Solved

Group Policy Item-Level Targeting

Posted on 2010-11-11
5
736 Views
Last Modified: 2012-05-10
Thanks for your help- I am trying to create group policy autp mapping drives for our sites, dcs, workstations.. the objective is to have workstations recognize authentiation with another dc in another site if local resource dc does go down.. group policy then needs to add the correct drives from the site level in my opinion.. for example
if houston dc site goes down (user has mapped network drives to server)
have them authenticate for a high bandwith different site dc an then have group policy change mapped drives to that new dc mapped dirves instead of the local.

Let  me know if i can help anymore.
0
Comment
Question by:Jmarcomb
  • 2
  • 2
5 Comments
 
LVL 24

Expert Comment

by:Awinish
ID: 34109944
The DC authentication happens to give the access to the resource which occurs through SRV records in dns.

Authentication doesn't work like you are expecting,once user is authenticated user can access resource in the domain & if the only dc in the site is down, it will reestablish the same session, so there will be no way what user was accessing preiously will be lost & new drives or something will be mapped.

Drive mapping GPO can be applied at user, computer,site level or domain level,if there is no dc available user can still work bt they will not be able to access resource or update the changes.

I don't think it is possible to achieve what you are expecting.




0
 

Author Comment

by:Jmarcomb
ID: 34112552
Well. if for example the local dc went down- workstation authenticates with off-site dc controller (like it does) and if manually added the offsite mapped drives it would work. Why then can I not have a group policy or logon script recognize hey I am not connected with houston on xxxxx subnet i am connected with new york on xxxxx subnet - use off-site mapped drives instead of local. I have even considered tricking dns to map a general name like "drives" to the server ip address. for example if i have a dns order 1,2,3.. if local resources went down (1) it would hit first off-site to authenticate (2) and in the group policy programming or script programming it would try to find drives.domain.local- and it would auto map those drives. Let me know what anyone thinks.. i really want this disaster recovery

(All sites have WAFS, WAN replicated data and same folder names. Any changes on one site are replicated to the other in a matter of moments)
0
 
LVL 27

Expert Comment

by:davorin
ID: 34113314
0
 

Author Comment

by:Jmarcomb
ID: 34114541
"DFS provides location transparency and redundancy to improve data availability in the face of failure or heavy load by allowing shares in multiple different locations to be logically grouped under one folder"

IT sounds- in theory what I am looking for.. though I do not need actual file replication- I need more details on this feature. I need the logical file share they are talking about.
0
 
LVL 27

Accepted Solution

by:
davorin earned 500 total points
ID: 34116712
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
Employees depend heavily on their PCs, and new threats like ransomware make it even more critical to protect their important data.
This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question