Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Businesses Software Linux IT

Locking Down Linux Desktops In an Enterprise? 904

supermehra writes "How do you move 300 desktops, locked down with Windows ADS Group Policies (GPO), over to Ubuntu desktop? We have tried Centrify, Likewise, Gnome Gconf, and the like. Of course, we evaluated SuSe Desktop Enterprise and RedHat Desktop. Samba 4.0 promises the server side, however nothing for desktop lockdown. And while gnome gconf does offer promise, no real tools for remotely managing 300 desktops running gnome + gconf exist. All the options listed above are expensive, in fact so expensive that it's cheaper to leave M$ on! So while we've figured out the Office suite, email client, browser, VPN, drawing tools, and pretty much everything else, there seems to be no reasonable, open source alternative to locking down Linux terminals to comply with company policies. We're not looking for kiosk mode — we're looking for IT policy enforcement across the enterprise. Any ideas ladies & gentlemen?"
This discussion has been archived. No new comments can be posted.

Locking Down Linux Desktops In an Enterprise?

Comments Filter:
  • LSTP (Score:5, Insightful)

    by IANAAC ( 692242 ) on Monday March 09, 2009 @08:06PM (#27128599)
    Why not use LSTP? That way you only have to worry about whatever image(s) you keep on the server.
  • Come on... (Score:3, Insightful)

    by Anonymous Coward on Monday March 09, 2009 @08:08PM (#27128615)

    so expensive that it's cheaper to leave M$ on!

    If you want to be taken seriously, please lern 2 spel currektly. I'm not a Microsoft fan, but it sure is annoying seeing it spelt like that.

  • dumb terminals? (Score:5, Insightful)

    by timmarhy ( 659436 ) on Monday March 09, 2009 @08:08PM (#27128621)
    if your talking about dumb terminals, your making me hot. sexy little gadgets with no fans or moving parts. in this instance you can lock down any of the major desktop environments by modifying their default user to have a really low level of user access , so when you create a new user it inherits these settings. gnome,kde and xfce all have this ability. and since they are terminals an logging into a central server management is dead easy.

    if you are talking stand alone desktops then it's not so great. linux doesn't really have anything as good as group polices and active directory, it's part of the reason corperate networks are mostly windows.

  • by Todd Knarr ( 15451 ) on Monday March 09, 2009 @08:09PM (#27128629) Homepage

    I guess the first question is: what are you trying to accomplish? Are you trying to prevent users from installing additional software locally? Are you trying to insure that particular applications get particular preferences set and users are prevented from changing those settings? What? Just saying "lock down the desktops" doesn't say what you're trying to actually do.

    Remember that Unix is, in large part, designed to work correctly without needing to be locked down. Much is controlled simply by the system-wide configuration files. The rest tends to be controlled on the server side, so that users simply can't do unacceptable things regardless of how they configure their local user account.

  • by Anonymous Coward on Monday March 09, 2009 @08:09PM (#27128635)

    In linux world, there is yet to be a quick, 3 question and 1 button way to add the computer to a domain and then receive straight away:
    - group policies - security and software install
    - single password store (with cached passwords for notebooks that go away from the network)
    - Patch update policy

    The only thing linux does right is work on technologies such as DHCP that were written for OTHER unix O/S'.

    Ubuntu is not interested in those things, they're more interested in making stories about koalas and hiding popup boxes.

    Gnome is dead, Mono and moonlight took all their brains away.

    kde is making a next-gen desktop but have yet to understand why so many IT shops have kept Windows at the office.

    This is all depressing. Windoze will never be replaced at the current rate.

  • Microsoft... (Score:1, Insightful)

    by magamiako1 ( 1026318 ) on Monday March 09, 2009 @08:11PM (#27128649)
    And now you know why Windows dominates the enterprise market.

    Good luck.
  • by Registered Coward v2 ( 447531 ) on Monday March 09, 2009 @08:11PM (#27128655)

    Instead of spending $$$ on bondage and discipline, how about treating your users like adult human beings?

    Because a number of them will wind up installing aps that put the company at risk?

