Solved

Windows Firewall is using your non-domain settings

Posted on 2006-07-19
2
2,995 Views
Last Modified: 2013-11-16
I setup special settings on my domain controller for Windows Firewall. All of my machines work with it except my laptop. When I go into the firewall settings, it reads at the bottom "Windows Firewall is using your non-domain settings". This causes the laptop to ignore these settings. Any ideas?
0
Comment
Question by:rbichon
2 Comments
 
LVL 25

Accepted Solution

by:
Cyclops3590 earned 250 total points
Comment Utility
just curious if it has been able to communicate to a DC since you've made those changes.

you should be able to do a
gpupdate /force
or just restart the machine after you know that it is capable of communicating with a DC
0
 
LVL 1

Author Comment

by:rbichon
Comment Utility
I think I figured it out. I was doing a backup of the server at the time which also backs up the system state. I think that when it does this, it locks some part of the DC for a period of time which makes all of the machines on the domain unable to apply the group policies. I have had similar issues with one computer that was unable to run the login script while logging on to the DC. When I am not running the backup, all of the issues disappear. Thanks for your help.
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now