Default Domain Policy Not Applying Settings to Servers or Clients

I have 2008 R2 DC's with a functioning level of 2003.  Our domain servers are a mix of 2003, 2008, 2008 R2, and 2012 and our clients are a mix of Windows 7 Pro and Windows 8.1 Pro.
I recently made a change to the Default Domain Policy located at Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options
For the Security Policy setting called: Network security: Configure encryption types allowed for Kerberos
The change was to enable DES because of a specific need that I have with an application that I work with but enabling DES and leaving the other options such AES unselected caused other applications to not work right.  I decided to revert the changes
back to "Not Defined" but those changes did not reflect on the servers even after running the gpupdate /force command.
In order to keep the application working that broke, we enabled all of the encryption levels such as DES, AES, etc. on the server that's running the application via it's Local Security Policy as a temporary fix.
Now, I want to make sure all servers receive the settings from the Default Domain Policy and have their Local Security Policies reflect the "Not Defined" setting but it's not applying.  It seems like they worked when I first applied them but
when I try to remove them it does not work.
If I change the setting directly on the Local Security Policy on the server or clients it shows "No minimum" instead of "Not Defined" which I've heard can be fixed by identifying the registry entry for that setting and deleting it...so
help with the location and how to identify that key would also be helpful.
My goal is not to manually have to change servers and clients to revert back to their default settings...I want the Domain policy to apply and override the servers and client's Local Security Policy.
Any help with this would be greatly appreciated and thank you in advance.

I have 2008 R2 DC's with a functioning level of 2003.  Our domain servers are a mix of 2003, 2008, 2008 R2, and 2012 and our clients are a mix of Windows 7 Pro and Windows 8.1 Pro.
I recently made a change to the Default Domain Policy located at Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> Security Options
For the Security Policy setting called: Network security: Configure encryption types allowed for Kerberos
refer:
http://technet.microsoft.com/en-us/library/jj852180(v=ws.10).aspx
We needed to implement a similar scenario a few years ago (when we introduced Windows7 into our estate).
We had an SAP/NetWeaver implementation which always worked on WinXP, but failed on Win7.
We had to enable the DES ciphers, since those were disabled by default in Win7. We discovered that we also needed to enable all the other ciphers (those which are enabled by default[not configured]).
i.e., when we changed the setting from "Not Configured", enabled DES, and left the RC4/AES stuff untouched by us, the RC4/AES stuff attracted a status of disabled.
So, we had to set the DES ciphers to Enabled, and, also set the RC4/AES ciphers to Enabled - this gave us the "resultant" enablement of the default stuff and the needed change/addition of DES.
When you set a GP setting "back to Not Configured", depending upon the setting *AND* the individual Windows feature itself - one of two things will happen:
a) the feature will "revert" to default behaviour
b) the feature will retain the current configured behaviour but becomes un-managed
In classic Group Policy terms, condition (b) above is often referred to as "tattooing", i.e., the last GP setting remains in effect even though GPMC/RSOP/etc does not reveal that to be the case.
(This is also a really good example of not doing this sort of stuff in the DDP. It could have borked your whole domain :)
What I'd suggest, is that you re-enable your ciphers for KRB settings again - this time, enable all the ciphers that would normally be "default", let that replicate around, and allow time for domain members to action it.
Then, set the setting back to Not Configured. This way, the "last" settings issued by GP will be those you want to remain as the "legacy".
Note: the GP settings reference s/sheet, has this to say:
Network security: Configure encryption types allowed for Kerberos
This policy setting allows you to set the encryption types that Kerberos is allowed to use.
If not selected, the encryption type will not be allowed. This setting may affect compatibility with client computers or services and applications. Multiple selections are permitted.
This policy is supported on at least Windows 7 or Windows Server 2008 R2.
Don
(Please take a moment to "Vote as Helpful" and/or "Mark as Answer", where applicable.
This helps the community, keeps the forums tidy, and recognises useful contributions. Thanks!)