  • by darthwader ( 130012 ) on Monday March 09, 2009 @08:14PM (#27128689) Homepage

    You set up the machines to all boot over the network, from a common image, and to load all system files from a NFS share.

    The only thing on the workstation is the user's $HOME directory, and some local stuff like /tmp, /var, etc.

    Your users don't get root on their workstations. They shouldn't need it. This isn't like Windows, where a huge number of apps don't run correctly if you don't have admin rights. Linux is designed under the assumption that users don't have admin rights.

    Maybe I'm being naive, but what more do you need?

  • by magamiako1 ( 1026318 ) on Monday March 09, 2009 @08:16PM (#27128703)
    To protect the users from themselves...PXE booting is not the answer.

    He wants to enforce things such as proxy settings, desktop settings, auditing, etc.
  • by jtownatpunk.net ( 245670 ) on Monday March 09, 2009 @08:17PM (#27128713)

    Never underestimate a user's ability to fark up something that is, in theory, unfarkupable.

  • by DF5JT ( 589002 ) <slashdot@bloatware.de> on Monday March 09, 2009 @08:18PM (#27128731) Homepage
    I remember an article about KDE's long term strategy to be just that: an enterprise ready Desktop with fine grained policies, central administration and all the fluff that makes windows enterprise-ready and the de facto standard for the desktop.

    IToday, we have a colorful disaster that isn't even as usable as its predecessor. Developers should have focused on the need for an enterprise desktop that could actually make a dent in MS corporate sales. Instead we got useless eye candy.

    The fault, of course, lies with the big distributions that pride themselves on providing enterprise ready Linux. Enterprise sans le Desktop. Useless wanking. The requirements for an enterprise ready desktop are out there for anyone to see and it's not just "applications" as everyone usually points out. It's the ability for administrators to create and maintain a usable desktop according to official corporate policies. No more and no less.
  • policies (Score:4, Insightful)

    by TheSHAD0W ( 258774 ) on Monday March 09, 2009 @08:19PM (#27128737) Homepage

    locking down Linux terminals to comply with company policies

    Sooo, what exactly ARE these company policies?

  • by Anonymous Coward on Monday March 09, 2009 @08:23PM (#27128783)

    That's a Microsoft paradigm, born from forcing the square peg of multi-user shared resources onto a single-user-owns-the-world system. Linux and other Unix operating systems were designed from the ground up to be secure multi-user operating systems. (And all you Microsoft-paid astroturfing fanbois who want to dispute that can FOAD. Just look at the mess that's UAC and the need for Microsoft to break it for their own use.)

    Just set up default menus, and if a user mucks them up blow away the .g* (or whatever) configuration files/directories in the user's home directory.

    Because anyone who knows what they're doing can run "unsupported" apps on any computer they can log onto anyway.

  • Re:M$ (Score:4, Insightful)

    by saleenS281 ( 859657 ) on Monday March 09, 2009 @08:23PM (#27128787) Homepage
    Ya, NO linux based company would EVER do something like that.

    www.redhat.com

    What's Ubuntu's LTS support? 5 years? And how long has XP been supported? Right...
  • by QuantumRiff ( 120817 ) on Monday March 09, 2009 @08:23PM (#27128789)

    You are looking at it from a system security perspective, not "IT Policies" perspective. He needs to be able to disallow solitare, force all connections through a proxy server for web filtering, pass down 802.1x keys, force people to use a certain network printer, etc...

  • by man_of_mr_e ( 217855 ) on Monday March 09, 2009 @08:27PM (#27128837)

    Probably because you can't guarantee that the users will ACT like adult human beings.

    Any corporate policy that relies on "Let's just hope users don't do bad things" is doomed to fail.

  • by RichardJenkins ( 1362463 ) on Monday March 09, 2009 @08:37PM (#27128925)

    You think using technology to help enforce an IT policy and respecting your employees are mutually exclusive aims? I strongly disagree.

    A small contingent of 'bad apples' can do serious harm if you do not effectively enforce IT policies. It's not possible to guarantee there is no one like this in your company, so you should protect the company and other staff from from them.

