[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

GPO preventing application launch at login

Posted on 2009-05-13
10
Medium Priority
?
623 Views
Last Modified: 2012-05-06
I just recently installed an application on a machine that runs off the hkey local machine "run" settings in registry.  Any user that attempts to log on in theory should have the application boot for them.  The application boots in the processes tree under the current user as opposed to system however, despite being a member of the HKey Local Machine registry group.

The issue I am having with the application is the following:

The application boots up for all users except users of a specific OU whose Group Policy is extremely tightened down.  I have tried to add the programs as an exception and can run under users\administrative templates\system\ run only allowed windows applications GPO, however the program still will not launch when the user logs in.

Are there any other GPOs that could potentially be turned on that I am missing that are preventing this application from booting when the user logs on?
0
Comment
Question by:megnin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 6
  • 3
10 Comments
 
LVL 15

Assisted Solution

by:zelron22
zelron22 earned 1600 total points
ID: 24378356
Have you run a group policy results in the GPMC to see which policies are winning for those users on those machines?
0
 
LVL 15

Assisted Solution

by:zelron22
zelron22 earned 1600 total points
ID: 24378369
0
 
LVL 3

Assisted Solution

by:a_ro_no
a_ro_no earned 400 total points
ID: 24378374
Sure! Software Policies?
User Configuration, Software settings, Software installation
0
Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

 
LVL 1

Author Comment

by:megnin
ID: 24379015
We don't have any Software Policies.
0
 
LVL 1

Author Comment

by:megnin
ID: 24379710
The Policy that holds the executables that are permitted to run is the winning GPO.  This brings me right back to the beginning of where I started as there is no software policy enabled in the GPO.  There is likely a policy of some sorts that is enabled and also a winning policy that is preventing this application from loading its process at the start.

0
 
LVL 1

Author Comment

by:megnin
ID: 24398542
Still haven't been able to find what policy is "winning" and preventing the application from running.
0
 
LVL 15

Accepted Solution

by:
zelron22 earned 1600 total points
ID: 24399292
Have you checked the security logs on one of the PCs?  Has security to anything on the C: drive been locked down further that might prevent the users access to temp folders, or the application folder?
0
 
LVL 1

Author Comment

by:megnin
ID: 24444088
I'll check that.  Thanks
0
 
LVL 1

Author Comment

by:megnin
ID: 24444731
I discovered the issue as the person that put the exe in forgot a letter.  Lesson for the day, double check others work instead of giving them the benefit of the doubt
0
 
LVL 1

Author Closing Comment

by:megnin
ID: 31581165
Thanks for the additional perspectives!
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How does someone stay on the right and legal side of the hacking world?
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question