Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Prevent Active Directory group policy getting applied

Posted on 2009-05-07
Medium Priority
Last Modified: 2012-05-06
I would like to know whats the options possilbe in preventing AD Group Policy getting applied to a computer or user.

The reason is we have few users who is having local admin rights on the machine and they are removing Domain Administrators from Local admin group. I am running a login script as part of GPO to add the Domain Admin back to the local admin group everytime they login and i know that its failing. For Group Policy everything else is fine, like networking OU's etc.

So i want to know what are the options they have to prevent GP script getting applied and work that way. Our setup is Win 2003 AD with XP SP3 and SP2 machines.


Question by:qman2007
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
  • +2
LVL 19

Expert Comment

by:Mal Osborne
ID: 24333146
Add the users to a Group, then in the security tab on the GPO properties, Tick the "deny" box under "apply group policy"  for that group.
LVL 57

Accepted Solution

Mike Kline earned 1500 total points
ID: 24333266
For more information about security filtering look here:
...but that is really not your issue because you want the policies to apply to the users
If they are local admin rights they can add and remove to the local machines at will.  First thing is maybe take their rights away.  They should not be doing that.
Have you thought about using restricted groups for your admin groups?

Author Comment

ID: 24334658
Hi Malmensa & Mike,

Thanks for your replies. But as i said in my post they are not letting the Group Policy to be executed and becuse of that i cant add Domain Administrator to Local Admin group.

Any suggestions on how users can block Group Policy Getting executed

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.


Expert Comment

by:Frank McCourry
ID: 24335017
Go back to your policy in Group Policy Manager and make sure it is "Enforced"
LVL 57

Expert Comment

by:Mike Kline
ID: 24336200
How do you know they are not letting it execute?  It could execute then they could just go remove the Domain Admin group.  The script won't run again

Expert Comment

by:Frank McCourry
ID: 24336292
Create a Policy that defines your users in the policy instead of using the script.  The policy need to have these settings:
Computer Configuration
      Windows Settings
            Security Settings
                Restricted Groups
Under restricted Groups add "Administrators"  Right click on the group and the properties.  Add the domain accounts that need administrator access and remove any that don't.

Save the policy, apply it to the OU and set it to enforced.  use gpupdate /force /wait:0 to apply it immediatly.  Users will have to log off then back on for it to take effect, but then you won't have to worry about it again.

BTW you can do this with power users and other groups too.


Author Comment

ID: 24342264
Hi Guys,

Thanks for your replies. The problem is my Group Policies are not getting applied.

Mike, you asked me how do i know that policies are not getting applied. I checked on 1 - 2 machines and found that its not applied. What i mainly want to know is, is there a way in Windows XP where a user can stop Group Policy getting applied eventhough he logs to domain.



Expert Comment

ID: 24349208
you can do a gpupdate /force on the windows client to force it to refresh the policy locally otherwise you may not  be waiting long enough time interval for syncronization? Some policies would force a logoff and logon to fully take affect but you should be notified when running this command from a prompt.

Expert Comment

by:Frank McCourry
ID: 24354092
If a policy is not being applied, it most likely not caused by anything the user is doing.  The whole purpose of policies it to force settings that the users cannot change.  If they are not being applied, it is because of a security error, possibly because the computer SID does not match or because of a networking problem such as the time on the server is drastically different from the PC's.  

As techexperts said, you may not be waiting long enough for synchronization to occur.  Just to add to his comment, if you add the /Wait:0 to the gpupdate command you will not have to wait.  the full command would be gpupdate /force /wait:0.  the caveat is that this has to be run from each workstation, which may take you longer than 15 minutes anyway.  You could put it in their logon script however.

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question