Solved

Impact of changing the scope of a GPO

Posted on 2011-09-25
2
383 Views
Last Modified: 2013-11-05
I have a Group Policy Object that is linked to an OU in Active Directory and deploys some software

In the 'Scope' tab of the GPO, the security filtering has been set to deploy to only a few machines.

My question is; If I change the scope to deploy to 'Authenticated Users', will the software uninstall/reinstall on those machines it has already been deployed to?

0
Comment
Question by:hydroIT
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 39

Accepted Solution

by:
Krzysztof Pytko earned 500 total points
ID: 36597315
Nope. If you do not change anything within GPO's policies it does not be installed again on those machines. GPO revision number won't change. You will only modify ACL for that GPO (GPO Filtering exactly saying)

But remember "Authenticated Users" group will apply only to all computers within that OU not in whole domain.

Regards,
Krzysztof
0
 
LVL 6

Expert Comment

by:Reubenwelsh
ID: 36597402
Just really confirmning what Krzysztof says is true if you where to have any doubts, hes summed it up well.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I was supporting a handful of Windows 2008 (non-R2) 2 node clusters with shared quorum disks. Some had SQL 2008 installed and some were just a vendor application that we supported. For the purposes of this article it doesn’t really matter which so w…
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question