Group Policy Troubleshooting Tools?


Recommended Posts

Wow, group policy is becomming weird on some machines! I am working on a domain that has all Windows XP Service Pack 2 machines. I am aware of what OU's that these machines are in, and what group policies that are being applied to them... or should be applied!

We are running into a situation where some of the machines are still displaying an old legal notice text, that should be over-written by another GPO. Even if you do a gpupdate /force, it still doesn't make the correct group policy changes as it should. It just seems that on some machines the GPO's that it should be getting don't apply, and we'll have to go through and make manual changes to them.

What utilities can I use to determine what policies are actually being used (I know about gpresult) on each machine, and how to determine why some policies aren't being applied???

Link to comment
Share on other sites

Bobbba,

I'm sorry but I neglected to add some information. One of the things that's funny is that we have a few computers that the policies don't seem to be active on. Our primary ones are the ones that configure the SUS addresses, and the one that applies the legal notice before you login to the computer. What's even more funny is that when I use gpresult, the computer states that the specific policies that aren't being applied are in fact active on the machine.

Why would they not be able to make the changes? I know one is directly stated in a GPO, and the other is in a GPO that runs a script to make some registry changes... even doing a gpupdate /force doesn't resolve anything.

Link to comment
Share on other sites

It just seems that on some machines the GPO's that it should be getting don't apply, and we'll have to go through and make manual changes to them... how to determine why some policies aren't being applied???
Weird. I would check for:
  • Any DNS problems
  • Any errors/clues in the Event Viewer on the workstations

What utilities can I use to determine what policies are actually being used (I know about gpresult) on each machine
Yeah, gpresult is one (runs remotely). And as bobba said, rsop.msc is another one that you can run on the local workstation.
Link to comment
Share on other sites

Bobbba,

I'm sorry but I neglected to add some information. One of the things that's funny is that we have a few computers that the policies don't seem to be active on. Our primary ones are the ones that configure the SUS addresses, and the one that applies the legal notice before you login to the computer. What's even more funny is that when I use gpresult, the computer states that the specific policies that aren't being applied are in fact active on the machine.

Why would they not be able to make the changes? I know one is directly stated in a GPO, and the other is in a GPO that runs a script to make some registry changes... even doing a gpupdate /force doesn't resolve anything.

If the policies are listed as being applied as fault suggested, I would definitely look at the workstation's system and application event logs for any pointers.

Also look in the registry on the workstation under hkey-currentuser>software>policies and hkey-localmachine>software>policies for any keys created by GPO

Link to comment
Share on other sites

Update:

Per using rdop.msc, for some reason there is a red x overtop of the Computer Policy. Looking at the Application Log, there appears to be a userenv error for 1054. Upon reviewing the error with event ID, I had enabled userenv logging, and at least manage to get the following... but I don't know what it means!

Any ideas???

USERENV(420.424) 10:08:22:234 LibMain: Process Name: C:\WINDOWS\System32\WScript.exe

USERENV(43c.440) 10:08:22:515 LibMain: Process Name: C:\WINDOWS\System32\wbem\wmiprvse.exe

USERENV(7b0.600) 10:09:05:040 LibMain: Process Name: C:\WINDOWS\system32\wuauclt.exe

USERENV(154.158) 10:09:21:443 LibMain: Process Name: C:\WINDOWS\system32\userinit.exe

USERENV(2bc.1ac) 10:10:00:904 SetFgRefreshInfo: Next User Fg policy Synchronous, Reason: NonCachedCredentials.

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: Yes, we can impersonate the user. Running as self

USERENV(2bc.2c0) 10:10:01:388 =========================================================

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: Entering, hToken = <0x6e4>, lpProfileInfo = 0x6e3e0

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: lpProfileInfo->dwFlags = <0x0>

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: lpProfileInfo->lpUserName = <5000>

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: NULL central profile path

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: lpProfileInfo->lpDefaultPath = <\\DTPD_W3K3\netlogon\Default User>

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: NULL server name

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: In console winlogon process

USERENV(2bc.2c0) 10:10:01:388 In LoadUserProfileP

USERENV(2bc.2c0) 10:10:01:388 =========================================================

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: Entering, hToken = <0x6e4>, lpProfileInfo = 0x6e3e0

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: lpProfileInfo->dwFlags = <0x0>

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: lpProfileInfo->lpUserName = <5000>

USERENV(2bc.2c0) 10:10:01:388 LoadUserProfile: NULL central profile path

USERENV(2bc.2c0) 10:10:01:403 LoadUserProfile: lpProfileInfo->lpDefaultPath = <\\DTPD_W3K3\netlogon\Default User>

USERENV(2bc.2c0) 10:10:01:403 LoadUserProfile: NULL server name

USERENV(2bc.2c0) 10:10:01:403 LoadUserProfile: User sid: S-1-5-21-823518204-842925246-682003330-1797

USERENV(2bc.2c0) 10:10:01:403 CSyncManager::EnterLock <S-1-5-21-823518204-842925246-682003330-1797>

USERENV(2bc.2c0) 10:10:01:403 CSyncManager::EnterLock: No existing entry found

USERENV(2bc.2c0) 10:10:01:403 CSyncManager::EnterLock: New entry created

USERENV(2bc.2c0) 10:10:01:403 CHashTable::HashAdd: S-1-5-21-823518204-842925246-682003330-1797 added in bucket 3

USERENV(2bc.2c0) 10:10:01:403 LoadUserProfile: Wait succeeded. In critical section.

