Solved

GPO software install

Posted on 2014-04-28
3
178 Views
Last Modified: 2014-05-18
Hi,

I have a server 2008 R2 environment with windows 7 laptops for my staff. I need to push out IE 9 via GPO as these laptops are not configured for WSUS. These laptops are configured to connect to the wireless once the user has entered their credentials so I have the issue where I want to push out this software package linking it to the computer OU where the computer objects reside however this means that the install happens upon system boot up which creates an issue for me where the GPO won't run due to lack of connectivity to the network until the user logs in.

If I set this GPO under the User configuration then if staff log onto another machine then it will try to install on any other machine that they log onto.

Is there a way around this so it installs on a specific OU containing the laptops?

By linking the GPO to the Computer OU it doesn't seem to run
0
Comment
Question by:dcirona86
  • 2
3 Comments
 
LVL 53

Expert Comment

by:McKnife
ID: 40028897
Hi.

> lack of connectivity to the network until the user logs in.
What should that mean? Why would the user logon have anything to do with connectivity? If you have very fast booting systems, then set the policy "always wait for the network" to make sure the network is initialized before logon and your policies will run before logon. http://technet.microsoft.com/en-us/magazine/gg486839.aspx
0
 

Author Comment

by:dcirona86
ID: 40033658
The wireless network is configured to use the user account login credentials to connect to the wireless which is one of my main issues with this
0
 
LVL 53

Accepted Solution

by:
McKnife earned 500 total points
ID: 40036675
I see. Ok, so software deployment using GPOs won't work. If the connection would NOT close when the user logs off, you could use a shutdown script. - Does it close?
If that's no waý, I still see 2 possibilities:
-Use WSUS (why wouldn't you anyway?)
-turn on all PCs and use psexec against them.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Log files are useful in diagnosing and repairing problems.  This is a list of common log files and their standard locations that I've compiled.   While this is not exhaustive, it is a pretty good list that I've found to be useful.  I may update it f…
Have you ever had a hard drive that you can't boot into, but need to change the registry? Here is the solution! This article guides you through accessing and editing a registry of a non-primary drive. To read registry information on a non-prim…
Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now