Item-level targeting failing intermittantly

We have an OU with a GPP that pushes autologon keys for our KIOSKS.  The gpp works by initially logging in with a kiosk user account that matches the
name of the computer account and then the GPP sets the autologon keys and after a reboot or logoff the machine auto-logs on after that.  It has worked great for many months.
Since we recently increase our password security, we could no longer use the shorter password for
new kiosks without a painful work-around for our enduser support group.
To make things easy, we added an additional GPP reg key for defaultpassword and utilized “Item-Level Targeting” within the existing GPO/GPP (see images below).
Last week we tested this change successfully by adding new kiosk and rebooting both new and existing PCs.   All existing kiosk accounts were members of
the PasswordComplexityDisabled group.  This group is our Fine-grained password policy that permits legacy complexity and password length.
On Monday we got flooded with calls that the autologon wasn't working.  I revert the item-level targeting entries and put the GPO back to its original state and the calls
subsided.  Before doing so however, when we investigated problem machines, the strange thing we noticed was that we could login with the original shorter password if we supplied it manually and after that autologon worked fine.  We also check
that the account in question was a member of the passwordcomplexitydisabled group.  We are at a loss as to why the key seems to have been blanked or set with the wrong key even though a member of the correct group and the ILT logic was correct. 
Any ideas. 
David W King

> There is nothing in the computer scope of the GPO that could have
> conflicted (we also link this same KIOSK GPO to the Computer OU) so I'm
> at a loss at what could have affected this defaultpassword key.  Again
> the strange thing is that once the older/shorter password was supplied
> manually/interactively the GPP processed and then autologon resumed
> working.
One thing that comes to mind: The defaultpassword entry has to be
written to the registry BEFORE the user logs on, so if you try to change
it through a user policy, it will not really work...
Maybe carefully examining a RSoP results or modeling report will reveal
what was going on?
Martin
Mal ein
GUTES Buch über GPOs lesen?
NO THEY ARE NOT EVIL, if you know what you are doing:
Good or bad GPOs?
And if IT bothers me - coke bottle design refreshment :))

Similar Messages

  • Multiple OUs with GPOs - One OU with multiple GPOs and security - One OU with one GPO and item level targeting

    Background...
    We have around 30 locations and we need to deliver different GPOs to these locations.
    There can be between 3 and 8 PCs in each location.
    These PCs can move around at short notice (mainly as a backup with neighbouring locations should
    PCs fail)
    The GPOs differ to change printers (2 per location and 2 backup printers from neighbouring location), auto login, desktop wallpaper
    Which is in your opinion the best solution for login speed, GPO & device management?
    1) Multiple OUs with a single GPO in each OU, the devices can be moved into new OU when the PCs move
    2) Single OU with multiple GPOs, add devices to security group and use security filtering on the GPOs
    3) Single OU with single GPO, add devices to security group and use item level targeting on the group

    > 1) Multiple OUs with a single GPO in each OU, the devices can be moved
    > into new OU when the PCs move
    > 2) Single OU with multiple GPOs, add devices to security group and use
    > security filtering on the GPOs
    > 3) Single OU with single GPO, add devices to security group and use item
    > level targeting on the group
    4) GPMC, Sites, "show sites". Then link appropriate GPOs to each
    individual site.
    That's the way to go here...
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • Preferences for Item-Level Targeting

    Hey guys,
    It seems like I have seen some weird issues in the past with multi item-level targeting where a condition happens that causes all items to fail.  I do not use the "Stop processing items in extension on error" option either.  I am
    trying to replicate it, but sometimes it seems that if an item comes back as false that others then start failing.  I read everything in the document below, but maybe I missed something.  If I put 10 conditions into Item-Level processing and 9
    fail leaving a single one that targets a single computer.  Is there any other conditions that would cause that true Item-Level processing to abort?  Having trouble replicating the problem so maybe I was just imaging things.
    Thanks,
    Dan
    http://technet.microsoft.com/en-us/library/cc733022.aspx
    Dan Heim

    > something.  If I put 10 conditions into Item-Level processing and 9
    > fail leaving a single one that targets a single computer.  Is there any
    > other conditions that would cause that true Item-Level processing to
    > abort?
    AFAIK no. A screenshot of your ILT might be helpful - or a copy of the XML.
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • Mapping drive using GPO does not obey to Item-level targeting

    Dear all,
    We are mapping drive using Item-level targeting based on security group (User Configuration > Preferences > Windows Settings > Drive Maps) with the following settings:
    Action: Replace
    Run in logged-on user's security context: <Checked>
    Item-level targeting: <Checked>
    So if user is member of Group_X then he/she will have drive X mapped on his computer.
    Problem now is that (even if reconnect is unchecked), drive will stay mapped when we remove a user from this group.
    Is this the normal behavior ? did I missed something ?
    or even worst, imho, should I add a new drive properties which would say to delete the drive if user does not belong to the relevant group ?
    -> double targeting query for a single drive
    -> what's the point of Replace / Reconnect then ?
    Thanks in advance for your opinions!
    /behd
    [EDIT: Forgot to specify Win2008R2 AD, Win7 Pro clients but doubt that it'll be of any interest for this case]

    Drive mapping should not remain after you remove the user from the group.
    What I suspect is, that at first, the "reconnect" was checked then the user got the policy and tattooed the reconnect value. after that it doesn't matter that "reconnect" was removed.
    Try the following:
    Logon with test user, make sure no drive mapping exist (disconnect if necessary).
    Create a new policy with drive map - make sure reconnect is not checked, and apply it for the test user.
    Make sure no other drive mapping policy exist for that user.
    Login with the test user, make sure drive was mapped.
    Log off that user, remove it from the group, wait for AD replication and log on again (sometimes another log off \ log on required).  
    Please take a moment to Vote as Helpful and/or Mark as Answer where applicable. Thanks.

  • Item level targeting via printer preferences

    I am trying to do item level targeting via printer preferences. I have tried numerous ways numerous times and cannot get this to work. I currently have 120 printers I am trying to assign via terminal server client ip range, workstation IP range , for different
    sites, and also group permissions to those printers.
    I have one printer I have the following setting (all the other printers follow this example depending on location and user
    this collection is true
    the terminal session is Remote Desktop Services with Client TCP/IP address between 10.4.1.1 and 10.4.1.254
    Or the IP address range is 10.4.1.1 - 10.41.254
    AND the user is a member of the security group SKIN\grpMIllennium
    OR the user is a member of the security group SKIN\grpPrtSDCPerReceipt
    However when I test this I am connecting from a 10.2.2.203 address but yet still get this printer. How can I limit this to only those IP addresses?

    I am trying to do item level targeting via printer preferences. I have tried numerous ways numerous times and cannot get this to work. I currently have 120 printers I am trying to assign via terminal server client ip range, workstation IP range , for different
    sites, and also group permissions to those printers.
    I have one printer I have the following setting (all the other printers follow this example depending on location and user
    this collection is true
    the terminal session is Remote Desktop Services with Client TCP/IP address between 10.4.1.1 and 10.4.1.254
    Or the IP address range is 10.4.1.1 - 10.41.254
    AND the user is a member of the security group SKIN\grpMIllennium
    OR the user is a member of the security group SKIN\grpPrtSDCPerReceipt
    However when I test this I am connecting from a 10.2.2.203 address but yet still get this printer. How can I limit this to only those IP addresses?

