ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Forcing Group Policy

    IT Discussion
    8
    15
    1.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JoelJ
      Joel
      last edited by

      I created a new OU and put the users I want it to apply to within there. The policy is linked to that OU.

      Im happy if they are clever enough to know they can browse to the drive but i just don't want them to see the drive at first glance.

      1 Reply Last reply Reply Quote 0
      • black3dynamiteB
        black3dynamite
        last edited by

        Here's what I've done to make it work.
        I have a group called HideDrivesFromUsers and then add the users who's not allowed to see the drive in the group.

        I linked the policy object to domain.local
        Under Scope tab, remove authenticated users from Security Filtering.
        Under Scope tab, add HideDrivesFromUsers
        Under Delegation tab, add authenticated users with read permission.

        JoelJ 1 Reply Last reply Reply Quote 0
        • DashrenderD
          Dashrender
          last edited by Dashrender

          https://technet.microsoft.com/en-us/library/cc978514.aspx

          https://social.technet.microsoft.com/Forums/windowsserver/en-US/ed0e5985-4902-4af1-af45-ee1330eb2bc1/ho-to-remove-user-access-permission-to-c-drive-in-terminal-server?forum=winservergen

          1 Reply Last reply Reply Quote 0
          • JoelJ
            Joel @black3dynamite
            last edited by

            @black3dynamite said in Forcing Group Policy:

            Here's what I've done to make it work.
            I have a group called HideDrivesFromUsers and then add the users who's not allowed to see the drive in the group.

            I linked the policy object to domain.local
            Under Scope tab, remove authenticated users from Security Filtering.
            Under Scope tab, add HideDrivesFromUsers
            Under Delegation tab, add authenticated users with read permission.

            I tried this but still doesnt work!

            KellyK 1 Reply Last reply Reply Quote 0
            • KellyK
              Kelly @Joel
              last edited by

              @joel said in Forcing Group Policy:

              @black3dynamite said in Forcing Group Policy:

              Here's what I've done to make it work.
              I have a group called HideDrivesFromUsers and then add the users who's not allowed to see the drive in the group.

              I linked the policy object to domain.local
              Under Scope tab, remove authenticated users from Security Filtering.
              Under Scope tab, add HideDrivesFromUsers
              Under Delegation tab, add authenticated users with read permission.

              I tried this but still doesnt work!

              Are you seeing the policy successfully apply when you look at the RSOP? Most of the issues I've encountered with GPOs are either due to container problems or with DC sync issues (typically DNS is the culprit).

              1 Reply Last reply Reply Quote 1
              • momurdaM
                momurda
                last edited by

                Weird. Just last night i changed a gpo for drive maps. Used Replace because i moved a share to different server.
                It isnt working either.

                1 Reply Last reply Reply Quote 0
                • JoelJ
                  Joel
                  last edited by

                  So all is now working guys.....I realised I kept applying GPO's again and again, deleting them and re-applying the same things to get it to work. Where I should have taken a step back and instead of re-creating and re-applying I should have modified the GPO to remove the existing configuration - applied it so it was all clear and then re-applied if that makes sense.

                  Thanks for your help

                  dbeatoD 1 Reply Last reply Reply Quote 2
                  • dbeatoD
                    dbeato @Joel
                    last edited by

                    @joel Yeah, that makes sense. Rebooting also works well.

                    1 Reply Last reply Reply Quote 0
                    • wrx7mW
                      wrx7m
                      last edited by wrx7m

                      In the future you can also use this command (run as admin) on the affected system to view which GPOs are being applied.

                      gpresult /h c:\gp.html /f

                      Once it creates the file, open it and show all content and do a ctrl + f for the GPO name or even the setting specific to the issue to see if it says it is being applied or blocked. You can use this to troubleshoot link order or permissions issues or even if it is showing at all (maybe you have a wmi filter or link disabled)

                      JaredBuschJ black3dynamiteB 2 Replies Last reply Reply Quote 1
                      • JaredBuschJ
                        JaredBusch @wrx7m
                        last edited by

                        @wrx7m said in Forcing Group Policy:

                        In the future you can also use this command (run as admin) on the affected system to view which GPOs are being applied.

                        gpresult /h c:\gp.html /f

                        You need to be careful when testing things on a user without admin rights.

                        Because when you run as admin and enter the admin account password, you are no longer running in the user's context. So not all of the same GPO may show up.

                        wrx7mW 1 Reply Last reply Reply Quote 3
                        • wrx7mW
                          wrx7m @JaredBusch
                          last edited by

                          @jaredbusch said in Forcing Group Policy:

                          @wrx7m said in Forcing Group Policy:

                          In the future you can also use this command (run as admin) on the affected system to view which GPOs are being applied.

                          gpresult /h c:\gp.html /f

                          You need to be careful when testing things on a user without admin rights.

                          Because when you run as admin and enter the admin account password, you are no longer running in the user's context. So not all of the same GPO may show up.

                          True. If you don't run as admin, though, the computer policy will be blank. So you would have to run it regular for the user and as admin for computer.

                          1 Reply Last reply Reply Quote 0
                          • black3dynamiteB
                            black3dynamite @wrx7m
                            last edited by

                            @wrx7m said in Forcing Group Policy:

                            In the future you can also use this command (run as admin) on the affected system to view which GPOs are being applied.

                            gpresult /h c:\gp.html /f

                            Once it creates the file, open it and show all content and do a ctrl + f for the GPO name or even the setting specific to the issue to see if it says it is being applied or blocked. You can use this to troubleshoot link order or permissions issues or even if it is showing at all (maybe you have a wmi filter or link disabled)

                            Group Policy Results in Group Policy Managment Console can provide the same results too.

                            1 Reply Last reply Reply Quote 1
                            • 1 / 1
                            • First post
                              Last post