Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How do I identify conflicting/failing group policy settings?

Posted on 2011-03-02
2
Medium Priority
?
2,737 Views
Last Modified: 2012-05-11
I have a Windows Server 2003 Box, set up as a terminal server. Through policy settings, Group A, B, and C are allowed to logon through terminal services. Intermittently (every 3 months or so), members of group A will report that they can log in, but the "all programs" menu on the start menu is missing, and the list of recently opened programs is also empty. Members of Group B and C are unable to log in at all, and are returned with an error message that they do not have access.

Checking the security settings at this time shows that Group A is the only group allowed to log on through terminal services. After a reboot of the server, the settings are restored, and all three groups are listed and working as normal. I have checked the event logs, and apart from some errors in applying some group policy power options, I have no leads. I suspect that it is a conflict between local policy and group policy, or perhaps an error with how the group policy is being applied and distributed, but I'm not sure where to go.
0
Comment
Question by:LCA-TSoln
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 4

Accepted Solution

by:
jlar310 earned 2000 total points
ID: 35019541
Are you using the Group Policy Management Console?

http://www.microsoft.com/downloads/en/details.aspx?FamilyID=0a6d4c24-8cbd-4b35-9272-dd3cbfc81887&displaylang=en

It has a Group Policy Results Wizard that can show you what settings are being applied to a session and which GPO is the source of each setting.
0
 
LVL 21

Expert Comment

by:snusgubben
ID: 35019917
... and the winning GPO if there is a "conflict" :)

0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Suggested Courses

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question