USERENV(2bc.2c0) 10:10:01:403 RestoreUserProfile: Entering

USERENV(2bc.2c0) 10:10:01:403 RestoreUserProfile: User is a Admin

USERENV(2bc.2c0) 10:10:01:403 IsCentralProfileReachable: Entering

USERENV(2bc.2c0) 10:10:01:403 IsCentralProfileReachable: Null path. Leaving

USERENV(2bc.2c0) 10:10:01:403 RestoreUserProfile: Profile path = <>

USERENV(2bc.2c0) 10:10:01:403 ExtractProfileFromBackup: A profile already exists

USERENV(2bc.2c0) 10:10:01:403 PatchNewProfileIfRequred: A profile already exists with the current sid, exitting

USERENV(2bc.2c0) 10:10:01:403 CreateLocalProfileKey: Not setting additional Security

USERENV(2bc.2c0) 10:10:01:403 GetExistingLocalProfileImage: Found entry in profile list for existing local profile

USERENV(2bc.2c0) 10:10:01:403 GetExistingLocalProfileImage: Local profile image filename = <%SystemDrive%\Documents and Settings\5000>

USERENV(2bc.2c0) 10:10:01:403 GetExistingLocalProfileImage: Expanded local profile image filename = <C:\Documents and Settings\5000>

USERENV(2bc.2c0) 10:10:01:435 GetExistingLocalProfileImage: No local mandatory profile. Error = 2

USERENV(2bc.2c0) 10:10:01:466 GetExistingLocalProfileImage: Found local profile image file ok <C:\Documents and Settings\5000\ntuser.dat>

USERENV(2bc.2c0) 10:10:01:466 GetExistingLocalProfileImage: Failed to query low profile unload time with error 2

USERENV(2bc.2c0) 10:10:01:466 Local Existing Profile Image is reachable

USERENV(2bc.2c0) 10:10:01:466 Local profile name is <C:\Documents and Settings\5000>

USERENV(2bc.2c0) 10:10:01:466 RestoreUserProfile: No central profile. Attempting to load local profile.

USERENV(2bc.2c0) 10:10:01:528 MyRegLoadKey: Returning 00000000

USERENV(2bc.2c0) 10:10:01:700 MyRegLoadKey: Returning 00000000

USERENV(2bc.2c0) 10:10:01:700 CreateClassHive: existing user classes hive found

USERENV(2bc.2c0) 10:10:01:700 RestoreUserProfile: About to Leave. Final Information follows:

USERENV(2bc.2c0) 10:10:01:700 Profile was successfully loaded.

USERENV(2bc.2c0) 10:10:01:700 lpProfile->lpRoamingProfile = <>

USERENV(2bc.2c0) 10:10:01:700 lpProfile->lpLocalProfile = <C:\Documents and Settings\5000>

USERENV(2bc.2c0) 10:10:01:700 lpProfile->dwInternalFlags = 0x100

USERENV(2bc.2c0) 10:10:01:700 RestoreUserProfile: Leaving.

USERENV(2bc.2c0) 10:10:01:716 UpgradeProfile: Entering

USERENV(2bc.2c0) 10:10:01:716 UpgradeProfile: Build numbers match

USERENV(2bc.2c0) 10:10:01:716 UpgradeProfile: Leaving Successfully

USERENV(2bc.2c0) 10:10:01:716 GetProfileType: Profile already loaded.

USERENV(2bc.2c0) 10:10:01:716 LoadProfileInfo: Failed to query central profile with error 2

USERENV(2bc.2c0) 10:10:01:716 GetProfileType: ProfileFlags is 0

USERENV(2bc.2c0) 10:10:01:778 Profile Ref Count is 1

USERENV(2bc.2c0) 10:10:01:778 LoadUserProfile: Leaving critical Section.

USERENV(2bc.2c0) 10:10:01:778 CSyncManager::LeaveLock <S-1-5-21-823518204-842925246-682003330-1797>

USERENV(2bc.2c0) 10:10:01:778 CSyncManager::LeaveLock: Lock released

USERENV(2bc.2c0) 10:10:01:778 CHashTable::HashDelete: S-1-5-21-823518204-842925246-682003330-1797 deleted

USERENV(2bc.2c0) 10:10:01:778 CSyncManager::LeaveLock: Lock deleted

USERENV(2bc.2c0) 10:10:01:778 LoadUserProfile: Impersonated user: 000006e4, 00000000

USERENV(2bc.2c0) 10:10:01:872 LoadUserProfile: Reverted to user: 00000000

USERENV(2bc.2c0) 10:10:01:872 LoadUserProfile: Leaving with a value of 1.

