Group Policy scheduled task - can't "delete" task

Posted on 2014-10-08
Last Modified: 2014-10-08
I was experimenting with running scheduled tasks on Win7 and Win8.1 using a GPO.  It is now working correctly but I am unable to delete a test task I had successfully created on the Win7 machines.  I originally created it NOT as a "at least windows 7" task.  I deleted it from the GPO and then went back and re-created it as a "delete".  I tried both levels of task configuration, and after running gpupdate /force on the targets, it still exists.  It's spelled the same.  I tried both domain/admin and SYSTEM for running the delete task.  Task history is confusing as it shows both deleting and then re-creating in the same gpupdate...

10/7/2014 9:25:29 PM      Task registration updated      Info      00000000-0000      "User ""domain\administrator""  updated Task Scheduler task ""\Wakeup"""
10/7/2014 9:25:29 PM      Task registered                  Info      00000000-0000      "User ""domain\administrator""  registered Task Scheduler task ""\Wakeup"""
10/7/2014 9:25:27 PM      Task registration deleted      Info      00000000-0000      "User ""NT AUTHORITY\System""  deleted Task Scheduler task ""\Wakeup"""

DC is running Server 2012.  How do I get rid of this task?  Thanks
Question by:dvanaken
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
LVL 22

Expert Comment

by:Joseph Moody
ID: 40368291
Could you delete it from C:\Windows\Tasks\?

As a file preference?
LVL 55

Accepted Solution

McKnife earned 500 total points
ID: 40368303
There seem to be two policies, one that deletes and an old one that recreates. Please execute at a client:
gpresult /h c:\test\result.html
And look at the result.html

Author Comment

ID: 40368430
When looking at a task in Task Scheduler - is there a way to know if it is the result of a GPO or is a locally entered task?
Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

LVL 55

Expert Comment

ID: 40368478

Author Comment

ID: 40368553
Ok - I found it using gpresult.  It turns out when testing I had added a task to Default Domain Policy even though I was working with a new GPO - I forgot that was there.  I set it to "delete".

In a few days should I delete the "delete" tasks from the GPOs?
LVL 55

Expert Comment

ID: 40368628
The delete task can be setup to run only once (in the options of that group policy preference item). Either you do that (preferred) or you delete it after making sure it has run everywhere make sure no new task will use that name anymore:)

Author Comment

ID: 40368654
Rather than mess with the delete task, I'll give it a week and then delete it.  Thanks again. --Dale

Author Closing Comment

ID: 40368656
Thanks again - all is well now.

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
The Windows functions GetTickCount and timeGetTime retrieve the number of milliseconds since the system was started. However, the value is stored in a DWORD, which means that it wraps around to zero every 49.7 days. This article shows how to solve t…
This Micro Tutorial will give you basic overview of the control panel section on Windows 7. It will depth in Network and Internet, Hardware and Sound, etc. This will be demonstrated using Windows 7 operating system.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question