GPP item-level targeting filter not working as expected

I am trying to set the Internet Explorer homepage via user Group Policy Preferences (GPP) registry setting for a very specific group of users.  I am using item-level targeting to accomplish this but am having trouble getting the logic working as expected.
Here is my item-level targeting filter:
The user is a member of the security group CONTOSO\FireRescueDept
AND this collection is false
     The user is a member of the security group CONTOSO\EmergencyManagementDept
     OR the user is a member of the security group CONTOSO\PublicSafetyDivision
The user in question is a member of both CONTOSO\FireRescueDept and CONTOSO\EmergencyManagementDept.  I believe this means that this particular registry GPP setting should NOT apply to the user in question and that is the outcome I desire.
Here is how I'm thinking about it:
The user is a member of CONTOSO\EmergencyManagementDept; therefore, "The user is a member of the security group CONTOSO\EmergencyManagementDept" evaluates to TRUE.
Since the other item in the collection is connected with the boolean OR operator, the collection evaluates to TRUE regardless of the evaluation of "The user is a member of the security group CONTOSO\PublicSafetyDivision."
The item-level targeting filter is looking for the collection to evaluate to FALSE.  Since the collection has evaluated to TRUE, the evaluation "This collection is false" is FALSE.
Because of the AND operator in front of "This collection is false", both "The user is a member of the security group CONTOSO\FireRescueDept" and "This collection is false" must evaluate to TRUE in order for the item-level targeting
filter to determine that the user in question to apply the GPP setting the filter is attached to.  However, since "This collection is false" has already evaluated to FALSE, the filter as a whole should evaluate to FALSE and this GPP setting
should not apply.
However, according to gpresult it does apply.
Please advise.  I want this particular setting to apply to users in the CONTOSO\FireRescueDept group unless they are a member of CONTOSO\EmergencyManagementDept and/or CONTOSO\PublicSafetyDivision.

Am 21.05.2013 16:22, schrieb Scott W. Sander:
> Does item-level targeting not work with Universal security groups
> because the group policy client isn't able to determine that the user
> is a member of groups of that type?
In my experience, it DOES work with universal groups... Are you
suffering from token bloat? How many groups is the user a member of?
http://blogs.technet.com/b/shanecothran/archive/2010/07/16/maxtokensize-and-kerberos-token-bloat.aspx
NO THEY ARE NOT EVIL, if you know what you are doing:
Good or bad GPOs?
Wenn meine Antwort hilfreich war, freue ich mich über eine Bewertung! If my answer was helpful, I'm glad about a rating!

Similar Messages

  • GPP: Item Level Targeting - How are collections evaluated?

    We are looking at optimizing a new VDI environment and are overhauling are GPOs which will be applied to those machines.  Using a third party product, we're moving some of the user based settings into its management stack. 
    There are additional debates over whether or not we should create separate OUs for some geographical scenarios so that we can apply two different GPOs with only one setting difference...  location.  My feeling is that we should use a standard naming
    convention on east vs west and use a single GPO with a computer name ILT to apply the east/west setting.  
    I can't seem to find anything with regards to how ILT collections are evaluated and what impact they may have on the system.  Does ILT use WMI to evaluate the name or some other method?
    Thanks

    Hi,
    Regarding the questions about Item-Level Targeting, Martin has already given a great explanation. Besides, for ILT, the following article can also be referred to for more information.
    Preference Item-Level Targeting
    http://msdn.microsoft.com/en-us/library/cc733022.aspx
    >>I recall some issue where you can't use AGPM delegated permissions to manage site based policies? 
    AGPM is a advanced tool for group policy management and it's part of MDOP. Although it's related to group policy, Microsoft has a dedicated forum for AGPM questions. In order to get better assistance, we can ask for advice regarding AGPM
    in that forum.
    Microsoft Advanced Group Policy Management
    https://social.technet.microsoft.com/Forums/windows/en-US/home?forum=mdopagpm
    TechNet Subscriber Support
    If you are TechNet Subscription user and have any feedback on our support quality, please send your feedback here.
    Best regards,
    Frank Shen

  • PR Item Level Release WF not working after Release Strategy change

    Hi Experts,
               I did PR item Level Release Standard Work flow and it was working fine now due to client requirement we changed the release strategy and now when the PR workflow triggers it gives the Below mentioned error.
    I really don't understand y after changing the release strategy workflow is not working and giving the following error.
    Even if i restart the workflow in SWPR the same error is occuring.
    Exception occurred    - Error when starting work item 000000390118
    PROCESS_NODE     - Error when processing node '0000000003' (ParForEach index 000000)
    CREATE                   -  Error when creating a component of type 'Step'
    CREATE_VIA_WFM  -  Agent determination for step '0000000003' failed
    EVALUATE_AGENT_VIA_RULE - Error in resolution of rule 'AC00000148' for step '0000000003'
    AC00000148             -  Object type 'TS' not valid
    Executing flow work item   - Work item 000000390118: Object FLOWITEM method EXECUTE cannot        be executed
    Executing flow work item   - Error when processing node '0000000003' (ParForEach index 000000)
    Regards,
    Hari

    Hello Hari,
    please set a breakpoint at function module
    ME_REL_GET_RESPONSIBLE
    and see what happends in section
        CASE t16fc-frgwf.
    * keine Ermittlung
          WHEN space.
            RAISE nobody_found.
    * Ermittlung über T16fW
          WHEN '1'.
    If using the T16FW-table, it should go to '1', otherwise it may that a user exit under '9' is used. So please check this.
    Best wishes,
    Florin

  • SRM 7.0 SP05 - BRF Item level approval does not work

    Hi Experts,
    I am working on process controlled workflow for shopping cart approval process.  I have defined necessary process levels and workflow works fine for a single item SC.
    I have selected decision type as "Item-based approval for partial document" for each process level and hence expect each line item (according the start condition) should have it's own set off approvers, but instead of this, system determines approvers at header level and hence item which does not really need approval undergoes approval as well.
    Could you please help me to resolve the issue?
    Thanks in advance.
    Best Regards,
    Amit

    Hi Bharat,
    Yes, we are using the copy of the standard implementation. We are looking into the BADI implementation and trying to assign a separate AREA GUID to each line item. Hopefully, when different aggents are assigned to these AREA GUIDs, it will enable the item level approval. I will keep you updated.
    Meanwhile, it would be really helpful if you could share some sample code of such badi implementation which can help me to understand it more clearly.
    Thanks & Regards,
    Amit

