I’ve just noticed I’m having issues with windows clients, group policies and sysvol/netlogon shares on UCS 4.4 domain controllers as samba4 AD.
My two main issues are:
- Group policies for computers are applying. But GPO for users are not applying. I’m getting windows error 1058:
The processing of Group Policy failed. Windows attempted to read the file \replaceddomain.com.au\sysvol\replaceddomain.com.au\Policies{31B2F340-016D-11D2-945F-00C04FB984F9}\gpt.ini from a domain controller and was not successful. Group Policy settings may not be applied until this event is resolved.
- Standard users can’t view the sysvol or netlogon shares on the domain controllers directly (
\\dcm1\sysvol
) or via IP address (\\10.20.x.x\sysvol
) or the domain address (\\replaceddomain.com.au\sysvol
). From explorer they just get the credentials popup over and over and from the cli with net view they just get system error 5 access is denied.
I can view all shares on a member file server (so kerberos is working?) and logins to the domain work without issue; just viewing the DC master/backup share listing or going directly to sysvol/netlogon does not work at all. Domain Admin users can view the sysvol/netlogon shares on the DCs. file ownership/permissions/acls seem to match a default UCS install too.
Have searched out the following UCS forum topics which have aspects of the issue I’m having:
- Problems evaluating group policies
- Netlogon & Sysvol Zugriff verweigert - seems to have same issues I do.
- Kein Zugriff auf SYSVOL - same symptoms for share access, his solution of sysvolreset didn’t help me
- Suddenly not all GPOs get applied - similar symptoms re. GPO policies failing, tried deleting policy history on client with no luck.
And have found the following windows topics and issues online re. the MS16-072 GPO changes and the MS15-011 hardened UNC paths changes:
- https://blogs.technet.microsoft.com/leesteve/2017/08/09/demystifying-the-unc-hardening-dilemma/
- https://support.microsoft.com/en-us/help/3163622/ms16-072-security-update-for-group-policy-june-14-2016
- https://support.microsoft.com/en-us/help/3000483/ms15-011-vulnerability-in-group-policy-could-allow-remote-code-executi
- https://community.spiceworks.com/topic/1119601-windows-10-group-policy-issue?page=1
- https://community.spiceworks.com/topic/1666296-beware-known-issues-with-update-kb3159398?page=1
- https://social.technet.microsoft.com/Forums/lync/en-US/4f3b560d-9c35-413e-9483-0e5be519e5d6/group-policy-cannot-apply-when-using-security-filtering?forum=winserverGP
I’m assuming my issues are coming from a combination of the hardened UNC paths changes in win10 (although my win7 machines have the same problem) and the GPO changes that force windows to read computer and user policies as the machine account context rather than the user account.
But I can’t find any combination of any mentioned fixes in all the above links that helps, and hoping someone here can help me narrow this down.
I’ve tried:
-
Based on problems evaluating group policies SDB have checked:
- Time sync is good.
- gpupdate /force works for computer GPO fails for user GPO.
- DNS all seems to work.
- tried sysvolreset and check, all good.
- no missing or mismatched revisions as far as I can tell.
-
setting Hardened UNC paths via computer GPO and via regedit directly on the win10 clients to wildcards (
\\*\SYSVOL, \\*\NETLOGON
), domain names (\\replacedomain.com.au\SYSVOL
), server names (\\dcm1.replaceddomain.com.au\SYSVOL
) with combinations of RequireMutualAuthentication=0, RequireIntegrity=0, RequirePrivacy=0 without any change to standard users ability to access the DC shares. -
Changing the GPO security filtering and delegation to authenticated users and/or domain computers:
-
If I set the domain computers group (read/apply) in the security filter and the authenticated users (read) group in the delegation my user policies don’t give me error 1058 and complete but they are also completely filtered out by the domain computers security filter and don’t apply anything to users (gpresult /r shows filtered policies).
-
If I set authenticated users (read/apply) in security filter and domain computers (read) in delegation I receive error 1058 for user policies and none of them apply as GPO client gives up after first access denied failure.
-
-
I’ve used
samba-tool ntacl sysvolreset
andsamba-tool ntacl sysvolcheck
and there are no issues there. -
The xattr for the sysvol/netlogon folders look to be OK (have compared against a fresh 4.4 install and against the UCS forum threads linked above). I have also tried adding in a domain computers group ACL for the sysvol folder with no change.
-
Based on thread above I enabled samba/max/protocol = SMB3 and min/protocol = SMB2
-
un-joining and re-joining machine (even deleting completely the machine account) no change.
-
Createing new user to ensure clean profile, same issues with re. to share access and user GPO application.
System Info:
- UCS Version: 4.4-0 errata147 (Blumenthal)
- UMC Version: 11.0.4-16A~4.4.0.201905101433
More Symptoms details:
- Domain logons work without issue.
- browsing of file server shares (where all my user docs/redirection are located) work without issue.
- This was previously working for win7/10 clients and has stopped at some point (maybe 4.3->4.4 upgrade?) as existing user policies applied to standard user accounts are preserved.
- There are no issues reported under the UCS system diagnostics.
- sysvol reset and check are good.
I’m assuming that if I can crack the sysvol share access issue for standard users then the GPO authenticated users security filtering will work, but at a bit of a loss of how to troubleshoot that now.
Thanks all.