?
Solved

GPO preventing application launch at login

Posted on 2009-05-13
10
Medium Priority
?
620 Views
Last Modified: 2012-05-06
I just recently installed an application on a machine that runs off the hkey local machine "run" settings in registry.  Any user that attempts to log on in theory should have the application boot for them.  The application boots in the processes tree under the current user as opposed to system however, despite being a member of the HKey Local Machine registry group.

The issue I am having with the application is the following:

The application boots up for all users except users of a specific OU whose Group Policy is extremely tightened down.  I have tried to add the programs as an exception and can run under users\administrative templates\system\ run only allowed windows applications GPO, however the program still will not launch when the user logs in.

Are there any other GPOs that could potentially be turned on that I am missing that are preventing this application from booting when the user logs on?
0
Comment
Question by:megnin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 6
  • 3
10 Comments
 
LVL 15

Assisted Solution

by:zelron22
zelron22 earned 1600 total points
ID: 24378356
Have you run a group policy results in the GPMC to see which policies are winning for those users on those machines?
0
 
LVL 15

Assisted Solution

by:zelron22
zelron22 earned 1600 total points
ID: 24378369
0
 
LVL 3

Assisted Solution

by:a_ro_no
a_ro_no earned 400 total points
ID: 24378374
Sure! Software Policies?
User Configuration, Software settings, Software installation
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 1

Author Comment

by:megnin
ID: 24379015
We don't have any Software Policies.
0
 
LVL 1

Author Comment

by:megnin
ID: 24379710
The Policy that holds the executables that are permitted to run is the winning GPO.  This brings me right back to the beginning of where I started as there is no software policy enabled in the GPO.  There is likely a policy of some sorts that is enabled and also a winning policy that is preventing this application from loading its process at the start.

0
 
LVL 1

Author Comment

by:megnin
ID: 24398542
Still haven't been able to find what policy is "winning" and preventing the application from running.
0
 
LVL 15

Accepted Solution

by:
zelron22 earned 1600 total points
ID: 24399292
Have you checked the security logs on one of the PCs?  Has security to anything on the C: drive been locked down further that might prevent the users access to temp folders, or the application folder?
0
 
LVL 1

Author Comment

by:megnin
ID: 24444088
I'll check that.  Thanks
0
 
LVL 1

Author Comment

by:megnin
ID: 24444731
I discovered the issue as the person that put the exe in forgot a letter.  Lesson for the day, double check others work instead of giving them the benefit of the doubt
0
 
LVL 1

Author Closing Comment

by:megnin
ID: 31581165
Thanks for the additional perspectives!
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question