  • Item Level Permission does not work as designed

    Here is the problem. 
    We have a site with a site members group with created permission level called vnContributor that differs from contributor in that they cannot edit delete items or versions, or create alerts. 
    We have a site owners group who have a custom permission level called vnOwner that allows them to add, edit, delete, view, and open items and view versions.  They do not have "Manage Lists" 
    The list permission settings were set to view everyone and edit everyone.  In this setting, however members could not see or edit anything, and owners could see and edit everything, regardless of whether it was theirs or not. 
    So I changed the list permissions level to edit only their own and changed the members to the OOTB contributor permission level.  I then opened the calendar and added a new item as a user in the members  group.
    There was no change.  Members still could not edit their items.  Owners could see and edit everyone's items.
    This is not how this is advertised to work. 
    ERJ MCSD MCDBA

    On June 11, 2008 Rachel.lane entered the following request
    "I would like to hide/show the edit button on a list item's edit form based on whether the user is the item's creator.  The reason I want to do this is because SharePoint's out-of-the-box behaviour is such that when a user edits someone
    else's item, the Access Denied page pops up AFTER the user makes his/her edits and presses ok.
    " My users want the edit button to be hidden so they don't have to go through the steps of making the edits, press ok, and then find out their access is denied."
    My users want the same thing. 
    Alex Santos1 said that "One approach is to give each list item it's own permission- giving the owner (creator) full access while giving everyone else read access."
    However everything I seen about giving item level permission seems to utilize the method I've already been doing which does not hide the Edit button.  Does anyone know how to pull off what he was suggesting?
    ERJ MCSD MCDBA

  • CS6 Offset filter not working as expected

    I've been using the offset filter for years to create seamless patterns with predictable results - I choose "Wrap around" and when I enter the distance the parts of the image that go off one side show up on the opposite side.
    Now, with CS6, sometimes it works as expected and sometimes parts of the image go missing when (if) it shows up on the other side.
    I've discovered that when this happens if I go to Image - reveal all that often times those lost pixels are outside of the viewable canvas. However, sometimes reveal all doesn't show anything new and the pixels have just been lost.
    I know there are not extra pixels outside the canvas are before I run the filter so I don't understand how this is happening.
    Does anyone know what's going on and how to prevent this from happening?
    The only solution I have found is to select all and crop the image between every offset. Sometimes I'm offsetting 20-30 layers in a row (becaue you can't apply a filter to multiple layers at once, so annoying). Otherwise, if I'm not careful after I've offset everything I go to check the pattern and realize i lost parts of my image.
    Thank you

    I'm having the exact same problem with my offset filter. Have you found a solution yet?
    Edit: I have figured it out.
    The problem is that the layer your are applying the offset filter to has white/transparent pixels that extend beyond the document size. What you have to do is "select all" and crop the image to the size of the document and make sure to "delete cropped pixels" as Noel said.
    The filter IS working correctly, however it's wrapping empty pixels, not what we expected.

  • Print history filter not working as expected

    We have four HP LaserJet 400 M401dn printers which are used soley for ePrinting, within my organisation. This afternoon we noticed that emails generated by the cloud-hosted web application to which we subscribe, and sent to one of the four printers, were not printed. There are no signs of the emails within the print history i.e. HP Connected > Collections>| PRINTING.
    In attempting to troubleshoot this, I manually sent an email to the printer, which printed out normally. However I noticed that the manual printout's print history entry is only visible in print history when the unfiltered 'All Printers' top-right dropdown is set. If I click the dropdown and set it to the printer email address to which I sent the message (and subsequently printed it), the print history is completely empty - no entries at all.
    I suspect the original problem with printing from the web app is a transient one as I noticed the HP Connected message "We are currently offline for maintenance. Sorry for the inconvenience. Please check back soon." this morning, but I thought I'd point out the print history problem since I guess it may be a bug?
    I'd be interested to know if other users have encountered this. The print history filter is extremely useful, but obviously it needs to work properly. 

    Untitled_Doc,
    I am glad to help. Some printers are classified as business printers and others are classified as home use printers. I shared the link above to get to it, if you have any further issues and want to post again at a later date.
    Thank you for using the HP forums.
    ↙-----------How do I give Kudos?| How do I mark a post as Solved? ----------------↓

  • Drive Map GPO and Item-Level targeting using DNS Computer Name not working as expected

    I've run into a snag trying to move from logon script based drive mappings, to a GPO based Drive map solution and I'm hoping somebody can shed some light on the problem that I am seeing.  We started down the GPO based drive mappings because we have
    a handful of Windows 8 client computers which don't run the logon script based drive mappings.
    I put together a basic Drive Maps GPO.   I'm mapping 3 drives, I've linked the GPO to a computer container OU for testing and everything is working just fine.  I have 3 different Windows 8 client PC, all domain joined, and all 3 run the GPO as
    expected.
    The problem is when I attempt to apply Item-level targeting.   I've found that if I define item-level targeting to use the NetBIOS name of the computer, I can either apply the GPO at an individual computer level, or I can exclude the GPO for that individual
    computer by toggling between IS and IS NOT.   However, when I choose to define the computer name by choosing the DNS option, the GPO does not apply as expected.
    So, if I say "the DNS computer name is example1.mydomain.com" and I apply the GPO, it applies to example1, example2 and example3.   And if I instead say, "the DNS computer name is not example1.mydomain.com", then it doesn't apply
    to example1, example2 or example3.     Obviously, I would expect it to apply or not apply only to example1.mydomain.com.
    If instead, I say "the NetBIOS computer name is example1", and apply the GPO, then example1 gets it, and example2 and example3 do not.   If I say, "the netBIOS name is not example 1", then example1 does NOT get the drive mapping,
    but example 2 and example3 do.   < This is exactly what I want and I can continue to just use NetBIOS names...but I don't understand why DNS isn't working in the same manner.
    My clients are all using DHCP and using domain controllers for DNS.   All 3 machines are in the mydomain.com namespace.  The mydomain.com namespace is an active directory integrated zone.   We have reverse zones in place for the dns records.
     I can ping the machines from the DC's as well as the machines themselves.  I can run nslookup and resolve the computer name for each host using the FQDN.  I can also run a ping -a IP_ADDY and get the FQDN back.  The DC's themselves are
    running Server 2008 R2.   I honestly don't see any issues from a name resolution standpoint on the network itself.   
    So, any suggestions as to why defining the shortened NetBIOS name works just fine, but using DNS with a FQDN does not?   (I've tried the DNS name using just the name, the name., as well as name.mydomain.com and name.mydomain.com.)