Similar Messages

  • Default Domain Policy security settings block inheritance

    I know this has been answered in one way but just to clarify, in our case default domain policy contains password security policies, Network security: LAN Manager authentication level, and some
    Public Key Policies/Trusted Root
    Certification Authorities settings. All of these are on computer settings, user side is disabled and is not Enforced.  
    Question is that if further down AD there is a inheritance filter applied, would all of the settings form Default domain policies would pass through or just security settings?
    I find that they have also linked the default domain policy at OUs where they have put inhetitance filter, probably thinking that they wanted to filter out every other policy but the default domain policy.
    Thanks
    NSW DECC

    Hi,
    >>Question is that if further down AD there is a inheritance filter applied, would all of the settings form Default domain policies would pass through or just security settings?
    The default domain policy will be blocked by enabling block inheritance at OU level. As Ramu suggested, we can enforce the default domain policy to prevent it from being blocked.
    In addition, regarding this question, the following thread can also be referred to for more information.
    Can I block inheritance of "Default Domain Policy"?
    http://social.technet.microsoft.com/Forums/en-US/ce5173b8-b803-4e50-b05b-c4a5677bf9ba/can-i-block-inheritance-of-default-domain-policy?forum=winserverGP
    Best regards,
    Frank Shen

  • How to avoid applying Default domain policy?

    Hello! Hope to get some ideas on the following:
    I have one PC that I DO NOT want to apply default domain policy to. I have created a separate OU in AD with one security group, that contains only that one PC.
    I made sure that pc is a member of only that group and not domain computers or any other groups.
    I have created a separate GPO for this PC and linked in to the domain.
    I am seeing in the gpresult /r  that both the new  GPO is applied to the workstation and the default domain gp as well.
    Default domain policy is designed to be applied to all authenticated users.
    I have create a separate user for that workstation that is not a member  of authenticated users.It is only a member of domain users.
    Ultimately I want default domain policy to be filtered out and the gpo specific to this pc to be applied.
    Any ideas?

    > Default domain policy is designed to be applied to all authenticated users.
    >
    > I have create a separate user for that workstation that is not a member
    > of authenticated users.It is only a member of domain users.
    You cannot exclude any computer or user from being an authenticated user...
    > Ultimately I want default domain policy to be filtered out and the gpo
    > specific to this pc to be applied.
    Then simply block inheritance on the OU this computer lives in, and link
    the specific GPO to that OU.
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • How do I move the policy from Default domain policy to a custom policy.

    I want to implement a new password policy.  In the past we had a fairly loose policy, now I want to implement minimum length and complexity.  I know how to set this up in Computer Config Policies windows settings security settings and account policies
    password policy. However after I set it up I notice that it is not being applied.  I have run gpupdate, and even waited several days but still it's not taking effect.  I have created what im calling a custom gpo calling it "password policy". 
    It is situated under domains/mydomain.com .  There are a number of other policies here.
    When I run gpresult /h c:\temp\gpreport.html  its all a bit confusing. It looks like it being applied but then further down it says under Group policies Applied GPOs Denied GPOs Pssword Policy mydomain.com empty. ??
    But let me ask this first off .
    The previous administrator I think has the password policy set up in the "default domain policy"
    Is it possible that the default domain policy which IS indeed set differently is overriding my custom "password policy"
    If this is so how can I make it so  my custom password policy is applied over the default domain policy.
    Or what other answers could it be.

    Hi,
    Based on your requirement you can create Fine Grained Password Policies.
    This feature introduced in Windows Server 2008 allows you to override password policy set at the Default Domain Policy for specific users or groups.
    Checkout the below link for creating Fine Grained Password Policies from GUI in Windows Server 2012,
    http://blogs.technet.com/b/reference_point/archive/2013/04/12/fine-grained-password-policies-gui-in-windows-server-2012-adac.aspx
    Regards,
    Gopi
    JiJi
    Technologies

  • Default domain policy got corrupted and can't reverse to old system state?

    Initially we had two servers which was 2003 and 2008, after adding additional two more servers (server 2012) in the network and then demoted the old servers. and that was quite while ago. after carefully looking a the default policy I have noticed that there
    so many policies was applied on default policy object which led me to disable them and created a backup for both domain controller and the domain policy.
    now the problem is stupidly run
    dcgpofix  thought it will restore the domain policy to it's original state but it did not instead it came up with an empty default policy template and inside there is no security policy which i can edit. However i did tried to restore the old policy which
    i backed up but i get an access denied error.
    Now i realise that the original default policy was from server 2003 and the current schema domain functional level is 2012.  Currently
    I can not login to any newly added computers to the domain via domain administrator account.
    Please help! Is there any way to create a new default domain policy?

