Lab Environment:
ad:server2012 R2 Test client: XP SERVER2012R2
Because there is no 2008R2 environment for temporary use of 2012R2 instead, in fact, are the same. Test client with SERVER2012R2 test with the same as Win7, but also tested XP because a lot of 2008 of their own strategy is not supported under XP. (I'm glad this strategy is supported by XP)
Because there is no fly autumn software. Use. EXE's YY installation program test, flying autumn is just one. EXE to run the program just the same operation steps
A Use ad Group Policy software to restrict policies.
650) this.width=650; "title=" clip_image002 "style=" border-top:0px; border-right:0px; Background-image:none; border-bottom:0px; padding-top:0px; padding-left:0px; border-left:0px; padding-right:0px "border=" 0 "alt=" clip_image002 "src=" http://s3.51cto.com/wyfs02/M02/71/05/ Wkiom1xdudpbhapyaafyg9fwkxq448.jpg "" 510 "height=" 318 "/>
Create a new policy in the Group Policy object Right-click Edit this policy is for the computer's often-said computer policy, so the target for this policy is "computer name", targeting the software restriction policy.
Two Sets the hash value.
650) this.width=650; "title=" clip_image003 "style=" border-top:0px; border-right:0px; Background-image:none; border-bottom:0px; padding-top:0px; padding-left:0px; border-left:0px; padding-right:0px "border=" 0 "alt=" clip_image003 "src=" http://s3.51cto.com/wyfs02/M00/71/05/ Wkiom1xdududmu3aaahjvux3gxm224.jpg "" 457 "height=" 438 "/>
Let's make an explanation.
Security level: It's easy to look at what it says and what it means. But don't forget to choose "Security Level" when setting the rule, do not remember 2008r2 has this setting, see also understand.
Select the new hash rule to do so.
Third, configure the hash rule
650) this.width=650; "title=" clip_image004 "style=" border-top:0px; border-right:0px; Background-image:none; border-bottom:0px; padding-top:0px; padding-left:0px; border-left:0px; padding-right:0px "border=" 0 "alt=" clip_image004 "src=" http://s3.51cto.com/wyfs02/M02/71/01/ Wkiol1xdujrj88lkaaeenlc1oda020.jpg "" 433 "height=" 367 "/>
Browse directly to select YY. EXE's installation package then determines that a hash message is automatically generated, which is "file information".
Security level don't forget to choose AH. (for 2012 of the Environment)
Hang the policy directly on the appropriate OU or directly onto the ad and refresh the policy.
Four: Test work
650) this.width=650; "title=" clip_image005 "style=" border-top:0px; border-right:0px; Background-image:none; border-bottom:0px; padding-top:0px; padding-left:0px; border-left:0px; padding-right:0px "border=" 0 "alt=" clip_image005 "src=" http://s3.51cto.com/wyfs02/M00/71/01/wKioL1XDUkeABIcXAAFu_ Yjry28302.jpg "" 454 "height=" 296 "/>
650) this.width=650; "title=" clip_image006 "style=" border-top:0px; border-right:0px; Background-image:none; border-bottom:0px; padding-top:0px; padding-left:0px; border-left:0px; padding-right:0px "border=" 0 "alt=" clip_image006 "src=" http://s3.51cto.com/wyfs02/M01/71/01/ Wkiol1xdukqwj3-uaad6dzy_jqg502.jpg "" 756 "height=" 463 "/>
The experiment is complete.
2014.5.8
Using hashes to seal off client software such as autumn