Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Group Policy MachineCNF

Posted on 2016-09-27
1
Medium Priority
?
80 Views
Last Modified: 2016-10-02
In ADSIEdit unter 'System\Policies' I have some Conflict Objects (MachineCNF). Can they be safely deleted?
0
Comment
Question by:albatros99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 6

Accepted Solution

by:
sAMAccountName earned 1500 total points
ID: 41818057
They can, but dont use ADSIEdit.  Thats a jackhammer when a finish hammer is sufficient.  (Im a strong poroponent of never using ADSIEdit since theres no real input validation and typos can be catastrophic).  You can easily delete them using explorer or powershell.  

It's important you make sure the conflicting item that matches the CNF-<GUID> has the proper contents before you delete the CNF-{GUID} folder... S, for each CNF-{GUID} policy object folder, you should have a corresponding folder with the same {GUID}.  Use gmpc to view the policy that corresponds to the GUID to make sure the settings are correct, then use a workstation that should be in the policies scope to make sure its applying correctly.  If everything checks out, you can delete it...

If you do this, its best to do it on the PDC which is the authority for group policies and the DFSr replication group.  Doing it elsewhere can cause more CNF folders to appear (though this is more likely in large volatile environments)
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question