Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

What is lock icon under security settings on a GPO

Posted on 2014-10-22
3
3,476 Views
Last Modified: 2014-10-23
What is this lock icon under security settings? does it mean the all settings are persistent ?
lock.jpg
0
Comment
Question by:crcsupport
3 Comments
 
LVL 9

Accepted Solution

by:
stu29 earned 500 total points
ID: 40397514
The Enforced option ensures the settings from the linked GPO always win conflicts regardless of any other Group Policy object that contains policy settings that may conflict with those of the linked GPO. The GPMC visually represents an enforced Group Policy link by adding a padlock to the existing linked policy icon. Group Policy settings from an enforced link always apply, even if the organizational unit has block policy inheritance enabled
0
 
LVL 80

Expert Comment

by:David Johnson, CD, MVP
ID: 40398389
The lock icon is a clue that the policy settings you are looking at are being set via domain policy, not local policy.
0
 
LVL 1

Author Comment

by:crcsupport
ID: 40400484
The domain GPO's all settings I"m looking at is settings for domain use, no?
Those locks are already there in my fresh lap environment. Enforcing is only done on GPO level, not setting level as far as I know as well.
I'm still not clear...
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
This article explains how to install and use the NTBackup utility that comes with Windows Server.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question