Solved

Group policy - authenticated users

Posted on 2014-11-30
5
337 Views
Last Modified: 2014-12-03
Hi,
I am applying a group policy & applying the policy to a security group.
I usually uses OU but havent designed the GPMC

My policy only works if I add the authenticated users on top of the security group.
Could somebody explain why?

and
Does Authenticated users means that the policy will apply to every objects in my domain?

Thanks
0
Comment
Question by:defrey
  • 3
5 Comments
 
LVL 54

Expert Comment

by:McKnife
ID: 40473167
You are using security filtering.
Often the error is: people create a security group containing computers while their policy should affect users (or vice versa). Please double check that.
0
 
LVL 17

Accepted Solution

by:
Learnctx earned 500 total points
ID: 40473228
This is a very common problem for loopback GPO's. Microsoft have written an excellent article on how to troubleshoot these: http://blogs.technet.com/b/askds/archive/2013/05/21/back-to-the-loopback-troubleshooting-group-policy-loopback-processing-part-2.aspx. Other than that, if you are applying security or WMI filtering then you need to verify that the user and/or the computer has the relevant rights to view the GPO and apply it. For security filtering make sure that the user and/or the computer is nested in the relevant groups. The fact that you add authenticated users and it then works means that the delegation on the GPO is messed up.
0
 
LVL 1

Author Comment

by:defrey
ID: 40473444
If I had the users to the policy outside the security group, then it is working!
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40473450
defrey, please give details like:
-the configuration I am trying to distribute is in the user configuration section of the policy/computer configuration section of the policy
-the group which I applied as a security filter consists of computer accounts/user accounts
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40480166
What solved it?
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
This article explains the steps required to use the default Photos screensaver to display branding/corporate images
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question