Solved

GPO to Remote Site

Posted on 2002-05-15
4
262 Views
Last Modified: 2010-04-13
I created some GPOs and deleted some old ones from my domain. The GPOs I deleted were being used to configure IE proxy settings and the new one did the same thing with a few other additions. Now that I deleted them the remote sites lost their proxy settings and didn't apply the new GPO with the same settings. When I run GPresult on one of the W2k Pro PCs it says that it is still applying the GPOs that are now deleted. Another PC says that it doesn't see the new or the old GPOs. This site doesn't have a DC. Any ideas?
0
Comment
Question by:timd4273
  • 3
4 Comments
 
LVL 1

Accepted Solution

by:
losgadas earned 200 total points
ID: 7012148
I don't know the topology of your network, but it seems to me that you need to have a domain controller in your site.
The changes you made to your domain may not have replicated to your network PCs.
0
 

Author Comment

by:timd4273
ID: 7012171
56K line. TCP/IP Ethernet.

I thought that myself because I set up the PC here at the corporate location and then installed the PC at the remote. But what I find curious is it knew the GPO was changed but it won't apply any new ones.
0
 

Author Comment

by:timd4273
ID: 7027966
Well as it turns out there is far more to this problem than I expected. I removed this PC from Active Directory and then removed the PC from the domain. Then I created the computer account in Active Directory and rejoined the PC into the domain and it didn't change one single thing. Apparently the PC is holding the settings and won't let go. If anyone has any ideas let me know.
0
 

Author Comment

by:timd4273
ID: 7292979
I just realized that I never graded this answer since no one knew the answer. You have to disable Slow Link Detection at the PC.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
We need a new way to communicate time sensitive or critical info.   The best part of my role at xMatters is visiting our clients all over the world to learn about how they operate their businesses, share insights that xMatters has gleaned across…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now