


To enhance performance, set the entries in Table 31.2.

Table 31.2. Performance is enhanced by configuring these entries.
ADM File Policy
WINNT.ADM Windows NT Printers/Scheduler priority
WINNT.ADM Windows NT System/Logon/Run logon scripts synchronously
WINNT.ADM Windows NT System/File System/Do not create 8.3 filenames for long filenames
WINNT.ADM Windows NT System/File System/Do not update last access time
WINNT.ADM Windows NT User Profiles/Timeout for dialog boxes

Default Computer versus Named Computer

System Policy Editor creates two policies by default. One policy is created for the Default Computer, and another is created for the default user. (See Figure 31.31.)

Figure 31.31. System Policy Editor creates two default policies.


Setting system policies can be done either for all computers or for individual computers. To name a specific computer and associate a policy with it, select Edit | Add Computer. Type or browse for the NetBIOS name of the computer, and click OK. (See Figure 31.32.)

Figure 31.32. Choosing a computer for a specific policy.


If your computer isn't specifically named, you get the settings associated with the Default Computer. With a policy in place for the named computer, as shown in Figure 31.33, any policy specified will overwrite the Registry. Any policy settings for the named computer cannot affect any other systems, but the Default Computer policy may still affect the named one if there is no setting in the named computer policy.

Figure 31.33. WS2 can have specific policies associated with it.

Policies in Conflict

When policies are written into the Registry, the active policies (whether the policy is activated or deactivated) from the Default Computer are written first. (See Figure 31.34.) Then, active policies at each named computer get written.


Figure 31.34. Default Computer policies get written to the Registry first, followed
by named computer policies.


Default Computer policies get written to the Registry first, followed by named computer policies.This is particularly important when the policies are in conflict with each other. If the policy of the named computer is set to activate or deactivate, it makes no difference what the setting is at the Default Computer. As an example, in Figure 31.35, the computer named WS2 is set to create hidden drive shares. As shown in Figure 31.36, the Default Computer is set not to create them. The policy for WS2 is the one that will take effect.

Figure 31.35. WS2 policy.

Figure 31.36. Default Computer policy, which is overridden by the WS2 policy.


In another instance, the policy associated with WS2 is ignored, and the policy associated with Default Computer is implemented. In Figure 31.37, the policy for WS2 is set to ignore the NT Printer setting. As shown in Figure 31.38, the Default Computer has the policy set to disable the browse thread. Because the WS2 policy is set to use whatever is already there, it also disables the browse thread.

Figure 31.37. WS2 policy.Figure 31.38. Default Computer policy, which is not overridden by the WS2 policy in this case.

Summary

You can set any or all of these settings for individual computers or for every computer in your network. By choosing to use these settings, you can manage the computers in your network from a single NT server, and the policies can affect any computer in the network.

TOCBACKFORWARD

© Copyright, Macmillan Computer Publishing. All rights reserved.