  • Updating Administrators(built-in) with item-level targeting on an enforced policy

    I need help with this. 
    In our Computers OU, we have an enforced GPO with a computer policy that adds local admins to the computers on our network. The policy is Computer Configuration >> Policies >> Windows Settings >> Security Settings >> Local Policies/User
    Rights Assignment >> Restricted Groups >> Group (BUILTIN\Administrators). For this example, we'll call this GPO #1.
    I need to add another user account as a local admin, but targeted to certain computers.
    I tried to edit GPO #1. I went into Computer Configuration >> Control Panel Settings > Local Users and Groups, and then added a Group with the settings >> Updating >> Administrators (built-in) & item-level targeting to the computers
    I wanted, but the setting always gets over-written by the setting that adds local admins. 
    I then tried to create a GPO with the Group update. Lets call this GPO #2. I enforced this rule, linked it to the OU, changed the order so that GPO #2 is above GPO #1, but this doesn't seem to be working.
    Is my inheritance order incorrect?
    1 is GPO #2
    2 is GPO #1
    Ideas anyone?

    > In our Computers OU, we have an enforced GPO with a computer policy that
    > adds local admins to the computers on our network. The policy is
    > Computer Configuration >> Policies >> Windows Settings >> Security
    > Settings >> Local Policies/User Rights Assignment >> Restricted Groups
    >  >> Group (BUILTIN\Administrators).
    Restricted Groups has 2 operation modes: Members and Member of. The
    first one clears out any existing members, and that's what you use right
    now. The second simply adds a group to another group and keeps all
    existing members, that's what you want to use for your additional computers.
     > I need to add another user account as a local admin, but targeted to
     > certain computers.
    To do so, you need to create a domain group that contains the related
    account(s). This domain group is "member of" local admins. And make sure
    this second GPO is linked higher (so it is processed _after_ the first
    one that clears out existing members).
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))
    Yes I know I can do this, but I can't use item-level targeting with this setup. I don't want the user account to be local admins for all computers. I only want it to be local admins for 4 of them.
    Wouldn't precedence take place in this OU if I have the GPO that adds another member as #1, and the GPO that deletes and adds as #2? It isn't working as I had thought it would.

  • GPP: Item Level Targeting - How are collections evaluated?

    We are looking at optimizing a new VDI environment and are overhauling are GPOs which will be applied to those machines.  Using a third party product, we're moving some of the user based settings into its management stack. 
    There are additional debates over whether or not we should create separate OUs for some geographical scenarios so that we can apply two different GPOs with only one setting difference...  location.  My feeling is that we should use a standard naming
    convention on east vs west and use a single GPO with a computer name ILT to apply the east/west setting.  
    I can't seem to find anything with regards to how ILT collections are evaluated and what impact they may have on the system.  Does ILT use WMI to evaluate the name or some other method?
    Thanks

    Hi,
    Regarding the questions about Item-Level Targeting, Martin has already given a great explanation. Besides, for ILT, the following article can also be referred to for more information.
    Preference Item-Level Targeting
    http://msdn.microsoft.com/en-us/library/cc733022.aspx
    >>I recall some issue where you can't use AGPM delegated permissions to manage site based policies? 
    AGPM is a advanced tool for group policy management and it's part of MDOP. Although it's related to group policy, Microsoft has a dedicated forum for AGPM questions. In order to get better assistance, we can ask for advice regarding AGPM
    in that forum.
    Microsoft Advanced Group Policy Management
    https://social.technet.microsoft.com/Forums/windows/en-US/home?forum=mdopagpm
    TechNet Subscriber Support
    If you are TechNet Subscription user and have any feedback on our support quality, please send your feedback here.
    Best regards,
    Frank Shen

  • Item level targeting not hitting nested security group

    Hi guys,
    Got two security groups (A & B). Group B is a member of A.
    We've applied item level targeting with security groups. We've chose a bunch of drive maps to apply to Group A (which I was hoping would apply to Group B also.
    The drive maps appear for the users of Group A but not Group B. Is this expected behaviour?
    Any help appreciated. Thanks

    Hi guys,
    Got two security groups (A & B). Group B is a member of A.
    We've applied item level targeting with security groups. We've chose a bunch of drive maps to apply to Group A (which I was hoping would apply to Group B also.
    What is your forest functional level? I am not sure, but if I recall correctly if your forest functional level is 2008 R2, I guess you should experience no problems. Otherwise you need a workaround solution like a custom script and etc.
    Mahdi Tehrani   |  
      |  
    www.mahditehrani.ir
    Please click on Propose As Answer or to mark this post as
    and helpful for other people.
    This posting is provided AS-IS with no warranties, and confers no rights.
    How to query members of 'Local Administrators' group in all computers?

  • Mapping Networkdrive using GPO and Item-Level Targeting - Same Letter in two groups

    Hi.
    I'm using one GPO to Map networkdrives, we are using it with Item-Level Targeting which targets on Security Group, so a Member of "SecurityGroup" gets the Drive, we have several drives and we are using all the Letters that are available, now I'm
    in a pickle and need help with If a User is part of two Security Groups that uses the same letter to map the drive, Example: User1 is a part of two security groups "Drive-Sales" and "Drive-Account" these two Security Groups uses the same
    Letter in the GPO to map the drive, so if the User is in both Groups he only gets the "Sales Drive" but not "Account Drive".
    So what I need is that can the GPO assign next Available letter on the computer that "user1" is logged on, and can it be signed on the "Account Drive". ?
    Hope you understand what I'm going for
    Kind Regards
    Haflidi Fridthjofsson.

    > we are using all the Letters that are available
    You should eventually switch to DFS Namespaces and Access based
    enumeration - so each user will have the DFS root assigned and can only
    see the subfolders he has access to.
    > So what I need is that can the GPO assign next Available letter on the
    > computer that "user1" is logged on, and can it be signed on the "Account
    > Drive". ?
    Yes: Create another assigment with an ILT of "user is member of BOTH
    groups" and use "next available" in this assignment.
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • GPP item-level targeting filter not working as expected

    I am trying to set the Internet Explorer homepage via user Group Policy Preferences (GPP) registry setting for a very specific group of users.  I am using item-level targeting to accomplish this but am having trouble getting the logic working as expected.
    Here is my item-level targeting filter:
    The user is a member of the security group CONTOSO\FireRescueDept
    AND this collection is false
         The user is a member of the security group CONTOSO\EmergencyManagementDept
         OR the user is a member of the security group CONTOSO\PublicSafetyDivision
    The user in question is a member of both CONTOSO\FireRescueDept and CONTOSO\EmergencyManagementDept.  I believe this means that this particular registry GPP setting should NOT apply to the user in question and that is the outcome I desire.
    Here is how I'm thinking about it:
    The user is a member of CONTOSO\EmergencyManagementDept; therefore, "The user is a member of the security group CONTOSO\EmergencyManagementDept" evaluates to TRUE.
    Since the other item in the collection is connected with the boolean OR operator, the collection evaluates to TRUE regardless of the evaluation of "The user is a member of the security group CONTOSO\PublicSafetyDivision."
    The item-level targeting filter is looking for the collection to evaluate to FALSE.  Since the collection has evaluated to TRUE, the evaluation "This collection is false" is FALSE.
    Because of the AND operator in front of "This collection is false", both "The user is a member of the security group CONTOSO\FireRescueDept" and "This collection is false" must evaluate to TRUE in order for the item-level targeting
    filter to determine that the user in question to apply the GPP setting the filter is attached to.  However, since "This collection is false" has already evaluated to FALSE, the filter as a whole should evaluate to FALSE and this GPP setting
    should not apply.
    However, according to gpresult it does apply.
    Please advise.  I want this particular setting to apply to users in the CONTOSO\FireRescueDept group unless they are a member of CONTOSO\EmergencyManagementDept and/or CONTOSO\PublicSafetyDivision.

