{"id":81,"date":"2004-06-21T08:55:00","date_gmt":"2004-06-21T13:55:00","guid":{"rendered":"http:\/\/192.168.33.66\/wp\/?p=81"},"modified":"2012-02-03T14:14:32","modified_gmt":"2012-02-03T19:14:32","slug":"81","status":"publish","type":"post","link":"http:\/\/www.wildow.com\/blog\/?p=81","title":{"rendered":"How to add Firewall Client via Group Policy"},"content":{"rendered":"<p>How to add Firewall Client via Group Policy<br \/>\nThanks to Chad Gross for this!<\/p>\n<p>Assigning the Firewall Client to client PCs via Group Policies is pretty simple &amp; straight-forward with SBS2k3:<\/p>\n<p>1) Open Start | Administrative Tools | Group Policy Management<br \/>\n<!--more--><\/p>\n<p>How to add Firewall Client via Group Policy<br \/>\nThanks to Chad Gross for this!<\/p>\n<p>Assigning the Firewall Client to client PCs via Group Policies is pretty simple &amp; straight-forward with SBS2k3:<\/p>\n<p>1) Open Start | Administrative Tools | Group Policy Management<br \/>\n2) Expand Forest | Domains | | My Business | Computers<br \/>\n3) Highlight SBSComputers<br \/>\n4) Click on Action | Create and Link a GPO here<br \/>\n5) Name your new GPO (e.g. &#8216;Microsoft Firewall Client Installation Policy&#8217;)<br \/>\n6) Your new GPO should now appear in the right-hand pane of the management console. Right-click on the GPO and select &#8216;Edit&#8217;<br \/>\n7) Expand Computer Configuration | Software Settings | Software Installation<br \/>\n8) Action | New | Package<br \/>\n9) Enter the UNC path to the firewall client installer file<br \/>\n(\\\\\\mspclnt\\ms_fwc.msi by default)<br \/>\n10) Select &#8216;Assigned&#8217; as the deployment method &amp; click OK.<br \/>\n11) Close the Group Policy Editor console<br \/>\n12) Back in the Group Policy Management Console, right-click on your GPO and select &#8216;Enforced&#8217;<\/p>\n<p>That&#8217;s it &#8211; your GPO for deploying the Firewall Client is now in place. As for when this change takes place, this depends . . .<\/p>\n<p>If you create &amp; enforce this GPO before joining workstations to the domain, this GPO will be part of the overall group policies that the workstation receives upon joining the domain.<\/p>\n<p>If you create &amp; enforce this GPO after clients have been joined to the domain, you have two options:<\/p>\n<p>1) touch each PC to manually update the Group Policies by running gpupdate \/force at the<br \/>\ncommand prompt.<br \/>\n2) By default, group policies are updated every 90 minutes &#8211; so you could wait for the backgroup update to refresh the policy.<br \/>\n3) Reboot the machine which will update the Group Policies.<\/p>\n<p>The interesting thing to remember is that when you assign an application to a Computer, the software installation actually occurs at startup before you get a logon banner. Therefore, if you create &amp; enforce this GPO after PCs have been joined to the domain, the PCs will still have to be rebooted for the firewall client to actually be installed. As a result, to make this installation as truly efficient as possible, I create &amp; enforce this GPO before joining PCs to the domain. This minimizes the number of reboots that have to occur when configuring client PCs.<\/p>\n<p>Another little trick re: minimizing Administrator requirements at each PC &#8211; with SBS2k3, when the firewall client is installed, it configures IE to use ISA as it&#8217;s proxy. Only problem is that it only does this for the user profile that installs the firewall client. (And with a GPO install assigned to the Computer, no user gets this configured). Naturally, this means that IE needs to be configured for each user that logs into the PC. Ugh, right?<\/p>\n<p>Not quite :^)<\/p>\n<p>1. On your SBS, navigate to C:\\Program Files\\Microsoft Windows Small Business Server\\ClientSetup\\Clients\\Setup.<br \/>\n2. Open the install.ins file with notepad.<br \/>\n3. Find the [Proxy] section and edit it so that it looks like:<\/p>\n<p>[Proxy]<br \/>\nHTTP_Proxy_Server=http:\/\/YourServerName:8080<br \/>\nFTP_Proxy_Server=http:\/\/YourServerName:8080<br \/>\nGopher_Proxy_Server=http:\/\/YourServerName:8080<br \/>\nSecure_Proxy_Server=http:\/\/YourServerName:8080<br \/>\nSocks_Proxy_Server=http:\/\/YourServerName:8080<br \/>\nUse_Same_Proxy=1<br \/>\nProxy_Enable=1<br \/>\nProxy_Override=&#8221;&#8221;<br \/>\nAutoDetect=0<\/p>\n<p>4. Save the file. The next time any user logs in to any PC, their IE will be properly configured to use ISA as a proxy. This is something else that is very beneficial if you do it early during your server configuration (and before you have users asking why they can&#8217;t get out to the internet :^)<\/p>\n<p>&#8212;<br \/>\nChad A. Gross &#8211; SBS MVP<br \/>\nSBS ROCKS!<br \/>\nwww.msmvps.com\/cgross<br \/>\nwww.gosbs.org<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to add Firewall Client via Group Policy Thanks to Chad Gross for this! Assigning the Firewall Client to client PCs via Group Policies is pretty simple &amp; straight-forward with SBS2k3: 1) Open Start | Administrative Tools | Group Policy &#8230; <a class=\"more-link\" href=\"http:\/\/www.wildow.com\/blog\/?p=81\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-81","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/81","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=81"}],"version-history":[{"count":1,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/81\/revisions"}],"predecessor-version":[{"id":910,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/81\/revisions\/910"}],"wp:attachment":[{"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=81"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=81"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}