Solved

Group Policy Preferences Question

Posted on 2008-10-06
4
278 Views
Last Modified: 2010-03-17
Within Group Polcy Preferences on server 2008 how can i do the following

if %computername%==WS1 goto end
batchfile.cmd

:end
0
Comment
Question by:titn003
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 58

Expert Comment

by:tigermatt
ID: 22651890

Group Policy Preferences and Deployed Printers are applied using the general rules of Group Policy Scope and inheritance. Thus, if a deployed printer must not be mapped on a particular computer, you have to move the computer account out of the scope of the Group Policy object, so the settings do not inherit and the policy is not applied.

The easiest method is to simply go to the Group Policy in Group Policy Management, click the "Delegation" tab, then add a Deny permission for the appropriate computer object for the "Apply Group Policy" permission.

-tigermatt
0
 
LVL 55

Expert Comment

by:McKnife
ID: 22654373
In GPP, you have ->item level targeting (which is nothing else but a wmi filter), to filter which computers, users, cpu types... the preferences get applied to. Look at the dialogue box behind "common" in the preference settings.
0
 

Author Comment

by:titn003
ID: 22656816
Mcknife

So where can i run the batch file
0
 
LVL 55

Accepted Solution

by:
McKnife earned 500 total points
ID: 22661227
GPP tries to be an easier substitute for scripts and batch files, so it does not offer to run batch files. What's the content/purpose of the batch? Is it intended to run once or again and again?
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Let's recap what we learned from yesterday's Skyport Systems webinar.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question