    Am 21.05.2013 16:22, schrieb Scott W. Sander:
    > Does item-level targeting not work with Universal security groups
    > because the group policy client isn't able to determine that the user
    > is a member of groups of that type?
    In my experience, it DOES work with universal groups... Are you
    suffering from token bloat? How many groups is the user a member of?
    http://blogs.technet.com/b/shanecothran/archive/2010/07/16/maxtokensize-and-kerberos-token-bloat.aspx
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    Wenn meine Antwort hilfreich war, freue ich mich über eine Bewertung! If my answer was helpful, I'm glad about a rating!

  • Printer Item level targeting via printer preferences

    I am trying to do item level targeting via printer preferences. I have tried numerous ways numerous times and cannot get this to work. I currently have 120 printers I am trying to assign via terminal server client ip range, workstation IP range , for different
    sites, and also group permissions to those printers.
    I have one printer I have the following setting (all the other printers follow this example depending on location and user
    this collection is true
    the terminal session is Remote Desktop Services with Client TCP/IP address between 10.4.1.1 and 10.4.1.254
    Or the IP address range is 10.4.1.1 - 10.41.254
    AND the user is a member of the security group SKIN\grpMIllennium
    OR the user is a member of the security group SKIN\grpPrtSDCPerReceipt
    However when I test this I am connecting from a 10.2.2.203 address but yet still get this printer. How can I limit this to only those IP addresses?

    Looking at the xml seemed to help me understand it a little better. Now I understand what you mean about the  parenthesis
    - collection statements. Makes a difference. I cant seem to get it all to work right though. For example, this printer I have it connecting by member of a group and terminal server client ip, member of a group client ip, or member of any of these remote groups.
    I made a test user that has access to "SKIN\grpPrtSDCDavFacesheetHP4014n" but when I connect from an ip of 10.2.1.23, it still adds the printer even though its only supposed to if it sees IP address from 10.8.1.1 - 10.8.1.254
    <?xml version="1.0"?>
    -<SharedPrinter bypassErrors="1" userContext="1" uid="{B54F5C24-47C6-4887-B8A6-622E1A0997AA}" changed="2014-10-16 17:22:07" image="2" status="CLIFACE" name="CLIFACE" clsid="{9A5E9697-9095-436d-A0EE-4D128FDFBCE5}"><Properties
    port="" deleteMaps="0" persistent="0" deleteAll="0" skipLocal="0" default="0" location="" path="\\SIILPEOSVPS02\CLIFACE" comment="" action="U"/>-<Filters>-<FilterCollection
    not="0" bool="AND"><FilterUser name="SKIN\spacli02" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-7310"/><FilterUser name="SKIN\spacli01" not="0"
    bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-7309"/><FilterGroup userContext="1" name="SKIN\grpPrtSDCDavFacesheetHP4014n" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5510"
    localGroup="0" primaryGroup="0"/><FilterGroup userContext="1" name="SKIN\grpPrtIDIClHP4240" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-3327" localGroup="0"
    primaryGroup="0"/><FilterTerminal not="0" bool="AND" max="10.8.1.254" min="10.8.1.1" option="IP" type="TS"/></FilterCollection>-<FilterCollection not="0" bool="OR"><FilterGroup
    userContext="1" name="SKIN\grpPrtIDIClHP4240" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-3327" localGroup="0" primaryGroup="0"/><FilterGroup userContext="1"
    name="SKIN\grpPrtSDCDavFacesheetHP4014n" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5510" localGroup="0" primaryGroup="0"/><FilterUser name="SKIN\spacli01" not="0"
    bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-7309"/><FilterUser name="SKIN\spacli02" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-7310"/><FilterIpRange
    not="0" bool="AND" max="10.8.1.254" min="10.8.1.1"/></FilterCollection>-<FilterCollection not="0" bool="OR"><FilterUser name="SKIN\dermdoc" not="0" bool="OR"
    sid="S-1-5-21-1972655925-2044812881-1539857752-1831"/><FilterGroup userContext="1" name="SKIN\grpPrtSDCThea" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-6894" localGroup="0"
    primaryGroup="0"/><FilterGroup userContext="1" name="SKIN\grpPrtSatelliteCoord4" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-7280" localGroup="0" primaryGroup="0"/><FilterGroup
    userContext="1" name="SKIN\grpPrtSatelliteCoord3" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5523" localGroup="0" primaryGroup="0"/><FilterGroup userContext="1"
    name="SKIN\grpPrtSatelliteCoord2" not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5520" localGroup="0" primaryGroup="0"/><FilterGroup userContext="1" name="SKIN\grpPrtSatelliteCoord"
    not="0" bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5517" localGroup="0" primaryGroup="0"/><FilterGroup userContext="1" name="SKIN\grpPrtSDCPeoMainOps" not="0"
    bool="OR" sid="S-1-5-21-1972655925-2044812881-1539857752-5333" localGroup="0" primaryGroup="0"/><FilterGroup userContext="1" name="SKIN\grpPrtSDCPeoAnnexPurchasingMngr" not="0" bool="OR"
    sid="S-1-5-21-1972655925-2044812881-1539857752-5326" localGroup="0" primaryGroup="0"/></FilterCollection></Filters></SharedPrinter>

  • Item Level Targetting - does it use WMI in the background?

    Hi everyone,
    How does Item Level Targetting work in the background?
    Is it just basically a WMI API? For instance, when using ILT, what is the query language for finding if a file is a specific version? "Select version from CIM_Datafile where ...." or is it a Powershell command, etc?
    Which would be quicker - having a GPO with one WMI filter, or a GPO with a few ILT GPP settings.
    I ask because my organization is of the opinion that WMI filters on GPOs should try and be avoided in place of GPP ILTs.
    Regards,
    Michael

    > This is a quote from Martin Binder MVP - It should answer your query
    > (just about) Im sure Martin will add to this!
    Yes, he will :-))
    http://evilgpo.blogspot.de/2014/11/showdown-wmi-filter-vs-item-level.html
    > It uses "appropriate" APIs - ILT is much faster than WMI in most cases,
    > unless you use ILT with a WMI query, of course :) And no, I don't know
    > which APIs they use for this or that ILT item.
    The above statement is still true - my post deals with a very fast WMI
    class...
    One example - You need a filter for a service that is installed and set
    to automatic startup. You have two choices to filter for this service:
    a) Select Name From Win32_Service Where Name="yourservice" And
    StartMode="Auto"
    This is the kind of filter almost everyone on the planet will use. And
    it is DAMN SLOW.
    b) Registry ILT:
    HKLM\System\CurrentControlSet\Services\yourservice:Start (REG_DWORD)
    exists and has a value of 2
    Guess which one will outperform the other one?
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

  • GPO Item-level targeting for IE11

    Hi, hoping someone can help guide me with setting up item-level targeting on a group policy.  I have created a set of IE11 group policy settings, and only want to apply to machines with IE11.  When creating the WMI query what and how do you enter
    the criteria in the Query, Namespace, Property, and Environment variable name fields.  Any help is much appreciated.

