Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Mapped drive is not accessible. Access is Denied.

Posted on 2012-04-12
3
Medium Priority
?
1,238 Views
Last Modified: 2012-05-30
We had an issue yesterday where we were unable to change an Exchange 2010 Distribution List from being Global to Universal.  I found an article online, that had me run this command in powershell:

dsquery group -limit 0 | dsmod group -c -q -scope u

This seems to have let us make that change.

However, I have a new problem now, that never happened prior to this change.  Several employees are members of a security group, which is also a member of another security group.  This does not seemed to be recognized in the case of drive mappings anymore, and users get access denied when attempting to connect to mapped drives.

For example:

Employee John Smith is a member of security Group A.

Group A is a member of DriveMap group.

John Smith cannot access the drive map as a member of Group A.

When John Smith is added as a member of DriveMap group directly, it works.

Again, this has been working fine for all this time, up until we had the issue with changing global to universal distribution lists. I'd rather not go through several hundred employees and add them to the DriveMap group manually, when it should apply the way we have groups broken down.

Thanks.
0
Comment
Question by:fireguy1125
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Expert Comment

by:armchair_scouse
ID: 37837605
This may not be the cause, but what you are describing is similar to the symptoms of problems with Kerberos netowrk authentication, in that Kerberos has a ticket/file per user, of a certain size, that holds a list of the AD groups to which a user is allowed to belong.  If the user is added to too many groups, or groups are added to other groups, the Kerberos file just cuts off the list of AD groups as far as the file size can hold, meaning anything that didn't make it into the file isn't recorded, and it might mean that resources that a user was previously able to access are no longer accessible.

If it is the case, then I understand the Kerberos ticket/file size can be adjusted, alternatively if the AD group names are rather long and flowery, adjusting the length of the names can help, or simply removing users from groups that they just don't need.

Apologies if this is a red herring/doesn't apply to your situation, but the symptoms sounded a little simliar to experiences we've had here, so thought I'd suggest it just in case.
0
 
LVL 1

Accepted Solution

by:
fireguy1125 earned 0 total points
ID: 37843283
I believe this may have something to do with the global and universal settings of the groups.  I am also noticing now that the GROUP A group and others are no longer members of the MAPDRIVES group, so I'm guessing that command did something that caused the removal of the GROUP A, GROUP B, etc... groups from the MAPDRIVES group.
0
 
LVL 1

Author Closing Comment

by:fireguy1125
ID: 38026218
No other solution found, but issue resolved by adding users back to individual groups
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For anyone that has accidentally used newSID with Server 2008 R2 (like I did) and hasn't been able to get the server running again because you were unlucky (as I was) and had no backups - I was able to get things working by doing a Registry Hive rec…
Microsoft Office 365 is a subscriptions based service which includes services like Exchange Online and Skype for business Online. These services integrate with Microsoft's online version of Active Directory called Azure Active Directory.
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question