USERENV(2bc.2c0) 10:10:01:872 =========================================================

USERENV(2bc.2c0) 10:10:01:872 LoadUserProfile: LoadUserProfileP succeeded

USERENV(2bc.2c0) 10:10:01:872 LoadUserProfile: Returning success. Final Information follows:

USERENV(2bc.2c0) 10:10:01:872 lpProfileInfo->UserName = <5000>

USERENV(2bc.2c0) 10:10:01:872 lpProfileInfo->lpProfilePath = <>

USERENV(2bc.2c0) 10:10:01:872 lpProfileInfo->dwFlags = 0x0

USERENV(2bc.2c0) 10:10:01:872 LoadUserProfile: Returning TRUE. hProfile = <0x78c>

USERENV(2bc.2c0) 10:10:02:122 IsSyncForegroundPolicyRefresh: Synchronous, Reason: NonCachedCredentials

USERENV(2bc.218) 10:10:02:122 IsSyncForegroundPolicyRefresh: Synchronous, Reason: NonCachedCredentials

USERENV(2bc.218) 10:10:02:122 ApplyGroupPolicy: Entering. Flags = 6

USERENV(2bc.218) 10:10:02:122 ProcessGPOs:

USERENV(2bc.218) 10:10:02:122 ProcessGPOs:

USERENV(2bc.218) 10:10:02:122 ProcessGPOs: Starting user Group Policy (Background) processing...

USERENV(2bc.218) 10:10:02:122 ProcessGPOs:

USERENV(2bc.218) 10:10:02:122 ProcessGPOs:

USERENV(2bc.218) 10:10:02:122 EnterCriticalPolicySectionEx: Entering with timeout 600000 and flags 0x0

USERENV(2bc.218) 10:10:02:122 EnterCriticalPolicySectionEx: User critical section has been claimed. Handle = 0x7b0

USERENV(2bc.218) 10:10:02:122 EnterCriticalPolicySectionEx: Leaving successfully.

USERENV(2bc.218) 10:10:02:122 ProcessGPOs: Machine role is 2.

USERENV(2bc.218) 10:10:02:122 PingComputer: Adapter speed 100000000 bps

USERENV(2bc.218) 10:10:02:122 PingComputer: First time: 0

USERENV(2bc.218) 10:10:02:122 PingComputer: Fast link. Exiting.

USERENV(2bc.218) 10:10:02:153 ProcessGPOs: User name is: CN=Test Officer,OU=Test OU,DC=DTPD1,DC=com, Domain name is: DTPD1

USERENV(2bc.218) 10:10:02:153 ProcessGPOs: Domain controller is: \\DTPD_W3K3.DTPD1.COM Domain DN is DTPD1.COM

USERENV(2bc.218) 10:10:02:153 ReadGPExtensions: Rsop entry point not found for gptext.dll.

USERENV(2bc.218) 10:10:02:153 ReadGPExtensions: Rsop entry point not found for dskquota.dll.

USERENV(2bc.218) 10:10:02:153 ReadGPExtensions: Rsop entry point not found for gptext.dll.

USERENV(2bc.218) 10:10:02:153 ReadGPExtensions: Rsop entry point not found for iedkcs32.dll.

USERENV(2bc.218) 10:10:02:153 ReadGPExtensions: Rsop entry point not found for scecli.dll.

USERENV(2bc.218) 10:10:02:153 ReadGPExtensions: Rsop entry point not found for gptext.dll.

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {35378EAC-683F-11D2-A89A-00C04FBBCFA2}

USERENV(2bc.218) 10:10:02:153 ReadStatus: Read Extension's Previous status successfully.

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {0ACDD40C-75AC-47ab-BAA0-BF6DE7E7FE63}

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {25537BA6-77A8-11D2-9B6C-0000F8080861}

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {3610eda5-77ef-11d2-8dc5-00c04fa31a66}

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {426031c0-0b47-4852-b0ca-ac3d37bfcb39}

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {42B5FAAE-6536-11d2-AE5A-0000F87571E3}

USERENV(2bc.218) 10:10:02:153 ReadStatus: Read Extension's Previous status successfully.