    Respecting staff won't stop douchebags being douchebags and screwing up your systems.

  • Re:Huh? Its unix (Score:4, Insightful)

    by Facetious ( 710885 ) on Monday March 09, 2009 @08:37PM (#27128935) Journal
    Finally! Thank you. I can't believe I had to read so many posts on slashdot of all places before someone points out the obvious. I recommend the OP googles "root over NFS." To reiterate, don't try to do Linux the Microsoft way. Also, please disregard all these stupid AC posts about Linux not being ready for the corporate desktop. Unemployed MCSEs are just yanking your chain.
  • Re:MOD PARENT UP (Score:5, Insightful)

    by binner1 ( 516856 ) <bdwalton@nOSPAM.gmail.com> on Monday March 09, 2009 @08:41PM (#27128975) Homepage

    While I _mostly_ agree with this, a nice policy management (configuration management mostly) tool is also essential when dealing with lots of boxes. You want a new setting for all Gnome desktops, simply add it to the policy tool and let it distributed any required config files or run commands to change the setting, etc. This type of thing used to be done with things like: for h in $all_my_hosts; do ssh $h /tweak/some/setting; done

    CFEngine and Puppet and friends are a nicer way of doing this. They're "self documenting" in that your write the code and then you can later very easily see when you added some configuration bits, etc...version control your configuration management scripts and you get even better tracking of who did what and when. (A side question: How does one do the version control type stuff in AD?)

    While kickstart is great (I use it), it only goes so far. Having a policy manager on top of that (installed and configured in the kickstart) is a beautiful thing!

    -Ben

  • by fm6 ( 162816 ) on Monday March 09, 2009 @08:43PM (#27128993) Homepage Journal

    I like this version better: No system is foolproof, because fools are fiendishly clever.

  • by Arker ( 91948 ) on Monday March 09, 2009 @08:44PM (#27129009) Homepage

    This is very much like when (several years back) I was told Linux wasnt ready because there was no antivirus or defrag available.

    If all you know is Windows then you imagine these things are critical to the operation of a corporate network. They arent. They're patches plastered all over an inherently poor design to allow it to (sort of) function in that environment.

    With a real OS the actual underlying goals these things serve are served without the need for the specific windows-centric functions to patch windows-specific problems.

  • by Anonymous Coward on Monday March 09, 2009 @08:45PM (#27129025)

    Or, am I missing something?

    Yeah managing this for 300+ people in an environment that changes daily without spending your entire IT budget on admins and the sneakernet support staff.

    despite our desire to act like open source is the cure for all ills this is the type of problem we need to solve. You MUST lock down some enterprise environments (or have a CEO who is willing to go to jail) and you MUST be able to manage this without breaking the company piggy bank. He's asking for solutions to these two requirements not how to keep ONE person on ONE desktop from doing ONE of the many forbidden things.

    And as for the guy/gal who suggested we treat everyone nice and hope they act right. That's fine for your 10 person IT shop...not so much for a multi-billion dollar public company that needs public trust and investment and is governed by a whole mess of federal regulations in numerous national jurisdictions around the world.

  • by HangingChad ( 677530 ) on Monday March 09, 2009 @08:47PM (#27129041) Homepage

    Want to lock stuff down? Don't give users root.

    Knowing what policies they're talking about might be helpful because I had the same question. What policies would require root level access? White list the proxy. Backups, share drives, printing...we have all those services on our Linux desktops. We can remote in and install any software they need...??? What policies can't be handled by a user account?

    Maybe I've been away from Windows networking too long, but I can't think of why you'd need to do this.

  • by magamiako1 ( 1026318 ) on Monday March 09, 2009 @08:51PM (#27129069)
    Multiply this by about 500 machines, and then the ability to later on down the road be able to change it without having to completely redo them or find some screwed up roundabout way to push out to every machine via scripts...

