NIST's guidance for a Zero Trust Architecture

Active Directory Policies

Windows Group Policy Object Inheritance: Explained

GPO Inheritance and Blocking

In Active Directory, GPOs are inherited automatically throughout the GPO application order. If a group policy setting is enabled at the highest domain level but is not configured at the OU level, the highest domain level setting takes precedence and is applied. Similarly, If a setting is not configured at the domain level and is disabled at the OU level, the OU setting is inherited.

A user or a computer in an OU can have multiple GPOs applied to it. For example, Local Group Policy, GPOs linked to the site, GPOs linked to the domain, and GPOs linked to the OU. Also, multiple GPOs can be linked to any of these containers. The following is the order in which the Group Policy settings take effect.

  • Local Group Policy settings are applied first.
  • GPOs linked at the site level are applied next followed by the GPOs linked at the domain level and OU level. Since GPOs linked to the OU are processed last, they have the highest precedence.
  • In case of nested OUs, GPOs linked to the parent OUs are applied first followed by the GPOs linked to the child OU.
  • If multiple GPOs are linked to a container, then the GPO with the lowest link order will have the highest precedence.
  • To view the list of GPOs applied to a container, double-click the container and select the Group Policy Inheritance tab in the right pane. A list of GPOs with link order, location and status will be displayed.

The final configuration of policy settings applied to a user or computer is a combination of all the policy settings defined in each GPO. In case of any conflicts, the policy settings configured for the GPO with higher precedence override the GPO with lower precedence. However, this behavior can be altered using the block inheritance option.

To block inheritance and apply only the policy settings configured in GPOs linked to a particular OU, right-click the OU and select Block Inheritance. This will block all the policy settings from GPOs linked at the domain level, site level, and parent OUs.

Enforcing a GPO   

GPOs can be enforced so that the GPOs linked to a higher level container like domain or a parent OU takes precedence over the GPOs linked to a lower level container. To enforce a GPO, select the GPO liked to a container. Right-click the GPO and select Enforced.

GPOs that are enforced will be applied to a lower-level container even when the ‘Block Inheritance’ option is enabled for that container. Learn how you can force a group policy update from here.

Enforcing a Group Policy Object in Active Directory
Enforcing a Group Policy Object

Disabling a GPO   

By default, both Computer Configuration and User Configuration policy settings of a GPO are enabled and applied to all users and computers present in the container in which the GPO is linked. But, situations may arise in which the GPO has to be disabled for a particular period of time. To disable a GPO, follow these steps:

  • In the left pane of the GPMC snap-in, double-click the container to see a list of GPOs linked to that container.
  • Select the GPO which has to be disabled. In the right pane, select the Details Tab.
  • In the GPO status drop down list, select any of the following settings.
The four GPO statuses available in Active Directory
The four GPO statuses available
  1. “All settings disabled” to disable the GPO.
  2. Select “Computer Configuration Settings disabled” to disable only the policy settings configured under computer configuration.
  3. Select “User Configuration Settings disabled” to disable only the policy settings configured under user configuration.

People also read

GPO Delegation

Managing GPOs with Group Policy Management Console

Managing GPOs in Active Directory

Related posts
Active Directory Policies

Group Policy Management Console (GPMC) – Part II

Active Directory Policies

Fine-Grained Password Policy: A Step-by-Step Configuration Guide

Active Directory Policies

Active Directory Account Lockout Policy

Active Directory Policies

Active Directory Password Policy

Leave a Reply

Your email address will not be published. Required fields are marked *