    And here is the result from a Windows 7 host,  which is named d2-7-user1...thus it should map the T drive and in fact does;
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] Entering ProcessGroupPolicyExDrives()
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] SOFTWARE\Policies\Microsoft\Windows\Group Policy\{5794DAFD-BE60-433f-88A2-1A31939AC01F}
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] BackgroundPriorityLevel ( 0 )
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] DisableRSoP ( 0 )
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] LogLevel ( 3 )
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] Command subsystem initialized. [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] User impersonation initialized.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Client context subsystem initialized.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Configuration subsystem initialized.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Licensing subsystem initialized.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] User information initialized.
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %ComSpec% = "C:\Windows\system32\cmd.exe"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %FP_NO_HOST_CHECK% = "NO"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %OS% = "Windows_NT"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %Path% = "C:\Program Files (x86)\VMware\VMware vSphere CLI\Perl\site\bin;C:\Program Files (x86)\VMware\VMware vSphere CLI\Perl\bin;C:\Program Files (x86)\Intel\iCLS Client\;C:\Program Files\Intel\iCLS
    Client\;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files (x86)\Intel\OpenCL SDK\2.0\bin\x86;C:\Program Files (x86)\Intel\OpenCL SDK\2.0\bin\x64;C:\Program Files\Intel\Intel(R) Management Engine
    Components\DAL;C:\Program Files\Intel\Intel(R) Management Engine Components\IPT;C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL;C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %PATHEXT% = ".COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %PROCESSOR_ARCHITECTURE% = "AMD64"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %TEMP% = "C:\Users\user1\AppData\Local\Temp"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %TMP% = "C:\Users\user1\AppData\Local\Temp"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %USERNAME% = "user1"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %windir% = "C:\Windows"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %PSModulePath% = "C:\Windows\system32\WindowsPowerShell\v1.0\Modules\"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %NUMBER_OF_PROCESSORS% = "8"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %PROCESSOR_LEVEL% = "6"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %PROCESSOR_IDENTIFIER% = "Intel64 Family 6 Model 58 Stepping 9, GenuineIntel"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %PROCESSOR_REVISION% = "3a09"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %windows_tracing_logfile% = "C:\BVTBin\Tests\installpackage\csilogfile.log"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %windows_tracing_flags% = "3"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %ALLUSERSPROFILE% = "C:\ProgramData"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %APPDATA% = "C:\Users\user1\AppData\Roaming"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %CommonProgramFiles% = "C:\Program Files\Common Files"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %CommonProgramFiles(x86)% = "C:\Program Files (x86)\Common Files"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %CommonProgramW6432% = "C:\Program Files\Common Files"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %COMPUTERNAME% = "D2-7-user1"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %HOMEDRIVE% = "C:"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %HOMEPATH% = "\Users\user1"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %LOCALAPPDATA% = "C:\Users\user1\AppData\Local"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %LOGONSERVER% = "\\VM-EXAMPLE-DC05"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %ProgramData% = "C:\ProgramData"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %ProgramFiles% = "C:\Program Files"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %ProgramFiles(x86)% = "C:\Program Files (x86)"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %ProgramW6432% = "C:\Program Files"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %PUBLIC% = "C:\Users\Public"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %SystemDrive% = "C:"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %SystemRoot% = "C:\Windows"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %USERDNSDOMAIN% = "mydomain.com.au"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %USERDOMAIN% = "mydomain"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %USERPROFILE% = "C:\Users\user1"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %LogonUser% = "user1"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %LogonDomain% = "mydomain"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %LogonUserSid% = "S-1-5-21-976655598-962914793-294660928-7222"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %BinaryUserSid% = "00001C3611902B403964E9E93A3694EE000000150500000000000501"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %LdapUserSid% = "\01\05\00\00\00\00\00\05\15\00\00\00\EE\94\36\3A\E9\E9\64\39\40\2B\90\11\36\1C\00\00"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %ReversedUserSid% = "010500000000000515000000EE94363AE9E96439402B9011361C0000"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %BinaryComputerSid% = "000040EC11902B403964E9E93A3694EE000000150500000000000501"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %ReversedComputerSid% = "010500000000000515000000EE94363AE9E96439402B9011EC400000"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %LdapComputerSid% = "\01\05\00\00\00\00\00\05\15\00\00\00\EE\94\36\3A\E9\E9\64\39\40\2B\90\11\EC\40\00\00"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %OsVersion% = "Windows 7"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %LocalTimeEx% = "2013-04-19 15:34:43.706"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %LocalTime% = "2013-04-19 15:34:43"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %LocalTimeXmlEx% = "2013-04-19T15:34:43.706"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %LocalTimeXml% = "2013-04-19T15:34:43"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %DateTimeEx% = "2013-04-19 19:34:43.706"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %DateTime% = "2013-04-19 19:34:43"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %MacAddress% = "cc-f7-20-52-41-53"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %TempDir% = "C:\Users\user1\AppData\Local\Temp"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %WindowsDir% = "C:\Windows"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %SystemDir% = "C:\Windows\system32"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %DomainName% = "mydomain"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %ProgramFilesDir% = "C:\Program Files"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %AppDataDir% = "C:\Users\user1\AppData\Roaming"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %DesktopDir% = "C:\Users\user1\Desktop"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %StartMenuDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\Start Menu"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %ProgramsDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %StartUpDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %FavoritesDir% = "C:\Users\user1\Favorites"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %SendToDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\SendTo"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %RecentDocumentsDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\Recent"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %NetPlacesDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\Network Shortcuts"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonAppdataDir% = "C:\ProgramData"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonDesktopDir% = "C:\Users\Public\Desktop"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonStartMenuDir% = "C:\ProgramData\Microsoft\Windows\Start Menu"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonProgramsDir% = "C:\ProgramData\Microsoft\Windows\Start Menu\Programs"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonStartUpDir% = "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonFavoritesDir% = "C:\Users\user1\Favorites"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %CurrentProcessId% = "992"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %CurrentThreadId% = "4620"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %GroupPolicyVersion% = "6.1.7601.17514"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %TraceFile% = "C:\ProgramData\GroupPolicy\Preference\Trace\User.log"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %LastError% = "0x00000000"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %LastErrorText% = "The operation completed successfully."
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variables subsystem initialized.
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] ----- Parameters
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c] CSE GUID : {5794DAFD-BE60-433f-88A2-1A31939AC01F}
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c] Flags : (   ) GPO_INFO_FLAG_MACHINE - Apply machine policy rather than user policy
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_BACKGROUND - Background refresh of policy (ok to do slow stuff)
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_SLOWLINK - Policy is being applied across a slow link
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_VERBOSE - Verbose output to the eventlog
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_NOCHANGES - No changes were detected to the Group Policy Objects
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_LINKTRANSITION - A change in link speed was detected between previous policy application and current policy application
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_LOGRSOP_TRANSITION - A change in RSoP logging was detected between the application of the previous policy and the application of the
    current policy.
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_FORCED_REFRESH - Forced Refresh is being applied. redo policies.
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_SAFEMODE_BOOT - windows safe mode boot flag
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_ASYNC_FOREGROUND - Asynchronous foreground refresh of policy
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] Token (computer or user SID): S-1-5-21-976655598-962914793-294660928-7222
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] Abort Flag : Yes (0x02b54a60)
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] HKey Root : Yes (0x0000163c)
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] Deleted GPO List : No
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] Changed GPO List : Yes
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] Asynchronous Processing : Yes
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Status Callback : Yes (0xfae525b0)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] WMI namespace : Yes (0x03c96fa0)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] RSoP Status : Yes (0x057ae838)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Planning Mode Site : (none)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Computer Target : No (0x00000000)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] User Target : No (0x00000000)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Calculated session relevance.
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Completed CSE pre-processing.
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Calculated list relevance. [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Deleted GPO list is not relevant to the CSE.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Calculated list relevance.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Planning mode not detected.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Processing changed list.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Processing user policy.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Got WMI namespace for logging mode.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Completed get GPO list.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Initialized internal RSoP storage.
