Help Group Policy setup on TS 2008

Posted on 2009-12-30
Last Modified: 2013-11-21

I have a customer with a Server 2008. I have configured it as ActiveDirectory and Terminal Server (on the same server, I know that it's not recommended, but the customer wants it anyway...)

I want to setup a group policy to limit features on the Terminal Server for users with TS access (members of Remote Desktop Group), but I don't want this Group Policy to apply to those users computers.

I have created a Group Policy named Terminal Server and then linked it to "Domain Computers" in the Grop Policy Management, After that I added "Remote Desktop Users" group under Secirity Filtering and removed "Authenticated Users".
This is not working, so what more do I have to do?
I heard something about Loop Back, but I don't know what that is... :)

Thanks in advance,
Question by:henriklundin
    LVL 59

    Expert Comment

    by:Darius Ghassem

    Author Comment


    What I understand it should be ok if I just enable "User Group Policy loopback processing mode" with replace option, but it's not working for me... I think my other settings are ok?  If I add "autenticated users" again the policy is applied on the TS users, but then the Administrator is also affecte.

    I have run the gpupdate after making changes...

    Thanks again!
    LVL 59

    Expert Comment

    by:Darius Ghassem
    Have you tried placing the TS servers in their own OU?
    LVL 31

    Accepted Solution

    I think he cannot do that as the TS is also the DC. :-)
    Take a look at this guide, "Terminal Services A to Z" that I wrote. Free download at It goes step-by-step in the group policy part. Ignore the OU requirement shown on the guide as in your case the TS is the DC. Everything else should apply and work.

    Cláudio Rodrigues
    Citrix CTP

    Featured Post

    How does your email signature look on mobiles?

    Do your employees use mobile devices to reply to emails? With mobile becoming increasingly important to the business world, it is in your best interest to make sure that your email signature looks great across all types of devices.

    Join & Write a Comment

    Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip is around source server preparation. No migration is an easy migration, there is a…
    Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
    This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
    To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…

    754 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now