Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Local user account management using Group Policy

Posted on 2008-06-26
2
Medium Priority
?
630 Views
Last Modified: 2013-12-04
Hi Experts,

there is a problem I keep coming across on my network which I think stems from a fundamental misunderstanding of how group policy works with local user accounts.

Numerous software packages I install have failed to restart their appropriate services because the default user account they created at setup is removed or does not have the appropriate privileges in our AD domain.

I have read a lot of information on the internet but cannot find a decent explanation of local user account management with group policy.

Can anyone recommend a decent web site, whitepaper, tutorial or book which will help my understanding of this subject?

I've assigned 500 points to the question because I hope you'll be able to recommend lots of good resources and so I'll have to split the points!

Many thanks for all help offered

Andrew
0
Comment
Question by:Synergix
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 40

Accepted Solution

by:
coolsport00 earned 1500 total points
ID: 21873815
Funny you ask this...there is a website (www.gpoguy.com) that you can inquire things and, most of all, get on a listserve, to answer these and various GP-related questions. This question came up just about a week ago. In my experience, and in my org, I have local accts set via GP. What I have in my policies overwrite the default. But, according to Jamie Nelson & Darren Mar-Elia (the "gpo guy"), there is a way to "add" users to the local acct.

This is what Darren wrote in his email reply to this question:
"There are two sides to Restricted Groups. If you open the dialog you see Members of this Group at the top and This group is a member of at the bottom. So, lets say you wanted to add the Help Desk Admins group to the local Administrators group on a set of workstations. You would right-click the Restricted Groups node, choose Add Group and enter in or browse Help Desk Admins. Then, in the This group is a member of dialog, you would add the local Administrators group and, voilá!"

While I have gained great knowledge from using this site, I completely recommend getting on that listserver from GPOGUY.COM as it is also amazing. Darren actually writes books for Microsoft on GPOs so you could say he knows his stuff. :)

Hope that helps you.
Regards.
~coolsport00
0
 

Author Comment

by:Synergix
ID: 21914887
Thanks a lot for the reply Coolsport. I've joined that mailing list and am finding it very useful. You'll see some questions from me in the near future I think!

All points are yours as no one else has bothered to reply!

Many thanks

Andrew
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing h…
This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question