Hi, There
As I knew, if your admins still get Access Denied editing GPOs after delegation, it’s usually one of these:
- Editing the wrong DC: GPMC writes to the PDC Emulator. In GPMC: Domain > Right-click > Change Domain Controller > select the PDC. From their PC, make sure they can open
\\<PDC>\SYSVOL\<domain>\Policies\{GPO-GUID}. - Missing the right permission level: Give them “Edit settings, delete, modify security” (not just “Edit settings”) on the GPO.
- A hidden Deny ACE: In GPMC (Delegation > Advanced) or ADSI Edit on the GPO object, remove any Deny.
- Central Store vs GPO folder: Editors need Modify on each
Policies\{GUID}folder on the PDC. Central Store doesn’t require write. - Ownership/old GPOs: “Group Policy Creator Owners” only helps for GPOs they create. For existing ones, grant the permission above or take ownership first.
- Default GPOs: Prefer a new GPO for domain/DC settings. If you must edit defaults, ensure the permission level above and no Deny.
- Run as Domain Admin on the PDC
$grp='DOMAIN\GPO-Editors'
Get-GPO -All | % { Set-GPPermissions -Guid $_.Id -TargetName $grp -TargetType Group -PermissionLevel GpoEditDeleteModifySecurity }
But if it still fails
- Try a new test GPO with the same user.
- Check logs: Event Viewer > Microsoft > Windows > GroupPolicy > Operational on the client; DFSR/File Server logs on the PDC.