    Use Item Level Targeting and do a "File Match" check with the Targeting Editor. 
    You may have to uncheck the option "Run in logged-on user's security context" to make it work properly depending on your system security. 
    Charlie Newman

  • Drive Map GPO and Item-Level targeting using DNS Computer Name not working as expected

    I've run into a snag trying to move from logon script based drive mappings, to a GPO based Drive map solution and I'm hoping somebody can shed some light on the problem that I am seeing.  We started down the GPO based drive mappings because we have
    a handful of Windows 8 client computers which don't run the logon script based drive mappings.
    I put together a basic Drive Maps GPO.   I'm mapping 3 drives, I've linked the GPO to a computer container OU for testing and everything is working just fine.  I have 3 different Windows 8 client PC, all domain joined, and all 3 run the GPO as
    expected.
    The problem is when I attempt to apply Item-level targeting.   I've found that if I define item-level targeting to use the NetBIOS name of the computer, I can either apply the GPO at an individual computer level, or I can exclude the GPO for that individual
    computer by toggling between IS and IS NOT.   However, when I choose to define the computer name by choosing the DNS option, the GPO does not apply as expected.
    So, if I say "the DNS computer name is example1.mydomain.com" and I apply the GPO, it applies to example1, example2 and example3.   And if I instead say, "the DNS computer name is not example1.mydomain.com", then it doesn't apply
    to example1, example2 or example3.     Obviously, I would expect it to apply or not apply only to example1.mydomain.com.
    If instead, I say "the NetBIOS computer name is example1", and apply the GPO, then example1 gets it, and example2 and example3 do not.   If I say, "the netBIOS name is not example 1", then example1 does NOT get the drive mapping,
    but example 2 and example3 do.   < This is exactly what I want and I can continue to just use NetBIOS names...but I don't understand why DNS isn't working in the same manner.
    My clients are all using DHCP and using domain controllers for DNS.   All 3 machines are in the mydomain.com namespace.  The mydomain.com namespace is an active directory integrated zone.   We have reverse zones in place for the dns records.
     I can ping the machines from the DC's as well as the machines themselves.  I can run nslookup and resolve the computer name for each host using the FQDN.  I can also run a ping -a IP_ADDY and get the FQDN back.  The DC's themselves are
    running Server 2008 R2.   I honestly don't see any issues from a name resolution standpoint on the network itself.   
    So, any suggestions as to why defining the shortened NetBIOS name works just fine, but using DNS with a FQDN does not?   (I've tried the DNS name using just the name, the name., as well as name.mydomain.com and name.mydomain.com.)

