Solved

Group policy - domain policies appearing last then first in precedence

Posted on 2009-05-14
2
229 Views
Last Modified: 2012-05-07
We run 2003 terminal servers with 2003 AD and use computer GPOs but recently we needed to split users into two OUs - one OU will use a proxy via a user GPO and the other group won't use the proxy via a different GPO.  The relevant user GPO will be merged with the computer GPOs via loopback.

The particular user GPO to apply the proxy is not working.  When I run rsop.msc and check the precedence for the proxy settings, a couple of domain policies are at the top with the proxy "<disabled>".  But those domain policies don't even have any proxy settings configured (enabled or disabled).  Plus, they appear at the bottom of the precedence AND at the top.  I thought GPOs were applied in this order: local, site, domain, OU.  

So how can the proxy be disabled when the GPO settings aren't even configured in the domain GPOs and why are the domain GPOs at the very top of the precedence level?  It must be something I've missed!
0
Comment
Question by:lrkwalkers
2 Comments
 
LVL 8

Expert Comment

by:schriste
ID: 24473124
I'd review this site: http://technet.microsoft.com/en-us/library/cc778890(WS.10).aspx

The exceptions to the precedence might be what is tripping you up.
0
 

Accepted Solution

by:
lrkwalkers earned 0 total points
ID: 24479054
This has been resolved by the IT company we outsource work to.

I will get more info.

0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Resolve DNS query failed errors for Exchange
Disabling the Directory Sync Service Account in Office 365 will stop directory synchronization from working.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question