Avatar of LockDown32
LockDown32
Flag for United States of America asked on

Manually Fix KB3159398

I posted this a day or two ago and guess I didn't get enough detail. I thought the simple fix was to add Authenticated Users under Delegation and give them Read privileges but I don't think this is correct. Don't they need Read and Apply GPO?

Secondly I thought Authenticated Users (Read and Apply GPO) was just a standard, every GPO should have it under Delegation, but when I add Authenticated Users under Delegation it also adds Authenticated Users under Scope. I don't want that. I have a specific security group under Scope and when added that group is automatically put it under Delegation with Read and Apply GPO permissions.

So I am a little confused about what KB3159398 actually did. I don't really want to add caret Blanche add Authenticated Users under Delegation where ever it is missing do I?
Active Directory

Avatar of undefined
Last Comment
Maclean

8/22/2022 - Mon
Albert Widjaja

You can check it first using this PowerShell script:

#Load GPO module
Import-Module GroupPolicy
#Get all GPOs in current domain
$GPOs = Get-GPO -All
#Check we have GPOs
if ($GPOs) {
#Loop through GPOs
foreach ($GPO in $GPOs) {
#Nullify $AuthUser & $DomComp
$AuthUser = $null
$DomComp = $null
#See if we have an Auth Users perm
$AuthUser = Get-GPPermissions -Guid $GPO.Id -TargetName “Authenticated Users” -TargetType Group -ErrorAction SilentlyContinue
 #See if we have the ‘Domain Computers perm
$DomComp = Get-GPPermissions -Guid $GPO.Id -TargetName “Domain Computers” -TargetType Group -ErrorAction SilentlyContinue
 #Alert if we don’t have an ‘Authenticated Users’ permission
if (-not $AuthUser) {
#Now check for ‘Domain Computers’ permission
if (-not $DomComp) {
                Write-Host “WARNING: $($GPO.DisplayName) ($($GPO.Id)) does not have an ‘Authenticated Users’ permission or ‘Domain Computers’ permission – please investigate” -ForegroundColor Red
}   #end of if (-not $DomComp)
else {
#COMMENT OUT THE BELOW LINE TO REDUCE OUTPUT!
               Write-Host “INFORMATION: $($GPO.DisplayName) ($($GPO.Id)) does not have an ‘Authenticated Users’ permission but does have a ‘Domain Computers’ permission” -ForegroundColor Yellow
}   #end of else (-not $DomComp)
}   #end of if (-not $AuthUser)
elseif (($AuthUser.Permission -ne “GpoApply”) -and ($AuthUser.Permission -ne “GpoRead”)) {
#COMMENT OUT THE BELOW LINE TO REDUCE OUTPUT!
Write-Host “INFORMATION: $($GPO.DisplayName) ($($GPO.Id)) has an ‘Authenticated Users’ permission that isn’t ‘GpoApply’ or ‘GpoRead'” -ForegroundColor Yellow
}   #end of elseif (($AuthUser.Permission -ne “GpoApply”) -or ($AuthUser.Permission -ne “GpoRead”))
else {
   #COMMENT OUT THE BELOW LINE TO REDUCE OUTPUT!
            Write-Output “INFORMATION: $($GPO.DisplayName) ($($GPO.Id)) has an ‘Authenticated Users’ permission”
        }   #end of else (-not $AuthUser)
    }   #end of foreach ($GPO in $GPOs)
}   #end of if ($GPOs)

Open in new window


From: https://blogs.technet.microsoft.com/poshchap/2016/06/16/ms16-072-known-issue-use-powershell-to-check-gpos/

And then manually add the permission one by one a necessary.
LockDown32

ASKER
Thanks but it is the manual permissions I am questioning.....  please see the question.....
Maclean

If you have a GPO targeted at a group named lets say "Finance-Users" you still need to add Authenticated Users under delegation with "Read" only selected (Deselect "Apply Group Policy" under Authenticated users)

If you need the policy to work for all authenticated users then you need to set both "Read" and "Apply Group Policy"

You do not need to add "Write" permissions etc to Authenticated users (Not recommended ever on authenticated users)

Capture.PNG
This is the best money I have ever spent. I cannot not tell you how many times these folks have saved my bacon. I learn so much from the contributors.
rwheeler23
LockDown32

ASKER
That is where the questions come in on manually fixing it. You are saying at the very least, under the delegation tab, that every GPO should have Authenticated Users, Read, checked and if it is targeting the Group Authenticated Users Apply Group Policy should be checked too?
ASKER CERTIFIED SOLUTION
Maclean

THIS SOLUTION ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
GET A PERSONALIZED SOLUTION
Ask your own question & get feedback from real experts
Find out why thousands trust the EE community with their toughest problems.
LockDown32

ASKER
OK. I corrected the Delegation but still no luck. GPRESULT /H on this workstations shows none of the GPOs linked to the Computers OU as being either Applied or Denied. Screen shot and GPRESULT attached,
Capture.PNG
gpresult.html
Maclean

Just on a side note. Computer GPO's do not show on GPRESULT /R It shows User Settings only.
You need to run GPRESULT /R /SCOPE:COMPUTER from an elevated CMD Prompt, if running it from client side in order to view the Computer Settings. But that's different from the GPO Results wizard attached here.

It looks from screenshot that Computer objects focused GPO's are set under SBSComputers correct.

Can you confirm that the computer which you ran the wizard against is in this OU.
In addition can you confirm if this problem applies to all systems tested, or only this one single computer please.
And finally did you check this after waiting for replication to finish. It can take some time unless you manually kicked of replication.
⚡ FREE TRIAL OFFER
Try out a week of full access for free.
Find out why thousands trust the EE community with their toughest problems.