Solved

GPO by PC Name

Posted on 2014-03-19
2
603 Views
Last Modified: 2014-03-20
Hey all,

I would like to know if there is a way to apply Group Policy Objects by computer name?

We have an OU with computers with autologins set up and some of theme need access to some mapped drives. I would like to have a GPO which check the computer names of the computers within an OU and when a string is found in the name it then applies the GPO?

For instance, if my naming scheme is DT-ROLE-01 and I want to apply the GPO to all computers where the 'ROLE' portion of the name is something like KIOSK or PUBLIC, is there any way to do that?

Thanks for any help!
0
Comment
Question by:PDGPA
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 19

Accepted Solution

by:
helpfinder earned 250 total points
ID: 39940845
is it possible that you create new OU whitin your actual OU and put all mentioned (KIOSK/PUBLIC) computers here? If so then you can apply/Link GPO to that OU and you are done

For apply only for computers based on hostname you can try GPO and WMI filder used in that GPO. WMI could looks like:
Select * from Win32_ComputerSystem where Name LIKE “%hosname%”

Open in new window

0
 
LVL 10

Assisted Solution

by:Schuyler Dorsey
Schuyler Dorsey earned 250 total points
ID: 39940925
Alternatively, you could also apply the GPO at the parent container then change the scoping of the GPO to list the computer names of the computers you want it to apply to.

To make it one step easier, you could create an A.D. group and put those computers into that a.d. group. Then put that A.D. group in the scoping option of the GPO.
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question