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {4CFB60C1-FAA6-47f1-89AA-0B18730C9FD3}

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {827D319E-6EAC-11D2-A4EA-00C04F79F83A}

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {A2E30F80-D7DE-11d2-BBDE-00C04F86AE3B}

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {B1BE8D72-6EAC-11D2-A4EA-00C04F79F83A}

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {c6dc5466-785a-11d2-84d0-00c04fb169f7}

USERENV(2bc.218) 10:10:02:153 ReadExtStatus: Reading Previous Status for extension {e437bc1c-aa7d-11d2-a382-00c04f991e27}

USERENV(2bc.218) 10:10:02:153 ProcessGPOs: Calling GetGPOInfo for normal policy mode

USERENV(2bc.218) 10:10:02:153 GetGPOInfo: ********************************

USERENV(2bc.218) 10:10:02:153 GetGPOInfo: Entering...

USERENV(2bc.218) 10:10:02:153 GetGPOInfo: Server connection established.

USERENV(2bc.218) 10:10:02:169 GetGPOInfo: Bound successfully.

USERENV(2bc.218) 10:10:02:185 SearchDSObject: Searching <OU=Test OU,DC=DTPD1,DC=com>

USERENV(2bc.218) 10:10:02:185 SearchDSObject: Found GPO(s): <[LDAP://cn={AA47296F-4671-4E9C-A861-D92F2E75B1C7},cn=policies,cn=system,DC=DTPD1,DC=COM;0][LDAP://cn={9C8B4191-4C63-4472-AD66-6FC64168EFDE},cn=policies,cn=system,DC=DTPD1,DC=COM;0][LDAP://cn={9A596C35-B58E-41B1-A702-E5D1B75180A5},cn=policies,cn=system,DC=DTPD1,DC=COM;0][LDAP://cn={D150E26C-1DF1-48F7-B3E7-1F58251EC6DA},cn=policies,cn=system,DC=DTPD1,DC=COM;0][LDAP://cn={14539203-9024-40BC-BFE9-CB13DB9E2322},cn=policies,cn=system,DC=DTPD1,DC=COM;0][LDAP://cn={D4E66C3A-3CF4-4AAE-987A-DE4A42898B39},cn=policies,cn=system,DC=DTPD1,DC=COM;0]>

USERENV(2bc.218) 10:10:02:185 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:185 ProcessGPO: Deferring search for <LDAP://cn={AA47296F-4671-4E9C-A861-D92F2E75B1C7},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:185 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:185 ProcessGPO: Deferring search for <LDAP://cn={9C8B4191-4C63-4472-AD66-6FC64168EFDE},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:185 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:185 ProcessGPO: Deferring search for <LDAP://cn={9A596C35-B58E-41B1-A702-E5D1B75180A5},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:185 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:185 ProcessGPO: Deferring search for <LDAP://cn={D150E26C-1DF1-48F7-B3E7-1F58251EC6DA},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:185 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:185 ProcessGPO: Deferring search for <LDAP://cn={14539203-9024-40BC-BFE9-CB13DB9E2322},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:185 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:185 ProcessGPO: Deferring search for <LDAP://cn={D4E66C3A-3CF4-4AAE-987A-DE4A42898B39},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:185 SearchDSObject: <OU=Test OU,DC=DTPD1,DC=com> has the Block From Above attribute set

USERENV(2bc.218) 10:10:02:185 SearchDSObject: Searching <DC=DTPD1,DC=com>

USERENV(2bc.218) 10:10:02:185 SearchDSObject: Found GPO(s): <[LDAP://CN={31B2F340-016D-11D2-945F-00C04FB984F9},CN=Policies,CN=System,DC=DTPD1,DC=COM;0]>

USERENV(2bc.218) 10:10:02:185 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:185 AddGPO: GPO will not be added to the list since the Block flag is set and this GPO is not in enforce mode.

USERENV(2bc.218) 10:10:02:185 ProcessGPO: Deferring search for <LDAP://CN={31B2F340-016D-11D2-945F-00C04FB984F9},CN=Policies,CN=System,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:200 SearchDSObject: Searching <CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=DTPD1,DC=com>

USERENV(2bc.218) 10:10:02:200 SearchDSObject: No GPO(s) for this object.

USERENV(2bc.218) 10:10:02:200 EvaluateDeferredGPOs: Searching for GPOs in cn=policies,cn=system,DC=DTPD1,DC=COM

USERENV(2bc.218) 10:10:02:200 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:200 ProcessGPO: Searching <cn={AA47296F-4671-4E9C-A861-D92F2E75B1C7},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:200 ProcessGPO: User has access to this GPO.

USERENV(2bc.218) 10:10:02:200 ProcessGPO: GPO passes the filter check.

USERENV(2bc.218) 10:10:02:200 ProcessGPO: Found functionality version of: 2

USERENV(2bc.218) 10:10:02:200 ProcessGPO: Found file system path of: <\\DTPD1.COM\SysVol\DTPD1.COM\Policies\{AA47296F-4671-4E9C-A861-D92F2E75B1C7}>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found common name of: <{AA47296F-4671-4E9C-A861-D92F2E75B1C7}>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found display name of: <Windows Defender (Non-beta)>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found user version of: GPC is 0, GPT is 0

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found flags of: 0

USERENV(2bc.218) 10:10:02:231 ProcessGPO: No client-side extensions for this object.