    You'll quickly turn to the Windows way of doing it.
  • by Anonymous Coward on Monday March 09, 2009 @08:53PM (#27129087)

    Have you ever met a sales person, or watched them try to use a computer? Seriously, watch them try to send a 500MB powerpoint presentation as an e-mail attachment, or ask for tech support on their limewire install, and marvel at the risk to your company.

  • Re:MOD PARENT UP (Score:4, Insightful)

    by QuoteMstr ( 55051 ) <dan.colascione@gmail.com> on Monday March 09, 2009 @08:55PM (#27129099)

    Err, you can still run interpreted programs on a filesystem mounted noexec:

    ~$ python myprogram.py

    A sufficiently clever user could use an interpreter to write his own dynamic linker and thereby run binaries too.

    But I agree: locking down the desktop is the wrong approach. Better is to separate sensitive information from things that aren't sensitive, and have a standard user environment to restore to if the user does manage to mess up his configuration.

  • Re:MOD PARENT UP (Score:5, Insightful)

    by magamiako1 ( 1026318 ) on Monday March 09, 2009 @08:55PM (#27129103)
    You kids still think that what the OP is asking for has anything to do with "preventing users from doing something harmful to the computer".

    Get it out of your heads. Many of the things group policy can do has nothing to do with "security" or "preventing users" from doing anything. It has a lot to do with quickly standardizing departments, offices, rooms, or whatever your business structure is.

    When you move a computer to a different department you simply drag the computer in AD to the different OU and BAM! That computer now gets everything new with its policies. There's no bringing the computer in to the IT department and reloading its configuration with "Configuration A for Department B".

    Want to make a change to how a whole department does things? There's no pushing a script out later on to the whole department. You simply change it in group policy and the entire thing gets taken care of automatically.

    You can spend more time focusing on actually getting shit done than fussing around with HOW to solve the problem with roundabout tool sets.
  • Do what's cheaper (Score:5, Insightful)

    by malevolentjelly ( 1057140 ) on Monday March 09, 2009 @08:57PM (#27129117) Journal

    If it's cheaper to stay with a Microsoft-based infrastructure, then stay with that. Creating massive infrastructure-wide group policies that go from desktop to web browser is sort of a windows thing. If you're going to maintain security policies in a linux-based system, you better be prepared to start thinking in Unix- that means remembering that you're using a network-based system, not a locally-oriented system on a network.

    If you're setting an IT infrastructure, the costs you're cutting on licensing will probably bite you in either support, security, training, or usability/productivity. There's no such thing as free software, I'm sorry.

  • CFEngine (Score:1, Insightful)

    by Anonymous Coward on Monday March 09, 2009 @08:59PM (#27129131)

    CFEngine can be used to enforce IT policies on UNIX desktops, servers, etc.

    It's free and works quite well. All of the large enterprises I've ever worked on use this extensively.

              http://www.cfengine.org/ [cfengine.org]

  • by Eil ( 82413 ) on Monday March 09, 2009 @09:01PM (#27129151) Homepage Journal

    You are looking at it from a system security perspective, not "IT Policies" perspective.

    Most "I.T. Policies" are stupid and written by control freaks with no managerial sense.

    force all connections through a proxy server for web filtering

    The ridiculousness of web filtering aside, this is easily accomplished by pre-made config files in /etc/skel.

    pass down 802.1x keys, force people to use a certain network printer,

    Again, /etc/skel or something like Puppet [reductivelabs.com] works fine here.

    He needs to be able to disallow solitare,

    Oooh, this is by far my favorite, that's why I saved it for last. If you're to the point where you're seriously considering disabling solitaire, this reveals a number of things about the organization:

    1) The I.T. staff and/or managers are unapologetic control freaks and perhaps even proud of it.
    2) You don't trust your employees to actually be productive on their own.
    3) Your hiring standards are probably pretty low.
    4) You have unrealistic expectations of employee efficiency.
    5) Morale must really be in the toilet already.
    6) It's solitaire for fuck's sake, possibly the most boring game ever devised. If your employees are playing it instead of whatever they should be doing, that means they have no motivation to work, which means management should be the ones to get their lunchtime games taken away, not the employees.

