Security Watch

Troubleshooting Tips: Get to Know FRS

Healthy FRS means healthy Group Policy.

It can take a huge investment of time to get an approved security policy in place, so you'll want to use the technology controls provided by Group Policy to distribute and apply them across each domain.

If you've made a commitment to centralize security management using Group Policy, you've used the policy decision-making time well. You've got your OU structure designed to support applying security to each type of computer and user based on the role they play within your organization. You've placed the desired computers and users in the appropriate OU. When the security policy is ready, it's quick work to configure the GPOs, making security settings in each GPO meet both best practices and security policy compliance, then linking those GPOs to respective OUs. In a matter of minutes, the hardening of thousands of computers will begin and your job is done. Now you can sit back, assured that you've secured the domain.

Wrong. Creating a security policy for the domain and implementing it is only half the battle. You've got to verify that it's working. What should you do if some desktop security settings are correct while others aren't?

Your first instinct is correct. If the normal time for Active Directory replication has passed, or you've used "gpoupdate" to kick-start it, check the GPO and the OU membership. If you haven't configured things properly, there's no way they're going to work right. If, however, things look right but still don't work right, what should you do? You'll have to troubleshoot Group Policy.

Troubleshooting Group Policy is never fun because so many things can go wrong: DNS, replication, misconfiguration, even simple things like basic network connectivity and the ability to log on to a domain controller can be the problem. Checking basic network issues, DNS and configuration should probably be your first steps; what if they're OK? Replication problems can be much harder to troubleshoot because two types of replication can play a role -- AD replication and the File Replication Service (FRS).

Many have invested significant time in understanding AD. If you're not familiar with using Replmon and Dcdiag (two Windows support tools) to check AD replication, learn how. Another support tool, TopChk, can verify that NTDS connection objects are present and the replication schedule is on. It can also help identify a number of other basic issues such as missing NTDS setting objects (missing setting objects can result in a lack of setting references and, hence, a failure of FRS), missing inbound connections (there has to be at least one), and potential self-reference connection objects (this type of isolationist behavior is never a good sign). All this replication topology troubleshooting is important for two reasons. First, information about which GPO links to which OU gets replicated with AD. Second, FRS uses the same topology and schedule to replicate the SYSVOL folder contents. If you haven't invested some time learning the ins and outs of what can go awry with AD replication, start now. If you're competent in this area, follow up and get busy building your knowledge of FRS.

I know admins who think FRS is primarily for replicating netlogon scripts and keeping Distributed File System (DFS) shares synchronized. FRS also plays a role in the distribution of Group Policy. Its role is to replicate any files in the SYSVOL folder on DCs, and this is precisely where Group Policy files are stored. Changes to GPOs are replicated using the same replication topology as AD but using FRS. If there's a problem with FRS, there's a problem with Group Policy. If you want centralized security management via GPOs, learn how to check FRS health and troubleshoot it.

Fortunately, there are now a number of free tools and documents to help. Some are provided in the Windows Support Tools installation from the product disks, and others are downloadable Resource Kit tools. To get started, browse on over to the Windows Server System Technology Center document "Monitoring and Troubleshooting the File Replication Service," at http://www.microsoft.com/windowsserver2003/technologies/fileandprint/
file/dfs/tshootfrs.mspx
.

Here you'll find links to four server tools: Ultrasound, Ntfrsutl, FRSDiag and Sonar. Download the tools, but before you use them, read the FRS Monitoring Help file for its comprehensive overview of what FRS does, best practices guide and troubleshooting guide that details how to use event logs and tools. The troubleshooting guide is an especially comprehensive gem! It starts with instructions to make sure the latest version of FRS is installed, (Service Pack 3 for Windows 2000 Server and the pre-SP 1 release of ntfrs.exe for Windows Server 2003), continues with a list of Knowledge Base articles for verifying FRS dependencies (DNS, AD Replication, and Network Connectivity), then begins to narrow FRS issues, and provides links to more information on using event logs and tools.

Browsing through these documents and examining the tools will make you eager, I hope, for the big picture. Solid backgrounders on how FRS works, and general tool information, can be found in the FRS Technical Reference at http://www.microsoft.com/resources/documentation/WindowsServ/2003/
all/techref/en-us/Default.asp
. This technical reference home page leads to Technologies Collections, Storage Collection, File Services Technologies and the FRS Technical Reference. Those of you without immediate Group Policy issues may want to start here. Whatever your approach FRS, add some knowledge and troubleshooting skills for FRS to your bag of security tips and tricks. Someday you'll be glad you did.

About the Author

Roberta Bragg, MCSE: Security, CISSP, Security+, and Microsoft MVP is a Redmond contributing editor and the owner of Have Computer Will Travel Inc., an independent firm specializing in information security and operating systems. She's series editor for Osborne/McGraw-Hill's Hardening series, books that instruct you on how to secure your networks before you are hacked, and author of the first book in the series, Hardening Windows Systems.

comments powered by Disqus
Most   Popular