Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Group Policy (GPO) and screen saver

Posted on 2013-06-26
2
Medium Priority
?
678 Views
Last Modified: 2013-06-26
Hello,

I would like to configure through a group Policy object the following:

1. Screen Saver
2. Screen saver time out
3. Upon resume from screen saver, force user to logon with a password

In GPO, I can configure this policy based on user configuration.

However, I would like to do the same based on Computer Configuration.

Is this possible? If so, how?

I would like the screen saver to be activated based on computer, and not based on the user who connects to the computer.

I would like to ensure that a computer (which is part of domain) would have the screen saver activated even if the user logs on with local administrator account (computer is part of domain).

Thanks in advance.

Mark
0
Comment
Question by:mbudman
2 Comments
 
LVL 16

Accepted Solution

by:
ThinkPaper earned 2000 total points
ID: 39278564
These settings are configured for users not computer:

User Configuration\Administrative Templates\Control Panel\Personalization
http://technet.microsoft.com/en-us/library/ee617164(WS.10).aspx

However, you can enable Group Policy Loopback processing which would enforce the setting on that workstation (regardless of who logs on). (Set to replace) So you'd simply configure the settings above, enable group policy loopback processing, and apply the policy to the OU with the workstation(s).

http://social.technet.microsoft.com/wiki/contents/articles/2548.windows-server-understand-user-group-policy-loopback-processing-mode.aspx
0
 
LVL 1

Author Closing Comment

by:mbudman
ID: 39278651
Thank you for the quick reply. This should resolve the issue at hand.

Cheers,

Mark
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

876 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question