  • Re:IT policy? (Score:3, Insightful)

    by itzdandy ( 183397 ) on Monday March 09, 2009 @09:04PM (#27129189) Homepage

    Normal business is when a virus spreads. Scanning for viruses is not a bad thing and performance should not trump security. This is called being pro-active which is ideal when dealing with computer security. Only scanning for virus's at night is call reactive, which is bad when dealing with computer security.

    Also, the IT department is responsible for the network and security of the network. If they make a policy that no linux machines can be on the network then what is the issue? Tight control over computer resources by IT staff is certainly best practices for a secure network.

    Granted, Linux desktops are more likely to be safe than Windows desktops, but administration time is also very important. Centralized policies such as a Windows Domain is much easier to manage than a hodgepodge of various desktops with no way to enforce policy.

  • Re:MOD PARENT UP (Score:3, Insightful)

    by Darkness404 ( 1287218 ) on Monday March 09, 2009 @09:08PM (#27129229)
    Ok, first though, these are ordinary workers. They aren't blackhats, they don't want to screw up their system, and if they know how to do that, they most likely work in the IT department.

    Don't treat your employees like criminals, if they break enough things all the time, fire them for incompetence, but there is no need to totally lock down everything.
  • Re:MOD PARENT UP (Score:3, Insightful)

    by QuoteMstr ( 55051 ) <dan.colascione@gmail.com> on Monday March 09, 2009 @09:10PM (#27129245)

    As a bonus, you can easily add web filtering and block things like Slashdot at work.

    Actually, browsing Slashdot, The Old New Thing [msdn.com], lwn.net [lwn.net] and so on has made me more productive overall. Preventing users from accessing "time wasters" is a losing strategy: not only is the blocking technically futile, but by treating employees like children, you kill morale. Instead of micromanaging their days, treat employees like responsible adults and evaluate them based on their work and its results.

  • Re:You don't (Score:3, Insightful)

    by jamstar7 ( 694492 ) on Monday March 09, 2009 @09:25PM (#27129347)

    And that stops users from downloading and running applications how?

    By blocking them out of root access, they can't download a package like a .deb or an .rpm & install it. If they somehow manage to figure out how to download and compile a tarball, all they can install it to is their own home directory. I'd say, best way to do it is make sure they don't have compiler access. So, take them out of the sudo users group.

  • by orev ( 71566 ) on Monday March 09, 2009 @09:31PM (#27129393)

    Instead of spending $$$ on bondage and discipline, how about treating your users like adult human beings?

    THIS is why those tools don't exist. Because every time you ask, some self-righteous idealist responds like this. Unfortunately, those self-righteous idealists are often also the really good programmers who have the ability to create such tools.

  • Re:MOD PARENT UP (Score:1, Insightful)

    by Anonymous Coward on Monday March 09, 2009 @09:37PM (#27129457)

    You grown-up still think what you are talking about is hard in linux.

    Get it out of your head It is super-easy to make things standard in Linux, and if windows doesn't do it the way you like, you can still do it with linux.

    When you move a computer to a different department you simply boot it up. Have a service to check which rpms should be installed for the department and install those and BANG BANG! The computer now gets everything with new policies. There is no bringing the computer to the IT department and reloading the configuration, or even having to deal with MS licensing!

    Of course you have to make your own rpms, but that is dead simple. Want to make a change for a whole department. Just recreate the rpm in your repo the way you want it, and install it.

    With Linux you sometimes have to spend a few extra minutes to make things work, but when you are done it is a million times more flexible than windows. You know how it works, and you don;t have to worry about any BSA audits. Not having to worry about the BSA means you can save tons on the licensing department in you giant organization.

  • by citylivin ( 1250770 ) on Monday March 09, 2009 @09:43PM (#27129503)

    "Then how do we prevent people from bringing in USB printers from home and connecting them locally"

    Id say if someone has to bring in their own printer, your company has bigger IT problems...