USERENV(2bc.218) 10:10:02:231 ProcessGPO: GPO Windows Defender (Non-beta) doesn't contain any data since the version number is 0. It will be skipped.

USERENV(2bc.218) 10:10:02:231 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:231 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Searching <cn={9C8B4191-4C63-4472-AD66-6FC64168EFDE},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: User has access to this GPO.

USERENV(2bc.218) 10:10:02:231 ProcessGPO: GPO passes the filter check.

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found functionality version of: 2

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found file system path of: <\\DTPD1.COM\SysVol\DTPD1.COM\Policies\{9C8B4191-4C63-4472-AD66-6FC64168EFDE}>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found common name of: <{9C8B4191-4C63-4472-AD66-6FC64168EFDE}>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found display name of: <Legal Notice>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found user version of: GPC is 0, GPT is 0

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found flags of: 0

USERENV(2bc.218) 10:10:02:231 ProcessGPO: No client-side extensions for this object.

USERENV(2bc.218) 10:10:02:231 ProcessGPO: GPO Legal Notice doesn't contain any data since the version number is 0. It will be skipped.

USERENV(2bc.218) 10:10:02:231 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:231 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Searching <cn={9A596C35-B58E-41B1-A702-E5D1B75180A5},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: User has access to this GPO.

USERENV(2bc.218) 10:10:02:231 ProcessGPO: GPO passes the filter check.

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found functionality version of: 2

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found file system path of: <\\DTPD1.COM\SysVol\DTPD1.COM\Policies\{9A596C35-B58E-41B1-A702-E5D1B75180A5}>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found common name of: <{9A596C35-B58E-41B1-A702-E5D1B75180A5}>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found display name of: <Assign Wins Addresses>

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found user version of: GPC is 0, GPT is 0

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Found flags of: 0

USERENV(2bc.218) 10:10:02:231 ProcessGPO: No client-side extensions for this object.

USERENV(2bc.218) 10:10:02:231 ProcessGPO: GPO Assign Wins Addresses doesn't contain any data since the version number is 0. It will be skipped.

USERENV(2bc.218) 10:10:02:231 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:231 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:231 ProcessGPO: Searching <cn={D150E26C-1DF1-48F7-B3E7-1F58251EC6DA},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: User has access to this GPO.

USERENV(2bc.218) 10:10:02:247 ProcessGPO: GPO passes the filter check.

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found functionality version of: 2

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found file system path of: <\\DTPD1.COM\SysVol\DTPD1.COM\Policies\{D150E26C-1DF1-48F7-B3E7-1F58251EC6DA}>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found common name of: <{D150E26C-1DF1-48F7-B3E7-1F58251EC6DA}>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found display name of: <Test Drives>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found user version of: GPC is 4, GPT is 4

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found flags of: 0

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found extensions: [{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{0F6B957E-509E-11D1-A7CC-0000F87571E3}][{42B5FAAE-6536-11D2-AE5A-0000F87571E3}{40B66650-4972-11D1-A7CA-0000F87571E3}]

USERENV(2bc.218) 10:10:02:247 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:247 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Searching <cn={14539203-9024-40BC-BFE9-CB13DB9E2322},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: User has access to this GPO.

USERENV(2bc.218) 10:10:02:247 ProcessGPO: GPO passes the filter check.

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found functionality version of: 2

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found file system path of: <\\DTPD1.COM\SysVol\DTPD1.COM\Policies\{14539203-9024-40BC-BFE9-CB13DB9E2322}>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found common name of: <{14539203-9024-40BC-BFE9-CB13DB9E2322}>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found display name of: <Test WUS Policy>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found user version of: GPC is 0, GPT is 0

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found flags of: 0

USERENV(2bc.218) 10:10:02:247 ProcessGPO: No client-side extensions for this object.

USERENV(2bc.218) 10:10:02:247 ProcessGPO: GPO Test WUS Policy doesn't contain any data since the version number is 0. It will be skipped.

USERENV(2bc.218) 10:10:02:247 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:247 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Searching <cn={D4E66C3A-3CF4-4AAE-987A-DE4A42898B39},cn=policies,cn=system,DC=DTPD1,DC=COM>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: User has access to this GPO.

USERENV(2bc.218) 10:10:02:247 ProcessGPO: GPO passes the filter check.

