?
Solved

Group Policy Problem

Posted on 2008-10-08
7
Medium Priority
?
200 Views
Last Modified: 2012-05-05
Hi Guys
i need to re-strict access to certain pc's on our network i have tried this with GPO but it does not work, i have OU applied to speccific users and these work fine but when i put the pc's i require to lock down in a ou an setup a policy on it nothing works, i need this for a group of specific people but i cant move them out of there existing OU

Any Ideas

Thanks

0
Comment
Question by:ciandirrane
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 39

Expert Comment

by:ChiefIT
ID: 22667256
What are we restricting access to, (internet, file shares, logging onto that particular computer)???
0
 

Author Comment

by:ciandirrane
ID: 22667263
Desktop Icons and to install a default printer and access to specific shares
0
 
LVL 39

Expert Comment

by:ChiefIT
ID: 22667391
Hi ciandirrane:

Your looking at the differences between Apples, Oranges, and Pears:

Desktop Icons:
Not quite sure what you want to do with these icons, can you specify for me? Do you want these users not to delete these Icons? Do you want them to have a default desktop?

Default printer:
This is usually best done with a logon script:
I avoid scripting like the plague, so it will be a good idea if we get some help on this. Once we get to the root of exactly what you want to do for all three tasks, I can get us some scripting help for us.

Access to shares:
This is done on the share itself. Going to the share and setting the NTFS permissions and Share permissions will prevent them from accessing the shares. If you don't want them to see the shares, we can involk Access Based Enumeration. ABE may be a little more advanced than you might want to go at this time and I find that preventing access to the shares is good in most all cases.
0
Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

 

Author Comment

by:ciandirrane
ID: 22667413
Hi
i want them to have a default Desktop on these specific machines i.e. pc1 and pc2, but when they logon to pc3 i want them to be able to use the control panel our change their desktop, i have worked out a vb script to set the default printer
If i create a OU with the pc's in them and apply a policy, it does not apply

Thanks

0
 
LVL 39

Expert Comment

by:ChiefIT
ID: 22667457
Go to the command prompt and type of the DC:
GPupdate /force

Does that enforce your group policy to those computers?
0
 
LVL 11

Accepted Solution

by:
loftyworm earned 2000 total points
ID: 22671412
I think using Loopback Processing will do the trick for you, it is near the bottom
http://technet.microsoft.com/en-us/library/bb742376.aspx
0
 

Author Closing Comment

by:ciandirrane
ID: 31504145
Thanks
0

Featured Post

10 Questions to Ask when Buying Backup Software

Choosing the right backup solution for your organization can be a daunting task. To make the selection process easier, ask solution providers these 10 key questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 22 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question