Files
claudetools/clients/glaztech/GPO-Configuration-Guide.md

310 lines
9.3 KiB
Markdown

# Glaztech PDF Preview Fix - Group Policy Configuration
**Issue:** Windows 10/11 security updates (KB5066791, KB5066835) block PDF previews from network shares
**Solution:** Configure Group Policy to trust Glaztech network resources
**Client:** Glaztech Industries
**Domain:** glaztech.com
---
## Quick Start
**Option 1:** Run PowerShell script once on each computer (fastest for immediate fix)
**Option 2:** Configure GPO for permanent solution (recommended for long-term)
---
## GPO Configuration (Permanent Solution)
### Policy 1: Add Sites to Local Intranet Zone
**Purpose:** Trust Glaztech internal network resources
1. **Open Group Policy Management Console**
- Run: `gpmc.msc`
- Navigate to: `Forest > Domains > glaztech.com > Group Policy Objects`
2. **Create New GPO**
- Right-click "Group Policy Objects" → New
- Name: `Glaztech - PDF Preview Fix`
- Description: `Fix PDF preview issues from network shares (KB5066791/KB5066835)`
3. **Edit GPO**
- Right-click GPO → Edit
4. **Configure Intranet Zone Sites**
- Navigate to: `User Configuration > Policies > Windows Settings > Internet Explorer Maintenance > Security`
- Double-click: **Security Zones and Content Ratings**
- Click: **Import the current security zones and privacy settings**
- Click: **Modify Settings**
5. **Add Sites to Local Intranet Zone**
- Click: **Local intranet****Sites****Advanced**
- Add these sites (one per line):
```
*.glaztech.com
https://*.glaztech.com
http://*.glaztech.com
file://*.glaztech.com
```
6. **Add IP Ranges** (if servers use IPs)
- For each Glaztech site (192.168.0.* through 192.168.9.*):
```
https://192.168.0.*
https://192.168.1.*
https://192.168.2.*
https://192.168.3.*
https://192.168.4.*
https://192.168.5.*
https://192.168.6.*
https://192.168.7.*
https://192.168.8.*
https://192.168.9.*
file://192.168.0.*
file://192.168.1.*
(etc. for all 10 sites)
```
### Policy 2: Disable SmartScreen for Intranet Zone
**Purpose:** Prevent SmartScreen from blocking trusted internal resources
1. **Navigate to:** `User Configuration > Administrative Templates > Windows Components > File Explorer`
2. **Configure:**
- **Configure Windows Defender SmartScreen** → **Disabled** (for Intranet zone only)
3. **Alternative Registry-Based Setting:**
- Navigate to: `User Configuration > Preferences > Windows Settings > Registry`
- Create new Registry Item:
- Action: **Update**
- Hive: **HKEY_CURRENT_USER**
- Key Path: `Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1`
- Value Name: `2702`
- Value Type: **REG_DWORD**
- Value Data: `0` (Disable SmartScreen for Intranet)
### Policy 3: Enable PDF Preview Handlers
**Purpose:** Ensure PDF preview is enabled in Windows Explorer
1. **Navigate to:** `User Configuration > Preferences > Windows Settings > Registry`
2. **Create Registry Item:**
- Action: **Update**
- Hive: **HKEY_CURRENT_USER**
- Key Path: `Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced`
- Value Name: `ShowPreviewHandlers`
- Value Type: **REG_DWORD**
- Value Data: `1`
### Policy 4: Unblock Network Shares (Advanced)
**Purpose:** Automatically remove Zone.Identifier from files on network shares
**Option A: Startup Script (runs at computer startup)**
1. **Navigate to:** `Computer Configuration > Policies > Windows Settings > Scripts > Startup`
2. **Add Script:**
- Click: **Add** → **Browse**
- Copy `Fix-PDFPreview-Glaztech.ps1` to: `\\glaztech.com\SYSVOL\glaztech.com\scripts\`
- Script Name: `Fix-PDFPreview-Glaztech.ps1`
- Script Parameters: Leave blank (uses defaults)
**Option B: Logon Script (runs at user logon)**
1. **Navigate to:** `User Configuration > Policies > Windows Settings > Scripts > Logon`
2. **Add Script:** (same as above)
**Option C: Scheduled Task via GPO**
1. **Navigate to:** `Computer Configuration > Preferences > Control Panel Settings > Scheduled Tasks`
2. **Create new Scheduled Task:**
- Action: **Create**
- Name: `Glaztech PDF Preview Maintenance`
- Run as: **NT AUTHORITY\SYSTEM** or **%LogonDomain%\%LogonUser%**
- Trigger: **At log on** (or daily)
- Action: Start a program
- Program: `powershell.exe`
- Arguments: `-ExecutionPolicy Bypass -File "\\glaztech.com\SYSVOL\glaztech.com\scripts\Fix-PDFPreview-Glaztech.ps1"`
---
## Link GPO to OUs
1. **In Group Policy Management:**
- Right-click appropriate OU (e.g., "Computers" or "Workstations")
- Select: **Link an Existing GPO**
