Gpupdate not updating sedating children for
This feature enables you – as the administrator – to configure group memberships on the client computers or member servers.You can add user accounts to groups on client machines that are in the scope of the policy.This command supersedes the now obsolete /refreshpolicy option for the secedit command.gpupdate [/target:] [/force] [/wait: means "wait indefinitely." /logoff : Logs off after the refresh has completed.But, the only sure fire way to be sure that the new group membership straight away is to either log off as the user or reboot the computer to refresh the Kerberos token.You do have the option to reduce or increase this refresh value you can do this by modifying the “Maximum lifetime for user ticket Properties” setting under Computer Configuration Kerberos Policy.But if you do apply your policy settings this way just be aware that the users/computers will probably be waiting a while for them to get the new settings if they are applied via group membership.
Refreshes local and Active Directory-based Group Policy settings, including security settings.
I guess you could try to invoke gpupdate /force using WMI.
not much of coding but it's rather manual - you have to execute it against every machine when you need to. Process call create "gpupdate /force" You might want to add local credentials if you are not a domain poweruser.
As there are many questions about this in the newsgroups, I will come up with an example that shows how to put a group of Active Directory users into the local Administrators group on the clients.
For this article, I assume that you already created a global security group containing all users that shall become local Administrators on some client computers. The target (= client) computers reside in a specific OU.