Supported GPOs
Although not all Group Policy Objects (GPOs) are applicable to your CIFS-enabled storage virtual machines (SVMs), SVMs can recognize and process the relevant set of GPOs.
The following GPOs are currently supported on SVMs:
-
Advanced audit policy configuration settings:
Object access: Central Access Policy staging
Specifies the type of events to be audited for central access policy (CAP) staging, including the following settings:
-
Do not audit
-
Audit only success events
-
Audit only failure events
-
Audit both success and failure events
If any of the three audit options are set (audit only success events, audit only failure events, audit both success and failure events), ONTAP audits both success and failure events.
Set by using the
Audit Central Access Policy Staging
setting in theAdvanced Audit Policy Configuration/Audit Policies/Object Access
GPO.To use advanced audit policy configuration GPO settings, auditing must be configured on the CIFS-enabled SVM to which you want to apply these setting. If auditing is not configured on the SVM, the GPO settings will not be applied and will be dropped.
-
-
Registry settings:
-
Group Policy refresh interval for CIFS-enabled SVM
Set by using the
Registry
GPO. -
Group Policy refresh random offset
Set by using the
Registry
GPO. -
Hash publication for BranchCache
The Hash Publication for BranchCache GPO corresponds to the BranchCache operating mode. The following three supported operating modes are supported:
-
Per-share
-
All-shares
-
Disabled Set by using the
Registry
GPO.
-
-
Hash version support for BranchCache
The following three hash version settings are supported:
-
BranchCache version 1
-
BranchCache version 2
-
BranchCache versions 1 and 2 Set by using the
Registry
GPO.
-
To use BranchCache GPO settings, BranchCache must be configured on the CIFS-enabled SVM to which you want to apply these setting. If BranchCache is not configured on the SVM, the GPO settings will not be applied and will be dropped.
-
-
Security settings
-
Audit policy and event log
-
Audit logon events
Specifies the type of logon events to be audited, including the following settings:
-
Do not audit
-
Audit only success events
-
Audit on failure events
-
Audit both success and failure events Set by using the
Audit logon events
setting in theLocal Policies/Audit Policy
GPO.
If any of the three audit options are set (audit only success events, audit only failure events, audit both success and failure events), ONTAP audits both success and failure events.
-
-
Audit object access
Specifies the type of object access to be audited, including the following settings:
-
Do not audit
-
Audit only success events
-
Audit on failure events
-
Audit both success and failure events Set by using the
Audit object access
setting in theLocal Policies/Audit Policy
GPO.
If any of the three audit options are set (audit only success events, audit only failure events, audit both success and failure events), ONTAP audits both success and failure events.
-
-
Log retention method
Specifies the audit log retention method, including the following settings:
-
Overwrite the event log when size of the log file exceeds the maximum log size
-
Do not overwrite the event log (clear log manually) Set by using the
Retention method for security log
setting in theEvent Log
GPO.
-
-
Maximum log size
Specifies the maximum size of the audit log.
Set by using the
Maximum security log size
setting in theEvent Log
GPO.
To use audit policy and event log GPO settings, auditing must be configured on the CIFS-enabled SVM to which you want to apply these setting. If auditing is not configured on the SVM, the GPO settings will not be applied and will be dropped.
-
-
File system security
Specifies a list of files or directories on which file security is applied through a GPO.
Set by using the
File System
GPO.The volume path to which the file system security GPO is configured must exist within the SVM.
-
Kerberos policy
-
Maximum clock skew
Specifies maximum tolerance in minutes for computer clock synchronization.
Set by using the
Maximum tolerance for computer clock synchronization
setting in theAccount Policies/Kerberos Policy
GPO. -
Maximum ticket age
Specifies maximum lifetime in hours for user ticket.
Set by using the
Maximum lifetime for user ticket
setting in theAccount Policies/Kerberos Policy
GPO. -
Maximum ticket renew age
Specifies maximum lifetime in days for user ticket renewal.
