We help IT Professionals succeed at work.

Default Domain Policy GPO Account Polices being overridden by Domain Controller's Local Security Policy

Drew McCurdy
Drew McCurdy asked
on
82 Views
1 Endorsement
Last Modified: 2019-01-11
The Default Domain Policy GPO specifies a value of 3 for the "Account Lockout Threshold", however, the value that is in effect is "5".  I've discovered that users are getting the effective value from the Domain Controllers' Local Security Policy (not to be confused with the Default Domain Controllers Policy GPO), which some people say is by design.  My first question is:  Is this how the system should be working? My second question is, if the answer to the first is "yes", what other settings/values in the Domain Controllers' Local Security Policy might be overriding my Default Domain Policy GPO?
Comment
Watch Question

MaheshArchitect
CERTIFIED EXPERT
Distinguished Expert 2019

Commented:
Default domain policy has final authority for account and password polices

run rsop.msc on domain controller and you should see only default domain policy setting is applied,?

U need to make sure account policy (default domain policy) is latched to domain level with required settings

and if you have blocked inheritance on domain controllers OU, it need to be removed
Brian MurphySenior Information Technology Consultant
CERTIFIED EXPERT
Distinguished Expert 2019

Commented:
In effect from at a down level client workstation?  Technically there is no local GPO (on the Controller) once you install AD.  Any local GPO on clients workstation would be overwritten by Domain policies unless you have a restriction policy above it in GPO and where that workstation is in that OU.

On one of the workstations, open CMD prompt and type "gpresult /v > c:\gpresults.txt"

Then, notepad c:\gpresults.txt

Verify actual applied policies on that workstation.  Per Mahesh comments above it is most likely blocked inheritance or forced policy.
CERTIFIED EXPERT
Distinguished Expert 2019

Commented:
gpresult will tell you which policy has won and what is in effect. Just use it.
gpresult /h %temp%\results.html &  %temp%\results.html

Open in new window


Execute that on an elevated command prompt on the DC.
CERTIFIED EXPERT
Distinguished Expert 2019

Commented:
Drew, you fell silent - do you need help with the instructions/suggestions?

Author

Commented:
I think we can go ahead and close this. I've gotten to a point where GP settings seem to be applying correctly. That being said, I ran into a situation where member servers would not inherit new Default Domain Policy settings and, instead, used cached ones. It took deleting the Group Policy hive in the registry on a few of the servers and rebooting to get them to adopt the new settings. Anyway, thanks for the help.
CERTIFIED EXPERT
Distinguished Expert 2019

Commented:
Ok, godd. Close it by selecting your comment as solution and also helpful comments (if any).
MaheshArchitect
CERTIFIED EXPERT
Distinguished Expert 2019

Commented:
If you could explain what hive / key you deleted on member servers it will be helpful for others incase

Author

Commented:
It is always advisable, no matter what hive / key you're going to delete, to back it up first. Again, in order for a few of my member servers to adopt the new policy, I had to delete the entire "Group Policy" key shown below, and then reboot the server:

 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy
Architect
CERTIFIED EXPERT
Distinguished Expert 2019
Commented:
This problem has been solved!
(Unlock this solution with a 7-day Free Trial)
UNLOCK SOLUTION
MaheshArchitect
CERTIFIED EXPERT
Distinguished Expert 2019

Commented:
Please select your own comment as solution, not mine