?
Solved

Local Administrator and Temporary Profile

Posted on 2014-02-12
3
Medium Priority
?
805 Views
Last Modified: 2014-02-27
We have a fairly large Active Directory installation running on Server 2008 R2. A majority of our users are successfully using roaming profiles, and we have a number of Group Policies controlling folder re-direction and the cleanup of cached profiles from the various workstations the roaming profile users are allowed to use. Recently, after some Group Policy changes, we started to see that when a local administrator logged on to the workstations that the roaming profile users are allowed to use, the local administrator is receiving an error message about their roaming profile and is being logged in with a temporary profile. The Group Policy that deletes the cached profiles has a scope for Authenticated Users.

How do I fix this problem so that when I log into a workstation and/or server as the local administrator, I do not get a temporary profile but get the profile I had the last time I logged into that workstation and/or server?
0
Comment
Question by:mharris3
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 38

Expert Comment

by:Hypercat (Deb)
ID: 39854650
The Authenticated Users group, being a system group, obviously includes the Administrator account. I'd scope it to the Users group instead, which doesn't include the local admin account or administrators group. The only potential problem here would be domain controllers, where logging on as a domain administrator, that account could possibly by default be a member of the domain Users group.  It's easily checked and removed from that group, though, if you need to do so. I'm not even 100% sure that the group policy would apply in that scenario, but I would test it before relying on it's not being applied.
0
 

Author Comment

by:mharris3
ID: 39854698
So Hypercat, even if the "set roaming profile path..." option is set in the GPO, limiting the scope to only those users who use roaming profiles should fix this problem?
0
 
LVL 38

Accepted Solution

by:
Hypercat (Deb) earned 2000 total points
ID: 39854770
Yes. On the specific policy that you use to control the deletion of the cached roaming profiles, on the Scope page under Security filtering, list only the group for the users who use roaming profiles.  This limits the ability to read (apply) the group policy settings to just that security group. Note that if this policy contains any other settings, those settings will only apply to that group as well - it's a global setting for the group policy. You could create a specific group for this if you don't already have one and add the roaming users to that group.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
A hard and fast method for reducing Active Directory Administrators members.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month13 days, 11 hours left to enroll

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question