-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
gPCMachineExtensionNames isn't set on GPO attributes, causing them to not show and not apply #39
Comments
Thank you for reporting this @mdjx, we will work to fix this in our September release. |
In order for the GPO to apply the security settings we need to set the GPO's relevant field to the correct values. Fixes #39.
In order for the GPO to apply the security settings we need to set the GPO's relevant field to the correct values. Fixes #39.
In order for the GPO to apply the security settings we need to set the GPO's relevant field to the correct values. Fixes #39.
Hi @mdjx , version 0.2.0 is out and it contains the fix for this issue. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
In order for the GPO to apply the security settings we need to set the GPO's relevant field to the correct values. Fixes hashicorp#39.
Terraform Version and Provider Version
Terraform v0.12.29
provider.ad v0.1.0
Windows Version
Client, Windows 10 1909
Server, 2012 R2, 2019
Affected Resource(s)
ad_gpo_security
Terraform Configuration Files
Expected Behavior
GPO should be created with the correct event log settings
Actual Behavior
GPO is created, but the settings are not visible in the 'Settings' tab of GPMC. The GPO does not apply correctly when linked.
However, once you edit the GPO, they can be seen.
Steps to Reproduce
terraform apply
Important Factoids
This condiition is due to a missing
gPCMachineExtensionNames
value within AD for the GPO. It needs to be set to[{827D319E-6EAC-11D2-A4EA-00C04F79F83A}{803E14A0-B4FB-11D0-A0D0-00A0C90F574B}]
.GPO Created with AD Provider:
Working GPO:
This can be corrected with PowerShell:
Set-ADObject -Identity "__GPO__DN__" -Replace @{gPCMachineExtensionNames="[{827D319E-6EAC-11D2-A4EA-00C04F79F83A}{803E14A0-B4FB-11D0-A0D0-00A0C90F574B}]"}
For User settings, the attribute name is
gPCUserExtensionNames
.This issue is more complex then I have presented here, there are GUIDs for different types of settings, a (complete?) list can be found here: https://www.infrastructureheroes.org/microsoft-infrastructure/active-directory/guid-list-of-group-policy-client-extensions/. Different GPO settings will require different CSE GUIDs to be applied to the appropriate attribute (user/machine).
Once the attribute value is set, the GPO shows (and applies) correctly.
References
Community Note
The text was updated successfully, but these errors were encountered: