[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

error using software restrictions in GPO

Posted on 2014-02-24
5
Medium Priority
?
220 Views
Last Modified: 2014-02-25
I get an error when trying to set software restrictions using the GP management editor. Has anyone seen this before? I attached a screenshot. I tried it on different DC's with same error. Im using 2008 server.
0
Comment
Question by:Thomas N
  • 2
  • 2
5 Comments
 
LVL 14

Expert Comment

by:Justin Yeung
ID: 39883528
where is the screenshot?
0
 

Author Comment

by:Thomas N
ID: 39883539
oops. Here it is.
Software-restrictions.bmp
0
 
LVL 14

Expert Comment

by:Justin Yeung
ID: 39883764
did you try to "run as administrator" for the GPMC
0
 

Author Comment

by:Thomas N
ID: 39883796
I just did and it didnt work. I can edit anything else in the policy. I also can edit other policies with that setting. Strange.
0
 
LVL 38

Accepted Solution

by:
Mahesh earned 2000 total points
ID: 39883864
Have you already blocked iexplore with hash rule or any other rule ?

Mahesh
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question