Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Deploying reg file through group policy

Posted on 2011-02-14
7
Medium Priority
?
6,968 Views
Last Modified: 2012-06-27
Hi,

I've been trying to deploy a reg file through group policy over the past few days but without any joy.  I've never had to do this before so any help would be much appreciated!  

I've followed the instructions on the below link.  However, I applied this under the Computer Configuration Node (rather than users), Policies, Windows Settings, Scripts (Startup/Shutdown).

http://blogs.technet.com/b/askds/archive/2007/08/14/deploying-custom-registry-changes-through-group-policy.aspx

In the Startup, I have put in the following:

EE1

The registry key is below.

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_PROTOCOL_LOCKDOWN]
"explorer.exe"=dword:00000001
"iexplore.exe"=dword:00000001
"*"=dword:00000001

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\RestrictedProtocols]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\RestrictedProtocols\1]
"mhtml"="mhtml"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\RestrictedProtocols\2]
"mhtml"="mhtml"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\RestrictedProtocols\3]
"mhtml"="mhtml"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\RestrictedProtocols\4]
"mhtml"="mhtml"


I have also dropped the file into the Show Files location.

In the group policy I have Security Filtering enabled.  We have created computer security groups which have been assigned to the policy.  Authenticated users are also in the Security Filtering.

When I run the Group Policy Modeling Wizard this shows that the GPO is being applied.

Also, when we start up the clients PCs, Resultant Set of Policy is showing the policy as being applied.  However, when I got to regedit, it has not made the changes.

We are running Windows 7 PCs and Server 2008 domain controllers.

Am I missing something really simple?





0
Comment
Question by:asasupport
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 39

Accepted Solution

by:
Krzysztof Pytko earned 2000 total points
ID: 34887234
I would suggest using Group Policy Preferences for that.

 GPP
If you wish to deploy GPP to XP/2003 you need to first install Client Side Extension (CSE)
XP -> http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e60b5c8f-d7dc-4b27-a261-247ce3f6c4f8&displaylang=en
2003 -> http://www.microsoft.com/downloads/en/details.aspx?FamilyID=bfe775f9-5c34-44d0-8a94-44e47db35add&displaylang=en

Regards,
Krzysztof
0
 
LVL 42

Expert Comment

by:kevinhsieh
ID: 34887285
If you are going to do it the way you are going it, I usually create a .cmd file and put the full command in that. I think that you would otherwise need to put regedit into the directory with the script.  I think that it's better to go with Krzysztof's suggestion, but it is more work to implement.

regedit /s \\domain.local\sysvol\.....\machine\startup\file.reg

Open in new window

0
 
LVL 11

Expert Comment

by:Tasmant
ID: 34887286
I think you're blocked by UAC on Windows7 and 2008.
When you run regedit /s on Windows7 computer, without command prompt with elevated privilege, UAC ask you if you want to bring modifications to registry.
I think you have two choices:
- use a batch file to launch regedit /s \\server\share\file.reg
- use commands REG to modify registry (like this: reg add HKCU\software /v test /t REG_DWORD /d 00000002), either directly or in a batch file.
Using Regedit i have the UAC prompt, with Reg commands i haven't it.
You could too disable UAC for all users, but is it really secure?
0
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

 
LVL 13

Expert Comment

by:upalakshitha
ID: 34893394
Do you prefer to do this with custom ADM template
http://www.frickelsoft.net/blog/?p=62
0
 

Author Comment

by:asasupport
ID: 34895320
Thanks Krzysztof!!  I've managed to crack it!!

I did use the Group Policy Preferences.  Went into Computer Configuration>Preferences>Windows Settings>Registry>Right click>New>Registry Wizard

I saved the reg file I needed to deploy to a 32-bit client PC and then drilled down to the file location.

The key then appears in the group policy.

 EE2
Drill down to the key location.  Right click on each entry, Properties, and Replace.

 EE3
Once again excellent advice from Experts Exchange!

Regards,

Y
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 34895335
I'm glad I could help :) You're welcome :)

Krzysztof
0
 

Author Closing Comment

by:asasupport
ID: 34895346
Many thanks Krzysztof!!  Using the Group Policy Preferences did the trick.  Being a numpty, I used the Registry Wizard.

Many thanks!!

Y
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
This tutorial will walk an individual through the steps necessary to install and configure the Windows Server Backup Utility. Directly connect an external storage device such as a USB drive, or CD\DVD burner: If the device is a USB drive, ensure i…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question