Solved

Group Policy Software Install

Posted on 2013-06-07
5
252 Views
Last Modified: 2013-07-01
If software is installed via group policy to PCs:-

1) if the policy is removed does the sofware get removed from the PCs, naturally I assume not
2) If a new server is installed and the policy isnt migrated to the new server does the software get removed (this I suppose is the same as question 1)
0
Comment
Question by:discoveranother
  • 3
  • 2
5 Comments
 
LVL 26

Expert Comment

by:pony10us
ID: 39230025
Removing a policy does not revert what the policy set.  

For example if you use GPO to enable Proxy settings and then remove the policy the settings will remain. What you have to do is go into the policy and change it to disable the proxy settings instead.  

The same would be true about installing/uninstalling software.
0
 

Author Comment

by:discoveranother
ID: 39230040
Puzzled as to why when logging on as a user the software shows as installed, but when logging on as another user it doesn't. When I say this, I don't mean desktop profiles or redirection, I actually mean in the installed programs list !
0
 
LVL 26

Accepted Solution

by:
pony10us earned 400 total points
ID: 39230183
Possible scenario:

GPO in place to install a program under User and not computer

User A logs on and the GPO is enforced

GPO removed/disabled

User B logs on and the GPO does not apply



Assigning Software
You can assign a program distribution to users or computers. If you assign the program to a user, it is installed when the user logs on to the computer. When the user first runs the program, the installation is completed. If you assign the program to a computer, it is installed when the computer starts, and it is available to all users who log on to the computer. When a user first runs the program, the installation is completed.
0
 

Author Comment

by:discoveranother
ID: 39230764
Very good point.
0
 

Author Comment

by:discoveranother
ID: 39233222
Have checked GPO and it appears that the computers have the software assigned to them and not the user
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now