Solved

Cannot disable 'Windows Security' option on Terminal Server using Group Policy

Posted on 2013-06-20
2
381 Views
Last Modified: 2013-07-05
After installing the Desktop Experience feature for Windows 2008 R2 and promptly uninstalling it, Terminal Server users have an option in the start menu labelled Windows Security. The option enables them to change their password, which is not desirable. In Group Policy there is a setting to disable the option as described here  . After applying the setting to the Terminal Server User Domain Policy group, the Windows Security option still shows up in the Start Menu. I can confirm that the setting "Remove Windows Security item from Start menu" is applied to all Terminal Server Users, but it doesn't appear to be having an effect. Thank you for the help.
0
Comment
Question by:MPLJasper
2 Comments
 
LVL 16

Accepted Solution

by:
ThinkPaper earned 500 total points
ID: 39264334
What happens when you look in C:\Users\All Users\Start Menu ?
Is it something you can delete there off the server itself?
You've uninstalled it, right? - so when you click on it does it load or does it fail saying the shortcut is invalid?

Also I assume you've done a gpresult or Resultant Set of Policy to make sure that the policy is applied properly?
0
 

Author Comment

by:MPLJasper
ID: 39302831
gpresult shows that the policy isn't getting applied properly. Back to the GPO drawing board for me.
0

Featured Post

Are your AD admin tools letting you down?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article outlines the process to identify and resolve account lockout in an Active Directory environment.
In-place Upgrading Dirsync to Azure AD Connect
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question