Solved

Apply Remote Desktop & Allow Log on through Terminal Services Policy

Posted on 2013-06-12
4
889 Views
Last Modified: 2013-06-18
I created a group policy which I thought would add a group to the Remote Desktop Users  on all servers and Allow log on through Terminal Services for group (ISADMIN).   I created a new GPO (RemoteDesktopUsers-Servers) and assigned the following settings

1) Computer Configuration-->Policies-->Windows Settings-->Security Settings --> Local Policies/User Rights Assignment --> Policy Setting

Allow log on through Terminal Services = DomainName\ISADMINS

2) Computer Configuration-->Windows Components-->Remote Desktop Services-->Remote Desktop Session Host/Connectionsshow

Allow users to connect remotely using Remote Desktop Services = Enabled

3) Preferences--> Control Panel Settings --> Local Users and Groups --> Group
(Name: Remote Desktop Users (built-in))
Remote Desktop Users (built-in) (Order: 1)
Local Group
Action Update
Properties
Group name Remote Desktop Users (built-in)
Delete all member users Disabled
Delete all member groups Disabled
Add membersCORE\ISAdmin

See attached policy export.

After this policy was applied to Domain Controllers and our Servers OUs the Domain Administrator was unable to log into the DCs unless added to the ISAdmin group and only the ISAdmin security group was left or shown under the Local Policies on those domain controllers and servers.  The Domain Admin could still log into the other member servers without joining the ISadmins group however.  

Does this policy somehow delete or break the Adminsitrators and Remote Desktop Users Builtin groups permissions to RDP to the DCs and servers?  Do I need to explicitly specify the Administrators and Remote Desktop Users built-ins in the Allow Log On Through Terminal Services and Remote Desktop Users - Local Groups?

Mixed Environment PDC = 2012DC,  DCs are 2008, 2008R2 and 2003R3,  Member servers are also same mix of 2012DC, 2012, 2008, 2008R2 and 2003R2.   Functional Level of forest and domain is 2003.    Recently Promoted 2012DC and assigned all roles.  

Any help would be appreciated.

Thanks
Tom
0
Comment
Question by:schultetg
  • 3
4 Comments
 

Accepted Solution

by:
schultetg earned 0 total points
ID: 39241516
I added the Administrators and Remote Desktop Users back to the Allow log on through Terminal Services policy which now allows domain admin to log on to the DCs.
0
 
LVL 16

Expert Comment

by:Dirk Mare
ID: 39242410
Seeing that you already answered your own question..

Yes you need to explicitly allow administrators and domain admins the right to log on through terminal services..
0
 

Author Comment

by:schultetg
ID: 39243024
I guess I misunderstood the definition that the Administrators group and Remote Desktop users had access by default to mean it was implicit and did not need to be explicitly specified in the policy.  

The reason for creating this new policy was due to an anomaly in GP:  the ISAdmins group was a member of the Administrators group but one member recently added to the ISadmins group did not have remote desktop access to any servers (or DCs).  When the user was added to the local remote desktop users group on DCs they obtained access to each DC, but still not able to access any other member servers.   When I removed this new policy from the Servers (and Domain Controllers) OUs the user was now able to acess all member servers.  It seems as though a previous policy may have been "hung up" preventing the new user from accessing these member servers (even though they were members of the Administrators group) and the policy some how reset itself after this new policy was removed, reverting back to the local policy setting (defaulting Administrators & Remote Desktop USers)......  I guess.
0
 

Author Closing Comment

by:schultetg
ID: 39255639
I have not received a more complete explanation
0

Featured Post

The problems with reply email signatures

Do you wish that you could place an email signature under a reply? Well, unfortunately, you can't. That great Exchange/Office 365 signature you've created will just appear at the bottom of an email chain. What a pain! Is there really no way to solve this? Well, there might be...

Join & Write a Comment

Understanding the various editions available is vital when you decide to purchase Windows Server 2012. You need to have a basic understanding of the features and limitations in each edition in order to make a well-informed decision that best suits y…
Resolve DNS query failed errors for Exchange
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now