Terminal Server Screensaver Group Policy Exception

Posted on 2011-02-21
Medium Priority
Last Modified: 2012-05-11
I have 2 screensaver policies applied to 2 different User Groups.  The first policy is a 15min/No lock and second is 5min/Lock.  The problem is that I have users from each group logging into a Win2003 Terminal Server and users that should not have the lock are having the lock applied.  Example - Time Clock terminal session via Remote Desktop should have 15min/No Lock, but the session is locking after 5 minutes.  Is there a way to put in an exception for our Terminal Server to ignore the Screensaver policies using the GPMC?  I was also curious if Terminal Server screensaver policies are not session specific but truly computer based so only 1 screensaver policy will affect all users with active sessions?
Question by:CMCITD
LVL 20

Accepted Solution

woolnoir earned 2000 total points
ID: 34946368
you can apple a policy to the terminal server, and apply the loopback on the policy, this will apply a policy to a user based on the machine to which they login. Instructions below.

LVL 32

Expert Comment

ID: 34948104
Aside from the loopback policies you need to configure The Terminal Server Configuration Connections as this overrides ALL settings, including GPOs.

-open your run command line
-type in tscc.msc and press enter
-Go to the Sessions tab and you can override the settings here if they are enabled.

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

SingleRun is a tool that ensures that only one instance of an application is started, running it again brings the application to focus.
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Watch the video to learn how one can deal with PST file corruption issue with an outstanding Kernel for Outlook PST Repair Tool easily. Using this tool, non-technical users can swiftly perform the repair process to restore their essential data witho…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question