Printer GPO and Loopback

Posted on 2011-10-13
Last Modified: 2012-05-12
I've seen similar questions to this but not exactly what I'm looking for,'s my situation.
We are a school system using Windows Server 2008 R2 and we deploy network printers via GPO, for the most part. The printer policy is targeted to a group of computers (in a room, for example). This works well as long as the user is in a subfolder of the policy (at that school, for example). However, if a user goes to another site, the printer policy does not get applied, even though the policy is directed at the workstation. It looks like enabling loopback may be our answer here and I'm getting ready to test that, but wanted to ask if anyone has similar experience and advice? I'm thinking I'll go with the replace mode, because there's no need to be printing to anywhere except the printer assigned to the workstation. And, I'm thinking I should configure this on the actual printer GPO that's created, so that only the printer setting is affected by the loopback mode? Thanks for any insight.
Question by:SHill22
    LVL 21

    Accepted Solution

    Use loopback in merge mode. Then you won't over-write user side settings (just replacing what is different).

    I help manage a school system of 5,550 computers and 20,000 users and loopback is our very best friend!
    LVL 11

    Assisted Solution

    Please have alook below for understanding of Loopback:

    Author Comment

    Thanks for the help. I've tested in merge mode as suggested and applied directly to the printer policy and it appears to be working as designed. Great find!

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Introduction You may have a need to setup a group of users to allow local administrative access on workstations.  In a domain environment this can easily be achieved with Restricted Groups and Group Policies. This article will demonstrate how to…
    This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…
    This tutorial will show how to inventory, catalog, and restore media from legacy versions of Backup Exec into both 2012 and 2014 versions of the software. Select Storage from the tabs along the ribbon bar as the top: Ensure the proper storage devi…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now