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] Completed GPO list pre-processing.
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] ----- Changed - 0
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] Options : (   ) GPO_FLAG_DISABLE - This GPO is disabled.
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c]           (   ) GPO_FLAG_FORCE - Do not override the settings in this GPO with settings in a subsequent GPO.
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] Options (raw) : 0x00000000
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] Version : 10354846 (0x009e009e)
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] GPC : LDAP://CN=User,cn={14209C3C-8E16-4247-95C6-925260D86074},cn=policies,cn=system,DC=mydomain,DC=com,DC=au
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] GPT :
    \\mydomain.com.au\SysVol\mydomain.com.au\Policies\{14209C3C-8E16-4247-95C6-925260D86074}\User
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c] GPO Display Name : US Drive Mapping
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c] GPO Name : {14209C3C-8E16-4247-95C6-925260D86074}
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c] GPO Link : (   ) GPLinkUnknown - No link information is available.
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c]            (   ) GPLinkMachine - The GPO is linked to a computer (local or remote).
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c]            (   ) GPLinkSite - The GPO is linked to a site.
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c]            (   ) GPLinkDomain - The GPO is linked to a domain.
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c]            ( X ) GPLinkOrganizationalUnit - The GPO is linked to an organizational unit.
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c]            (   ) GP Link Error
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c] lParam : 0x00000000
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Prev GPO : No
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Next GPO : No
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Extensions : [{00000000-0000-0000-0000-000000000000}{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}][{5794DAFD-BE60-433F-88A2-1A31939AC01F}{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}]
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] lParam2 : 0x02a92248
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Link : LDAP://OU=Windows8 Machines,OU=USA,DC=mydomain,DC=com,DC=au
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Variable %GPHPATH% = "C:\ProgramData\Microsoft\Group Policy\History\{14209C3C-8E16-4247-95C6-925260D86074}\S-1-5-21-976655598-962914793-294660928-7222"
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Completed get GPH path.
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Completed set extensions.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed get GPO is relevant.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Variable %GPTPATH% = "\\mydomain.com.au\SysVol\mydomain.com.au\Policies\{14209C3C-8E16-4247-95C6-925260D86074}\User"
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed get GPT path.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed RSoP init.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed get next GPO.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed check GPO license usage.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed GPO pre-processing.
    2013-04-19 15:34:43.971 [pid=0x3e0,tid=0x120c] Started removing policy.
    2013-04-19 15:34:43.971 [pid=0x3e0,tid=0x120c] Read GPH data file.
    2013-04-19 15:34:43.971 [pid=0x3e0,tid=0x120c] Completed parse of GPH XML.
    2013-04-19 15:34:43.971 [pid=0x3e0,tid=0x120c] Completed get tree root.
    2013-04-19 15:34:43.971 [pid=0x3e0,tid=0x120c] Deleted GPH data file.
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Started package execution.
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Set package timestamp variable (2013-04-19 19:34:43).
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Starting class <Drives>.
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Starting class <Drive> - G:.
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.003 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] EVENT : The user 'G:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object was successfully removed.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] Completed class <Drive> - G:.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.049 [pid=0x3e0,tid=0x120c] Starting class <Drive> - M:.
    2013-04-19 15:34:44.049 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.049 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.096 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.096 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.096 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.096 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] EVENT : The user 'M:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object was successfully removed.
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] Completed class <Drive> - M:.
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] Starting class <Drive> - H:.
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.143 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.143 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.143 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.143 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.143 [pid=0x3e0,tid=0x120c] EVENT : The user 'H:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object was successfully removed.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Completed class <Drive> - H:.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Starting class <Drive> - T:.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Policy is not flagged for removal.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Completed class <Drive> - T:.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Completed class <Drives>.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Completed package execution.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Completed execution of removal package.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Completed remove GPH.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Started applying policy.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Opened file.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Got file size.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Created file buffer.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Completed read file data.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Terminated file buffer.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Closed file handle.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Read GPE XML data file (1807 bytes total).
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Completed parse of GPE XML data.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Completed loading of package.
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] Completed get tree root.
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] Started package execution.
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] Set package timestamp variable (2013-04-19 19:34:43).
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] Starting class <Drives>.
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.221 [pid=0x3e0,tid=0x120c] Starting class <Drive> - G:.
    2013-04-19 15:34:44.221 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.221 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.283 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.283 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.283 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.283 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] EVENT : The user 'G:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object applied successfully.
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] Completed class <Drive> - G:.
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] Starting class <Drive> - M:.
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.314 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] EVENT : The user 'M:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object applied successfully.
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] Completed class <Drive> - M:.
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Starting class <Drive> - H:.
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Starting filter [AND NOT FilterComputer].
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Passed filter [FilterComputer].
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Filters passed.
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.377 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.377 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.377 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.377 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] EVENT : The user 'H:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object applied successfully.
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] Completed class <Drive> - H:.
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] Starting class <Drive> - T:.
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] Starting filter [AND NOT FilterComputer].
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.408 [pid=0x3e0,tid=0x120c] Passed filter [FilterComputer].
    2013-04-19 15:34:44.408 [pid=0x3e0,tid=0x120c] Filters passed.
    2013-04-19 15:34:44.408 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.408 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.548 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.548 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.548 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.548 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.548 [pid=0x3e0,tid=0x120c] EVENT : The user 'T:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object applied successfully.
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Completed class <Drive> - T:.
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Completed class <Drives>.
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Completed package execution.
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Completed execution of apply package.
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Update GPH : apmCreateFoldersEx
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Update GPH : xmlRemovalPackage
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Update GPH : apmWriteFile
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Updated GPH.
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Completed apply GPO.
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Completed GPO post-processing.
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Completed get next GPO. [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Completed calculate precedence.
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Completed get RSoP class.
    2013-04-19 15:34:44.595 [pid=0x3e0,tid=0x120c] Completed initialize namespace.
    2013-04-19 15:34:44.595 [pid=0x3e0,tid=0x120c] WQL : SELECT * FROM RSOP_PolmkrSetting WHERE polmkrBaseCseGuid = "{5794DAFD-BE60-433f-88A2-1A31939AC01F}"
    2013-04-19 15:34:44.595 [pid=0x3e0,tid=0x120c] Executed WQL query.
    2013-04-19 15:34:44.595 [pid=0x3e0,tid=0x120c] Purged 4 old RSoP entries.
    2013-04-19 15:34:44.611 [pid=0x3e0,tid=0x120c] Logging 4 new RSoP entries.
    2013-04-19 15:34:44.611 [pid=0x3e0,tid=0x120c] RSoP Entry 0
    2013-04-19 15:34:44.611 [pid=0x3e0,tid=0x120c]  <INSTANCE CLASSNAME="RSOP_PolmkrDriveSetting">
    <PROPERTY NAME="name">
    <VALUE>G:</VALUE></PROPERTY>
    <PROPERTY NAME="GPOID">
    <VALUE>cn={14209C3C-8E16-4247-95C6-925260D86074},cn=policies,cn=system,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="SOMID">
    <VALUE>OU=Windows8 Machines,OU=USA,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpeGuid">
    <VALUE>{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseCseGuid">
    <VALUE>{5794DAFD-BE60-433f-88A2-1A31939AC01F}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoDisplayName">
    <VALUE>US Drive Mapping</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoGuid">
    <VALUE>{14209C3C-8E16-4247-95C6-925260D86074}</VALUE></PROPERTY>
