Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Group Policy Preferences Fail when Authenticated Users is removed.

Posted on 2016-10-19
3
Medium Priority
?
79 Views
Last Modified: 2016-10-19
Creating a mapped drive in GPP for a GPO linked at the domain level works fine when Security Filtering is set to Authenticated users.

The drive mapping fails when we remove Authenticated Users and replace with a single user account. The account is added and checked to make sure it has read and apply rights.

In order to get the drive to map, we have to add the computer account to the security filtering as well.

Why must we add the computer account to security filtering when we want the drive mapped to the user no matter the machine to which they log on?
0
Comment
Question by:spencerturbine
  • 2
3 Comments
 
LVL 86

Accepted Solution

by:
oBdA earned 2000 total points
ID: 41850914
That's "by design" since June:
MS16-072: Security update for Group Policy: June 14, 2016
https://support.microsoft.com/en-us/kb/3163622
0
 

Author Comment

by:spencerturbine
ID: 41850922
Bingo!
0
 

Author Closing Comment

by:spencerturbine
ID: 41850923
Thanks!
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Understanding the various editions available is vital when you decide to purchase Windows Server 2012. You need to have a basic understanding of the features and limitations in each edition in order to make a well-informed decision that best suits …
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question