  • by Ungrounded Lightning ( 62228 ) on Monday March 09, 2009 @09:44PM (#27129515) Journal

    Many of the things group policy can do has nothing to do with "security" or "preventing users" from doing anything. It has a lot to do with quickly standardizing departments, offices, rooms, or whatever your business structure is.

    When you move a computer to a different department you simply drag the computer in AD to the different OU and BAM! That computer now gets everything new with its policies. There's no bringing the computer in to the IT department and reloading its configuration with "Configuration A for Department B".

    A lot of this can be done by netbooting the computer and letting it grab its configuration from the filesystems it points to.

    The configuration files (mainly in /etc) can contain the default startup scripts for the department's configurations. If you REALLY need to limit what apps the user can run, point to binary and library directories that don't contain anything the user mustn't have.

    Move it to a new department? Change the entry for the machine on the DHCP server. No need to pull it in for retweaking.

    This also means you don't need to have the OS and apps on the machine's own disk. You have a single copy of each kernel, utility, and library on your fileservers. You can use the whole disk for swap and /tmp. No individual
    installs. No local copies. Save the disk for stuff where fast access is needed but is all volatile. Meanwhile the cache take care of unloading the fileservers and network.

  • by Ungrounded Lightning ( 62228 ) on Monday March 09, 2009 @09:50PM (#27129569) Journal

    Move it to a new department? Change the entry for the machine on the DHCP server. No need to pull it in for retweaking.

    Or even plugged in when you make the change.

    You can use the whole disk for swap and /tmp. No individual installs. No local copies.

    And the user's entire persistent state is on your fileservers, where you control the backup, maintain history (and let the user recover his OWN lost files), etc.

    Meanwhile, with nothing persistent on the user's machine there's no info lost if it fries or is stolen, or if you need to upgrade his hardware. Just configure a fresh machine for netboot and replace the MAC address of his workstation with the new machine. Instant gratification.

    You also get to update the software on ALL the machines by updating ONE image on the servers.

  • by SaDan ( 81097 ) on Monday March 09, 2009 @10:13PM (#27129713) Homepage

    Unfortunately, few people in the Windows world seem to grasp that LDAP has been around for many years in the *nix world, and has all the functionality you would find in Group Policies when linked into PAM on the client side.

    For a couple years, I maintained a company-wide network that supported unified "home" directories and unified login/password capabilities between Windows workstations, Linux workstations, and Solaris servers, all tied back to Fedora Directory Server. It was hell to set up, and sweet to watch in action.

    Active Directory and Group Policies aren't bad for simple installations, but really turn into a mess quickly depending on your setup. LDAP and *nix systems that support PAM are a snap to set up, work fairly well and took significantly LESS time to get working properly than the Windows side did.

    There's a lot of research that goes into setting up either side of the equation. Linux/Unix has been more ready for the "enterprise" desktop than Windows has, though, and that's a cold hard fact.

  • by ozphx ( 1061292 ) on Monday March 09, 2009 @10:18PM (#27129759) Homepage

    In a large organisation the poor admin implementing the policy is not the person who created the policy.

    Web filtering is put in because Suzy once saw Joe in accounting see this site [tubgirl.com] after I linked to it here, because I'm a bit of a cunt like that. She then caused massive panic, which spread upwards to the CEO, who decreed that The Internets Shall Be Filtered to prevent the company being sued.

    Most GP isn't implemented to be totally bulletproof, its there to create a standardised config, and mostly prevent people breaking the policy. Mostly. Nobody gives a toss if Brad brings in solitaire on a usb stick and runs it, because he will get fired - for being a dick. GP is not strictly about "security". Its ease of config - and GP does make it fucking easy.

    As the article says, its bloody cheap to just pay your MS tax, tick a few things in a wizard and sit back. The other benefit with the MS solution is you _can_ tell your boss "Group Policy won't do that". If you try saying "KPolicyFreeEditsLOL" won't do that, then their response will be "Shit! I blame you for pushing this Linucks on us!".

    Cost of a domain controller and a XP pro licenses in bulk is bugger all compared to my annual salary anyway...