    Hi thanks for your input,
    but that doesn't resolves my issue. However I have managed to fix it by modifying the Default policy systemflags and then run the command gpfixup.exe /ignoreschema /target :domain.com.
    and after that I was able to restore my old gp from earlier backup. 

  • Discrepancy in Default Domain Policy

    Hello, 
    About 6 months ago we migrated from DC's running Windows 2003 R2 to Windows 2012 R2. At that time we raised our domain functional level to "Windows Server 2008 R2"
    I am trying to audit my Group Policy and have found a problem I am unable to explain. I have installed RSAT tools on my local workstation, and I have been using it to view group policy to perform my audit. Everything was going fine until I came across:
    "Default Domain Policy"
    Computer Configuration\Policies\Windows Settings\Security Settings\Public Key Policies\Trusted Root Certification Authorities
    However when I attempted to edit the policy to look at the settings, nothing is there, the certificate is just missing.
    Furthermore, when I look in the Group Policy Management on the DC, It does not even show "Computer Configuration\Policies\Windows Settings\Security Settings\Public Key Policies\TrustedRoot Certification Authorities"
    Can anyone explain to me the following:
    1. Why does my local workstations RSAT tools show settings that are not reflected on the DC?
    2. Why is my RSAT tools showing settings on a certificate the does not exist? Is it because there used to be a cert there when we were using 2k3 domain controllers, and the cert wasn't migrated?
    3. How can I fix this so that my RSAT Group Policy Manager on my Workstations is synched with my Domain Controllers?
    Thank You in advance for any assistance. 
    P.S. I had several pictures setup that made the explanation of all this much easier, but I was not allowed to add them because "Body text cannot contain images or links until we are able to verify your account."  

    I have made some interesting discoveries that I think may help future individuals, if they find this posting. 
    When looking at the picture in my original posting you see that the group policy points to:
    "Computer Configuration\Policies\Windows Settings\Security Settings\Public Key Policies\Trusted
    Root Certification Authorities"
    So you would expect that you would navigate to the same path in the GPME (Group Policy Management Editor)
    but it turns out, that is not the case, to edit these settings you must navigate to the following:
    "Computer Configuration\Policies\Windows Settings\Security Settings\Public Key Policies" and
    double-click on "Certificate Path Validation Settings"
    I discovered this information using this technet article:
    http://technet.microsoft.com/en-us/library/cc754841.aspx
    Under "Managing Trusted Root Certificates for a Domain"
    However this does not resolve my original issue, in that it does not explain the discrepancy between RSAT tools and the DC. 
    Well I have a friend who has almost an identical setup to mine at his company (he is using Server 2012 R1), he checked, and he saw the exact same scenario as I have. 
    I am unsure if this is by design or a bug in GPO. I would assume that if it was a bug that others would have discovered it by now and written about it, can anyone provide any insight?

  • Password policy not applying properly

    I have set password policy for my domain that
    Maximum age: 60days
    Minimum age is: 45days
    but I get messages every week that passwords would expire in 4 days
    I checked using rsop.msc and policy seems to be correctly applied.
    what could be the problem?

    > Maximum age: 60days
    > but I get messages every week that passwords would expire in 4 days
    If your GPO is applied correctly, this simply means that the last
    password change was 56 days ago.
    > I checked using rsop.msc and policy seems to be correctly applied.
    On the client? Your user is not a local user on the client, but most
    probably a domain user. So you need to check RSoP.msc on the PDC
    emulator, not on the client.
    > what could be the problem?
    You forgot to link your password policy to the domain, and after doing
    so, make sure you move it upwards above the existing "default domain
    policy". In the security filter, add at least "Domain Controllers" -
    better leave "Authenticated Users". And finally, do not block
    inheritance on the "domain controllers" OU.
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • Windows 2003 Password Policy Ignored in Default Domain Policy

    Hi there I've a problem on my DC.
    i set in the "default domain policy" the settings form the policy password lenght complexity etc etc..
    When i RUN Group policy modelling simulation i cannot view the settings of Windows Settings\Security Settings\account policy\password policy
    the scope of the GPO is Authenticated
    the GPO seems to be ignored for the security settings but not for the other parameters like kerberos security.
    Any Idea to solve this issue?