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found functionality version of: 2

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found file system path of: <\\DTPD1.COM\SysVol\DTPD1.COM\Policies\{D4E66C3A-3CF4-4AAE-987A-DE4A42898B39}>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found common name of: <{D4E66C3A-3CF4-4AAE-987A-DE4A42898B39}>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found display name of: <Desktop Background>

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found user version of: GPC is 2, GPT is 2

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found flags of: 0

USERENV(2bc.218) 10:10:02:247 ProcessGPO: Found extensions: [{35378EAC-683F-11D2-A89A-00C04FBBCFA2}{0F6B957E-509E-11D1-A7CC-0000F87571E3}]

USERENV(2bc.218) 10:10:02:247 ProcessGPO: ==============================

USERENV(2bc.218) 10:10:02:247 GetGPOInfo: GPO Local Group Policy doesn't contain any data since the version number is 0. It will be skipped.

USERENV(2bc.218) 10:10:02:247 GetGPOInfo: Leaving with 1

USERENV(2bc.218) 10:10:02:247 GetGPOInfo: ********************************

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Logging Data for Target <5000>.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: OpenThreadToken failed with error 1008, assuming thread is not impersonating

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension Registry

USERENV(2bc.218) 10:10:02:263 ReadStatus: Read Extension's Previous status successfully.

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes and no security group membership change and extension Registry has NoGPOChanges set.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension Wireless

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes but couldn't read extension Wireless's status or policy time.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Extension Wireless skipped with flags 0x6.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension Folder Redirection

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes but couldn't read extension Folder Redirection's status or policy time.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Extension Folder Redirection skipped because both deleted and changed GPO lists are empty.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension Microsoft Disk Quota

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes but couldn't read extension Microsoft Disk Quota's status or policy time.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Extension Microsoft Disk Quota skipped with flags 0x6.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension QoS Packet Scheduler

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes but couldn't read extension QoS Packet Scheduler's status or policy time.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Extension QoS Packet Scheduler skipped with flags 0x6.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension Scripts

USERENV(2bc.218) 10:10:02:263 ReadStatus: Read Extension's Previous status successfully.

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes and no security group membership change and extension Scripts has NoGPOChanges set.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension Internet Explorer Zonemapping

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes but couldn't read extension Internet Explorer Zonemapping's status or policy time.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Extension Internet Explorer Zonemapping skipped because both deleted and changed GPO lists are empty.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension Security

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes but couldn't read extension Security's status or policy time.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Extension Security skipped with flags 0x6.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension Internet Explorer Branding

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes but couldn't read extension Internet Explorer Branding's status or policy time.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Extension Internet Explorer Branding skipped because both deleted and changed GPO lists are empty.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension EFS recovery

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes but couldn't read extension EFS recovery's status or policy time.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Extension EFS recovery skipped with flags 0x6.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension Software Installation

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes but couldn't read extension Software Installation's status or policy time.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Extension Software Installation skipped because both deleted and changed GPO lists are empty.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: -----------------------

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Processing extension IP Security

USERENV(2bc.218) 10:10:02:263 CompareGPOLists: The lists are the same.

USERENV(2bc.218) 10:10:02:263 CheckGPOs: No GPO changes but couldn't read extension IP Security's status or policy time.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Extension IP Security skipped with flags 0x6.

USERENV(2bc.218) 10:10:02:263 SetFgRefreshInfo: Previous User Fg policy Synchronous, Reason: NonCachedCredentials.

USERENV(2bc.218) 10:10:02:263 SetFgRefreshInfo: Next User Fg policy Asynchronous, Reason: NoNeedForSync.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: No WMI logging done in this policy cycle.

USERENV(2bc.218) 10:10:02:263 LeaveCriticalPolicySection: Critical section 0x7b0 has been released.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: User Group Policy has been applied.

USERENV(2bc.218) 10:10:02:263 ProcessGPOs: Leaving with 1.

USERENV(2bc.218) 10:10:02:263 ApplyGroupPolicy: Leaving successfully.

USERENV(2bc.214) 10:10:02:263 GPOThread: Next refresh will happen in 103 minutes

USERENV(2bc.2c0) 10:10:02:466 IsSyncForegroundPolicyRefresh: Asynchronous, Reason: NoNeedForSync

USERENV(2bc.2f8) 10:10:02:466 IsSyncForegroundPolicyRefresh: Asynchronous, Reason: NoNeedForSync

USERENV(4fc.51c) 10:10:02:591 LibMain: Process Name: C:\WINDOWS\system32\userinit.exe

USERENV(4c8.494) 10:10:02:622 LibMain: Process Name: C:\WINDOWS\system32\userinit.exe

USERENV(2f4.314) 10:10:02:653 ImpersonateUser: Failed to impersonate user with 5.

USERENV(2f4.314) 10:10:02:653 GetUserNameAndDomain Failed to impersonate user

USERENV(2f4.314) 10:10:02:653 ImpersonateUser: Failed to impersonate user with 5.

USERENV(2f4.314) 10:10:02:653 GetUserDNSDomainName: Failed to impersonate user

USERENV(2f4.314) 10:10:02:778 ImpersonateUser: Failed to impersonate user with 5.