  • by jmorris42 ( 1458 ) * <jmorris&beau,org> on Monday March 09, 2009 @10:23PM (#27129805)

    > Then how do we prevent people from bringing in USB printers from home and connecting them locally?

    Well it seems to me you are dealing with one of two scenarios.

    1. Users are so desperate to get work done they are working around IT stupidity. History repeats itself. Microcomputers were often brought into the workplace to get around the stupid restrictions the high priests of IT put on access to the minicomputer/mainframe. And a lot of minis initially came in to get local control of computing away from the lords of the mainframe at corporate HQ.

    Solution: Replace the IT people and let employees so motivated they were bringing their own printer do their part to get the economy going again.

    2. Users doing nefarious things like printing out company secrets.

    Do you think they won't work around any restrictions short of putting epoxy in the USB ports? And if you do that they will clone the MAC address onto a laptop and connect it in place of the locked desktop. Money motivates.

    Solution: In such a secure environment they should be using terminal services to keep them away from physical access to the hardware that can compromise security. When you catch someone probing the defenses get rid of them before they figure out a way in. If you can't trust them they shouldn't be allowed anywhere near secrets. If they have to the bastards will take screenshots with their damned cellphone.

  • by jkinney3 ( 535278 ) on Monday March 09, 2009 @10:25PM (#27129829)

    In Linux it's done with policies in LDAP that are used to set variables for login scripts. Using standard Linux tools (written 20+ years ago for UNIX systems), the login process can report back what machine, IP address, etc a user is accessing. That coupled with the group structures in LDAP are used to set environment variables that dictate everything a user can access.

    If it weren't for the boneheaded point-n-click gui that windows crams down every admins throat, even windows admins would see that their precious AD is just ldap with environment variables modified by scripts.

    You talk about converting 300 seats. I converted 2000 to LTSP desktops. All driven by only 33 servers. See here for details: http://www.localnetsolutions.com/press.html [localnetsolutions.com]

    If you are still stuck, my contact info is on the site. I consult.

  • by Blakey Rat ( 99501 ) on Monday March 09, 2009 @10:40PM (#27129971)

    If you don't even KNOW what group policy is, why are you posting here? Get a knowledge injection of how NT and AD works, then come back.

    No, not everything group policy does can be done in Linux.

  • by mysidia ( 191772 ) on Monday March 09, 2009 @10:42PM (#27129993)

    Just because you have python and perl interpreters on the system does not mean you allow users access to them.

    You can use file permissions to restrict access to your executable interpreters.

  • NICE ETHICS (Score:1, Insightful)

    by Anonymous Coward on Monday March 09, 2009 @10:47PM (#27130037)

    Re: sudo vi conf/file.conf

    a) whoever set up that sudo should be fired. Look at rvim
    b) anyone who would exploit such a whole should be fired
    c) port forwarding wtf

  • by ozphx ( 1061292 ) on Monday March 09, 2009 @10:52PM (#27130079) Homepage

    The thing about that is it would require some very skilled programmers to do some very boring things. Generally this requires large infusions of cash and/or beers.

  • by Burdell ( 228580 ) on Monday March 09, 2009 @11:16PM (#27130241)

    That breaks functionality that uses those interpreters. For example, I see python running on my system for a printer applet. There are a number of things in a "modern" desktop that use python and perl (and ruby and ...).

    Also, if you change the permissions, your system package manager will probably at least complain, if not change them back the next time the packages are updated.

  • by Anonymous Coward on Monday March 09, 2009 @11:34PM (#27130347)

    As other posters pointed out, you have to stop thinking the One Microsoft Way.

    With a Unix system, you NFS mount the /home and /usr directories and you noexec /home. That is about all there is to it. The machine just needs to boot up minimally - the rest it gets over the network from a central server, so you manage ALL your machines in ONE place.

    It is much easier to administer a bunch of Unix machines than Microsoft machines.

  • Re:MOD PARENT UP (Score:3, Insightful)

    by QuoteMstr ( 55051 ) <dan.colascione@gmail.com> on Monday March 09, 2009 @11:36PM (#27130361)

    Different scenarios. What if your user is using his account on a central machine via remote X11?

