-
Notifications
You must be signed in to change notification settings - Fork 72
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Group Policies on Server 2019 #73
Comments
Did you find a solution for this as I am also getting the error |
I have had this too! |
I had the same Issue on 2019 servers.
I have to go further in the tests because i still have GPO problem (cannot create one) |
Yeah, we used this script on all our new 2019 deployments and it does kill GPO Management. You can't edit or create new group policies. We even created a ticket with microsoft, but they were like "Nah, it's your script." But we have this working everywhere else 2016 and below, what did you change?! we said. |
maybe an issue should be select only shares with type 0. Not 0 and 2147483648 as it is actually. $drivesContainingShares = Get-WmiObject Win32_Share | Select Name,Path,Type | Where-Object { $_.Type -match '0|2147483648' } | Select -ExpandProperty Path | Select -Unique no time to check now if someone could ...thanks :-) |
We did more testing just on 2019 servers, Standard and Essential. It has nothing to do with the CryptoBlocker script at all. Something is broken in 2019 when Passive screens are applied to the same volume where SYSVOL sits on. |
@xicanoink @davidande @snagrat @big-nath I replaced the code with this in the protect list part (we dont use this so i delted it) What is does it checks witch OS version you are running and based on that it enumerates shares with or with the C drive. So if the server OS version is 2019 then it will enumerates shares on every drive except the C drive. If it is 2016 or lower it will enumerate shares on all drives. Check OS Version for specific Enumeration of OS shares$OSVersion = (get-itemproperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" -Name ProductName).ProductName If($OSVersion -like "Windows Server 2019*") Else { |
FRSM role now makes no errors in GPO. no incompatibility anymore. |
I seem to be having an issue when running the script on Server 2019. It seems to stop Group policy management from working correctly. When I try to create a GPO after running this script it, I get a access denied error.
I have removed the Passive screens monitoring the sysvol folder and then the GPO creation works again.
I only seem to have this issue with 2019. Has anyone else experienced this issue?
The text was updated successfully, but these errors were encountered: