Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

User Group Policy loopback processing mode

Posted on 2011-02-18
6
Medium Priority
?
640 Views
Last Modified: 2013-11-12
If I enable "User Group Policy loopback processing mode" for a GPO at the root of my domain, will all GPO's under this one still have loopback enabled as well. Or is it only applied to this one GPO?
0
Comment
Question by:MountyTech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 57

Expert Comment

by:Mike Kline
ID: 34927060
It will apply to all machines if you apply it to a domain linked policy.  For something like loopback I'd probably not do that.
0
 
LVL 59

Expert Comment

by:Darius Ghassem
ID: 34927335
You will only apply Loopback processing on that one GPO to all stations in the domain
0
 

Author Comment

by:MountyTech
ID: 34954476
Has anyone tested this?
0
Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 
LVL 59

Expert Comment

by:Darius Ghassem
ID: 34954501
Tested what? If you enable loopback processing on one Group Policy Object then that object is affected only
0
 

Accepted Solution

by:
MountyTech earned 0 total points
ID: 35094691
At this point I am still not sure what the answer is. We are getting mixed results. It appears that once loopback is turned on it may affect other GPO's.
0
 

Author Closing Comment

by:MountyTech
ID: 35135813
I have not been able to verify any of the answers given.
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
How to deal with a specific error when using the Enable-RemoteMailbox cmdlet to create a mailbox in the cloud-based service, for an existing user in an on-premises Active Directory.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question