Solved

Delete Printers Deployed via 2008's Print Managment Utility?

Posted on 2013-12-17
5
538 Views
Last Modified: 2013-12-18
I would like to deploy printers using GPOs and the 2008 servers Print Management utility.

Deploying printers is easy, but I’m noticing that users cannot delete the printers that were added via the GPO (access denied, unable to remove device).

In regards to deploying printers via GPO, there’s another way to do this using the Shared Printer option with the following setting in place: Run in logged-on users security context.  But this method is far more time consuming than going through the Print Management utility.

Is there a way to deploy printers via GPO and the Print Management utility to where users have the ability to delete the printers added by the GPO?
0
Comment
Question by:acmi
  • 3
  • 2
5 Comments
 
LVL 57

Expert Comment

by:Cliff Galiher
ID: 39725340
Nope.
0
 

Author Comment

by:acmi
ID: 39725356
Seriously?
0
 
LVL 57

Accepted Solution

by:
Cliff Galiher earned 500 total points
ID: 39725375
By design.

Group policies are exactly that. They are *policies.* In other words, you don't *want* users to be able to undo them. Would you want a user to be able to change the password complexity policies that you set?  Of course not.

Print Management (via policy) forces users to have printers.

Group Policy Preferences, as the name also indicates, is just a preference. A user can override preferences. But, as you said, deploying via preferences takes some extra steps (by nature of how they are deployed.)

So that is your choice. Deploy as a policy and have it enforced, or deploy as a preference and have it be optional.  You can't deploy with the former and expect it to behave like the latter.

-Cliff
0
 

Author Comment

by:acmi
ID: 39726797
I was hoping there was a way to build in some flexibility via a setting or an additional process – but it looks like that will not be the case.  

Thank you for your response.
0
 

Author Closing Comment

by:acmi
ID: 39726804
Nice explanation
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Both MMF (multi-mode fiber) and SMF (single-mode fiber) are types of optical fiber that can aid in communication applications. These thin strands of silica or glass will allow communication to occur between devices. The transmission of light between…
A procedure for exporting installed hotfix details of remote computers using powershell
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…

822 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question