Mapped drive is not accessible. Access is Denied.

We had an issue yesterday where we were unable to change an Exchange 2010 Distribution List from being Global to Universal.  I found an article online, that had me run this command in powershell:

dsquery group -limit 0 | dsmod group -c -q -scope u

This seems to have let us make that change.

However, I have a new problem now, that never happened prior to this change.  Several employees are members of a security group, which is also a member of another security group.  This does not seemed to be recognized in the case of drive mappings anymore, and users get access denied when attempting to connect to mapped drives.

For example:

Employee John Smith is a member of security Group A.

Group A is a member of DriveMap group.

John Smith cannot access the drive map as a member of Group A.

When John Smith is added as a member of DriveMap group directly, it works.

Again, this has been working fine for all this time, up until we had the issue with changing global to universal distribution lists. I'd rather not go through several hundred employees and add them to the DriveMap group manually, when it should apply the way we have groups broken down.

Thanks.
LVL 1
fireguy1125Asked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

armchair_scouseCommented:
This may not be the cause, but what you are describing is similar to the symptoms of problems with Kerberos netowrk authentication, in that Kerberos has a ticket/file per user, of a certain size, that holds a list of the AD groups to which a user is allowed to belong.  If the user is added to too many groups, or groups are added to other groups, the Kerberos file just cuts off the list of AD groups as far as the file size can hold, meaning anything that didn't make it into the file isn't recorded, and it might mean that resources that a user was previously able to access are no longer accessible.

If it is the case, then I understand the Kerberos ticket/file size can be adjusted, alternatively if the AD group names are rather long and flowery, adjusting the length of the names can help, or simply removing users from groups that they just don't need.

Apologies if this is a red herring/doesn't apply to your situation, but the symptoms sounded a little simliar to experiences we've had here, so thought I'd suggest it just in case.
fireguy1125Author Commented:
I believe this may have something to do with the global and universal settings of the groups.  I am also noticing now that the GROUP A group and others are no longer members of the MAPDRIVES group, so I'm guessing that command did something that caused the removal of the GROUP A, GROUP B, etc... groups from the MAPDRIVES group.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
fireguy1125Author Commented:
No other solution found, but issue resolved by adding users back to individual groups
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Active Directory

From novice to tech pro — start learning today.