Solved

group policy mandatory profile

Posted on 2009-05-03
3
1,023 Views
Last Modified: 2012-05-06

Dear experts

I have mandatory profile and it is working fine and I add some group policy to the user that I want them to be applied to tighten the security ,but the group policy does not applied  , I read that if have mandatory profile you can not apply group policy ,

there is any work around to get the group policy applied?

Fast response is appreciated
0
Comment
Question by:M_omeir
  • 2
3 Comments
 
LVL 12

Expert Comment

by:zoofan
Comment Utility
You can not apply changes to a mandatory profile after you you make the profile mandatory.

It would defeat the purpose of making it mandatory.

You need to rename the file and folder back to normal apply changes and then make it mandatory again.



zf
0
 

Author Comment

by:M_omeir
Comment Utility
thanks

but i want to modify through group policy there is no way to do through script
0
 
LVL 12

Accepted Solution

by:
zoofan earned 250 total points
Comment Utility
I know this is not what you want to hear but your best/safest/most reliable way to handle this is to make
the profile NON mandatory long enough for the policy changes to update and then return it to mandatory.

(I do this myself as needed by changing the users password logging in myself applying changes and logging out and then give the user a new password)  

There is no other way that is reliable(that Im aware of)....once you rename the ntuser.dat to ntuser.man it is locked from changes from: the OS/the user/GPO's etc...


The one and only option that I know of but had more troubles then success with
is to manually edit the ntuser.man(dat) file and the time involved is much longer then the above.

By loading the ntuser.man(dat) hive by hive and key by key into regedit or using regeditpro(never used it just read about it) you can make changes directly to the file itself.

regeditpro(not an endorsement just a google search find)
http://www.robotronic.de/regedit/index.html


zf
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip is around source server preparation. No migration is an easy migration, there is a…
When you start your Windows 10 PC and got an "Operating system not found" error or just saw  "Auto repair for startup". After a while, you have entered a loop for Auto repair which does not fix anything and you will be in a  panic as all your work w…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now