Creators Update Stops Cross Domain GPO Drive mapping working ('0x80090005 Bad Data)

Solution 1:

So, I'm one of the 10 or so GP MVPs from Microsoft.

In short: This isn't supported. @Twisty is right: This security hole was closed by modern GPMCs and not permitted anymore. The KB:

https://support.microsoft.com/en-us/help/2962486/ms14-025-vulnerability-in-group-policy-preferences-could-allow-elevati

I have two possible workarounds:

1: Try REMOVING the trailing \ at the end. So, the correct UI would be

\\server\share and not \\server\share\

2: Without testing it though, a workaround might be worth testing. Try the policy setting (on ONE MACHINE using GPedit.msc):

Computer | Admin Templates | System | Group Policy | Allow cross-forest user policy and roaming user profiles

Just set ONE machine locally with that policy.. (GPedit.msc LOCALLY on one Win10 1703 / creators edition box).. dont go crazy and enable it everywhere yet.

Then, reboot and re-test.

Did that work?

If yes, yay. If not.. that's all I have to offer.

-Jeremy Moskowitz, 15-year Group Policy MVP from GPanswers.com

Solution 2:

I came up with a work-around, but it's really not pretty: The Old is New again.

Background: We moved from using a simple CMD login script to GPO mapped drives when we moved from Windows XP to Windows 8, and User Account control stopped mapped drives working, due to standard and admin tokens conflicting (See TechNet note here)

As Creators update removed the ability to save credentials in group policy, and I couldn't get group policy to add the details to the local Credential Manager (Tried using this script, but looks like it won't work with User Account Control and allowing unsigned scripts), I turned on the EnableLinkedConnections registry key, and mapped this one drive using the old skool net use command.

Full Details:

Step 1 Create a new WMI Filter specifically to detect Creators update (This reduces the lower security footprint to only the machines that need it):

select * from Win32_OperatingSystem WHERE Version like "10.0.15063%" AND ProductType="1"

Step 2 Add the WMI Filter to a new GPO, which:

  • Sets the DWORD regkey SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections to 1
  • Add a cmd Login script in the Sysvol folder

GPO Setup

Step 3

In the login script, add the following code:

net use m: /delete /y
net use m: \\[Server]\[Share]\ /user:[Server FQDN]\[Username] [Password] /PERSISTENT:YES

As a sidenote, this only fully affects users that are Local Administrators on Creator Update systems: If you have the option to take their administrator rights away, you can take out the EnableLinkedConnections step in the GPO, which improves the security for the other GPO mapped drives (The drive in question will still have a plaintext password script, though), but I'm working with a Legacy Program which needed the cross domain mapping AND Admin rights to work.

Know this is less than ideal as it goes back to the XP days of having a plaintext password in a not too hard to locate file, but it's the only workaround I've found so far to this Creators Update issue: I have a feeling programming Credential Manager via GPO or a PowerShell login script is the correct answer, but I just can't get it to work: If anyone can improve on this answer by getting that way to work, then that's what I'll go for.