    Hi Federico,
    >>i cannot view the settings of Windows Settings\Security Settings\account policy\password policy
    What do this mean? Does this mean that we can’t see the password policy in the modeling, or that we can’t see the change we made to the password policy? Besides, were there
    error messages displayed in the modeling?
    In addition, we can try running the Group Policy Modeling Wizard again to see if the issue persist.
    Best regards,
    Frank Shen

  • Block Inheritance and Default Domain Policy

       Hello to all, I will run a cross-forest migration and target forest has a Default Domain Policy. Target domain is Windows 2003 Functional Level, but has almost all DCs on Windows 2008. As first level OUs represents country codes (USA, GBR, FRA,
    etc) and a new country will be created I want to block GPOs from Domain level. The task itself is very easy, just configure "Block Inheritance" on the new country OU. Important: Default Domain Policy is >> not set << to "Enforce"
    on target domain.
       Question: the security configurations (account, password, local policies) from Default Domain Policy will be blocked? If yes, how domain users below this new country OU will have basic configurations for them (password complexity, password length,
    certificates, etc) ?
       Regards, EEOC.

       Question: the security configurations (account, password, local policies) from Default Domain Policy will be blocked? If yes, how domain users below this new country OU will have basic configurations for them (password complexity, password length,
    certificates, etc) ?
    The Domain security policy for passwords etc, is domain-wide, and cannot be blocked.
    It applies to, and is controlled by, the Domain Controllers.
    Don
    (Please take a moment to "Vote as Helpful" and/or "Mark as Answer", where applicable.
    This helps the community, keeps the forums tidy, and recognises useful contributions. Thanks!)

  • Missing Default Domain policy

    Hi Experts,
    i have strange issue, users are unable get the policy applied after investigating found out that the default domain policy is missing on dcs in one site, i have checked further for any events relation to journal wrapping to no avail,  client pcs recwiving
    this error below:
    The processing of Group Policy failed. Windows attempted to read the file \\mydomain\SysVol\my
    domain.local\Policies\
    strange thing is that the replication is working, but only the sysvol replication not working, can someone please advice
    OS: Windows 2012 R2

    > The processing of Group Policy failed. Windows attempted to read the
    > file \\mydomain\SysVol\my
    > domain.local\Policies\
    Replication via DFSR or FRS? Check both eventlogs then follow the action
    in the events :)
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • Confused with default domain policy

    Hello I have a screensaver timeout policy that is enabled on the Default domain policy. It has a very short time value so that administrators lock out quickly
    however for general users in a different OU I created a new policy and enforced it which sets the timeout to be a bit longer.
    but for some reason the winning GPO is always the default domain policy. I looked at the default domain policy and it is not enforced so I am slightly confused why my enforced GPO lower down does not win .
    any idea?

    > but still I don't know what I can do to get it to apply the timeout
    > value overriding the default domain policy timeout value.
    First read through the links I provided.
    Then either link your "override" GPO to the computer OU and give domain
    computers read access, or disable loopback, or choose a totally
    different approach without using loopback:
    http://evilgpo.blogspot.de/2012/03/how-to-save-my-screen.html
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • Default domain policy

    default domain policy will be applied to all OU's by default? or it needs to linked to each OU's

    default domain policy will be applied to all OU's by default? or it needs to linked to each OU's
    Yes to all. Let 'Default Domain Policy' be for password policy and account policies. If you REALLY want to apply specific GPO to the whole domain, create
    New policy and link it to the domain, but do not append it to the default domain policy unless you are good in documenting them.
    Mahdi Tehrani   |  
      |  
    www.mahditehrani.ir
    Please click on Propose As Answer or to mark this post as
    and helpful for other people.
    This posting is provided AS-IS with no warranties, and confers no rights.
    How to query members of 'Local Administrators' group in all computers?

