Solved

Group Policy Preferences Question

Posted on 2008-10-06
4
272 Views
Last Modified: 2010-03-17
Within Group Polcy Preferences on server 2008 how can i do the following

if %computername%==WS1 goto end
batchfile.cmd

:end
0
Comment
Question by:titn003
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 58

Expert Comment

by:tigermatt
ID: 22651890

Group Policy Preferences and Deployed Printers are applied using the general rules of Group Policy Scope and inheritance. Thus, if a deployed printer must not be mapped on a particular computer, you have to move the computer account out of the scope of the Group Policy object, so the settings do not inherit and the policy is not applied.

The easiest method is to simply go to the Group Policy in Group Policy Management, click the "Delegation" tab, then add a Deny permission for the appropriate computer object for the "Apply Group Policy" permission.

-tigermatt
0
 
LVL 54

Expert Comment

by:McKnife
ID: 22654373
In GPP, you have ->item level targeting (which is nothing else but a wmi filter), to filter which computers, users, cpu types... the preferences get applied to. Look at the dialogue box behind "common" in the preference settings.
0
 

Author Comment

by:titn003
ID: 22656816
Mcknife

So where can i run the batch file
0
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 22661227
GPP tries to be an easier substitute for scripts and batch files, so it does not offer to run batch files. What's the content/purpose of the batch? Is it intended to run once or again and again?
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question