Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Blocking group policy for one user

Posted on 2009-04-08
6
1,910 Views
Last Modified: 2013-12-24
We have recently applied a user GPO to the main OU that contains all of our users. There are some other child OUs under it but the policy is set to inherit from the parent.

We have one user who should not receive the policy. I would like to set it up so that the policy is not applied to him.

What I was thinking was a two step process.
1. First I will create a new ou outside of the OU that is applying the GPO and move his user account into it. This should unlock the settings that are currenlty being applied by the GPO and grayed out.
2. I am thinking that to block his access to receiving the policy I can set a deny read on the policy only for his user account. I have never done this before so Im looking for a little guidance.

Does this sounds like a correct way to go about this? Any other ideas or suggestions.

Thanks
0
Comment
Question by:Joseph Daly
6 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 500 total points
ID: 24101553
Yes option 2 is known as security filtering and that is all you have to do.
Step 1 -- select the group policy in GPMC, go the delegation tab and select advanced -- see first screen shot
step 2 -- then just select user user and select deny for read and apply group policy -- screen shot 2
Let me know if that helps or if you have any questions
Thanks
Mike

GPMC-Delegation-Advanced.jpg
Deny-read-and-apply.jpg
0
 
LVL 35

Author Comment

by:Joseph Daly
ID: 24101574
If I remember correctly the Deny read will overtak any grant permissions correct?
0
 
LVL 31

Expert Comment

by:Justin Owens
ID: 24101605
Yes, deny always wins over grant.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 10

Expert Comment

by:0xSaPx0
ID: 24101991

There are several ways of doing this:
  1. Block inheritance
    1. create a subcontainer and place obkjects you do not want the policy applied to
    2. apply policy to parent container and block policy inheritance on subcontainer
  2. policy inheritance
    1. create and apply policy
    2. create and apply "inverse policy"
    3. apply inverse policy using security filtering so it has higher precendence and aookies only to that user
  3. security filtering
    1. apply a policy only to that user OR
    2. apply a policy only to the users who are not that user
  4. loopback policy
    1. create a policy and place in in a workstation container. there is a "loopback policy processing" in the computer configuration section you can set to "merge"
    2. either in that policy or in a separate policy object in that computer container, configure your user policies
      the user policies in that container will "merge" with the policies in the user container
security filtering is found by selecting the group policy object and looking at the Scope tab.  Use groups and/or users lists to help narrow the scope down
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 24102167
loopback is overkill here :)
0
 
LVL 18

Expert Comment

by:Americom
ID: 24104056
I agreed loopback is not needed here. Just do what Mike suggested above. One thing you might want to do is instead of deny to an individual user account, deny by group account instead. You may later decide that another user also need to be denied. Then all you have to do is add the user to this group instead of making change on the GPO again and creating extra works and traffic.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question