    <PROPERTY NAME="id">
    <VALUE>{67CE9D8B-48A8-433A-813F-2B549875ABAA}</VALUE></PROPERTY>
    <PROPERTY NAME="precedence" CHANGETYPE="3">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="creationTime">
    <VALUE>20130419193444.221000+000</VALUE></PROPERTY>
    <INSTANCE CLASSNAME="RSOP_PolmkrDriveItem">
    <PROPERTY NAME="polmkrClassClsid">
    <VALUE>{935D1B74-9CB8-4e3c-9914-7DD559B7A417}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassName">
    <VALUE>G:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassStatus">
    <VALUE>G:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassImage">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassChanged">
    <VALUE>2013-04-16 18:53:56</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUid">
    <VALUE>{840ACB3A-24B1-40C9-9CFA-936FC3F08A9E}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassRemovePolicy">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUserContext">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassBypassErrors">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAction">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrThisDrive">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAllDrives">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUserName">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPath">
    <VALUE>\\detfs01\general</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLabel">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPersistent">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUseLetter">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetter">
    <VALUE>G</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrActionResolved">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetterResolved">
    <VALUE>g:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000000</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>The operation completed successfully.</VALUE></PROPERTY></INSTANCE>
    <PROPERTY NAME="polmkrBaseHash">
    <VALUE>RSOP_PolmkrDriveSetting.polmkrLetter=&quot;G&quot;</VALUE></PROPERTY></INSTANCE>
    2013-04-19 15:34:44.626 [pid=0x3e0,tid=0x120c] RSoP Entry 1
    2013-04-19 15:34:44.626 [pid=0x3e0,tid=0x120c]  <INSTANCE CLASSNAME="RSOP_PolmkrDriveSetting">
    <PROPERTY NAME="name">
    <VALUE>M:</VALUE></PROPERTY>
    <PROPERTY NAME="GPOID">
    <VALUE>cn={14209C3C-8E16-4247-95C6-925260D86074},cn=policies,cn=system,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="SOMID">
    <VALUE>OU=Windows8 Machines,OU=USA,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpeGuid">
    <VALUE>{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseCseGuid">
    <VALUE>{5794DAFD-BE60-433f-88A2-1A31939AC01F}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoDisplayName">
    <VALUE>US Drive Mapping</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoGuid">
    <VALUE>{14209C3C-8E16-4247-95C6-925260D86074}</VALUE></PROPERTY>
    <PROPERTY NAME="id">
    <VALUE>{DBA37AA7-F6DF-4E18-9BD4-383BB43637F3}</VALUE></PROPERTY>
    <PROPERTY NAME="precedence" CHANGETYPE="3">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="creationTime">
    <VALUE>20130419193444.299000+000</VALUE></PROPERTY>
    <INSTANCE CLASSNAME="RSOP_PolmkrDriveItem">
    <PROPERTY NAME="polmkrClassClsid">
    <VALUE>{935D1B74-9CB8-4e3c-9914-7DD559B7A417}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassName">
    <VALUE>M:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassStatus">
    <VALUE>M:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassImage">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassChanged">
    <VALUE>2013-04-16 18:55:02</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUid">
    <VALUE>{3D62A401-52C3-40D1-999A-32D0F0D00117}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassRemovePolicy">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUserContext">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassBypassErrors">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAction">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrThisDrive">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAllDrives">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUserName">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPath">
    <VALUE>\\detfs01\EmailArchives</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLabel">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPersistent">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUseLetter">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetter">
    <VALUE>M</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrActionResolved">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetterResolved">
    <VALUE>m:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000000</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>The operation completed successfully.</VALUE></PROPERTY></INSTANCE>
    <PROPERTY NAME="polmkrBaseHash">
    <VALUE>RSOP_PolmkrDriveSetting.polmkrLetter=&quot;M&quot;</VALUE></PROPERTY></INSTANCE>
    2013-04-19 15:34:44.642 [pid=0x3e0,tid=0x120c] RSoP Entry 2
    2013-04-19 15:34:44.642 [pid=0x3e0,tid=0x120c]  <INSTANCE CLASSNAME="RSOP_PolmkrDriveSetting">
    <PROPERTY NAME="name">
    <VALUE>H:</VALUE></PROPERTY>
    <PROPERTY NAME="GPOID">
    <VALUE>cn={14209C3C-8E16-4247-95C6-925260D86074},cn=policies,cn=system,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="SOMID">
    <VALUE>OU=Windows8 Machines,OU=USA,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpeGuid">
    <VALUE>{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseCseGuid">
    <VALUE>{5794DAFD-BE60-433f-88A2-1A31939AC01F}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoDisplayName">
    <VALUE>US Drive Mapping</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoGuid">
    <VALUE>{14209C3C-8E16-4247-95C6-925260D86074}</VALUE></PROPERTY>
    <PROPERTY NAME="id">
    <VALUE>{AEEB1495-02E1-4B94-909B-C8DE89C82C0B}</VALUE></PROPERTY>
    <PROPERTY NAME="precedence" CHANGETYPE="3">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="creationTime">
    <VALUE>20130419193444.346000+000</VALUE></PROPERTY>
    <INSTANCE CLASSNAME="RSOP_PolmkrComputerFilterItem">
    <PROPERTY NAME="polmkrBool">
    <VALUE>AND</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrNot">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrType">
    <VALUE>NETBIOS</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrName">
    <VALUE>d-7-user1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000001</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>Incorrect function.</VALUE></PROPERTY></INSTANCE>
    <INSTANCE CLASSNAME="RSOP_PolmkrDriveItem">
    <PROPERTY NAME="polmkrClassClsid">
    <VALUE>{935D1B74-9CB8-4e3c-9914-7DD559B7A417}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassName">
    <VALUE>H:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassStatus">
    <VALUE>H:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassImage">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassChanged">
    <VALUE>2013-04-18 20:14:04</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUid">
    <VALUE>{04A87992-7420-44CE-B2B6-1B07FE654F77}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassRemovePolicy">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUserContext">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassBypassErrors">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAction">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrThisDrive">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAllDrives">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUserName">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPath">
    <VALUE>\\detfs01\users\%username%</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLabel">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPersistent">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUseLetter">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetter">
    <VALUE>H</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrActionResolved">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetterResolved">
    <VALUE>h:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000000</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>The operation completed successfully.</VALUE></PROPERTY></INSTANCE>
    <PROPERTY NAME="polmkrBaseHash">
    <VALUE>RSOP_PolmkrDriveSetting.polmkrLetter=&quot;H&quot;</VALUE></PROPERTY></INSTANCE>
    2013-04-19 15:34:44.658 [pid=0x3e0,tid=0x120c] RSoP Entry 3
    2013-04-19 15:34:44.658 [pid=0x3e0,tid=0x120c]  <INSTANCE CLASSNAME="RSOP_PolmkrDriveSetting">
    <PROPERTY NAME="name">
    <VALUE>T:</VALUE></PROPERTY>
    <PROPERTY NAME="GPOID">
    <VALUE>cn={14209C3C-8E16-4247-95C6-925260D86074},cn=policies,cn=system,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="SOMID">
    <VALUE>OU=Windows8 Machines,OU=USA,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpeGuid">
    <VALUE>{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseCseGuid">
    <VALUE>{5794DAFD-BE60-433f-88A2-1A31939AC01F}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoDisplayName">
    <VALUE>US Drive Mapping</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoGuid">
    <VALUE>{14209C3C-8E16-4247-95C6-925260D86074}</VALUE></PROPERTY>
    <PROPERTY NAME="id">
    <VALUE>{7E0CA279-4F24-4773-BD3D-8E4E8AA8AF86}</VALUE></PROPERTY>
    <PROPERTY NAME="precedence" CHANGETYPE="3">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="creationTime">
    <VALUE>20130419193444.392000+000</VALUE></PROPERTY>
    <INSTANCE CLASSNAME="RSOP_PolmkrComputerFilterItem">
    <PROPERTY NAME="polmkrBool">
    <VALUE>AND</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrNot">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrType">
    <VALUE>DNS</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrName">
    <VALUE>nb-864-user1.mydomain.com.au</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000001</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>Incorrect function.</VALUE></PROPERTY></INSTANCE>
    <INSTANCE CLASSNAME="RSOP_PolmkrDriveItem">
    <PROPERTY NAME="polmkrClassClsid">
    <VALUE>{935D1B74-9CB8-4e3c-9914-7DD559B7A417}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassName">
    <VALUE>T:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassStatus">
    <VALUE>T:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassImage">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassChanged">
    <VALUE>2013-04-19 13:21:12</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUid">
    <VALUE>{57350522-F65A-4B69-84D5-7FD5EAA99875}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassRemovePolicy">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUserContext">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassBypassErrors">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAction">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrThisDrive">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAllDrives">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUserName">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPath">
    <VALUE>\\detfs01\users</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLabel">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPersistent">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUseLetter">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetter">
    <VALUE>T</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrActionResolved">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetterResolved">
    <VALUE>t:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000000</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>The operation completed successfully.</VALUE></PROPERTY></INSTANCE>
    <PROPERTY NAME="polmkrBaseHash">
    <VALUE>RSOP_PolmkrDriveSetting.polmkrLetter=&quot;T&quot;</VALUE></PROPERTY></INSTANCE>
    2013-04-19 15:34:44.658 [pid=0x3e0,tid=0x120c] Completed logging of RSoP data.
    2013-04-19 15:34:44.658 [pid=0x3e0,tid=0x120c] Completed commit reporting.
    2013-04-19 15:34:44.658 [pid=0x3e0,tid=0x120c] Completed GPO list post-processing.
    2013-04-19 15:34:44.673 [pid=0x3e0,tid=0x120c] Completed get GPO list. [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.673 [pid=0x3e0,tid=0x120c] Completed CSE post-processing.
    2013-04-19 15:34:44.673 [pid=0x3e0,tid=0x120c] User impersonation uninitialized.
    2013-04-19 15:34:44.673 [pid=0x3e0,tid=0x120c] Leaving ProcessGroupPolicyExDrives() returned 0x00000000
    2013-04-19 15:34:44.673 [pid=0x3e0,tid=0x120c]

