Solved

Loop back processing applied to security group

Posted on 2009-04-08
4
302 Views
Last Modified: 2012-05-06
I have loop back processing working on a 2008 terminal server.  When the gpo is applied to authenticated users it works and drives are hidden.  I only want to apply to policy to a particular security group. However, when I do this, the part of the policy that hides the drives no longer is applied.  I can see this in group policy results and in actuality.

The permissions for the GPO are the same for Authenticated users and the Security group I created.
0
Comment
Question by:networkmgmt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 49

Expert Comment

by:Akhater
ID: 24101031
you mean you are removing "apply group policy settings' for "Authenticated users" and adding it to that security group ?


If so try adding the computer accounts they are logging on to in that security group and try again it will work
0
 

Author Comment

by:networkmgmt
ID: 24101246
I mean, I removed "authenticated users" from the Security filtering and added a different security group.  I assumed then that the policy would only apply to that security group rather than all authenticated users.

All the users log into 1 computer, the Terminal server.  You mean add the terminal server to that security group?  If you meant that, I tried it, but still have the same problem.

Basically, I want all of the drives hidden on the terminal server when users log into it.  I do not want the drives hidden when administrators log into the server.

0
 
LVL 49

Accepted Solution

by:
Akhater earned 500 total points
ID: 24101255
yes add the TS to that group and restart the TS
0
 

Author Closing Comment

by:networkmgmt
ID: 31568208
That worked, thanks a lot.
0

Featured Post

MS Dynamics Made Instantly Simpler

Make Your Microsoft Dynamics Investment Count  & Drastically Decrease Training Time by Providing Intuitive Step-By-Step WalkThru Tutorials.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question