What occurs when the Security Group Policy CSE encounters a null DACL
Mike here. The Group Policy security client side extension can distribute security descriptors on files and registry keys. This extension is difficult to troubleshoot because it is considerably durable...
View ArticleMigrating from PolicyMaker to Group Policy Preferences with GPPMIG
Mike here. PolicyMaker customers rejoice—Microsoft has a way for you to migrate from PolicyMaker 2.x to the new Group Policy preferences released with Windows Server 2008 and included in the Remote...
View ArticleGroup Policy Slow Link Detection using Windows Vista and later
Mike here again. Many Group Policy features rely on a well connected network for their success. However, not every connection is perfect or ideal; some connections are slow. The Group Policy...
View ArticleGroup Policy Preferences Logging and Windows 7
Hi all, Mike here again. Back in July of 2007, I posted a blog explaining how to enable Group Policy Preferences debug logging using RSAT. As a refresher, Group Policy Preferences debug logging is...
View ArticleWindows 7, Windows Server 2008 R2 and the Group Policy Central Store
Mike here again to help bring clarity to something we are seeing with Windows Server 2008 R2 and existing Group Policy central store. Before that discussion, let us cover some background...
View ArticleControl Extended Protection for Authentication using Security Policy
Mike here again. Microsoft has introduced additional security measures for authentication known as Extended Protection for Authentication, also known as channel binding token (CBT). Extended protection...
View ArticleWindows XP Power Management and Group Policy Preferences
Hi everyone, Mike here again to discuss a common scenario that generates calls to Microsoft. The scenario covers managing power on Windows XP client computers using Group Policy Preferences. Let’s...
View ArticleGP Editorial on the Group Policy blog
Ned here. Mike Stephens has a short editorial on the GP development team blog. It addresses the fallacy of group policy "best practices" and is a good read for philosophy majors as well as IT staff....
View ArticleBackground uploading of User Registry Settings
Hey everyone, Mike here again to discuss an interesting feature I learned about in Windows 7. Many Microsoft customers deploy Roaming User Profiles. In fact, many combine Roaming User profiles and...
View ArticleGroup Policy Script Processing Behavior
Hi Everyone, Mike here. Today I am discussing the default processing behavior for Group Policy scripts. Microsoft changed the default behavior of Group Policy startup and logon scripts processing from...
View ArticleFRS to DFSR Migration Tool Released
Heya, Ned here again. I am out of my barrel and on the road again this week, coming to you live from Las Colinas Texas. As you may have noticed, I recently wrote a TechNet Whitepaper on how to migrate...
View ArticleAskDS is 0.03 Centuries Old Today
Three years ago today the AskDS site published its first post and had its first commenter. In the meantime we’ve created 455 articles and we’re now ranked 6th in all of TechNet’s blogs, behind AskPerf,...
View ArticleForcing Afterhours User Logoffs
Mike here and today I want to answer a common customer request—how to force users to logoff at the end of the day. The scenario requires a bit of an explanation, so let’s get started.Let’s recognize...
View ArticleMythical Creatures – Corrupt User Profiles
“Ned” the Gnome Mike here again and in the spirit of Halloween I want to discuss mythical creatures. What would the world be without J.R.R. Tolkien’s idea of smelly, leather-skinned Orcs or...
View ArticleTarget Group Policy Preferences by Container, not by Group
Hello again AskDS readers, Mike here again. This post reflects on Group Policy Preference targeting items, specifically targeting by security groups. Targeting preference items by security groups is a...
View ArticleAskDS is 12,614,400,000,000,000 shakes old
It’s been four years and 591 posts since AskDS reached critical mass. You’d hope our party would look like this: But it’s more likely to be:Without you, we’d be another of those sites that glow red...
View ArticleImproved Group Policy Preference Targeting by Computer Group Membership
Hello AskDS readers, it's Mike again talking about Group Policy Preference targeting items. I posted an article in June entitled Targeting Group Policy Preferences by Container, not by Group. This post...
View ArticleCluster and Stale Computer Accounts
Hi, Mike here again. Today, I want to write about a common administrative task that can lead to disaster: removing stale computer accounts from Active Directory.Removing stale computer accounts is...
View ArticleFriday Mail Sack: It’s a Dog’s Life Edition
Hi folks, Ned here again with some possibly interesting, occasionally entertaining, and always unsolicited Friday mail sack. This week we talk some:DNS partition absenceControlling DCDIAG event...
View ArticleThe Mouse Will Play
Hey all, Ned here. Mike and I start teaching Windows Server 2012 and Windows 8 DS internals this month in the US and UK and won’t be back until July. Until then, Jonathan is – I can’t believe I’m...
View Article