Solved

Group Policy not processed on wireless clients, ideas?

Posted on 2008-10-29
7
812 Views
Last Modified: 2013-11-05
We have wireless clients that are failing to retrieve group policy settings.

Basically it comes down to the fact that the wireless connection isn't really getting authenticated and establishing a network connection until after the user logs on, so group policy processing is aborted because "no domain controller can be found".

Makes sense overall, but what ways can I use to ensure group policy settings (like software deployment, computer startup scripts, etc.) get processed by these wireless clients?  Is there a way to get the wireless to authenticate prior to CTRL-ALT-DEL?

I do have the group policy setting "Wait for network before login" enabled but hasn't done anything for these guys. (not even sure if they are getting it anyway.lol)
0
Comment
Question by:TheCleaner
  • 4
  • 2
7 Comments
 
LVL 70

Expert Comment

by:KCTS
ID: 22831058
It could be that the wireless network is being detected as a "Slow connection" see http://technet.microsoft.com/en-us/library/cc781031.aspx
0
 
LVL 23

Author Comment

by:TheCleaner
ID: 22831421
KCTS, don't think that's it actually.

When I log on to the computer and look at the system log I get multiple entries regarding:

-w32time not getting time from a DC
-No domain controller available
-lsasrv errors

Then about 1 minute later I get a new entry:

-Belkin wireless adapter has entered a working and operational state

Then I get:

-w32time is now syncing correctly


If I setup a continuous ping to this workstation from a DC, I don't get a response until after the "Belkin wlreless" log entry in the system log appears on the workstation (about 1 minute after logon).


I'm thinking it boils down to the wireless connection not connecting prior to user authentication, but not sure what I can do to remedy that situation.
0
 
LVL 70

Expert Comment

by:KCTS
ID: 22831450
Are the machines getting thair IP from DHCP?
Check that they have your DC as the DNS server.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 23

Author Comment

by:TheCleaner
ID: 22831625
They are getting IPs from DHCP, and yes they get their DNS settings from DHCP too (and yes the DNS servers are the local DCs)
0
 
LVL 1

Expert Comment

by:ITSMA
ID: 22832289
As far as a computer startup script, you could have the computers run gpupdate /force after they logon to force a GPO update.  You can also do gpresult to see what policies they are getting.
0
 
LVL 23

Author Comment

by:TheCleaner
ID: 22833887
ITSMA,

The problem is that even with a gpupdate /force it acknowledges there are gpo's to apply and asks for a reboot, but then the network (and thus the GPO's from the DC's) isn't available until after logon.
0
 
LVL 23

Accepted Solution

by:
TheCleaner earned 0 total points
ID: 22890208
Determined that some of the clients weren't using Windows Zero Configuration for their wireless...and thus weren't being authenticated to the network until after logon (when the 3rd party utility actually started).
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Numerous times I have been asked this questions that what is it that makes my machine log on so slow, there have been cases where computers took 23 minute exactly after taking password and getting to the desktop. Interesting thing was the fact th…
A quick step-by-step overview of installing and configuring Carbonite Server Backup.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question