Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Group Policy security settings..

Posted on 2009-07-10
4
Medium Priority
?
233 Views
Last Modified: 2012-05-07
Ok after running gpresult on one of my terminal servers I noticed that the terminal server GPO wasnt being applied due to Security as in "Filtering: Denied (Security)".

So Im looking and that specific GPO is Linked to the Terminal Server OU (which contains all three TS servers, and it is Filtered to Authenticated Users and Terminal Server Computers and both of those have read and apply rights.

So do I evern need the Terminal Server Computers group listed under Filtering since the GPO is only linked to the Terminal Server OU?  Could that be whats causing this security failure?
0
Comment
Question by:Ben Hart
  • 2
  • 2
4 Comments
 
LVL 14

Accepted Solution

by:
amichaell earned 1000 total points
ID: 24827309
So long as the GPO is only linked to the Terminal Server OU you can just filter on Authenticated Users, which is all authenticated users and computers.  
0
 
LVL 14

Author Comment

by:Ben Hart
ID: 24827370
Sweet.. So I removed the terminal Server Computers from the filtering list and tonight when they all reboot I'll re-run gpresult and hopefully get better results.  
0
 
LVL 14

Expert Comment

by:amichaell
ID: 24827390
Great.  Let me know.  
0
 
LVL 14

Author Comment

by:Ben Hart
ID: 24843124
Seems to have worked, gpresult now shows teh computer portion of that GPO as being applied.  thanks so much.
0

Featured Post

NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Here's a look at newsworthy articles and community happenings during the last month.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question