EC said:
Hi Cary,
I'm still trying to get the Loopback working.
Are you really using Loopback? That actually
affect USERS (but based on the location of the
computer they are currently USING -- logged on
from.)
The computer account isn't directly under the PrimaryOU, it's buried about 3
OUs down.
PrimaryOU->LocationOU->ComputersOU->DeptOU->MyComputer
The default domain policy is being applied at th PrimaryOU.
That sounds wrong since the Default Domain policy is normally
linked to the DOMAIN, not to an OU.
At the LocationOU there is a NoGPO Policy which is the loopback.
Huh?
What does NoGPO have to do specifically with "loopback"?
Under the LocationOU I've created a group called NoGPO. The reason for the
security group is I have several computers across multiple departments that
I want to prevent the default domain policy from being applied.
Ok, if that is REALLY what you need.
I've change
the permissions on the NoGPO Policy and added the NoGPO group with
Read/Apply permissions.
Why not just DENY that group (NoGPO) permissions
on all undesired GPOs?
The computer is now showing that it is part of the
NoGPO group however the NoGPO Policy isn't running against the computer.
Any ideas or am I doing this completely wrong????
If you have given that group Read and Apply it should
be applied if it is linked to the Computers container
or parents, baring "block inheritance" and "disable" settings.
Did you allow it to replicate OR are you sure the same
DC is being used for authentication.