Dear Team,
Based on the rsop.msc
result you've provided, the GPO named Account_Task
is correctly applying the "Log on as a batch job" right to the ~task
account. When this happens, but the permission still doesn't work, the cause is almost always a conflicting "Deny" policy.
Here is the straight answer for how to fix this:
The most likely problem is that the ~task
account, or a group it belongs to, is being explicitly forbidden this right by the "Deny log on as a batch job" policy, which always overrides the "Allow" policy.
Follow these steps on the problematic server to resolve the issue:
Step 1: Check the "Deny" Policy
- Open the Local Security Policy editor by running
secpol.msc
.
Navigate to Local Policies > User Rights Assignment.
Find and double-click the policy named "Deny log on as a batch job".
Examine the list of users and groups. If you see the ~task
account or a group it is a member of (like Domain Users
or Authenticated Users
), that is the source of your problem.
Step 2: Fix the "Deny" Policy
If you find an entry: The best practice is to not edit the local policy directly. Instead, find which GPO is applying this "Deny" setting.
Run rsop.msc
again, just as you did before.
Look at the "Deny log on as a batch job" policy in the list and check its __Source GPO__.
Edit that GPO in the __Group Policy Management Console__ on your domain controller to remove the conflicting account or group.
Step 3: Force Policy Update and Reboot
After you have removed the conflict from the GPO, run the following commands in an elevated Command Prompt on the problematic server to ensure the changes take effect immediately:
Bash
gpupdate /force
shutdown /r /t 0
A reboot is often necessary for user rights assignments to be fully updated and recognized by the system. After the server reboots, the Task Scheduler will recognize the permission correctly.Based on the rsop.msc
result you've provided, the GPO named Account_Task
is correctly applying the "Log on as a batch job" right to the ~task
account. When this happens, but the permission still doesn't work, the cause is almost always a conflicting "Deny" policy.
Here is the straight answer for how to fix this:
The most likely problem is that the ~task
account, or a group it belongs to, is being explicitly forbidden this right by the "Deny log on as a batch job" policy, which always overrides the "Allow" policy.
Follow these steps on the problematic server to resolve the issue:
Step 1: Check the "Deny" Policy
Open the Local Security Policy editor by running secpol.msc
.
Navigate to Local Policies > User Rights Assignment.
Find and double-click the policy named "Deny log on as a batch job".
Examine the list of users and groups. If you see the ~task
account or a group it is a member of (like Domain Users
or Authenticated Users
), that is the source of your problem.
Step 2: Fix the "Deny" Policy
If you find an entry: The best practice is to not edit the local policy directly. Instead, find which GPO is applying this "Deny" setting.
Run rsop.msc
again, just as you did before.
Look at the "Deny log on as a batch job" policy in the list and check its __Source GPO__.
Edit that GPO in the __Group Policy Management Console__ on your domain controller to remove the conflicting account or group.
Step 3: Force Policy Update and Reboot
After you have removed the conflict from the GPO, run the following commands in an elevated Command Prompt on the problematic server to ensure the changes take effect immediately:
Bash
gpupdate /force
shutdown /r /t 0
A reboot is often necessary for user rights assignments to be fully updated and recognized by the system. After the server reboots, the Task Scheduler will recognize the permission correctly.
Best Regards,