Sweet!

That's a very good tip.

Kurt

On Tue, Jun 20, 2017 at 9:28 AM, Michael Leone <[email protected]> wrote:
> I didn't bounce the servers. But this did work:
>
> http://www.windowsnetworking.com/kbase/WindowsTips/Windows7/AdminTips/Admin/Forcingre-evaluationofcomputergroupmembership.html
>
> klist –li 0x3e7 purge
>
> Then run this command on the computer:
>
> gpupdate /force
>
> The first command clears the Kerberos ticket cache for the computer
> account (that’s the 0x3e7 part) while the second command causes the
> computer to authenticate anew and determine its new group membership.
>
>
>
> On Tue, Jun 20, 2017 at 11:21 AM, Kennedy, Jim
> <[email protected]> wrote:
>> Did you bounce the servers so they could pick up the new group memebership?
>>
>> -----Original Message-----
>> From: [email protected] [mailto:[email protected]] 
>> On Behalf Of Michael Leone
>> Sent: Tuesday, June 20, 2017 11:11 AM
>> To: [email protected]
>> Subject: [NTSysADM] Re: GPO being filtered out, denied by security - MORE
>>
>> OK, I've noticed that there are more servers exhibiting this GPO denial. All 
>> were added to the AD group that applies to this denied GPO. All that were 
>> added to the AD group yesterday are fine, GPO *not* being denied.
>>
>> Maybe I just need to leave it? I would have thought that a "gpupdate /force" 
>> would have been enough. I even forced a site replication between DCs, just 
>> in case Ad changes hadn't been replicated yet.
>>
>> On Tue, Jun 20, 2017 at 10:28 AM, Michael Leone <[email protected]> wrote:
>>> I'm scratching my head at this. I created a new GPO, to set updates to
>>> be applied automatically, and rebooted automatically. I created a new
>>> AD group; added 10 server accounts to it. Set the security filtering
>>> on the new GPO to this new group.
>>>
>>> All seemed fine, I spot-checked the 10 servers to be sure that GPO was
>>> being applied (I did a gpupdate /force /target:computer, then checked
>>> gpresult /r). And it is being applied as it should.
>>>
>>> With one exception. One server says it is being filtered out, and
>>> denied by security. And I can't figure out why. There are no
>>> delegations on the GPO, so it can't be denied from there.
>>>
>>> All server accounts are in the same OU. All are members of all the
>>> same AD groups.
>>>
>>> Here's the thing. This account is a member of 2 AD groups. Both groups
>>> are on security filtering for my WSUS GPOs. And it *is* applying the
>>> one GPO (the one that is set to download only, not install).
>>>
>>> But it is not applying the other GPO, which is set to install, and
>>> which is higher in precedence. (I know it's higher in precedence, this
>>> GPO is properly being applied to the other members of that AD group).
>>>
>>> Where do I go from here? How can I determine why just this one server
>>> is filtering out the GPO, when the other group members are not
>>> filtering it out?
>>
>>
>
>


Reply via email to