- Choose: `Glaztech - PDF Preview Fix`
2. **Verify Link:**
- Ensure GPO is enabled (checkmark in "Link Enabled" column)
- Set appropriate link order (higher = applied later)
---
## Testing GPO
1. **Force GPO Update on Test Computer:**
```powershell
gpupdate /force
```
2. **Verify Applied Policies:**
```powershell
gpresult /H C:\Temp\gpresult.html
# Open C:\Temp\gpresult.html in browser to review applied policies
```
3. **Check Registry Values:**
```powershell
# Check Intranet Zone configuration
Get-ItemProperty "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1"
# Check if preview handlers are enabled
Get-ItemProperty "HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" -Name ShowPreviewHandlers
```
4. **Test PDF Preview:**
- Navigate to network share with PDFs
- Select a PDF file
- Check if preview appears in Preview Pane (View → Preview Pane)
---
## Troubleshooting
### PDF Preview Still Not Working
1. **Check if GPO applied:**
```powershell
gpresult /r /scope:user
```
2. **Restart Windows Explorer:**
```powershell
Stop-Process -Name explorer -Force
```
3. **Check for blocked files manually:**
```powershell
Get-ChildItem "\\server\share" -Filter "*.pdf" -Recurse |
ForEach-Object {
if (Get-Item $_.FullName -Stream Zone.Identifier -ErrorAction SilentlyContinue) {
Unblock-File $_.FullName
}
}
```
### GPO Not Applying
1. **Check GPO replication:**
```powershell
dcdiag /test:replications
```
2. **Verify SYSVOL replication:**
```powershell
Get-SmbShare SYSVOL
```
3. **Check event logs:**
- Event Viewer → Windows Logs → Application
- Look for Group Policy errors
### SmartScreen Still Blocking
1. **Manually disable SmartScreen for Intranet (temporary):**
```powershell
Set-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1" -Name "2702" -Value 0 -Type DWord
```
2. **Check Windows Defender settings:**
- Settings → Update & Security → Windows Security → App & browser control
- Ensure SmartScreen isn't overriding zone settings
---
## Rollback Plan
If issues occur after GPO deployment:
1. **Disable GPO:**
- GPMC → Right-click GPO → **Link Enabled** (uncheck)
2. **Delete GPO (if needed):**
- GPMC → Right-click GPO → **Delete**
3. **Force refresh on clients:**
```powershell
gpupdate /force
```
---
## Alternative: PowerShell Deployment (No GPO)
If GPO deployment is not feasible:
1. **Deploy via GuruRMM:**
```powershell
.\Deploy-PDFFix-BulkRemote.ps1 -UseGuruRMM
# Upload generated script to GuruRMM dashboard
```
2. **Deploy via PowerShell Remoting:**
```powershell
$Computers = Get-ADComputer -Filter * -SearchBase "OU=Workstations,DC=glaztech,DC=com" | Select-Object -ExpandProperty Name
.\Deploy-PDFFix-BulkRemote.ps1 -ComputerNames $Computers
```
3. **Manual deployment:**
- Copy script to network share
- Email link to users
- Instruct users to right-click → "Run with PowerShell"
---
## When to Use Each Method
| Method | Use When | Pros | Cons |
|--------|----------|------|------|
| **GPO** | Large environment, permanent fix needed | Automatic, consistent, centrally managed | Requires AD infrastructure, slower rollout |
| **GuruRMM** | Quick deployment needed, mixed environment | Fast, flexible, good reporting | Requires GuruRMM access, manual execution |
| **PowerShell Remoting** | AD environment, immediate fix needed | Very fast, scriptable | Requires WinRM enabled, manual execution |
| **Manual** | Small number of computers, no remote access | Simple, no infrastructure needed | Time-consuming, inconsistent |
---
## Additional Server Names/IPs
**TODO:** Update this list when user provides Glaztech file server details
```powershell
# Add servers to script parameters:
$ServerNames = @(
# "fileserver01",
# "192.168.1.50",
# "glaztech-nas01",
# Add more as identified...
)
```
Update script on SYSVOL or re-run deployment after adding servers.
---
## References
- [Microsoft KB5066791](https://support.microsoft.com/kb/5066791) - Security update that changed file handling
- [Microsoft KB5066835](https://support.microsoft.com/kb/5066835) - Related security update
- [Mark of the Web (MOTW)](https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/mark-of-the-web) - Zone.Identifier explanation
- [Internet Explorer Security Zones](https://docs.microsoft.com/en-us/troubleshoot/browsers/how-to-add-sites-to-the-local-intranet-zone)
---
**Last Updated:** 2026-01-27
**Contact:** AZ Computer Guru MSP
**Client:** Glaztech Industries (GuruRMM Client ID: d857708c-5713-4ee5-a314-679f86d2f9f9)