Solved

WMI Filters

Posted on 2011-03-12
4
272 Views
Last Modified: 2012-05-11
Will a GPO using WMI Filtering still process if the WMI Database cannot be accessed, Will the GPO process the policies on all systems in the OU anyway ?  
0
Comment
Question by:adlucas
  • 2
4 Comments
 
LVL 35

Accepted Solution

by:
Joseph Daly earned 500 total points
ID: 35123076
I am going to have to say that the GPO will not process. This is because a WMI filter will only apply a GPO when it evaluates to true. If the WMI can not be accessed then that would evaluate to something other than true and the GPO will not apply.

There is a good tool to use to check WMI filters for GPOS. It is called WMIFtest and there is a link to it here

http://www.experts-exchange.com/Software/Server_Software/File_Servers/Active_Directory/A_4221-Active-Directory-Administrator's-Tool-Kit.html
0
 
LVL 35

Expert Comment

by:Joseph Daly
ID: 35123835
Here you go backing up my last posting confirmation from microsoft.

http://support.microsoft.com/kb/814613
0
 
LVL 74

Expert Comment

by:Glen Knight
ID: 37433060
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Resolve DNS query failed errors for Exchange
Disabling the Directory Sync Service Account in Office 365 will stop directory synchronization from working.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question