?
Solved

Loop back processing applied to security group

Posted on 2009-04-08
4
Medium Priority
?
306 Views
Last Modified: 2012-05-06
I have loop back processing working on a 2008 terminal server.  When the gpo is applied to authenticated users it works and drives are hidden.  I only want to apply to policy to a particular security group. However, when I do this, the part of the policy that hides the drives no longer is applied.  I can see this in group policy results and in actuality.

The permissions for the GPO are the same for Authenticated users and the Security group I created.
0
Comment
Question by:networkmgmt
  • 2
  • 2
4 Comments
 
LVL 49

Expert Comment

by:Akhater
ID: 24101031
you mean you are removing "apply group policy settings' for "Authenticated users" and adding it to that security group ?


If so try adding the computer accounts they are logging on to in that security group and try again it will work
0
 

Author Comment

by:networkmgmt
ID: 24101246
I mean, I removed "authenticated users" from the Security filtering and added a different security group.  I assumed then that the policy would only apply to that security group rather than all authenticated users.

All the users log into 1 computer, the Terminal server.  You mean add the terminal server to that security group?  If you meant that, I tried it, but still have the same problem.

Basically, I want all of the drives hidden on the terminal server when users log into it.  I do not want the drives hidden when administrators log into the server.

0
 
LVL 49

Accepted Solution

by:
Akhater earned 2000 total points
ID: 24101255
yes add the TS to that group and restart the TS
0
 

Author Closing Comment

by:networkmgmt
ID: 31568208
That worked, thanks a lot.
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's recap what we learned from yesterday's Skyport Systems webinar.
I’m willing to make a bet that your organization stores sensitive data in your Windows File Servers; files and folders that you really don’t want making it into the wrong hands.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question