Solved

samba ntconfig.pol

Posted on 2006-12-01
12
370 Views
Last Modified: 2011-09-20
Hi all,

I have a quick question. I have a samba server acting as domain controller which is working fine. I want to implement policies so i created NTConfig.POL and have it placed in the root of the netlogon folder and I have the permissions set to 777. However it is not implemeting these policies when I logon to the domain.

The domain members are windows xp and the policy was created on one of these computers then copied across.

Anyone have any ideas?

Thanks a lot.
0
Comment
Question by:blaadom
  • 6
  • 6
12 Comments
 
LVL 5

Expert Comment

by:dasmaer
ID: 18052709
How are you telling Samba to use these policies?
0
 

Author Comment

by:blaadom
ID: 18052718
Thats what i need to know. How do you tell samba to use this file? thanks for the quick response.
0
 
LVL 5

Expert Comment

by:dasmaer
ID: 18052738
When a Windows NT4/200x/XP machine logs onto the network, the client looks in the NETLOGON share on the authenticating domain controller for the presence of the NTConfig.POL file. If one exists, it is downloaded, parsed, and then applied to the user's part of the registry.

So make sure you have a NETLOGIN share on the domain controller (it should be created by default), and make sure that you have yourNTConfig.POL file there... or are you doing this already?
0
 

Author Comment

by:blaadom
ID: 18052752
yep i have a netlogon folder which has NTConfig.POL in it. Both the folder and the file are chmod to 777 yet for some reason the windows client doesn't pick it up. Is there even any way of checking if the client is trying to get the.pol file
0
 
LVL 5

Expert Comment

by:dasmaer
ID: 18052756
By default the client will look there and download it, I don't know if you can tell if its fetching it.  It may be the case that the client is trying to execute it though, I take it you chmod'd to 755 before and had no luck?
0
 
LVL 5

Accepted Solution

by:
dasmaer earned 500 total points
ID: 18052770
sorry, I meant 744.
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 

Author Comment

by:blaadom
ID: 18052771
yea tried it at 755 and then changed to 777 just in case. from what i have been reading it just seems as easy as creating the pol file and placing it in the netlogon share. im just wondering am i missing something simple. thanks a lot for your help your giving
0
 

Author Comment

by:blaadom
ID: 18052785
oh ok i will try 744 now, 1 sec
0
 
LVL 5

Expert Comment

by:dasmaer
ID: 18052796
Just another thought, have you restarted Samba since placing the file there? Or is that not practical in your situation?
0
 

Author Comment

by:blaadom
ID: 18052803
hey your a god it worked!!! thanks a bunch, excellent help, fully deserve 500 points
0
 
LVL 5

Expert Comment

by:dasmaer
ID: 18052807
np. was it the 744 that fixed it?
0
 

Author Comment

by:blaadom
ID: 18052808
yep it was the 744, again thanks a bunch, your an expert! :)
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
rdate is a Linux command and the network time protocol for immediate date and time setup from another machine. The clocks are synchronized by entering rdate with the -s switch (command without switch just checks the time but does not set anything). …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now