USERENV(2f4.314) 10:10:02:809 GetUserNameAndDomain Failed to impersonate user

USERENV(2f4.314) 10:10:02:809 ImpersonateUser: Failed to impersonate user with 5.

USERENV(2f4.314) 10:10:02:809 GetUserDNSDomainName: Failed to impersonate user

USERENV(4c8.494) 10:10:02:856 GetProfileType: Profile already loaded.

USERENV(4c8.494) 10:10:02:856 GetProfileType: ProfileFlags is 0

USERENV(2f4.314) 10:10:02:856 ImpersonateUser: Failed to impersonate user with 5.

USERENV(2f4.314) 10:10:02:919 GetUserNameAndDomain Failed to impersonate user

USERENV(2f4.314) 10:10:02:919 ImpersonateUser: Failed to impersonate user with 5.

USERENV(2f4.314) 10:10:02:919 GetUserDNSDomainName: Failed to impersonate user

USERENV(41c.534) 10:10:02:981 LibMain: Process Name: C:\WINDOWS\System32\WScript.exe

USERENV(430.438) 10:10:03:106 LibMain: Process Name: C:\WINDOWS\Explorer.EXE

USERENV(430.528) 10:10:03:778 GetProfileType: Profile already loaded.

USERENV(430.528) 10:10:03:778 GetProfileType: ProfileFlags is 0

USERENV(430.528) 10:10:03:778 GetProfileType: Profile already loaded.

USERENV(430.528) 10:10:03:778 GetProfileType: ProfileFlags is 0

USERENV(430.438) 10:10:03:856 GetProfileType: Profile already loaded.

USERENV(430.438) 10:10:03:856 GetProfileType: ProfileFlags is 0

USERENV(1cc.1d0) 10:10:06:887 LibMain: Process Name: C:\WINDOWS\system32\ctfmon.exe

USERENV(1cc.1d0) 10:10:06:887 GetProfileType: Profile already loaded.

USERENV(1cc.1d0) 10:10:06:887 GetProfileType: ProfileFlags is 0

USERENV(79c.1c0) 10:10:07:433 LibMain: Process Name: C:\Program Files\Windows Defender\MSASCui.exe

USERENV(430.438) 10:10:07:793 ImpersonateUser: Failed to impersonate user with 5.

USERENV(430.438) 10:10:07:793 GetUserNameAndDomain Failed to impersonate user

USERENV(430.438) 10:10:07:793 ImpersonateUser: Failed to impersonate user with 5.

USERENV(430.438) 10:10:07:793 GetUserDNSDomainName: Failed to impersonate user

USERENV(430.438) 10:10:07:793 ImpersonateUser: Failed to impersonate user with 5.

USERENV(430.438) 10:10:07:793 GetUserNameAndDomain Failed to impersonate user

USERENV(430.438) 10:10:07:808 ImpersonateUser: Failed to impersonate user with 5.

USERENV(430.438) 10:10:07:808 GetUserDNSDomainName: Failed to impersonate user

USERENV(430.438) 10:10:07:902 ImpersonateUser: Failed to impersonate user with 5.

USERENV(430.438) 10:10:07:902 GetUserNameAndDomain Failed to impersonate user

USERENV(430.438) 10:10:07:902 ImpersonateUser: Failed to impersonate user with 5.

USERENV(430.438) 10:10:07:902 GetUserDNSDomainName: Failed to impersonate user

USERENV(470.70) 10:10:08:855 GetProfileType: Profile already loaded.

USERENV(470.70) 10:10:08:886 LoadProfileInfo: Failed to query central profile with error 2

USERENV(470.70) 10:10:08:886 GetProfileType: ProfileFlags is 0

USERENV(884.888) 10:10:17:416 LibMain: Process Name: C:\WINDOWS\system32\userinit.exe

USERENV(430.528) 10:10:20:228 GetProfileType: Profile already loaded.

USERENV(430.528) 10:10:20:228 GetProfileType: ProfileFlags is 0

USERENV(22c.218) 10:10:46:097 LibMain: Process Name: C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe

USERENV(f80.f84) 10:11:43:507 LibMain: Process Name: C:\WINDOWS\system32\NOTEPAD.EXE

Link to comment
Share on other sites

Well, the policy that you said was not working would not be covered by userenv logging as it is a machine policy.

The above seems to be more or less ok. I can see several have worked or been blocked for valid reasons.

Did you look in the registry on the workstation under hkey-currentuser>software>policies and hkey-localmachine>software>policies for any keys created by GPO?

Anything in the application log refering to machine policies?