    And here is the result from a Windows 7 host,  which is named d2-7-user1...thus it should map the T drive and in fact does;
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] Entering ProcessGroupPolicyExDrives()
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] SOFTWARE\Policies\Microsoft\Windows\Group Policy\{5794DAFD-BE60-433f-88A2-1A31939AC01F}
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] BackgroundPriorityLevel ( 0 )
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] DisableRSoP ( 0 )
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] LogLevel ( 3 )
    2013-04-19 15:34:43.691 [pid=0x3e0,tid=0x120c] Command subsystem initialized. [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] User impersonation initialized.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Client context subsystem initialized.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Configuration subsystem initialized.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Licensing subsystem initialized.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:43.706 [pid=0x3e0,tid=0x120c] User information initialized.
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %ComSpec% = "C:\Windows\system32\cmd.exe"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %FP_NO_HOST_CHECK% = "NO"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %OS% = "Windows_NT"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %Path% = "C:\Program Files (x86)\VMware\VMware vSphere CLI\Perl\site\bin;C:\Program Files (x86)\VMware\VMware vSphere CLI\Perl\bin;C:\Program Files (x86)\Intel\iCLS Client\;C:\Program Files\Intel\iCLS
    Client\;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files (x86)\Intel\OpenCL SDK\2.0\bin\x86;C:\Program Files (x86)\Intel\OpenCL SDK\2.0\bin\x64;C:\Program Files\Intel\Intel(R) Management Engine
    Components\DAL;C:\Program Files\Intel\Intel(R) Management Engine Components\IPT;C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL;C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %PATHEXT% = ".COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %PROCESSOR_ARCHITECTURE% = "AMD64"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %TEMP% = "C:\Users\user1\AppData\Local\Temp"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %TMP% = "C:\Users\user1\AppData\Local\Temp"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %USERNAME% = "user1"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %windir% = "C:\Windows"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %PSModulePath% = "C:\Windows\system32\WindowsPowerShell\v1.0\Modules\"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %NUMBER_OF_PROCESSORS% = "8"
    2013-04-19 15:34:43.722 [pid=0x3e0,tid=0x120c] Variable %PROCESSOR_LEVEL% = "6"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %PROCESSOR_IDENTIFIER% = "Intel64 Family 6 Model 58 Stepping 9, GenuineIntel"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %PROCESSOR_REVISION% = "3a09"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %windows_tracing_logfile% = "C:\BVTBin\Tests\installpackage\csilogfile.log"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %windows_tracing_flags% = "3"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %ALLUSERSPROFILE% = "C:\ProgramData"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %APPDATA% = "C:\Users\user1\AppData\Roaming"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %CommonProgramFiles% = "C:\Program Files\Common Files"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %CommonProgramFiles(x86)% = "C:\Program Files (x86)\Common Files"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %CommonProgramW6432% = "C:\Program Files\Common Files"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %COMPUTERNAME% = "D2-7-user1"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %HOMEDRIVE% = "C:"
    2013-04-19 15:34:43.737 [pid=0x3e0,tid=0x120c] Variable %HOMEPATH% = "\Users\user1"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %LOCALAPPDATA% = "C:\Users\user1\AppData\Local"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %LOGONSERVER% = "\\VM-EXAMPLE-DC05"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %ProgramData% = "C:\ProgramData"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %ProgramFiles% = "C:\Program Files"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %ProgramFiles(x86)% = "C:\Program Files (x86)"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %ProgramW6432% = "C:\Program Files"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %PUBLIC% = "C:\Users\Public"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %SystemDrive% = "C:"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %SystemRoot% = "C:\Windows"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %USERDNSDOMAIN% = "mydomain.com.au"
    2013-04-19 15:34:43.753 [pid=0x3e0,tid=0x120c] Variable %USERDOMAIN% = "mydomain"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %USERPROFILE% = "C:\Users\user1"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %LogonUser% = "user1"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %LogonDomain% = "mydomain"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %LogonUserSid% = "S-1-5-21-976655598-962914793-294660928-7222"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %BinaryUserSid% = "00001C3611902B403964E9E93A3694EE000000150500000000000501"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %LdapUserSid% = "\01\05\00\00\00\00\00\05\15\00\00\00\EE\94\36\3A\E9\E9\64\39\40\2B\90\11\36\1C\00\00"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %ReversedUserSid% = "010500000000000515000000EE94363AE9E96439402B9011361C0000"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %BinaryComputerSid% = "000040EC11902B403964E9E93A3694EE000000150500000000000501"
    2013-04-19 15:34:43.769 [pid=0x3e0,tid=0x120c] Variable %ReversedComputerSid% = "010500000000000515000000EE94363AE9E96439402B9011EC400000"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %LdapComputerSid% = "\01\05\00\00\00\00\00\05\15\00\00\00\EE\94\36\3A\E9\E9\64\39\40\2B\90\11\EC\40\00\00"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %OsVersion% = "Windows 7"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %LocalTimeEx% = "2013-04-19 15:34:43.706"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %LocalTime% = "2013-04-19 15:34:43"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %LocalTimeXmlEx% = "2013-04-19T15:34:43.706"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %LocalTimeXml% = "2013-04-19T15:34:43"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %DateTimeEx% = "2013-04-19 19:34:43.706"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %DateTime% = "2013-04-19 19:34:43"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %MacAddress% = "cc-f7-20-52-41-53"
    2013-04-19 15:34:43.784 [pid=0x3e0,tid=0x120c] Variable %TempDir% = "C:\Users\user1\AppData\Local\Temp"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %WindowsDir% = "C:\Windows"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %SystemDir% = "C:\Windows\system32"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %DomainName% = "mydomain"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %ProgramFilesDir% = "C:\Program Files"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %AppDataDir% = "C:\Users\user1\AppData\Roaming"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %DesktopDir% = "C:\Users\user1\Desktop"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %StartMenuDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\Start Menu"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %ProgramsDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %StartUpDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
    2013-04-19 15:34:43.800 [pid=0x3e0,tid=0x120c] Variable %FavoritesDir% = "C:\Users\user1\Favorites"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %SendToDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\SendTo"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %RecentDocumentsDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\Recent"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %NetPlacesDir% = "C:\Users\user1\AppData\Roaming\Microsoft\Windows\Network Shortcuts"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonAppdataDir% = "C:\ProgramData"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonDesktopDir% = "C:\Users\Public\Desktop"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonStartMenuDir% = "C:\ProgramData\Microsoft\Windows\Start Menu"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonProgramsDir% = "C:\ProgramData\Microsoft\Windows\Start Menu\Programs"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonStartUpDir% = "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup"
    2013-04-19 15:34:43.815 [pid=0x3e0,tid=0x120c] Variable %CommonFavoritesDir% = "C:\Users\user1\Favorites"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %CurrentProcessId% = "992"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %CurrentThreadId% = "4620"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %GroupPolicyVersion% = "6.1.7601.17514"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %TraceFile% = "C:\ProgramData\GroupPolicy\Preference\Trace\User.log"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %LastError% = "0x00000000"
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variable %LastErrorText% = "The operation completed successfully."
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Variables subsystem initialized.
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:43.831 [pid=0x3e0,tid=0x120c] ----- Parameters
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c] CSE GUID : {5794DAFD-BE60-433f-88A2-1A31939AC01F}
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c] Flags : (   ) GPO_INFO_FLAG_MACHINE - Apply machine policy rather than user policy
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_BACKGROUND - Background refresh of policy (ok to do slow stuff)
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_SLOWLINK - Policy is being applied across a slow link
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_VERBOSE - Verbose output to the eventlog
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_NOCHANGES - No changes were detected to the Group Policy Objects
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_LINKTRANSITION - A change in link speed was detected between previous policy application and current policy application
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_LOGRSOP_TRANSITION - A change in RSoP logging was detected between the application of the previous policy and the application of the
    current policy.
    2013-04-19 15:34:43.847 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_FORCED_REFRESH - Forced Refresh is being applied. redo policies.
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_SAFEMODE_BOOT - windows safe mode boot flag
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c]         (   ) GPO_INFO_FLAG_ASYNC_FOREGROUND - Asynchronous foreground refresh of policy
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] Token (computer or user SID): S-1-5-21-976655598-962914793-294660928-7222
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] Abort Flag : Yes (0x02b54a60)
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] HKey Root : Yes (0x0000163c)
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] Deleted GPO List : No
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] Changed GPO List : Yes
    2013-04-19 15:34:43.862 [pid=0x3e0,tid=0x120c] Asynchronous Processing : Yes
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Status Callback : Yes (0xfae525b0)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] WMI namespace : Yes (0x03c96fa0)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] RSoP Status : Yes (0x057ae838)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Planning Mode Site : (none)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Computer Target : No (0x00000000)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] User Target : No (0x00000000)
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Calculated session relevance.
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Completed CSE pre-processing.
    2013-04-19 15:34:43.878 [pid=0x3e0,tid=0x120c] Calculated list relevance. [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Deleted GPO list is not relevant to the CSE.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Calculated list relevance.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Planning mode not detected.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Processing changed list.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Processing user policy.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Got WMI namespace for logging mode.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Completed get GPO list.
    2013-04-19 15:34:43.893 [pid=0x3e0,tid=0x120c] Initialized internal RSoP storage.
