ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Forcing Group Policy

    IT Discussion
    8
    15
    1.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • black3dynamiteB
      black3dynamite
      last edited by

      If you chose to hide a drive, applications can still see it.

      1 Reply Last reply Reply Quote 1
      • JoelJ
        Joel
        last edited by

        I created a new OU and put the users I want it to apply to within there. The policy is linked to that OU.

        Im happy if they are clever enough to know they can browse to the drive but i just don't want them to see the drive at first glance.

        1 Reply Last reply Reply Quote 0
        • black3dynamiteB
          black3dynamite
          last edited by

          Here's what I've done to make it work.
          I have a group called HideDrivesFromUsers and then add the users who's not allowed to see the drive in the group.

          I linked the policy object to domain.local
          Under Scope tab, remove authenticated users from Security Filtering.
          Under Scope tab, add HideDrivesFromUsers
          Under Delegation tab, add authenticated users with read permission.

          JoelJ 1 Reply Last reply Reply Quote 0
          • DashrenderD
            Dashrender
            last edited by Dashrender

            https://technet.microsoft.com/en-us/library/cc978514.aspx

            https://social.technet.microsoft.com/Forums/windowsserver/en-US/ed0e5985-4902-4af1-af45-ee1330eb2bc1/ho-to-remove-user-access-permission-to-c-drive-in-terminal-server?forum=winservergen

            1 Reply Last reply Reply Quote 0
            • JoelJ
              Joel @black3dynamite
              last edited by

              @black3dynamite said in Forcing Group Policy:

              Here's what I've done to make it work.
              I have a group called HideDrivesFromUsers and then add the users who's not allowed to see the drive in the group.

              I linked the policy object to domain.local
              Under Scope tab, remove authenticated users from Security Filtering.
              Under Scope tab, add HideDrivesFromUsers
              Under Delegation tab, add authenticated users with read permission.

              I tried this but still doesnt work!

              KellyK 1 Reply Last reply Reply Quote 0
              • KellyK
                Kelly @Joel
                last edited by

                @joel said in Forcing Group Policy:

                @black3dynamite said in Forcing Group Policy:

                Here's what I've done to make it work.
                I have a group called HideDrivesFromUsers and then add the users who's not allowed to see the drive in the group.

                I linked the policy object to domain.local
                Under Scope tab, remove authenticated users from Security Filtering.
                Under Scope tab, add HideDrivesFromUsers
                Under Delegation tab, add authenticated users with read permission.

                I tried this but still doesnt work!

                Are you seeing the policy successfully apply when you look at the RSOP? Most of the issues I've encountered with GPOs are either due to container problems or with DC sync issues (typically DNS is the culprit).

                1 Reply Last reply Reply Quote 1
                • momurdaM
                  momurda
                  last edited by

                  Weird. Just last night i changed a gpo for drive maps. Used Replace because i moved a share to different server.
                  It isnt working either.

                  1 Reply Last reply Reply Quote 0
                  • JoelJ
                    Joel
                    last edited by

                    So all is now working guys.....I realised I kept applying GPO's again and again, deleting them and re-applying the same things to get it to work. Where I should have taken a step back and instead of re-creating and re-applying I should have modified the GPO to remove the existing configuration - applied it so it was all clear and then re-applied if that makes sense.

                    Thanks for your help

                    dbeatoD 1 Reply Last reply Reply Quote 2
                    • dbeatoD
                      dbeato @Joel
                      last edited by

                      @joel Yeah, that makes sense. Rebooting also works well.

                      1 Reply Last reply Reply Quote 0
                      • wrx7mW
                        wrx7m
                        last edited by wrx7m

                        In the future you can also use this command (run as admin) on the affected system to view which GPOs are being applied.

                        gpresult /h c:\gp.html /f

                        Once it creates the file, open it and show all content and do a ctrl + f for the GPO name or even the setting specific to the issue to see if it says it is being applied or blocked. You can use this to troubleshoot link order or permissions issues or even if it is showing at all (maybe you have a wmi filter or link disabled)

                        JaredBuschJ black3dynamiteB 2 Replies Last reply Reply Quote 1
                        • JaredBuschJ
                          JaredBusch @wrx7m
                          last edited by

                          @wrx7m said in Forcing Group Policy:

                          In the future you can also use this command (run as admin) on the affected system to view which GPOs are being applied.

                          gpresult /h c:\gp.html /f

                          You need to be careful when testing things on a user without admin rights.

                          Because when you run as admin and enter the admin account password, you are no longer running in the user's context. So not all of the same GPO may show up.

                          wrx7mW 1 Reply Last reply Reply Quote 3
                          • wrx7mW
                            wrx7m @JaredBusch
                            last edited by

                            @jaredbusch said in Forcing Group Policy:

                            @wrx7m said in Forcing Group Policy:

                            In the future you can also use this command (run as admin) on the affected system to view which GPOs are being applied.

                            gpresult /h c:\gp.html /f

                            You need to be careful when testing things on a user without admin rights.

                            Because when you run as admin and enter the admin account password, you are no longer running in the user's context. So not all of the same GPO may show up.

                            True. If you don't run as admin, though, the computer policy will be blank. So you would have to run it regular for the user and as admin for computer.

                            1 Reply Last reply Reply Quote 0
                            • black3dynamiteB
                              black3dynamite @wrx7m
                              last edited by

                              @wrx7m said in Forcing Group Policy:

                              In the future you can also use this command (run as admin) on the affected system to view which GPOs are being applied.

                              gpresult /h c:\gp.html /f

                              Once it creates the file, open it and show all content and do a ctrl + f for the GPO name or even the setting specific to the issue to see if it says it is being applied or blocked. You can use this to troubleshoot link order or permissions issues or even if it is showing at all (maybe you have a wmi filter or link disabled)

                              Group Policy Results in Group Policy Managment Console can provide the same results too.

                              1 Reply Last reply Reply Quote 1
                              • 1 / 1
                              • First post
                                Last post