Solved

Wireless Computers not accepting computer group policy

Posted on 2008-10-23
2
465 Views
Last Modified: 2012-05-05
My laptops are not accepting computer group policies. It works with users but not computers.

I'm running WPA-TKIP and authenticating the computer using RADIUS. I can ping the computer before i ever see a login screen but the policies still seems to n ot take any effect.

Anyone has any ideas?
0
Comment
Question by:jjmartineziii
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Expert Comment

by:sk_raja_raja
ID: 22786762
1.If the other computers are not running VISTA and they have not yet had thier client site extensions upgraded (XP or 2000 Pro), this policy will not update.

See http://technet2.microsoft.com/windowsserver/en/library/1f52744d-02d1-421d-bc85-af90cc0ddb261033.mspx?mfr=true

What is the operating system status of the other computers?

2. Follow these steps from previous EE posts by an expert,
You can do this in the following way:

1. Create a new GPO or edit an existing one. The best tool for creating, linking and editing GPOs in the Group Policy Management Console (or GPMC).
2. Edit the GPO you've selected, and expand Computer Configuration > Security Settings. You'll notice a node called Wireless Network (IEEE 802.11) Policies.
3. Right-click Wireless Network (IEEE 802.11) Policies and select Create Wireless Network Policy
4. In the Wireless Network Policy window click Next.
5. In the Name box type a descriptive name for the new policy. Click Next.
6. In the final window make sure Edit Properties is selected, and click Finish.
7. In the Wireless Policy Properties window on the General tab you can change the policy's name, the refresh interval (by default - 180 minutes), the ability to force the client computers to only connect to infrastructure devices (versus the ability to connect to any available device, including Ad-Hoc networks), and the option to force the default Windows client WiFi tool (versus other 3rd-party tools such as the excellent Intel PROSet/Wireless client).
8. On the Preferred Networks tab you can add a list of the preferred WiFi networks that the clients are allowed to connect to. The client will only connect to these networks as long as it has had the Wireless GPO applied to it.

When you click on Add you can enter the Wireless's network Name (SSID), just make sure you type it exactly as it is broadcast by the Wireless Access Point. You can also configure the level of authentication and encryption of the preferred network.

On the IEEE 802.1X tab of the New Preferred Setting Properties window you can configure the desired authentication method required by the Wireless network you're connecting to.

When finished click Ok.

9. When you're done, close the GPO editor tool.

Although limited in scope, these settings can be used to configure the basic settings for the client computer.
0
 
LVL 12

Accepted Solution

by:
jjmartineziii earned 0 total points
ID: 22897697
Had to do a registry edit:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"GpNetworkStartTimeoutPolicyValue"=dword:00000060
0

Featured Post

SharePoint Admin?

Enable Your Employees To Focus On The Core With Intuitive Onscreen Guidance That is With You At The Moment of Need.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In-place Upgrading Dirsync to Azure AD Connect
A project that enables an administrator to perform actions within a user session context not just at the time of login but any time later on day(s) or week(s) later.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question