Solved

Group Policy Preferences Fail when Authenticated Users is removed.

Posted on 2016-10-19
3
58 Views
Last Modified: 2016-10-19
Creating a mapped drive in GPP for a GPO linked at the domain level works fine when Security Filtering is set to Authenticated users.

The drive mapping fails when we remove Authenticated Users and replace with a single user account. The account is added and checked to make sure it has read and apply rights.

In order to get the drive to map, we have to add the computer account to the security filtering as well.

Why must we add the computer account to security filtering when we want the drive mapped to the user no matter the machine to which they log on?
0
Comment
Question by:spencerturbine
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 85

Accepted Solution

by:
oBdA earned 500 total points
ID: 41850914
That's "by design" since June:
MS16-072: Security update for Group Policy: June 14, 2016
https://support.microsoft.com/en-us/kb/3163622
0
 

Author Comment

by:spencerturbine
ID: 41850922
Bingo!
0
 

Author Closing Comment

by:spencerturbine
ID: 41850923
Thanks!
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question