  • Mapping drive using GPO does not obey to Item-level targeting

    Dear all,
    We are mapping drive using Item-level targeting based on security group (User Configuration > Preferences > Windows Settings > Drive Maps) with the following settings:
    Action: Replace
    Run in logged-on user's security context: <Checked>
    Item-level targeting: <Checked>
    So if user is member of Group_X then he/she will have drive X mapped on his computer.
    Problem now is that (even if reconnect is unchecked), drive will stay mapped when we remove a user from this group.
    Is this the normal behavior ? did I missed something ?
    or even worst, imho, should I add a new drive properties which would say to delete the drive if user does not belong to the relevant group ?
    -> double targeting query for a single drive
    -> what's the point of Replace / Reconnect then ?
    Thanks in advance for your opinions!
    /behd
    [EDIT: Forgot to specify Win2008R2 AD, Win7 Pro clients but doubt that it'll be of any interest for this case]

    Drive mapping should not remain after you remove the user from the group.
    What I suspect is, that at first, the "reconnect" was checked then the user got the policy and tattooed the reconnect value. after that it doesn't matter that "reconnect" was removed.
    Try the following:
    Logon with test user, make sure no drive mapping exist (disconnect if necessary).
    Create a new policy with drive map - make sure reconnect is not checked, and apply it for the test user.
    Make sure no other drive mapping policy exist for that user.
    Login with the test user, make sure drive was mapped.
    Log off that user, remove it from the group, wait for AD replication and log on again (sometimes another log off \ log on required).  
    Please take a moment to Vote as Helpful and/or Mark as Answer where applicable. Thanks.

