I was wondering if someone could confirm me if the following GPO behavior is normal/expected:<\/p>\n
Situation: in an organization they have put all users in the default Users container
\n(Active Directory).<\/p>\n
The users have been put in various security groups, according their function.<\/p>\n
They then have created a GPO to map a network drive. They attached the GPO to the root off the domain, but limited the range of the GPO to a specific security group, which does contain some members.<\/p>\n
This seems to work. (Users of the security group get the mapped drive, others don’t).<\/p>\n
I personally prefer putting users in OU’s according their department. When applying a GPO to map a network drive. I would create the GPO, but attach it to the OU of the users and let the GPO apply to all authenticated users.<\/p>\n
This also seems to work.<\/p>\n
But what doesn’t seem to work here is combining both ways described above: put users in an OU, attach a GPO and limit the reach of the GPO to a security containing the same members.<\/p>\n
For example: put all members for marketing in an OU ‘Marketing’, put the same members in a security group called ‘Marketing’. Create a GPO which does map a network drive. Attach the the GPO to the OU ‘Marketing’ and set the reach of the GPO to the security group ‘Marketing’<\/p>\n
Can both ways be combined or is it way 1 or way 2 ?<\/p>","upvoteCount":7,"answerCount":9,"datePublished":"2020-01-23T09:52:50.000Z","author":{"@type":"Person","name":"koendemarest7861","url":"https://community.spiceworks.com/u/koendemarest7861"},"suggestedAnswer":[{"@type":"Answer","text":"
I was wondering if someone could confirm me if the following GPO behavior is normal/expected:<\/p>\n
Situation: in an organization they have put all users in the default Users container
\n(Active Directory).<\/p>\n
The users have been put in various security groups, according their function.<\/p>\n
They then have created a GPO to map a network drive. They attached the GPO to the root off the domain, but limited the range of the GPO to a specific security group, which does contain some members.<\/p>\n
This seems to work. (Users of the security group get the mapped drive, others don’t).<\/p>\n
I personally prefer putting users in OU’s according their department. When applying a GPO to map a network drive. I would create the GPO, but attach it to the OU of the users and let the GPO apply to all authenticated users.<\/p>\n
This also seems to work.<\/p>\n
But what doesn’t seem to work here is combining both ways described above: put users in an OU, attach a GPO and limit the reach of the GPO to a security containing the same members.<\/p>\n
For example: put all members for marketing in an OU ‘Marketing’, put the same members in a security group called ‘Marketing’. Create a GPO which does map a network drive. Attach the the GPO to the OU ‘Marketing’ and set the reach of the GPO to the security group ‘Marketing’<\/p>\n
Can both ways be combined or is it way 1 or way 2 ?<\/p>","upvoteCount":7,"datePublished":"2020-01-23T09:52:50.000Z","url":"https://community.spiceworks.com/t/applying-gpo-to-groups-or-ous/747910/1","author":{"@type":"Person","name":"koendemarest7861","url":"https://community.spiceworks.com/u/koendemarest7861"}},{"@type":"Answer","text":"
Can both ways be combined or is it way 1 or way 2 ?\n<\/code><\/pre>\nboth forms can be used, but when you use them together, both conditions must be valid before the GPO can be applied.<\/p>","upvoteCount":1,"datePublished":"2020-01-23T11:53:45.000Z","url":"https://community.spiceworks.com/t/applying-gpo-to-groups-or-ous/747910/2","author":{"@type":"Person","name":"spiceuser-q49qs","url":"https://community.spiceworks.com/u/spiceuser-q49qs"}},{"@type":"Answer","text":"
For starters, take everybody out of the default containers and build out an OU structure. You can’t directly link GPO’s to the built-in containers so you’re missing out on a lot of flexibility.<\/p>\n
Secondly, applying GPO’s against groups and OU’s are both good options but ultimately I always suggest applying generally to OU’s and then fine-tuning with groups (if necessary).<\/p>","upvoteCount":4,"datePublished":"2020-01-23T12:03:14.000Z","url":"https://community.spiceworks.com/t/applying-gpo-to-groups-or-ous/747910/3","author":{"@type":"Person","name":"dimforest","url":"https://community.spiceworks.com/u/dimforest"}},{"@type":"Answer","text":"
Generally speaking, the preferred method is to apply the GPO’s to OU wherever possible<\/p>\n
However there is always the odd occasion where you need to apply security filtering by Group.<\/p>\n
I would say it’s unusual to apply all GPO’s at root level and only use security groups - have they moved the user accounts out of the default USER’s OU - that may explain the reason, as you can’t apply GPO’s to the default OU’s<\/p>","upvoteCount":0,"datePublished":"2020-01-23T12:17:10.000Z","url":"https://community.spiceworks.com/t/applying-gpo-to-groups-or-ous/747910/4","author":{"@type":"Person","name":"Kenny8416","url":"https://community.spiceworks.com/u/Kenny8416"}},{"@type":"Answer","text":"
Hi<\/p>\n
Usually you link your GPO’s to your OU’s and it’s inherited to Sub-OU’s (you can also break inheritance - but better not)<\/p>\n
Then you have filtering options (WMI) or you can also target gpo to a specific group or even user …<\/p>\n