Solved

GPO software install

Posted on 2014-04-28
3
180 Views
Last Modified: 2014-05-18
Hi,

I have a server 2008 R2 environment with windows 7 laptops for my staff. I need to push out IE 9 via GPO as these laptops are not configured for WSUS. These laptops are configured to connect to the wireless once the user has entered their credentials so I have the issue where I want to push out this software package linking it to the computer OU where the computer objects reside however this means that the install happens upon system boot up which creates an issue for me where the GPO won't run due to lack of connectivity to the network until the user logs in.

If I set this GPO under the User configuration then if staff log onto another machine then it will try to install on any other machine that they log onto.

Is there a way around this so it installs on a specific OU containing the laptops?

By linking the GPO to the Computer OU it doesn't seem to run
0
Comment
Question by:dcirona86
  • 2
3 Comments
 
LVL 53

Expert Comment

by:McKnife
ID: 40028897
Hi.

> lack of connectivity to the network until the user logs in.
What should that mean? Why would the user logon have anything to do with connectivity? If you have very fast booting systems, then set the policy "always wait for the network" to make sure the network is initialized before logon and your policies will run before logon. http://technet.microsoft.com/en-us/magazine/gg486839.aspx
0
 

Author Comment

by:dcirona86
ID: 40033658
The wireless network is configured to use the user account login credentials to connect to the wireless which is one of my main issues with this
0
 
LVL 53

Accepted Solution

by:
McKnife earned 500 total points
ID: 40036675
I see. Ok, so software deployment using GPOs won't work. If the connection would NOT close when the user logs off, you could use a shutdown script. - Does it close?
If that's no waý, I still see 2 possibilities:
-Use WSUS (why wouldn't you anyway?)
-turn on all PCs and use psexec against them.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In a hurry?.. scroll down to "HERE's HOW TO DO IT" Section. Greetings All, I was going to post this as question/solution, but its seems more appropriate as an article considering its length.  I felt it important to illucidate all the details c…
This is a little timesaver I have been using for setting up Microsoft Small Business Server (SBS) in the simplest possible way. It may not be appropriate for every customer. However, when you get a situation where the person who owns the server is i…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

930 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now