Solved

Amending the GPO to add more drive options - no system.adm under ADM folder in GPO

Posted on 2015-02-11
8
50 Views
Last Modified: 2015-02-15
Hi there,
Running server 2008 R2 Domain, windows 8.1 clients.  On my remote desktop server I have applied a GPO and would like to make some changes to the system.adm file to add more 'Hide drive' options.  I am following this article:
https://support.microsoft.com/kb/231289
I can find my GPO Unique # from \\server\sysvol\policies\{kajd lfjsf9wr080808980} (example) and there is an ADM folder but this folder is empty.  
Question:  How can I have my existing applied GPO to have system.adm file under ADM folder so that I can add some more drives to HIDE.  Need help
0
Comment
Question by:amanzoor
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 3
8 Comments
 
LVL 13

Expert Comment

by:Greg Hejl
ID: 40603263
The article you reference shows the system.adm file to be modified is The default location of the System.adm file for a default domain policy is:
%SystemRoot%\Sysvol\Sysvol\YourDomainName\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\Adm\System.adm
0
 
LVL 4

Author Comment

by:amanzoor
ID: 40603288
Greg Hejl,
Thanks for reply.  In my case since its a Remote desktop server, I have a new GPO connected to the OU in which the VM resides.  I need to make changes to that GPO.  It has ADM folder but no system.adm
0
 
LVL 13

Expert Comment

by:Greg Hejl
ID: 40603352
0
Creating Instructional Tutorials  

For Any Use & On Any Platform

Contextual Guidance at the moment of need helps your employees/users adopt software o& achieve even the most complex tasks instantly. Boost knowledge retention, software adoption & employee engagement with easy solution.

 
LVL 13

Expert Comment

by:Greg Hejl
ID: 40603364
https://www.youtube.com/watch?v=2bZGMtOCXN0

Video on Loopback Processing
0
 
LVL 4

Author Comment

by:amanzoor
ID: 40603523
Greg,
I am sure the loop back processing would work well if my changes to include more drives to the default policy work first.  So I went to the default policy after following the changes as per the article, went into default domain policy,  the drop down menu to see if it has added my drives to 'Hide drives' portion.  The result was nothing was added.  For some reason there is an additional step which I am missing somewhere.  Need help.
0
 
LVL 13

Expert Comment

by:Greg Hejl
ID: 40604069
0
 
LVL 4

Author Comment

by:amanzoor
ID: 40604358
Hi Greg,
Thanks for the reply.  If adm or even admx files are un-editable.  What else I can use to have some more drives added to 'Hide specific drives' option in GPO?  Need help
0
 
LVL 13

Accepted Solution

by:
Greg Hejl earned 500 total points
ID: 40604518
By the end of the link I had sent you the poster had it working.

did you follow the instructions in the post?
0

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
LDAP Setup 6 65
PEN and Issuance policy for 2 tier Windows 2012 PKI 3 86
GPO denied - but why ? 6 57
GPO question 3 33
This article runs through the process of deploying a single EXE application selectively to a group of user.
A hard and fast method for reducing Active Directory Administrators members.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question