Solved

Group policy and remote installation of office2k

Posted on 2001-08-29
2
125 Views
Last Modified: 2010-04-13
I am having trouble setting up automated office 2000 installs at CHILD DOMAIN level. The automated install works okay at PARENT DOMAIN level for any computer accounts, but the same policy within the child domain fails to work!
I have ensured the policy is being accessed by adding a sample script at computer level and this runs okay. Any ideas - it's driving me mad!!!
0
Comment
Question by:dd021197
2 Comments
 
LVL 16

Expert Comment

by:GUEEN
Comment Utility
Within the CIW for the administrative install (screen 12 I believe) have you specified the additional network servers that users can install from?  Did you use path and not unc?
0
 
LVL 3

Accepted Solution

by:
rcasteel earned 300 total points
Comment Utility
Ther are several reasons for this behavior.  Since Office deploys successfully in the parent domain, I will assume that the GPO is correct and working.  Since the script works, I will assume that the GPO is actually being deployed in the child domain.  

I feel that the GPO is probably correct and configured properly.

The question is this.  When you placed the office files on a server did you give the users in the child domain at least read access to them?  I suspect that you placed the files on a server in the parent domain.  The GPO points to that server for the source for the files to be copied from.  You then applied that GPO to a child domain.  When the PCs in the child domain try to carry out the GPO, it works...until it tries to read the Office files fro  the server in the remote domin.  You could try a few things to test this.  1.  give EVERYONE read access to the source files and see if the GPO deploys the software.
2.  Do a full A-G-DL-P to the files and see if the GPO deploys the software.

Remember this if you are working towads certification...this is actually the way to send software to an OU and prevent a single comnputer in that OU from recieving the software deplyed in the GPO.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Veeam Backup & Replication has added a new integration – Veeam Backup for Microsoft Office 365.  In this blog, we will discuss how you can benefit from Office 365 email backup with the Veeam’s new product and try to shed some light on the needs and …
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now