Solved

User computer policy window dosent popup , when user logs in after Domain controller migration

Posted on 2014-02-09
2
636 Views
Last Modified: 2014-03-24
Hi  

We recently migrated our DC from Windows 2008 to windows 2012 server and also all the netlogon shares to our new server.

Before the migration when students were logging into a computer user policy windows used to appear and the window had options to accept and decline. when the students click the accept the policy the window disappears and the desktop loads.
But if the user declines the PC logs off the user.

Recently I have found, when the student logs I cannot see this window popping up. It straight away loads the desktop.This was set up by my predecessors.

If I go to the properties of a student user properties -Profile- User profile -Logon script

I can see a login.vbs and I have copied the text below. Not sure what it actually means.
Is this calling another script to display the user policy when user logs in ?


Set WSHShell = CreateObject("WScript.Shell")
If UCase(Left(strComputerName, 3)) = "LAP" Then matchUser = " /matchuser"

When I go to the students OU and there is a GPO applied to this OU. Under the User Configuration - Policies – Windows settings- Scripts

If I see the properties of a logon script- I can see another Student.VBS applied here and the following lines which I have copied from the .


SET DESKTOP WALLPAPER STUDENTS
' ===============================================================================
  WSHShell.Run ("\\domain.local\SYSVOL\domain.local\scripts\bginfo\bginfo.exe \\domain.local\SYSVOL\domain.local\scripts\bginfo\student.bgi /accepteula /timer:0 /silent")
' ===============================================================================
'                              END SET DESKTOP WALLPAPER
' ===============================================================================

I saw the permissions on the bginfo folder and the everyone is set for read and write . Any help to trouble shoot the failing computer policy popup much appreciated.
Or please let me know if there is a better way of implementing this.

Thanks
0
Comment
Question by:lianne143
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Accepted Solution

by:
computication earned 500 total points
ID: 39846289
Hi,

Can you check a setting from this artical? http://technet.microsoft.com/nl-nl/library/cc738773(v=ws.10).aspx

Computer Configuration\Administrative Templates\System\Scripts\Run shutdown scripts visible

By default script output isn't  visable to users.

This allows the script to use command to interact with the shell:
Set WSHShell = CreateObject("WScript.Shell")

This compares the first 3 letters of the computername to the string "LAP" and then sets a variable matchUser with the string: "/matchuser"
If UCase(Left(strComputerName, 3)) = "LAP" Then matchUser = " /matchuser"

Hope it helps. Let me know if I was unclear.
0
 

Author Comment

by:lianne143
ID: 39894465
What would happen if it sets a  a variable with match user and string

Thanks
0

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The following article is comprised of the pearls we have garnered deploying virtualization solutions since Virtual Server 2005 and subsequent 2008 RTM+ Hyper-V in standalone and clustered environments.
A hard and fast method for reducing Active Directory Administrators members.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question