  • Windows 8 and Default Domain Policy modification issue

    Hi,
    I'm unable to edit the default domain policy from my new Windows 8 desktop.  It's the only Win8 in the environment so I'm not able to easily test another one unfortunately.  The error I receive is:
    Group Policy Error
    Failed to open the Group Policy Object.  You might not have the appropriate rights.
    Details: The volume for a file has been externally altered so that the opened file is no longer valid.
    I have checked from a Win7 and a 2003 machine and can access and edit the GPO without issue using the same account.  The Win8 desktop is a fresh install with the RSAT tools installed, Exchange 2010 tools and a few basic applicaitons (non of which stick
    out as having anything to do with AD management).
    It only occurs if I click edit on the GPO.  I'm able to successfully view the policy and edit the permissions etc.  Have rebooted and the machine is current with patches as of now.
    thanks
    Andy
    Cheers Andy

    Hi,
    According to your description, the issue only occurred when you click to edit the GPO. And only occurred on Windows 8. I would like suggest you to follow below suggestions to narrow down the issue:
    1. Check out whether the issue only occurred to Default domain policy object.
    2. Test on another new installed Windows 8 client with only RSAT installed.
    3. Create another new account and add it to domain admin group to test again.
    4. Run dcdiag on DCs to check out whether the replications work fine.
    Hope this helps.
    Regards,
    Yan Li
    If you have any feedback on our support, please click
    here
    Cataleya Li
    TechNet Community Support

  • Gpupdate wont update because of Default Domain Policy

    Hi Technet Community
    I have just tried to do a gpupdate /force in the Command Prompt, but it has thrown an error up at me. Screenshot below :
    I have gone into Group Policy Management and tracked the UID (which is displayed above starting with 31B2F340...) to be the same as the Default Domain Policy. Usually, I would do whatever I need to with Group Policy to get it working again, but I don't know
    how to change this policy about, or whether I can delete the current one and recreate it?
    Could anyone let me know what I can do to resolve this.
    A restart does not resolve this issue, and if I leave the domain and re-join it, it still doesn't resolve it.
    I'll try installing SP1 and see if it works, but no other Windows 7, 8 or 8.1 client computers seem to work either, with exactly the same error.
    All users can still log in.
    Thanks
    Ed

    Hi Technet Community
    I have just tried to do a gpupdate /force in the Command Prompt, but it has thrown an error up at me. Screenshot below :
    I have gone into Group Policy Management and tracked the UID (which is displayed above starting with 31B2F340...) to be the same as the Default Domain Policy. Usually, I would do whatever I need to with Group Policy to get it working again, but I don't know
    how to change this policy about, or whether I can delete the current one and recreate it?
    Could anyone let me know what I can do to resolve this.
    A restart does not resolve this issue, and if I leave the domain and re-join it, it still doesn't resolve it.
    I'll try installing SP1 and see if it works, but no other Windows 7, 8 or 8.1 client computers seem to work either, with exactly the same error.
    All users can still log in.
    Thanks
    Ed

  • Broken Default Domain Policy! GPOFIX Doesn't work

    Justin1250 wrote:
    So I noticed that command prompt is open in the users directory.
    Did you right click on the command window and run as administrator?
    It should run from the system directory as an admin.Yes I did. I just made sure again to run it as admin. Same result.

    I've spent hours and hours trying to fix this but can't. I seem to have located the problem where the default domain policy has lost is child associated with the GUID in AD/Registry. None of the tools seem to work, and I can't delete and recreate it because it thinks it doesn't exist and because Microsoft has engineered it to not be removable. This would be fine if it wasn't corrupted. I've read on some forums that the in-ability to delete a policy object is due to permissions issues. However, that isn't the issue in my case.I've tried THISwhich didn't work.I recently did a test migration to 2012 from 2003, and was hoping when I migrated the data that the GPO wouldn't transfer it's corrupted data, but I was wrong :-/The pictures below should illustrate more detail than I could describe.GPOFIX ToolActive Directory showing that the GUID...
    This topic first appeared in the Spiceworks Community

Maybe you are looking for