Solved

Blocking group policy for one user

Posted on 2009-04-08
6
1,913 Views
Last Modified: 2013-12-24
We have recently applied a user GPO to the main OU that contains all of our users. There are some other child OUs under it but the policy is set to inherit from the parent.

We have one user who should not receive the policy. I would like to set it up so that the policy is not applied to him.

What I was thinking was a two step process.
1. First I will create a new ou outside of the OU that is applying the GPO and move his user account into it. This should unlock the settings that are currenlty being applied by the GPO and grayed out.
2. I am thinking that to block his access to receiving the policy I can set a deny read on the policy only for his user account. I have never done this before so Im looking for a little guidance.

Does this sounds like a correct way to go about this? Any other ideas or suggestions.

Thanks
0
Comment
Question by:Joseph Daly
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 500 total points
ID: 24101553
Yes option 2 is known as security filtering and that is all you have to do.
Step 1 -- select the group policy in GPMC, go the delegation tab and select advanced -- see first screen shot
step 2 -- then just select user user and select deny for read and apply group policy -- screen shot 2
Let me know if that helps or if you have any questions
Thanks
Mike

GPMC-Delegation-Advanced.jpg
Deny-read-and-apply.jpg
0
 
LVL 35

Author Comment

by:Joseph Daly
ID: 24101574
If I remember correctly the Deny read will overtak any grant permissions correct?
0
 
LVL 31

Expert Comment

by:Justin Owens
ID: 24101605
Yes, deny always wins over grant.
0
NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

 
LVL 10

Expert Comment

by:0xSaPx0
ID: 24101991

There are several ways of doing this:
  1. Block inheritance
    1. create a subcontainer and place obkjects you do not want the policy applied to
    2. apply policy to parent container and block policy inheritance on subcontainer
  2. policy inheritance
    1. create and apply policy
    2. create and apply "inverse policy"
    3. apply inverse policy using security filtering so it has higher precendence and aookies only to that user
  3. security filtering
    1. apply a policy only to that user OR
    2. apply a policy only to the users who are not that user
  4. loopback policy
    1. create a policy and place in in a workstation container. there is a "loopback policy processing" in the computer configuration section you can set to "merge"
    2. either in that policy or in a separate policy object in that computer container, configure your user policies
      the user policies in that container will "merge" with the policies in the user container
security filtering is found by selecting the group policy object and looking at the Scope tab.  Use groups and/or users lists to help narrow the scope down
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 24102167
loopback is overkill here :)
0
 
LVL 18

Expert Comment

by:Americom
ID: 24104056
I agreed loopback is not needed here. Just do what Mike suggested above. One thing you might want to do is instead of deny to an individual user account, deny by group account instead. You may later decide that another user also need to be denied. Then all you have to do is add the user to this group instead of making change on the GPO again and creating extra works and traffic.
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microsoft Access is a place to store data within tables and represent this stored data using multiple database objects such as in form of macros, forms, reports, etc. After a MS Access database is created there is need to improve the performance and…
In this series, we will discuss common questions received as a database Solutions Engineer at Percona. In this role, we speak with a wide array of MySQL and MongoDB users responsible for both extremely large and complex environments to smaller singl…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question