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] Completed GPO list pre-processing.
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] ----- Changed - 0
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] Options : (   ) GPO_FLAG_DISABLE - This GPO is disabled.
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c]           (   ) GPO_FLAG_FORCE - Do not override the settings in this GPO with settings in a subsequent GPO.
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] Options (raw) : 0x00000000
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] Version : 10354846 (0x009e009e)
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] GPC : LDAP://CN=User,cn={14209C3C-8E16-4247-95C6-925260D86074},cn=policies,cn=system,DC=mydomain,DC=com,DC=au
    2013-04-19 15:34:43.909 [pid=0x3e0,tid=0x120c] GPT :
    \\mydomain.com.au\SysVol\mydomain.com.au\Policies\{14209C3C-8E16-4247-95C6-925260D86074}\User
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c] GPO Display Name : US Drive Mapping
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c] GPO Name : {14209C3C-8E16-4247-95C6-925260D86074}
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c] GPO Link : (   ) GPLinkUnknown - No link information is available.
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c]            (   ) GPLinkMachine - The GPO is linked to a computer (local or remote).
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c]            (   ) GPLinkSite - The GPO is linked to a site.
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c]            (   ) GPLinkDomain - The GPO is linked to a domain.
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c]            ( X ) GPLinkOrganizationalUnit - The GPO is linked to an organizational unit.
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c]            (   ) GP Link Error
    2013-04-19 15:34:43.925 [pid=0x3e0,tid=0x120c] lParam : 0x00000000
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Prev GPO : No
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Next GPO : No
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Extensions : [{00000000-0000-0000-0000-000000000000}{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}][{5794DAFD-BE60-433F-88A2-1A31939AC01F}{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}]
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] lParam2 : 0x02a92248
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Link : LDAP://OU=Windows8 Machines,OU=USA,DC=mydomain,DC=com,DC=au
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Variable %GPHPATH% = "C:\ProgramData\Microsoft\Group Policy\History\{14209C3C-8E16-4247-95C6-925260D86074}\S-1-5-21-976655598-962914793-294660928-7222"
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Completed get GPH path.
    2013-04-19 15:34:43.940 [pid=0x3e0,tid=0x120c] Completed set extensions.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed get GPO is relevant.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Variable %GPTPATH% = "\\mydomain.com.au\SysVol\mydomain.com.au\Policies\{14209C3C-8E16-4247-95C6-925260D86074}\User"
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed get GPT path.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed RSoP init.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed get next GPO.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed check GPO license usage.
    2013-04-19 15:34:43.956 [pid=0x3e0,tid=0x120c] Completed GPO pre-processing.
    2013-04-19 15:34:43.971 [pid=0x3e0,tid=0x120c] Started removing policy.
    2013-04-19 15:34:43.971 [pid=0x3e0,tid=0x120c] Read GPH data file.
    2013-04-19 15:34:43.971 [pid=0x3e0,tid=0x120c] Completed parse of GPH XML.
    2013-04-19 15:34:43.971 [pid=0x3e0,tid=0x120c] Completed get tree root.
    2013-04-19 15:34:43.971 [pid=0x3e0,tid=0x120c] Deleted GPH data file.
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Started package execution.
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Set package timestamp variable (2013-04-19 19:34:43).
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Starting class <Drives>.
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Starting class <Drive> - G:.
    2013-04-19 15:34:43.987 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.003 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] EVENT : The user 'G:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object was successfully removed.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] Completed class <Drive> - G:.
    2013-04-19 15:34:44.034 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.049 [pid=0x3e0,tid=0x120c] Starting class <Drive> - M:.
    2013-04-19 15:34:44.049 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.049 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.096 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.096 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.096 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.096 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] EVENT : The user 'M:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object was successfully removed.
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] Completed class <Drive> - M:.
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] Starting class <Drive> - H:.
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.112 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.143 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.143 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.143 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.143 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.143 [pid=0x3e0,tid=0x120c] EVENT : The user 'H:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object was successfully removed.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Completed class <Drive> - H:.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Starting class <Drive> - T:.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Policy is not flagged for removal.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Completed class <Drive> - T:.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Completed class <Drives>.
    2013-04-19 15:34:44.158 [pid=0x3e0,tid=0x120c] Completed package execution.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Completed execution of removal package.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Completed remove GPH.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Started applying policy.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Opened file.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Got file size.
    2013-04-19 15:34:44.174 [pid=0x3e0,tid=0x120c] Created file buffer.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Completed read file data.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Terminated file buffer.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Closed file handle.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Read GPE XML data file (1807 bytes total).
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Completed parse of GPE XML data.
    2013-04-19 15:34:44.190 [pid=0x3e0,tid=0x120c] Completed loading of package.
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] Completed get tree root.
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] Started package execution.
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] Set package timestamp variable (2013-04-19 19:34:43).
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] Starting class <Drives>.
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.205 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.221 [pid=0x3e0,tid=0x120c] Starting class <Drive> - G:.
    2013-04-19 15:34:44.221 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.221 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.283 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.283 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.283 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.283 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] EVENT : The user 'G:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object applied successfully.
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] Completed class <Drive> - G:.
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] Starting class <Drive> - M:.
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.299 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.314 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] EVENT : The user 'M:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object applied successfully.
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] Completed class <Drive> - M:.
    2013-04-19 15:34:44.330 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Starting class <Drive> - H:.
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Starting filter [AND NOT FilterComputer].
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Passed filter [FilterComputer].
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Filters passed.
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.346 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.377 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.377 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.377 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.377 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] EVENT : The user 'H:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object applied successfully.
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] Completed class <Drive> - H:.
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] {935D1B74-9CB8-4e3c-9914-7DD559B7A417}
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] Starting class <Drive> - T:.
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] Starting filter [AND NOT FilterComputer].
    2013-04-19 15:34:44.392 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.408 [pid=0x3e0,tid=0x120c] Passed filter [FilterComputer].
    2013-04-19 15:34:44.408 [pid=0x3e0,tid=0x120c] Filters passed.
    2013-04-19 15:34:44.408 [pid=0x3e0,tid=0x120c] Set user security context.
    2013-04-19 15:34:44.408 [pid=0x3e0,tid=0x120c] Adding child elements to RSOP.
    2013-04-19 15:34:44.548 [pid=0x3e0,tid=0x120c] Properties handled.
    2013-04-19 15:34:44.548 [pid=0x3e0,tid=0x120c] RunOnce value created [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.548 [pid=0x3e0,tid=0x120c] Handle Children.
    2013-04-19 15:34:44.548 [pid=0x3e0,tid=0x120c] Set system security context.
    2013-04-19 15:34:44.548 [pid=0x3e0,tid=0x120c] EVENT : The user 'T:' preference item in the 'US Drive Mapping {14209C3C-8E16-4247-95C6-925260D86074}' Group Policy object applied successfully.
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Completed class <Drive> - T:.
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Completed class <Drives>.
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Completed package execution.
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Completed execution of apply package.
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Update GPH : apmCreateFoldersEx
    2013-04-19 15:34:44.564 [pid=0x3e0,tid=0x120c] Update GPH : xmlRemovalPackage
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Update GPH : apmWriteFile
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Updated GPH.
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Completed apply GPO.
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Completed GPO post-processing.
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Completed get next GPO. [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Completed calculate precedence.
    2013-04-19 15:34:44.580 [pid=0x3e0,tid=0x120c] Completed get RSoP class.
    2013-04-19 15:34:44.595 [pid=0x3e0,tid=0x120c] Completed initialize namespace.
    2013-04-19 15:34:44.595 [pid=0x3e0,tid=0x120c] WQL : SELECT * FROM RSOP_PolmkrSetting WHERE polmkrBaseCseGuid = "{5794DAFD-BE60-433f-88A2-1A31939AC01F}"
    2013-04-19 15:34:44.595 [pid=0x3e0,tid=0x120c] Executed WQL query.
    2013-04-19 15:34:44.595 [pid=0x3e0,tid=0x120c] Purged 4 old RSoP entries.
    2013-04-19 15:34:44.611 [pid=0x3e0,tid=0x120c] Logging 4 new RSoP entries.
    2013-04-19 15:34:44.611 [pid=0x3e0,tid=0x120c] RSoP Entry 0
    2013-04-19 15:34:44.611 [pid=0x3e0,tid=0x120c]  <INSTANCE CLASSNAME="RSOP_PolmkrDriveSetting">
    <PROPERTY NAME="name">
    <VALUE>G:</VALUE></PROPERTY>
    <PROPERTY NAME="GPOID">
    <VALUE>cn={14209C3C-8E16-4247-95C6-925260D86074},cn=policies,cn=system,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="SOMID">
    <VALUE>OU=Windows8 Machines,OU=USA,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpeGuid">
    <VALUE>{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseCseGuid">
    <VALUE>{5794DAFD-BE60-433f-88A2-1A31939AC01F}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoDisplayName">