  • Item level targeting not hitting nested security group

    Hi guys,
    Got two security groups (A & B). Group B is a member of A.
    We've applied item level targeting with security groups. We've chose a bunch of drive maps to apply to Group A (which I was hoping would apply to Group B also.
    The drive maps appear for the users of Group A but not Group B. Is this expected behaviour?
    Any help appreciated. Thanks

    Hi guys,
    Got two security groups (A & B). Group B is a member of A.
    We've applied item level targeting with security groups. We've chose a bunch of drive maps to apply to Group A (which I was hoping would apply to Group B also.
    What is your forest functional level? I am not sure, but if I recall correctly if your forest functional level is 2008 R2, I guess you should experience no problems. Otherwise you need a workaround solution like a custom script and etc.
    Mahdi Tehrani   |  
      |  
    www.mahditehrani.ir
    Please click on Propose As Answer or to mark this post as
    and helpful for other people.
    This posting is provided AS-IS with no warranties, and confers no rights.
    How to query members of 'Local Administrators' group in all computers?

  • Item Level Targetting - does it use WMI in the background?

    Hi everyone,
    How does Item Level Targetting work in the background?
    Is it just basically a WMI API? For instance, when using ILT, what is the query language for finding if a file is a specific version? "Select version from CIM_Datafile where ...." or is it a Powershell command, etc?
    Which would be quicker - having a GPO with one WMI filter, or a GPO with a few ILT GPP settings.
    I ask because my organization is of the opinion that WMI filters on GPOs should try and be avoided in place of GPP ILTs.
    Regards,
    Michael

    > This is a quote from Martin Binder MVP - It should answer your query
    > (just about) Im sure Martin will add to this!
    Yes, he will :-))
    http://evilgpo.blogspot.de/2014/11/showdown-wmi-filter-vs-item-level.html
    > It uses "appropriate" APIs - ILT is much faster than WMI in most cases,
    > unless you use ILT with a WMI query, of course :) And no, I don't know
    > which APIs they use for this or that ILT item.
    The above statement is still true - my post deals with a very fast WMI
    class...
    One example - You need a filter for a service that is installed and set
    to automatic startup. You have two choices to filter for this service:
    a) Select Name From Win32_Service Where Name="yourservice" And
    StartMode="Auto"
    This is the kind of filter almost everyone on the planet will use. And
    it is DAMN SLOW.
    b) Registry ILT:
    HKLM\System\CurrentControlSet\Services\yourservice:Start (REG_DWORD)
    exists and has a value of 2
    Guess which one will outperform the other one?
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • Item-level targeting failing intermittantly

    We have an OU with a GPP that pushes autologon keys for our KIOSKS.  The gpp works by initially logging in with a kiosk user account that matches the
    name of the computer account and then the GPP sets the autologon keys and after a reboot or logoff the machine auto-logs on after that.  It has worked great for many months.
    Since we recently increase our password security, we could no longer use the shorter password for
    new kiosks without a painful work-around for our enduser support group.
    To make things easy, we added an additional GPP reg key for defaultpassword and utilized “Item-Level Targeting” within the existing GPO/GPP (see images below).
    Last week we tested this change successfully by adding new kiosk and rebooting both new and existing PCs.   All existing kiosk accounts were members of
    the PasswordComplexityDisabled group.  This group is our Fine-grained password policy that permits legacy complexity and password length.
    On Monday we got flooded with calls that the autologon wasn't working.  I revert the item-level targeting entries and put the GPO back to its original state and the calls
    subsided.  Before doing so however, when we investigated problem machines, the strange thing we noticed was that we could login with the original shorter password if we supplied it manually and after that autologon worked fine.  We also check
    that the account in question was a member of the passwordcomplexitydisabled group.  We are at a loss as to why the key seems to have been blanked or set with the wrong key even though a member of the correct group and the ILT logic was correct. 
    Any ideas. 
    David W King

    > There is nothing in the computer scope of the GPO that could have
    > conflicted (we also link this same KIOSK GPO to the Computer OU) so I'm
    > at a loss at what could have affected this defaultpassword key.  Again
    > the strange thing is that once the older/shorter password was supplied
    > manually/interactively the GPP processed and then autologon resumed
    > working.
    One thing that comes to mind: The defaultpassword entry has to be
    written to the registry BEFORE the user logs on, so if you try to change
    it through a user policy, it will not really work...
    Maybe carefully examining a RSoP results or modeling report will reveal
    what was going on?
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • Group Policy Item level targeting LDAP Query for specific AD Sites

    Hi Everyone,
    I'm looking to try and take advantage of Group Policy Preference Item Level Targeting to publish user Proxy settings based on what AD Site a user is located in.
    The company I work for has multiple proxies (for multiple regions). We have hundreds of AD Sites listed within our AD S and S setup. I know that I could potentially list every AD Site that requires a particular proxy, but this would generate additional admin
    overhead each time a new site is commissioned, as well as each time a site is decommissioned (this is a construction company, so may "sites" can fluctuate rapidly).
    Due to this, I would like to know if it is possible to filter by LDAP query, and filter for each proxy, based on a portion of the text/name of the AD Sites (as we use a specific naming convention for our sites, this could be dynamic enough for us to not
    have to add or remove additional AD sites).
    Is this possible, and, if so, how would I write the LDAP Filter/Query??
    Right now I would assume I would do it in the following manner:
    (&(objectCategory=site)(objectClass=site)(cn=AU-*)
    Any assistance would be greatly appreciated.
    Cheers,
    Simon

    > Right now I would assume I would do it in the following manner:
    >
    > (&(objectCategory=site)(objectClass=site)(cn=AU-*)
    Sites do NOT reside in the domain partition, but in the configuration
    partition... You can verify your LDAP filter with
    dsquery * -filter "(your filter here)"
    This query will return all matching objects' distinguished names (DN).
    But why don't you use the "Sites" ILT instead? This ILT supports ? and *
    as wildcards, so it might be sufficient.
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • Updating Administrators(built-in) with item-level targeting on an enforced policy

    I need help with this. 
    In our Computers OU, we have an enforced GPO with a computer policy that adds local admins to the computers on our network. The policy is Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Local Policies/User
    Rights Assignment >> Restricted Groups >> Group (BUILTIN\Administrators). For this example, we'll call this GPO #1.
    I need to add another user account as a local admin, but targeted to certain computers.
    I tried to edit GPO #1. I went into Computer Configuration >> Control Panel Settings > Local Users and Groups, and then added a Group with the settings >> Updating >> Administrators (built-in) & item-level targeting to the computers
    I wanted, but the setting always gets over-written by the setting that adds local admins. 
    I then tried to create a GPO with the Group update. Lets call this GPO #2. I enforced this rule, linked it to the OU, changed the order so that GPO #2 is above GPO #1, but this doesn't seem to be working.
    Is my inheritance order incorrect?
    1 is GPO #2
    2 is GPO #1
    Ideas anyone?

