Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Missing administrative templates from Group Policy Windows 2012 Domain Controllers

Posted on 2016-08-25
Medium Priority
Last Modified: 2016-08-26
Today I went to edit our domain group policies (which I do often) and found the Administrative templates is empty.      Example right click any policy and choose edit then select user configuration then select policies then Administrative templates and none of the usual items and sub folders are there.      Any ideas how to resolve this?

Windows 2012 domain controllers.  (both have same issue)
Question by:Zoldy2000
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
LVL 41

Accepted Solution

footech earned 2000 total points
ID: 41771213
Do you use a central repository?

GP definitions can be copied from any machine.  You can go to C:\Windows\PolicyDefinitions and copy them from any 2012 server.  I'm not certain that you wouldn't encounter any issues if you were to copy from a newer OS (but from my understanding I think it's unlikely).  What you find in that folder is only the templates, not the actual GPOs.  You can also download templates from MS, just search for the version you want.  Example:

Compare what's available from another machine or download to what you have in the PolicyDefinitions folder.

Author Comment

ID: 41771521
The policy definitions are already in that folder.    I installed the latest ones anyone and still have the same issue.     Not sure if this is a clue but the only policy template that is showing is a custom one from a software vendor for deployment and it is located in a different folder.      Could mind be somehow reading from the wrong folder?  


Author Comment

ID: 41771524
I just copied these files C:\Windows\PolicyDefinitions to here C:\Windows\SYSVOL\sysvol\mydomain.com\Policies\PolicyDefinitions and that fixed the problem although I am still puzzled why this happened at least it worked.
Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

LVL 41

Assisted Solution

footech earned 2000 total points
ID: 41772005
That's the location of the central repository (it's something that has to be set up manually).  Without that set up, each machine would look at their own C:\Windows\PolicyDefinitions folder when editing GPOs.  That's why I asked if you had one set up - to know where GP considers the source.

As to how files got removed, that I can't answer.  If you have auditing turned on you may be able to glean the information.

Author Comment

ID: 41772081
Resolved thanks

Author Closing Comment

ID: 41772083

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question