Link to comment
Share on other sites

I haven't seen anything yet referring to any kind of machine policies. I did go under the registry per your recommendation, and I do see a whole bunch of policies that are listed under there. Something else that I find very strange, and this may be the only part to the mystery... it appears that this computer in particular is only processing half of one of the scripts we have running. I have one script that 1) Displays a welcome message, before actually logging in you get a popup with "disclaimer" text... This box here is the old information that used to be set way back via GPO... It has since been removed from the GPO's, and been handed out in the script. The script also adds a message ABOVE the username / password login box to login to the machine. What's funny is that text is there, but the initial disclaimer text is still the old 1 liner disclaimer text.

We also have a policy that deploys Adobe Reader 8... we have a few machines that for some reason or another, who typically had no other problem applying the policies, aren't getting that policy. I still have yet to hop on those machines and do a rsop logging or anything like that...

Link to comment
Share on other sites

Don't know whther it is this but I'll suggest it anyway, if you set a value using a GPO and then remove the GPO, the value will remain until a new GPO removes or changes the entry(that's how it was with NT4 and I think the same applies under 2000/2003).

Maybe elements of the legal notice were set using the GPO that has since been deleted but the registry values remain?

Link to comment
Share on other sites

Perhaps, because we've seen remnants of the old old GPO still in play. My question though: The new GPO should be overwriting these exact registry entries. I'm sure I can delete the old stuff out of the registry, but why would the script not be applying these changes in the registry updating it with what it should be?

Link to comment
Share on other sites

Perhaps, because we've seen remnants of the old old GPO still in play. My question though: The new GPO should be overwriting these exact registry entries. I'm sure I can delete the old stuff out of the registry, but why would the script not be applying these changes in the registry updating it with what it should be?

Are the policy entries from the new GPO being written to the registry?

Why are you using a script to update the same registry entries, doesn't it make sense to use just GPO's for this?

What are you actually trying to do with the script?

Remember that a login script runs with the users permissions so if you are updating registry entries in HKKEYLM from login script and it is a standard user logging on, they won't have permission.

Link to comment
Share on other sites

Here is the script:

Option Explicit

' Constants
Const HKEY_LOCAL_MACHINE = &amp;H80000002

' Variable Declarations
Dim strComputer
Dim objReg
Dim strKeyPath
Dim strValueName
Dim strValue

' Variable Initialisations
strComputer = "."
Set objReg = GetObject("winmgmts:\\" &amp; strComputer &amp; "\root\default:StdRegProv")
strKeyPath = "SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"

' Construct the LegalNoticeCaption and set the value
strValueName = "LegalNoticeCaption"
strValue = "WARNING!!!"
objReg.SetStringValue HKEY_LOCAL_MACHINE, strKeyPath, strValueName, strValue

' Construct the LegalNoticeText and set the value
strValueName = "LegalNoticeText"
strValue = "This system is the property of the BLAH BLAH BLAH and established for the sole use of authorized users for official business only. You have no expectation of privacy in its use. To protect the system from unauthorized use and to ensure that the system is functioning properly, individuals using this computer system are subject to having all of their activities on this system monitored and recorded. Anyone using this system expressly consents to such monitoring."
strValue = strValue &amp; vbCrLf &amp; vbCrLf
strValue = strValue &amp; "By continuing to use this system you indicate your awareness of and consent to these terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning."
objReg.SetStringValue HKEY_LOCAL_MACHINE, strKeyPath, strValueName, strValue

' Construct the LogonPrompt and set the value
strValueName = "LogonPrompt"
strValue = "Any unauthorized access of this system or unauthorized use of the information				on this system by authorized users or others is prohibited."
objReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue

' Construct the Welcome and set the value
strValueName = "Welcome"
strValue = "													 blah- 1*"
objReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue

' Tidy up and quit
Set objReg = Nothing
WScript.Quit

It sets the Legal Notice Caption, The Legal Notice Text, as well as the Welcome banner, and the LogonPrompt. We are using this script because 1) We can't get the correct spacing that we desire using the GPO, it can only work as a script. 2) I know that some of those options can't be configured through the GPO, they are only registry related entries.

The only thing I see in the registry is that it is set to run the script, it doesn't have the particulars in the registry... only what it changed.

Link to comment
Share on other sites

I think this is proving to difficult to resolve through an internet forum. I've got a feeling that the problem is being caused by a clash between current or older GPO's and the script. Sorry for not being able to find you an answer after all this!

Link to comment
Share on other sites

I still can't give up, I have to find a resolution for this.

As per the clash between other GPO's, we've removed ALL GPO's that have the legal notice and other options specified. There is only one GPO remaining that issues the information, and that GPO is the one that uses the script. If it were a mix between clashing GPO's, wouldn't ALL of the machines suffer the same result, rather than just 2 or 3?

Link to comment
Share on other sites

Let me just see if I'm following you here...

1) Disable the script from running on it's GPO's.

2) Setup a new GPO, that sets the LoginText and make sure nothing can override it?

What about the text that the GPO can't control, like the login box text at the top? I'll provide screen shots tomorrow hopefully.

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.