Solved

How to ignore Domian security policy

Posted on 2003-10-24
3
154 Views
Last Modified: 2010-04-13
Hi,

I have one server that i need to have a different set of policies than the rest of my domain.  How can i set this box ignore the global policy that is in place, and use its own local policy instead.

thanks
Stu
0
Comment
Question by:stuartknox
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 43

Expert Comment

by:JFrederick29
ID: 9613543
If the server is a member server and you want different Account Policies you'll have to remove the server from the domain and configure the server as a "stand alone" server (Do not attach it to the domain).  It will then use its own local security policies.

If the server is a DC, you'll have to create a second domain to setup different Account policies.

If you are not referring to the domain account policy, simply block the inheritance of the group policy in question and create a new one for the server at the OU level.
0
 
LVL 3

Accepted Solution

by:
dshuang5858 earned 125 total points
ID: 9613941
Hi, stuartknox,

Another way you can try is to create an user group which use default policy.

- In the GPO where display your GPO link, you highlight the default policy and click "Properties".  
- Under "Security" Tab, highlight "Authenticated Users" and under Permission, uncheck "Read" and "Apply Group Policy"
- Click "Add" button to add the user group that need to use default policy and submit
- Make sure you highlight the new user group you just added; under Permission, check "Read" and "Apply Group Policy"

This way, you allow certain users to use default policy and rest of others will ignore the Global policy.

Hope this help!

dshuang5858
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Although a lot of people devote their energy toward marketing for specific industries, there are some basic principles that can be applied to any sector imaginable. We’ll look at four steps to take and examine how those steps were put into action fo…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question