Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Loop back processing applied to security group

Posted on 2009-04-08
4
Medium Priority
?
304 Views
Last Modified: 2012-05-06
I have loop back processing working on a 2008 terminal server.  When the gpo is applied to authenticated users it works and drives are hidden.  I only want to apply to policy to a particular security group. However, when I do this, the part of the policy that hides the drives no longer is applied.  I can see this in group policy results and in actuality.

The permissions for the GPO are the same for Authenticated users and the Security group I created.
0
Comment
Question by:networkmgmt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 49

Expert Comment

by:Akhater
ID: 24101031
you mean you are removing "apply group policy settings' for "Authenticated users" and adding it to that security group ?


If so try adding the computer accounts they are logging on to in that security group and try again it will work
0
 

Author Comment

by:networkmgmt
ID: 24101246
I mean, I removed "authenticated users" from the Security filtering and added a different security group.  I assumed then that the policy would only apply to that security group rather than all authenticated users.

All the users log into 1 computer, the Terminal server.  You mean add the terminal server to that security group?  If you meant that, I tried it, but still have the same problem.

Basically, I want all of the drives hidden on the terminal server when users log into it.  I do not want the drives hidden when administrators log into the server.

0
 
LVL 49

Accepted Solution

by:
Akhater earned 2000 total points
ID: 24101255
yes add the TS to that group and restart the TS
0
 

Author Closing Comment

by:networkmgmt
ID: 31568208
That worked, thanks a lot.
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A bad practice commonly found during an account life cycle is to set its password to an initial, insecure password. The Password Reset Tool was developed to make the password reset process easier and more secure.
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question