    > In our Computers OU, we have an enforced GPO with a computer policy that
    > adds local admins to the computers on our network. The policy is
    > Computer Configuration >> Policies >> Windows Settings >> Security
    > Settings >> Local Policies/User Rights Assignment >> Restricted Groups
    >  >> Group (BUILTIN\Administrators).
    Restricted Groups has 2 operation modes: Members and Member of. The
    first one clears out any existing members, and that's what you use right
    now. The second simply adds a group to another group and keeps all
    existing members, that's what you want to use for your additional computers.
     > I need to add another user account as a local admin, but targeted to
     > certain computers.
    To do so, you need to create a domain group that contains the related
    account(s). This domain group is "member of" local admins. And make sure
    this second GPO is linked higher (so it is processed _after_ the first
    one that clears out existing members).
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))
    Yes I know I can do this, but I can't use item-level targeting with this setup. I don't want the user account to be local admins for all computers. I only want it to be local admins for 4 of them.
    Wouldn't precedence take place in this OU if I have the GPO that adds another member as #1, and the GPO that deletes and adds as #2? It isn't working as I had thought it would.

  • Printer Item level targeting via printer preferences

    I am trying to do item level targeting via printer preferences. I have tried numerous ways numerous times and cannot get this to work. I currently have 120 printers I am trying to assign via terminal server client ip range, workstation IP range , for different
    sites, and also group permissions to those printers.
    I have one printer I have the following setting (all the other printers follow this example depending on location and user
    this collection is true
    the terminal session is Remote Desktop Services with Client TCP/IP address between 10.4.1.1 and 10.4.1.254
    Or the IP address range is 10.4.1.1 - 10.41.254
    AND the user is a member of the security group SKIN\grpMIllennium
    OR the user is a member of the security group SKIN\grpPrtSDCPerReceipt
    However when I test this I am connecting from a 10.2.2.203 address but yet still get this printer. How can I limit this to only those IP addresses?

    Looking at the xml seemed to help me understand it a little better. Now I understand what you mean about the  parenthesis
    - collection statements. Makes a difference. I cant seem to get it all to work right though. For example, this printer I have it connecting by member of a group and terminal server client ip, member of a group client ip, or member of any of these remote groups.
    I made a test user that has access to "SKIN\grpPrtSDCDavFacesheetHP4014n" but when I connect from an ip of 10.2.1.23, it still adds the printer even though its only supposed to if it sees IP address from 10.8.1.1 - 10.8.1.254
    <?xml version="1.0"?>
    -<SharedPrinter bypassErrors="1" userContext="1" uid="{B54F5C24-47C6-4887-B8A6-622E1A0997AA}" changed="2014-10-16 17:22:07" image="2" status="CLIFACE" name="CLIFACE" clsid="{9A5E9697-9095-436d-A0EE-4D128FDFBCE5}"><Properties
    port="" deleteMaps="0" persistent="0" deleteAll="0" skipLocal="0" default="0" location="" path="\\SIILPEOSVPS02\CLIFACE" comment="" action="U"/>-<Filters>-<FilterCollection
    not="0" bool="AND"><FilterUser name="SKIN\spacli02" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-7310"/><FilterUser name="SKIN\spacli01" not="0"
    bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-7309"/><FilterGroup userContext="1" name="SKIN\grpPrtSDCDavFacesheetHP4014n" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5510"
    localGroup="0" primaryGroup="0"/><FilterGroup userContext="1" name="SKIN\grpPrtIDIClHP4240" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-3327" localGroup="0"
    primaryGroup="0"/><FilterTerminal not="0" bool="AND" max="10.8.1.254" min="10.8.1.1" option="IP" type="TS"/></FilterCollection>-<FilterCollection not="0" bool="OR"><FilterGroup
    userContext="1" name="SKIN\grpPrtIDIClHP4240" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-3327" localGroup="0" primaryGroup="0"/><FilterGroup userContext="1"
    name="SKIN\grpPrtSDCDavFacesheetHP4014n" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5510" localGroup="0" primaryGroup="0"/><FilterUser name="SKIN\spacli01" not="0"
    bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-7309"/><FilterUser name="SKIN\spacli02" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-7310"/><FilterIpRange
    not="0" bool="AND" max="10.8.1.254" min="10.8.1.1"/></FilterCollection>-<FilterCollection not="0" bool="OR"><FilterUser name="SKIN\dermdoc" not="0" bool="OR"
    sid="S-1-5-21-1972655925-2044812881-1539857752-1831"/><FilterGroup userContext="1" name="SKIN\grpPrtSDCThea" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-6894" localGroup="0"
    primaryGroup="0"/><FilterGroup userContext="1" name="SKIN\grpPrtSatelliteCoord4" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-7280" localGroup="0" primaryGroup="0"/><FilterGroup
    userContext="1" name="SKIN\grpPrtSatelliteCoord3" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5523" localGroup="0" primaryGroup="0"/><FilterGroup userContext="1"
    name="SKIN\grpPrtSatelliteCoord2" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5520" localGroup="0" primaryGroup="0"/><FilterGroup userContext="1" name="SKIN\grpPrtSatelliteCoord"
    not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5517" localGroup="0" primaryGroup="0"/><FilterGroup userContext="1" name="SKIN\grpPrtSDCPeoMainOps" not="0"
    bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5333" localGroup="0" primaryGroup="0"/><FilterGroup userContext="1" name="SKIN\grpPrtSDCPeoAnnexPurchasingMngr" not="0" bool="OR"
    sid="S-1-5-21-1972655925-2044812881-1539857752-5326" localGroup="0" primaryGroup="0"/></FilterCollection></Filters></SharedPrinter>

Maybe you are looking for