Default Domain Policy misconfigured — Domain Admins & Enterprise Admins added to DENY logon settings, locking all admin access

Al Aguilar 0 Reputation points
2025-11-28T07:08:19.64+00:00

Hello, I need help recovering my Active Directory domain after an incorrect settings change was applied to the Default Domain Policy (DGP {31B2F340-016D-11D2-945F-00C04FB984F9}).

A change was made to the GPO’s security policy that added multiple Deny entries affecting administrative accounts. Specifically:

Both “Domain Admins” and “Enterprise Admins” were added to these policies:

Deny log on locally

Deny log on through Remote Desktop Services

Deny access to this computer from the network

As soon as the policy applied, every domain administrator account was locked out of every domain controller, both locally and over RDP.

This includes all privileged groups because:

Domain Admins SID = S-1-5-21-…-512

Enterprise Admins SID = S-1-5-21-…-519

Both appear inside the Default Domain Policy’s GptTmpl.inf under MACHINE\Microsoft\Windows NT\SecEdit

Windows for business | Windows Server | Directory services | Deploy group policy objects
{count} votes

2 answers

Sort by: Most helpful
  1. Marcin Policht 67,980 Reputation points MVP Volunteer Moderator
    2025-11-28T12:09:36.1166667+00:00

    Resetting the Default Domain Policy should work. This should have no impact on other GPOs (other than Default Domain Policy and Default Domain Controllers Policy)


    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin

    0 comments No comments

  2. Kate Pham (WICLOUD CORPORATION) 205 Reputation points Microsoft External Staff Moderator
    2025-12-01T01:26:51.38+00:00

    Hi sir.

    Thank you for your contribution to the community

    To address the issue, please help try remove the incorrect settings, this could avoid causing impact on other GPOs.

    Then, run gpupdate /force for the new setting to be applied.

    • Verify effective rights (perform on all DCs):

    gpresult /h C:\temp\gp.html

    • Force DFSR to poll Active Directory for changes:

    dfsrdiag pollad

    If you believe this information adds some value, please accept the answer so that your experience with the issue would help contribute to the whole community.

    Best wishes,

    Kate!

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.