    <VALUE>US Drive Mapping</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoGuid">
    <VALUE>{14209C3C-8E16-4247-95C6-925260D86074}</VALUE></PROPERTY>
    <PROPERTY NAME="id">
    <VALUE>{67CE9D8B-48A8-433A-813F-2B549875ABAA}</VALUE></PROPERTY>
    <PROPERTY NAME="precedence" CHANGETYPE="3">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="creationTime">
    <VALUE>20130419193444.221000+000</VALUE></PROPERTY>
    <INSTANCE CLASSNAME="RSOP_PolmkrDriveItem">
    <PROPERTY NAME="polmkrClassClsid">
    <VALUE>{935D1B74-9CB8-4e3c-9914-7DD559B7A417}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassName">
    <VALUE>G:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassStatus">
    <VALUE>G:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassImage">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassChanged">
    <VALUE>2013-04-16 18:53:56</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUid">
    <VALUE>{840ACB3A-24B1-40C9-9CFA-936FC3F08A9E}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassRemovePolicy">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUserContext">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassBypassErrors">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAction">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrThisDrive">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAllDrives">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUserName">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPath">
    <VALUE>\\detfs01\general</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLabel">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPersistent">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUseLetter">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetter">
    <VALUE>G</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrActionResolved">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetterResolved">
    <VALUE>g:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000000</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>The operation completed successfully.</VALUE></PROPERTY></INSTANCE>
    <PROPERTY NAME="polmkrBaseHash">
    <VALUE>RSOP_PolmkrDriveSetting.polmkrLetter=&quot;G&quot;</VALUE></PROPERTY></INSTANCE>
    2013-04-19 15:34:44.626 [pid=0x3e0,tid=0x120c] RSoP Entry 1
    2013-04-19 15:34:44.626 [pid=0x3e0,tid=0x120c]  <INSTANCE CLASSNAME="RSOP_PolmkrDriveSetting">
    <PROPERTY NAME="name">
    <VALUE>M:</VALUE></PROPERTY>
    <PROPERTY NAME="GPOID">
    <VALUE>cn={14209C3C-8E16-4247-95C6-925260D86074},cn=policies,cn=system,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="SOMID">
    <VALUE>OU=Windows8 Machines,OU=USA,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpeGuid">
    <VALUE>{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseCseGuid">
    <VALUE>{5794DAFD-BE60-433f-88A2-1A31939AC01F}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoDisplayName">
    <VALUE>US Drive Mapping</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoGuid">
    <VALUE>{14209C3C-8E16-4247-95C6-925260D86074}</VALUE></PROPERTY>
    <PROPERTY NAME="id">
    <VALUE>{DBA37AA7-F6DF-4E18-9BD4-383BB43637F3}</VALUE></PROPERTY>
    <PROPERTY NAME="precedence" CHANGETYPE="3">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="creationTime">
    <VALUE>20130419193444.299000+000</VALUE></PROPERTY>
    <INSTANCE CLASSNAME="RSOP_PolmkrDriveItem">
    <PROPERTY NAME="polmkrClassClsid">
    <VALUE>{935D1B74-9CB8-4e3c-9914-7DD559B7A417}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassName">
    <VALUE>M:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassStatus">
    <VALUE>M:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassImage">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassChanged">
    <VALUE>2013-04-16 18:55:02</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUid">
    <VALUE>{3D62A401-52C3-40D1-999A-32D0F0D00117}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassRemovePolicy">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUserContext">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassBypassErrors">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAction">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrThisDrive">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAllDrives">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUserName">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPath">
    <VALUE>\\detfs01\EmailArchives</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLabel">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPersistent">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUseLetter">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetter">
    <VALUE>M</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrActionResolved">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetterResolved">
    <VALUE>m:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000000</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>The operation completed successfully.</VALUE></PROPERTY></INSTANCE>
    <PROPERTY NAME="polmkrBaseHash">
    <VALUE>RSOP_PolmkrDriveSetting.polmkrLetter=&quot;M&quot;</VALUE></PROPERTY></INSTANCE>
    2013-04-19 15:34:44.642 [pid=0x3e0,tid=0x120c] RSoP Entry 2
    2013-04-19 15:34:44.642 [pid=0x3e0,tid=0x120c]  <INSTANCE CLASSNAME="RSOP_PolmkrDriveSetting">
    <PROPERTY NAME="name">
    <VALUE>H:</VALUE></PROPERTY>
    <PROPERTY NAME="GPOID">
    <VALUE>cn={14209C3C-8E16-4247-95C6-925260D86074},cn=policies,cn=system,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="SOMID">
    <VALUE>OU=Windows8 Machines,OU=USA,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpeGuid">
    <VALUE>{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseCseGuid">
    <VALUE>{5794DAFD-BE60-433f-88A2-1A31939AC01F}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoDisplayName">
    <VALUE>US Drive Mapping</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoGuid">
    <VALUE>{14209C3C-8E16-4247-95C6-925260D86074}</VALUE></PROPERTY>
    <PROPERTY NAME="id">
    <VALUE>{AEEB1495-02E1-4B94-909B-C8DE89C82C0B}</VALUE></PROPERTY>
    <PROPERTY NAME="precedence" CHANGETYPE="3">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="creationTime">
    <VALUE>20130419193444.346000+000</VALUE></PROPERTY>
    <INSTANCE CLASSNAME="RSOP_PolmkrComputerFilterItem">
    <PROPERTY NAME="polmkrBool">
    <VALUE>AND</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrNot">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrType">
    <VALUE>NETBIOS</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrName">
    <VALUE>d-7-user1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000001</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>Incorrect function.</VALUE></PROPERTY></INSTANCE>
    <INSTANCE CLASSNAME="RSOP_PolmkrDriveItem">
    <PROPERTY NAME="polmkrClassClsid">
    <VALUE>{935D1B74-9CB8-4e3c-9914-7DD559B7A417}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassName">
    <VALUE>H:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassStatus">
    <VALUE>H:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassImage">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassChanged">
    <VALUE>2013-04-18 20:14:04</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUid">
    <VALUE>{04A87992-7420-44CE-B2B6-1B07FE654F77}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassRemovePolicy">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUserContext">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassBypassErrors">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAction">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrThisDrive">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAllDrives">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUserName">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPath">
    <VALUE>\\detfs01\users\%username%</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLabel">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPersistent">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUseLetter">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetter">
    <VALUE>H</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrActionResolved">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetterResolved">
    <VALUE>h:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000000</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>The operation completed successfully.</VALUE></PROPERTY></INSTANCE>
    <PROPERTY NAME="polmkrBaseHash">
    <VALUE>RSOP_PolmkrDriveSetting.polmkrLetter=&quot;H&quot;</VALUE></PROPERTY></INSTANCE>
    2013-04-19 15:34:44.658 [pid=0x3e0,tid=0x120c] RSoP Entry 3
    2013-04-19 15:34:44.658 [pid=0x3e0,tid=0x120c]  <INSTANCE CLASSNAME="RSOP_PolmkrDriveSetting">
    <PROPERTY NAME="name">
    <VALUE>T:</VALUE></PROPERTY>
    <PROPERTY NAME="GPOID">
    <VALUE>cn={14209C3C-8E16-4247-95C6-925260D86074},cn=policies,cn=system,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="SOMID">
    <VALUE>OU=Windows8 Machines,OU=USA,DC=mydomain,DC=com,DC=au</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpeGuid">
    <VALUE>{2EA1A81B-48E5-45E9-8BB7-A6E3AC170006}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseCseGuid">
    <VALUE>{5794DAFD-BE60-433f-88A2-1A31939AC01F}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoDisplayName">
    <VALUE>US Drive Mapping</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrBaseGpoGuid">
    <VALUE>{14209C3C-8E16-4247-95C6-925260D86074}</VALUE></PROPERTY>
    <PROPERTY NAME="id">
    <VALUE>{7E0CA279-4F24-4773-BD3D-8E4E8AA8AF86}</VALUE></PROPERTY>
    <PROPERTY NAME="precedence" CHANGETYPE="3">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="creationTime">
    <VALUE>20130419193444.392000+000</VALUE></PROPERTY>
    <INSTANCE CLASSNAME="RSOP_PolmkrComputerFilterItem">
    <PROPERTY NAME="polmkrBool">
    <VALUE>AND</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrNot">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrType">
    <VALUE>DNS</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrName">
    <VALUE>nb-864-user1.mydomain.com.au</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000001</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>Incorrect function.</VALUE></PROPERTY></INSTANCE>
    <INSTANCE CLASSNAME="RSOP_PolmkrDriveItem">
    <PROPERTY NAME="polmkrClassClsid">
    <VALUE>{935D1B74-9CB8-4e3c-9914-7DD559B7A417}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassName">
    <VALUE>T:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassStatus">
    <VALUE>T:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassImage">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassChanged">
    <VALUE>2013-04-19 13:21:12</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUid">
    <VALUE>{57350522-F65A-4B69-84D5-7FD5EAA99875}</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassRemovePolicy">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassUserContext">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassBypassErrors">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAction">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrThisDrive">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrAllDrives">
    <VALUE>NOCHANGE</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUserName">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPath">
    <VALUE>\\detfs01\users</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLabel">
    <VALUE></VALUE></PROPERTY>
    <PROPERTY NAME="polmkrPersistent">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrUseLetter">
    <VALUE>1</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetter">
    <VALUE>T</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrActionResolved">
    <VALUE>R</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrLetterResolved">
    <VALUE>t:</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCodeValue">
    <VALUE>0</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultCode">
    <VALUE>0x00000000</VALUE></PROPERTY>
    <PROPERTY NAME="polmkrClassResultText">
    <VALUE>The operation completed successfully.</VALUE></PROPERTY></INSTANCE>
    <PROPERTY NAME="polmkrBaseHash">
    <VALUE>RSOP_PolmkrDriveSetting.polmkrLetter=&quot;T&quot;</VALUE></PROPERTY></INSTANCE>
    2013-04-19 15:34:44.658 [pid=0x3e0,tid=0x120c] Completed logging of RSoP data.
    2013-04-19 15:34:44.658 [pid=0x3e0,tid=0x120c] Completed commit reporting.
    2013-04-19 15:34:44.658 [pid=0x3e0,tid=0x120c] Completed GPO list post-processing.
    2013-04-19 15:34:44.673 [pid=0x3e0,tid=0x120c] Completed get GPO list. [SUCCEEDED(S_FALSE)]
    2013-04-19 15:34:44.673 [pid=0x3e0,tid=0x120c] Completed CSE post-processing.
    2013-04-19 15:34:44.673 [pid=0x3e0,tid=0x120c] User impersonation uninitialized.
    2013-04-19 15:34:44.673 [pid=0x3e0,tid=0x120c] Leaving ProcessGroupPolicyExDrives() returned 0x00000000
    2013-04-19 15:34:44.673 [pid=0x3e0,tid=0x120c]

