Solved

How to Deploy Power scheme settings using Group policy?

Posted on 2008-06-13
4
912 Views
Last Modified: 2008-11-21
How to Deploy Power scheme settings using Group policy?
0
Comment
Question by:OCUBE
4 Comments
 
LVL 2

Accepted Solution

by:
kunalclk earned 250 total points
ID: 21781232
There is not much that you can get in Group Policy.
Go to User Configuration>Administrative Templates>System>Power Management.

Additionally you can use scripts and apply them using GPO. Try this link if this works for you:
http://support.microsoft.com/kb/324347
0
 
LVL 3

Expert Comment

by:theklap
ID: 22143287
What I do is set the permissions on the power options registry keys to allow regular users to set the default power profile. You will have to go get satacl.exe from http://setacl.sourceforge.net/
Then as administrator run these commands.  I use a software deployment tool called wpkg to deploy software, so I created a new package that runs these commands.

SetACL.exe -on "hklm\SOFTWARE\Microsoft\Windows\CurrentVersion\Controls Folder\PowerCfg\GlobalPowerPolicy" -ot reg -actn ace -ace "n:users;p:full" -log "c:\setacllog.txt" -silent

SetACL.exe -on "hklm\SOFTWARE\Microsoft\Windows\CurrentVersion\Controls Folder\PowerCfg\PowerPolicies" -ot reg -actn ace -ace "n:users;p:full" -log "c:\setacllog.txt" -silent'

Then from there I use the power config tool available in XP to set the default profile in the user login script.  I use the always on profile since I run updates and such at night.
POWERCFG /SETACTIVE "Always On"

0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

INTRODUCTION The purpose of this document is to demonstrate the Installation and configuration of the Data Protection Manager product. Note that this demonstration was prepared on the basis of Windows OS is 2008 R2 and DPM 2010. DATA PROTECTI…
Ever notice how you can't use a new drive in Windows without having Windows assigning a Disk Signature?  Ever have a signature collision problem (especially with Virtual Machines?)  This article is intended to help you understand what's going on and…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now