Default Domain Policy GPO Account Polices being overridden by Domain Controller's Local Security Policy

Drew McCurdy
Drew McCurdy used Ask the Experts™
on
The Default Domain Policy GPO specifies a value of 3 for the "Account Lockout Threshold", however, the value that is in effect is "5".  I've discovered that users are getting the effective value from the Domain Controllers' Local Security Policy (not to be confused with the Default Domain Controllers Policy GPO), which some people say is by design.  My first question is:  Is this how the system should be working? My second question is, if the answer to the first is "yes", what other settings/values in the Domain Controllers' Local Security Policy might be overriding my Default Domain Policy GPO?
Comment
Watch Question

Do more with

Expert Office
EXPERT OFFICE® is a registered trademark of EXPERTS EXCHANGE®
MaheshArchitect
Distinguished Expert 2018

Commented:
Default domain policy has final authority for account and password polices

run rsop.msc on domain controller and you should see only default domain policy setting is applied,?

U need to make sure account policy (default domain policy) is latched to domain level with required settings

and if you have blocked inheritance on domain controllers OU, it need to be removed
Brian MurphySenior Information Technology Consultant

Commented:
In effect from at a down level client workstation?  Technically there is no local GPO (on the Controller) once you install AD.  Any local GPO on clients workstation would be overwritten by Domain policies unless you have a restriction policy above it in GPO and where that workstation is in that OU.

On one of the workstations, open CMD prompt and type "gpresult /v > c:\gpresults.txt"

Then, notepad c:\gpresults.txt

Verify actual applied policies on that workstation.  Per Mahesh comments above it is most likely blocked inheritance or forced policy.
Distinguished Expert 2018

Commented:
gpresult will tell you which policy has won and what is in effect. Just use it.
gpresult /h %temp%\results.html &  %temp%\results.html

Open in new window


Execute that on an elevated command prompt on the DC.
Ensure you’re charging the right price for your IT

Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden using our free interactive tool and use it to determine the right price for your IT services. Start calculating Now!

Distinguished Expert 2018

Commented:
Drew, you fell silent - do you need help with the instructions/suggestions?

Author

Commented:
I think we can go ahead and close this. I've gotten to a point where GP settings seem to be applying correctly. That being said, I ran into a situation where member servers would not inherit new Default Domain Policy settings and, instead, used cached ones. It took deleting the Group Policy hive in the registry on a few of the servers and rebooting to get them to adopt the new settings. Anyway, thanks for the help.
Distinguished Expert 2018

Commented:
Ok, godd. Close it by selecting your comment as solution and also helpful comments (if any).
MaheshArchitect
Distinguished Expert 2018

Commented:
If you could explain what hive / key you deleted on member servers it will be helpful for others incase

Author

Commented:
It is always advisable, no matter what hive / key you're going to delete, to back it up first. Again, in order for a few of my member servers to adopt the new policy, I had to delete the entire "Group Policy" key shown below, and then reboot the server:

 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy
Architect
Distinguished Expert 2018
Commented:
Thanks
MaheshArchitect
Distinguished Expert 2018

Commented:
Please select your own comment as solution, not mine

Do more with

Expert Office
Submit tech questions to Ask the Experts™ at any time to receive solutions, advice, and new ideas from leading industry professionals.

Start 7-Day Free Trial