  • Group Policy Item level targeting LDAP Query for specific AD Sites

    Hi Everyone,
    I'm looking to try and take advantage of Group Policy Preference Item Level Targeting to publish user Proxy settings based on what AD Site a user is located in.
    The company I work for has multiple proxies (for multiple regions). We have hundreds of AD Sites listed within our AD S and S setup. I know that I could potentially list every AD Site that requires a particular proxy, but this would generate additional admin
    overhead each time a new site is commissioned, as well as each time a site is decommissioned (this is a construction company, so may "sites" can fluctuate rapidly).
    Due to this, I would like to know if it is possible to filter by LDAP query, and filter for each proxy, based on a portion of the text/name of the AD Sites (as we use a specific naming convention for our sites, this could be dynamic enough for us to not
    have to add or remove additional AD sites).
    Is this possible, and, if so, how would I write the LDAP Filter/Query??
    Right now I would assume I would do it in the following manner:
    (&(objectCategory=site)(objectClass=site)(cn=AU-*)
    Any assistance would be greatly appreciated.
    Cheers,
    Simon

    > Right now I would assume I would do it in the following manner:
    >
    > (&(objectCategory=site)(objectClass=site)(cn=AU-*)
    Sites do NOT reside in the domain partition, but in the configuration
    partition... You can verify your LDAP filter with
    dsquery * -filter "(your filter here)"
    This query will return all matching objects' distinguished names (DN).
    But why don't you use the "Sites" ILT instead? This ILT supports ? and *
    as wildcards, so it might be sufficient.
    Martin
    Mal ein
    GUTES Buch über GPOs lesen?
    NO THEY ARE NOT EVIL, if you know what you are doing:
    Good or bad GPOs?
    And if IT bothers me - coke bottle design refreshment :))

Maybe you are looking for

  • Abends - CLIB and GWIA - me too

    Running GW 8.0.2 on NW 6.5.6 (was recommended not to patch NW due to Backup Exec) Starting at 5:02 pm on January 19th we began to get Abends on our GW server. I have since determined that we only get them when one specific user's Sprint HTC EVO estab

  • Title on spine of hardcover book cut off

    Hi! I've been ordering books via iPhoto for many years and was shocked at the latest batch I received this week. I had chosen to do a hardcover book with wrap around cover.  The title on the spine was cut off, featuring only part of it which was odd

  • Java and oracle connection

    Hello I have made tables in oracle and im tryin g 2 connect these tables to java where i have made forms. i havent downloaded any driver but i think when i installed Oracle 8.1.7 it has jdbc drivers too. now i dont know which driver it is, thin, inte

  • Substitution in posting the document

    Hi All,        I am using direct input method to post the Fi documents. Documents are stored in BSEG table at end after posting happens. Mean while while posting happens some substitution takes place. eg., If profit center is 111 according to susbsti

  • Belle update for operator this March

    Hello, I think the update for this operators or appointed Nu it's for the month of March after the two posts of the forum and O2 Bouyegues. I also  hope that Orange and other operators copied from there forum Forum O2 N8 Belle firmware update for O2