Solved

GPO preventing application launch at login

Posted on 2009-05-13
10
610 Views
Last Modified: 2012-05-06
I just recently installed an application on a machine that runs off the hkey local machine "run" settings in registry.  Any user that attempts to log on in theory should have the application boot for them.  The application boots in the processes tree under the current user as opposed to system however, despite being a member of the HKey Local Machine registry group.

The issue I am having with the application is the following:

The application boots up for all users except users of a specific OU whose Group Policy is extremely tightened down.  I have tried to add the programs as an exception and can run under users\administrative templates\system\ run only allowed windows applications GPO, however the program still will not launch when the user logs in.

Are there any other GPOs that could potentially be turned on that I am missing that are preventing this application from booting when the user logs on?
0
Comment
Question by:megnin
  • 6
  • 3
10 Comments
 
LVL 15

Assisted Solution

by:zelron22
zelron22 earned 400 total points
Comment Utility
Have you run a group policy results in the GPMC to see which policies are winning for those users on those machines?
0
 
LVL 15

Assisted Solution

by:zelron22
zelron22 earned 400 total points
Comment Utility
0
 
LVL 3

Assisted Solution

by:a_ro_no
a_ro_no earned 100 total points
Comment Utility
Sure! Software Policies?
User Configuration, Software settings, Software installation
0
 
LVL 1

Author Comment

by:megnin
Comment Utility
We don't have any Software Policies.
0
 
LVL 1

Author Comment

by:megnin
Comment Utility
The Policy that holds the executables that are permitted to run is the winning GPO.  This brings me right back to the beginning of where I started as there is no software policy enabled in the GPO.  There is likely a policy of some sorts that is enabled and also a winning policy that is preventing this application from loading its process at the start.

0
Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 1

Author Comment

by:megnin
Comment Utility
Still haven't been able to find what policy is "winning" and preventing the application from running.
0
 
LVL 15

Accepted Solution

by:
zelron22 earned 400 total points
Comment Utility
Have you checked the security logs on one of the PCs?  Has security to anything on the C: drive been locked down further that might prevent the users access to temp folders, or the application folder?
0
 
LVL 1

Author Comment

by:megnin
Comment Utility
I'll check that.  Thanks
0
 
LVL 1

Author Comment

by:megnin
Comment Utility
I discovered the issue as the person that put the exe in forgot a letter.  Lesson for the day, double check others work instead of giving them the benefit of the doubt
0
 
LVL 1

Author Closing Comment

by:megnin
Comment Utility
Thanks for the additional perspectives!
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now