Solved

Group Policy not processed on wireless clients, ideas?

Posted on 2008-10-29
7
814 Views
Last Modified: 2013-11-05
We have wireless clients that are failing to retrieve group policy settings.

Basically it comes down to the fact that the wireless connection isn't really getting authenticated and establishing a network connection until after the user logs on, so group policy processing is aborted because "no domain controller can be found".

Makes sense overall, but what ways can I use to ensure group policy settings (like software deployment, computer startup scripts, etc.) get processed by these wireless clients?  Is there a way to get the wireless to authenticate prior to CTRL-ALT-DEL?

I do have the group policy setting "Wait for network before login" enabled but hasn't done anything for these guys. (not even sure if they are getting it anyway.lol)
0
Comment
Question by:TheCleaner
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
7 Comments
 
LVL 70

Expert Comment

by:KCTS
ID: 22831058
It could be that the wireless network is being detected as a "Slow connection" see http://technet.microsoft.com/en-us/library/cc781031.aspx
0
 
LVL 23

Author Comment

by:TheCleaner
ID: 22831421
KCTS, don't think that's it actually.

When I log on to the computer and look at the system log I get multiple entries regarding:

-w32time not getting time from a DC
-No domain controller available
-lsasrv errors

Then about 1 minute later I get a new entry:

-Belkin wireless adapter has entered a working and operational state

Then I get:

-w32time is now syncing correctly


If I setup a continuous ping to this workstation from a DC, I don't get a response until after the "Belkin wlreless" log entry in the system log appears on the workstation (about 1 minute after logon).


I'm thinking it boils down to the wireless connection not connecting prior to user authentication, but not sure what I can do to remedy that situation.
0
 
LVL 70

Expert Comment

by:KCTS
ID: 22831450
Are the machines getting thair IP from DHCP?
Check that they have your DC as the DNS server.
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 23

Author Comment

by:TheCleaner
ID: 22831625
They are getting IPs from DHCP, and yes they get their DNS settings from DHCP too (and yes the DNS servers are the local DCs)
0
 
LVL 1

Expert Comment

by:ITSMA
ID: 22832289
As far as a computer startup script, you could have the computers run gpupdate /force after they logon to force a GPO update.  You can also do gpresult to see what policies they are getting.
0
 
LVL 23

Author Comment

by:TheCleaner
ID: 22833887
ITSMA,

The problem is that even with a gpupdate /force it acknowledges there are gpo's to apply and asks for a reboot, but then the network (and thus the GPO's from the DC's) isn't available until after logon.
0
 
LVL 23

Accepted Solution

by:
TheCleaner earned 0 total points
ID: 22890208
Determined that some of the clients weren't using Windows Zero Configuration for their wireless...and thus weren't being authenticated to the network until after logon (when the 3rd party utility actually started).
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Learn about cloud computing and its benefits for small business owners.
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question