Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

which switches should I use for gpupdate /force not to cause a logoff or a reboot ?

Posted on 2007-08-07
9
Medium Priority
?
6,169 Views
Last Modified: 2011-05-08
please help
0
Comment
Question by:itbabe
8 Comments
 
LVL 31

Expert Comment

by:Toni Uranjek
ID: 19644401
Hi!

AFAIK "gpupdate /force" will not reboot or logoff if you don't use /boot and/or /logoff switches.

Toni
0
 

Author Comment

by:itbabe
ID: 19644412
no,  but it wil still ask whether the user wants a reboot or a logoff
I want the command to run automatically without asking input from the user.

For now i have cmd /c ECHO n ECHO n|gpupdate /force,  but this is only responding to the first question.
0
 
LVL 31

Expert Comment

by:Toni Uranjek
ID: 19644438
May I ask why you want to put gpupdate in script? Policies are automatically procesed every 90 + random 0..30 minutes. And if they require reboot or logoff, new settings will afect computers and/or users only after reboot and/or logoff.
0
Transaction-level recovery for Oracle database

Veeam Explore for Oracle delivers low RTOs and RPOs with agentless transaction log backup and transaction-level recovery of Oracle databases. You can restore the database to a precise point in time, even to a specific transaction.

 

Author Comment

by:itbabe
ID: 19652672
I need to use the command to apply a security policy after a software package has been installed on a pc.

Eg when access is given to the programfiles folder by the policy.

I found the solution : cmd /c (echo n & echo n)|gpupdate /force
0
 
LVL 1

Accepted Solution

by:
Vee_Mod earned 0 total points
ID: 19682846
Closed, 500 points refunded.
Vee_Mod
Community Support Moderator
0
 

Expert Comment

by:MyITGuy
ID: 32936018
I decided to run each one individually.

echo n | gpupdate /target:user /force
echo n | gpupdate /target:computer /force

or..

echo n | gpupdate /target:user /force && echo n | gpupdate /target:computer /force
0
 

Expert Comment

by:GSMELHD
ID: 35717221
Thanks that worked for me
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
A hard and fast method for reducing Active Directory Administrators members.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses
Course of the Month20 days, 16 hours left to enroll

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question