Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Group Policies

Posted on 2016-09-07
2
54 Views
Last Modified: 2016-09-11
Couple of question re. GPO's on server 2008:

1. I have set up a GPO which rolls out 2 printers as a user preferences role. I have triple checked this GPO, scope, user OU's, the file share paths, printer drivers, registryy etc and the ONLY way it applies when a user logs on is if the Delegate tab in the GPO editor as "Domain Computers" in it
Can someone explain why please

2. Same server - What can stop Redirected Folders from being applied to Domain Users
0
Comment
Question by:doctorbill
2 Comments
 
LVL 11

Accepted Solution

by:
TS4B earned 500 total points
ID: 41788632
Could be related to KB3163622

Best I can assume is that under delegate tab, there is no "Authenticated users" group with read permissions.
All authenticated users need to be able to read a policy.

o you click advanced, add authenticated users, check that only read is selected, and deselect apply group policy

Both shown in this example screenshot.

Delegate
As long as the user group to assign the GPO to users has read & apply group policy applied, in combination with the existence of the authenticate users tab, all should be fine. Some more info is available on this MS blog

If this is not your scenario, perhaps add some screenshots to clarify the issue please, as many things can stop a GPO from applying. You could try running the gpo results wizard for some added info.
0
 

Author Closing Comment

by:doctorbill
ID: 41793246
Thanks
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, we will see the basic design consideration while designing a Multi-tenant web application in a simple manner. Though, many frameworks are available in the market to develop a multi - tenant application, but do they provide data, cod…
Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question