?
Solved

Custom ADMX template with loopback processing

Posted on 2010-03-23
4
Medium Priority
?
1,143 Views
Last Modified: 2012-08-13
Good afternoon,

We are in the process of trying to standardize the profiles on our Server 2008/R2 boxes.  We needed something that would work for existing and new servers, so default profile modification via sysprep is not an option.  So we went to group policy, but some options are not available that we need to customize.

We created an ADMX / ADML file set to modify a registry key, for example:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\TaskbarSmallIcons
dword:00000001

Now, our user objects do not, and can not live in the OU where this policy is applied.  So we enabled loopback processing in the policy, but this setting does not appear to be making it down to the machine.

Can ADMX templates be applied via loopback processing?

Thank you for any assistance.
0
Comment
Question by:omnipower321
  • 3
4 Comments
 
LVL 33

Expert Comment

by:NJComputerNetworks
ID: 28371251
Run Group Policy Managment tool....Run Group Policy Results Wizard report against one of your test machines... this will show you is the policy setting is being applied.




3-23-2010-2-22-03-PM.png
0
 

Author Comment

by:omnipower321
ID: 28371385
The policy is being applied, but the registry key remains unchanged, and the icons are still hidden.
0
 

Author Comment

by:omnipower321
ID: 28371843
Here is an example of the ADMX file:

<policyDefinitions revision="1.0" schemaVersion="1.0">
  <policyNamespaces>
    <target prefix="fullarmor" namespace="FullArmor.Policies.F1C659F7_5E6C_4E54_8CD3_46630BFB1246" />
    <using prefix="windows" namespace="Microsoft.Policies.Windows" />
  </policyNamespaces>
  <supersededAdm fileName="" />
  <resources minRequiredRevision="1.0" />
  <categories>
    <category name="Custom" displayName="$(string.Custom)" />
  </categories>
  <policies>
    <policy name="HKCU_Explorer_Hidden" class="User" displayName="$(string.HKCU_Explorer_Hidden)" key="HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" valueName="Hidden">
      <parentCategory ref="Custom" />
      <supportedOn ref="windows:SUPPORTED_WindowsVista" />
      <enabledValue />
      <disabledValue />
    </policy>
  </policies>
</policyDefinitions>

 
And an example of the ADML file:
<policyDefinitionResources revision="1.0" schemaVersion="1.0">
  <displayName>
  </displayName>
  <description>
  </description>
  <resources>
    <stringTable>
      <string id="Custom">Custom</string>
      <string id="HKCU_Explorer_Hidden">Show hidden files</string>
    </stringTable>
  </resources>
</policyDefinitionResources>

 
Both were created by using FullArmor ADMX.
0
 

Accepted Solution

by:
omnipower321 earned 0 total points
ID: 28445670
Figured it out.  My syntax was wrong in the ADMX file.  I specified a full path including HKEY_CURRENT_USER when it is already implied through the class="User" property.
0

Featured Post

Free tool for managing users' photos in Office 365

Easily upload multiple users’ photos to Office 365. Manage them with an intuitive GUI and use handy built-in cropping and resizing options. Link photos with users based on Azure AD attributes. Free tool!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
Native ability to set a user account password via AD GPO was removed because the passwords can be easily decrypted by any authenticated user in the domain. Microsoft recommends LAPS as a replacement and I have written an article that does something …
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Suggested Courses

601 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question