Solved

Group Policy Management exclusion of  Autolock screen policy to users loging in to conference room PC.

Posted on 2013-05-13
5
597 Views
Last Modified: 2013-05-13
Dear Experts:

I need to exclude from a auto lock policy users that login to the conference room desktop or workstation.

I can put the PCs on their own active directory container. That is easy. How to make it so that every user that connects to that workstation does not get that policy applied to them? I take is in the Group Policy inheritance.


Thanks! M
0
Comment
Question by:marceloNYC
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 19

Accepted Solution

by:
Peter Hutchison earned 500 total points
ID: 39162045
In GPMC console, click on the Delegation tab for the policy. Click on the Advanced button, add the Computer object to the ACL list and in the permissions select Deny for 'Apply Group Policy' and it will no longer apply those settings to that PC.
0
 
LVL 11

Expert Comment

by:Giladn
ID: 39162048
Let me ask in a diffrent way, first I don't know a way (doesn't make much sense) , but how will the server that the user is connected va confrence room? is there any network related characteristics you can rely on?
0
 
LVL 22

Expert Comment

by:Joseph Moody
ID: 39162088
Because this is a user side policy and you are wanting to apply it to a set of computers, you will need to use Loopback Policy Processing.

http://www.frickelsoft.net/blog/?p=22
0
 

Author Closing Comment

by:marceloNYC
ID: 39162092
Bingo! Nice thank you so much!
0
 
LVL 11

Expert Comment

by:Giladn
ID: 39162134
great!
I misunderstood the question but indeed- a great quick answer.
G
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question