Solved

Loop back processing applied to security group

Posted on 2009-04-08
4
296 Views
Last Modified: 2012-05-06
I have loop back processing working on a 2008 terminal server.  When the gpo is applied to authenticated users it works and drives are hidden.  I only want to apply to policy to a particular security group. However, when I do this, the part of the policy that hides the drives no longer is applied.  I can see this in group policy results and in actuality.

The permissions for the GPO are the same for Authenticated users and the Security group I created.
0
Comment
Question by:networkmgmt
  • 2
  • 2
4 Comments
 
LVL 49

Expert Comment

by:Akhater
ID: 24101031
you mean you are removing "apply group policy settings' for "Authenticated users" and adding it to that security group ?


If so try adding the computer accounts they are logging on to in that security group and try again it will work
0
 

Author Comment

by:networkmgmt
ID: 24101246
I mean, I removed "authenticated users" from the Security filtering and added a different security group.  I assumed then that the policy would only apply to that security group rather than all authenticated users.

All the users log into 1 computer, the Terminal server.  You mean add the terminal server to that security group?  If you meant that, I tried it, but still have the same problem.

Basically, I want all of the drives hidden on the terminal server when users log into it.  I do not want the drives hidden when administrators log into the server.

0
 
LVL 49

Accepted Solution

by:
Akhater earned 500 total points
ID: 24101255
yes add the TS to that group and restart the TS
0
 

Author Closing Comment

by:networkmgmt
ID: 31568208
That worked, thanks a lot.
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Join & Write a Comment

In this article, we will see the basic design consideration while designing a Multi-tenant web application in a simple manner. Though, many frameworks are available in the market to develop a multi - tenant application, but do they provide data, cod…
Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now