Solved

WMI Filters

Posted on 2011-03-12
4
274 Views
Last Modified: 2012-05-11
Will a GPO using WMI Filtering still process if the WMI Database cannot be accessed, Will the GPO process the policies on all systems in the OU anyway ?  
0
Comment
Question by:adlucas
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 35

Accepted Solution

by:
Joseph Daly earned 500 total points
ID: 35123076
I am going to have to say that the GPO will not process. This is because a WMI filter will only apply a GPO when it evaluates to true. If the WMI can not be accessed then that would evaluate to something other than true and the GPO will not apply.

There is a good tool to use to check WMI filters for GPOS. It is called WMIFtest and there is a link to it here

http://www.experts-exchange.com/Software/Server_Software/File_Servers/Active_Directory/A_4221-Active-Directory-Administrator's-Tool-Kit.html
0
 
LVL 35

Expert Comment

by:Joseph Daly
ID: 35123835
Here you go backing up my last posting confirmation from microsoft.

http://support.microsoft.com/kb/814613
0
 
LVL 74

Expert Comment

by:Glen Knight
ID: 37433060
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question