Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

group policy permissions by security group on windows 2008 R2

Posted on 2012-03-23
3
Medium Priority
?
469 Views
Last Modified: 2012-03-28
I want to apply a security policy to a specific security group on windows 2008 R2. I want specifics steps please. I know how to apply it to the whole domain but not how to do for individual users or security groups in precision.
0
Comment
Question by:Abbas Haidar
3 Comments
 
LVL 59

Assisted Solution

by:Darius Ghassem
Darius Ghassem earned 460 total points
ID: 37757095
0
 
LVL 57

Assisted Solution

by:Mike Kline
Mike Kline earned 440 total points
ID: 37757109
So you can't apply to a group.  Since you know how to apply to a domain you are almost there.  You can use security filtering

http://adisfun.blogspot.com/2009/04/security-filtering-and-group-policy.html

Just have the GPO apply to the group not authenticated users.  If your users are in an OU I'd rather link it lower at the OU level

Thanks

Mike
0
 
LVL 10

Accepted Solution

by:
Michael Ian Claridge earned 1100 total points
ID: 37757921
Hello,

Create the blank GPO (If starting from scratch)
Remove Authenticated Users
Edit the GPO
When finished link it to the OU in question
Create the Security Group
Add said Security Group to the Security Filtering Pane

Note that the users may need to be a member of the same OU you link the policy to.
Also this can take time to propergate across your domain.

I hope this helps.
0

Featured Post

NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question