Set by using the
Maximum lifetime for user ticket renewal
setting in theAccount Policies/Kerberos Policy
GPO.
-
-
User rights assignment (privilege rights)
-
Take ownership
Specifies the list of users and groups that have the right to take ownership of any securable object.
Set by using the
Take ownership of files or other objects
setting in theLocal Policies/User Rights Assignment
GPO. -
Security privilege
Specifies the list of users and groups that can specify auditing options for object access of individual resources, such as files, folders, and Active Directory objects.
Set by using the
Manage auditing and security log
setting in theLocal Policies/User Rights Assignment
GPO. -
Change notify privilege (bypass traverse checking)
Specifies the list of users and groups that can traverse directory trees even though the users and groups might not have permissions on the traversed directory.
The same privilege is required for users to receive notifications of changes to files and directories. Set by using the
Bypass traverse checking
setting in theLocal Policies/User Rights Assignment
GPO.
-
-
Registry values
-
Signing required setting
Specifies whether required SMB signing is enabled or disabled.
Set by using the
Microsoft network server: Digitally sign communications (always)
setting in theSecurity Options
GPO.
-
-
Restrict anonymous
Specifies what the restrictions for anonymous users are and includes the following three GPO settings:
-
No enumeration of Security Account Manager (SAM) accounts:
This security setting determines what additional permissions are granted for anonymous connections to the computer. This option is displayed as
no-enumeration
in ONTAP if it is enabled.Set by using the
Network access: Do not allow anonymous enumeration of SAM accounts
setting in theLocal Policies/Security Options
GPO. -
No enumeration of SAM accounts and shares
This security setting determines whether anonymous enumeration of SAM accounts and shares is allowed. This option is displayed as
no-enumeration
in ONTAP if it is enabled.Set by using the
Network access: Do not allow anonymous enumeration of SAM accounts and shares
setting in theLocal Policies/Security Options
GPO. -
Restrict anonymous access to shares and named pipes
This security setting restricts anonymous access to shares and pipes. This option is displayed as
no-access
in ONTAP if it is enabled.Set by using the
Network access: Restrict anonymous access to Named Pipes and Shares
setting in theLocal Policies/Security Options
GPO.
-
When displaying information about defined and applied group policies, the
Resultant restriction for anonymous user
output field provides information about the resultant restriction of the three restrict anonymous GPO settings. The possible resultant restrictions are as follows:-
no-access
The anonymous user is denied access to the specified shares and named pipes, and cannot use enumeration of SAM accounts and shares. This resultant restriction is seen if the
Network access: Restrict anonymous access to Named Pipes and Shares
GPO is enabled. -
no-enumeration
The anonymous user has access to the specified shares and named pipes, but cannot use enumeration of SAM accounts and shares. This resultant restriction is seen if both of the following conditions are met:
-
The
Network access: Restrict anonymous access to Named Pipes and Shares
GPO is disabled. -
Either the
Network access: Do not allow anonymous enumeration of SAM accounts
or theNetwork access: Do not allow anonymous enumeration of SAM accounts and shares
GPOs is enabled.
-
-
no-restriction
The anonymous user has full access and can use enumeration. This resultant restriction is seen if both of the following conditions are met:
-
The
Network access: Restrict anonymous access to Named Pipes and Shares
GPO is disabled. -
Both the
Network access: Do not allow anonymous enumeration of SAM accounts
andNetwork access: Do not allow anonymous enumeration of SAM accounts and shares
GPOs are disabled.-
Restricted Groups
You can configure restricted groups to centrally manage membership of either built-in or user-defined groups. When you apply a restricted group through a group policy, the membership of a CIFS server local group is automatically set to match the membership-list settings defined in the applied group policy.
Set by using the
Restricted Groups
GPO.
-
-
-
-
Central access policy settings
Specifies a list of central access policies. Central access policies and the associated central access policy rules determine access permissions for multiple files on the SVM.