หมายเหตุ
การเข้าถึงหน้านี้ต้องได้รับการอนุญาต คุณสามารถลอง ลงชื่อเข้าใช้หรือเปลี่ยนไดเรกทอรีได้
การเข้าถึงหน้านี้ต้องได้รับการอนุญาต คุณสามารถลองเปลี่ยนไดเรกทอรีได้
This article provides a solution to a problem in which you can't apply Group Policy settings to users because of a permissions problem.
Applies to: Windows Server (all supported versions), Windows Client (all supported versions)
Symptoms
After you remove the default permissions for the Authenticated Users group from one or more Group Policy Objects (GPOs), you can't successfully apply Group Policy settings to users.
Cause
When a user signs in to Windows, Windows retrieves the user Group Policy settings that apply to that user. Before security update MS16-072: Security update for Group Policy: June 14, 2016, Windows used the user security context for this operation. This security update changed this functionality so that Windows uses the computer's security context to retrieve user Group Policy settings.
Because of this change, the computer account has to have Read permissions for GPOs that apply to the signed-in user. By default, the Authenticated Users group has Read and Apply group policy permissions for all GPOs in the domain. All the computer accounts in the domain belong to the Authenticated Users group, and they inherit these permissions.
If the default permissions are in place, the Scope tab of the Group Policy Management Console (GPMC) lists Authenticated Users in the Security Filtering section, as shown in the following screenshot.
Additionally, the Delegation tab lists the allowed permission for Authenticated Users as Read (from Security Filtering). This permission corresponds to the Windows permissions, Read and Apply Group Policy.
Some administrators remove Authenticated Users from Security Filtering to improve security or to use more granular security groups for filtering. This action removes both the Read and the Apply group policy permissions from the group and all its members. In order for user GPOs to function correctly, you must restore the Read permission to the computer objects.
Note
This problem usually does not affect users who use domain controllers to sign in to a domain. By default, the built-in Enterprise Domain Controllers group has the Read permission for all GPOs in the domain. Therefore, domain controllers do not rely on the Authenticated Users group for this permission.
Resolution
If you remove the Read (from Security Filtering) permission from Authenticated Users, you have to use an alternative method to assign the Read permission to the computer objects:
Assign Read permission to the Authenticated Users group.
This approach restores the Read permission without restoring the Apply group policy permission.
Assign Read permission to the Domain Computers group.
All the computers in the domain belong to the Domain Computers group in that domain.
Assign Read permission to specific computer objects or to a security group that the computers belong to.
Important
Whenever you modify Group Policy permissions, make sure that user objects, computer objects, or groups to which those objects belong are not explicitly denied access to the GPOs. An explicit denial always overrides a permission that would otherwise allow access.
To resolve the problem, follow these steps:
In GPMC, on the Delegation tab, select Add.
In the Add Group or User dialog box, select the group or object that you want. Then, in the Permissions box, select Read.
Select OK.
After you finish these steps, the Delegation tab lists the allowed permission for the selected object or group as Read instead of Read (from Security Filtering). This difference indicates that the object or group doesn't have the Apply group policy permission.
Example scenario
Consider a GPO that defines only user settings. You want to apply the GPO to specific users who all belong to a group that's named contoso_user_group. In GPMC, on the Scope tab for the GPO, you add contoso_user_group to the Security Filtering list. To limit the GPO to only the users in that group, you remove Authenticated Users from the list.
To test this configuration, you run gpresult /h gpresult.html
on a user's computer, and then open the gpresult.html file to view the policy results. In this scenario, the report indicates an error (listed at the bottom of the following screenshot).
To resolve this error, you have to grant the Read permission to the computer objects that represent the computers that the members of contoso_user_group use to sign in. In this scenario, you could create a group that's named contoso_computer_group, and add the affected computers to that group. Then, by using the procedure from the "Resolution" section, you could use the GPMC Delegation tab to assign the Read permission to that group. After these changes are made, the Delegation tab lists the permissions as shown in the following screenshot.