?
Solved

Group Policy Preferences - Scheduled Tasks

Posted on 2009-05-19
4
Medium Priority
?
986 Views
Last Modified: 2012-05-07
I have a GPO that is pushing an immediate task, which runs fine on most computers. However, on the computers that have the same name as the username the task gets scheduled but it is set to run as a local user instead of a domain user. Typically it runs as domain\username but on these particular computers it sets to run as computername\username. I tried setting it to run in user context with the same result. I also tried a regular scheduled task with the same result.
The task runs as expected when logging in as a different user. The task also cannot not be run under a different user because of the nature of the task.
Any one know why this is happening?
0
Comment
Question by:MCKreed
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 15

Expert Comment

by:zelron22
ID: 24422491
If you give us more background, like exactly what you're trying to accomplish with this task, we may either have a better idea of how to do it or an easier time solving this issue.
0
 
LVL 1

Author Comment

by:MCKreed
ID: 24422541
We are using the immediate task to update the signature in outlook on every GP refresh. The task calls an exe with parameters depending on what OU the user is in. The update pulls info from AD to fill the signature.
0
 
LVL 15

Expert Comment

by:zelron22
ID: 24823135
Do the users have admin privileges on the machines?
0
 
LVL 1

Accepted Solution

by:
MCKreed earned 0 total points
ID: 24827105
http://social.technet.microsoft.com/Forums/en-US/winserverGP/thread/26e136bf-29c6-485a-b201-a8c09e416e98?prof=required

This post explains it all.<input id="gwProxy" type="hidden"><!--Session data--><input onclick="jsCall();" id="jsProxy" type="hidden">
0

Featured Post

What Is Blockchain Technology?

Blockchain is a technology that underpins the success of Bitcoin and other digital currencies, but it has uses far beyond finance. Learn how blockchain works and why it is proving disruptive to other areas of IT.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question