  • by gbarules2999 ( 1440265 ) on Monday March 09, 2009 @11:42PM (#27130399)
    End users *are* responsible for telling developers what they're doing wrong.
  • Re:You don't (Score:3, Insightful)

    by DavidRawling ( 864446 ) on Monday March 09, 2009 @11:48PM (#27130463)
    Thanks for being intelligent and providing useful answers. Already I have learned about cfengine, bcfg2 and FreeIPA today - all of which look like bridging these gaps. Not that I want them to, really, since effectively Microsoft pays my salary ;-)
  • by Anonymous Coward on Tuesday March 10, 2009 @12:14AM (#27130673)
    Yet, everyone is using it.

    Goes to show how much it is needed.
  • by Malc ( 1751 ) on Tuesday March 10, 2009 @01:40AM (#27131139)

    Which Linux distro does it in a standardised manner so that any Linux admin hired from anywhere else will be able to come in and just understand without having to figure it out?

  • by TheRealSlimShady ( 253441 ) on Tuesday March 10, 2009 @03:57AM (#27131683)

    Unfortunately few people in the *nix world seem to grasp that LDAP is just a protocol (that's the P bit of the acronym). It's just a standard way of accessing directories - which is what Active Directory is (as is OpenLDAP etc etc). LDAP means nothing as a reference to a directory - OpenLDAP might in your case. So what you meant to say was "directories (that are accessible via LDAP) have been around for years". Whether they do everything the particular implemention of Active Directory does is up for question - some may, some may not. It depends on implementation...

  • Firewall + logging (Score:3, Insightful)

    by sqldr ( 838964 ) on Tuesday March 10, 2009 @06:37AM (#27132423)

    Lets examine the threats here:

        Viruses? Hardly any.
        Rampant piracy? Of open source? haha. Of movies? Block bit torrent
        People opening up ports on their desktops to the world? Get a firewall.
        People h@x0ring root? Tripwire+logging.
        Dissemination of company secrets? Was always a threat. Force everyone through a proxy.

    Anything else?

  • Re:M$ (Score:2, Insightful)

    by tbogart ( 802762 ) <tjbogart33@gmail.com> on Tuesday March 10, 2009 @02:37PM (#27138477)

    "Depending on the support contract, RedHat costs you anything from US$500 to US$thousands per year for updates."

    Nope. Sorry. Simply not true. Updates are available regardless. Get over it. The whole model is not comparable to MS. Though millions of dollars change hands because lots of folks, including IT folks, just don't get it. Geez, I wonder if it is worth looking up the thread from maybe 4 years ago with IBMers who thought their support contract was a user license and they had to have it in place before they could use SLES.

    But we in the community appreciate you dumping the money out there, even if it is on totally bogus assumptions.

  • by SanityInAnarchy ( 655584 ) <ninja@slaphack.com> on Tuesday March 10, 2009 @03:30PM (#27139375) Journal

    They aren't competent because they have no incentive to be -- if they screw up their computers, that's IT's problem. If it suddenly became their problem, they might see things a little differently.

    Just for fun, here's a car analogy: A car is a rather complex piece of machinery, and takes a lot of training -- typically an entire class of driver's education. While some people go on to master it and become stunt drivers, or simply improve their skills and get a truck license, etc, most are content to at least reach some level of competence.

    But if you never bother to reach that much, you end up driving into a tree, or a telephone pole, or another person, and it's generally your fault.

    Aside from the fact that cars are actually dangerous, and can cause bodily harm, I'll go with the fact that it is entirely the responsibility of the driver to be properly licensed and at least competent, and if they can't do that, it's entirely on their own head, both literally and financially.

    Now, granted, many corporations don't like the idea of having to fire their best salesmen because said salesmen are morons about computers. But that only perpetuates the myth that it's somehow hard to attain some level of competence, and allows the salesmen to continue to see computer knowledge as somehow beneath them.

This file will self-destruct in five minutes.

Working...