You are using an unsupported browser. Please update your browser to the latest version on or before July 31, 2020.
close
You are viewing the article in preview mode. It is not live at the moment.
Home > 410: Scripts & Triggers Manager > Knowledge Base > 02: Tip and Tricks > 07: How to Reset Secure Channel for computers that have fallen out of sync with domain while working remotely by using Scripts Manager in PolicyPak Cloud
07: How to Reset Secure Channel for computers that have fallen out of sync with domain while working remotely by using Scripts Manager in PolicyPak Cloud
print icon

Symptoms:

Prerequisite:

Users need to have the “Reset password” right on the computer objects they will be resetting the Secure Channel for.

Note: If the user does not have the right to “Reset password” on the computer object then they will receive the following error when they attempt to reset the Secure Channel:

Once the “Reset password” right is in place for the user on the computer object the only remaining issue will be to run the reset Secure Channel command with elevated rights and that is where PolicyPak Scripts Manager comes in.

If a domain user (who has been granted the “Reset password” right) tries to reset the Secure Channel for a computer previously joined to the domain and they do not run the command elevated then they will receive the error below:

To work around this, we are going to use PolicyPak Scripts Manager (PPSM).

  1. Using an instance of the Microsoft Group Policy Management Console (GPMC) with the PolicyPak Admin console installed, create a new PPSM policy on the user side and set the “Apply action” to run the following PowerShell Script as the user and elevated:

    #Script starts here
    Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass -Force

    #Create temp folder if not present
    $tempfolder = "C:\temp"
    if (-not (Test-Path $tempfolder -PathType Container) )
    {
        New-Item -ItemType directory -Path $tempfolder
    }

    # Turn on logging
    start-transcript -path "c:\temp\SecureChannel_PS.log" -append

    # Optionally check current state of Secure Channel

    #Test-ComputerSecureChannel -verbose
    #Repair Secure Channel regardless of state
    $VerbosePreference = "Continue"
    Write-Verbose "Running Test-ComputerSecureChannel -Repair"
    Test-ComputerSecureChannel -Repair

    #End of Script

  2. Skip the “Revert action” screen, then for “Policy process mode configuration” choose either “Once” or the “Once or when forced” radio button then click “Save” to save the policy.
  3. Export the policy as XML then upload and link the policy to the Computer group in PolicyPak Cloud that needs to receive the policy.

    Should look similar to below after import:

  4. For testing, you can either wait for the policy to process on its own automatically, or manually test from a computer that is currently connected to the company network via VPN and is experiencing this issue by running “ppcloud /sync” followed by ‘’ppupdate” from a CMD prompt.

    TIP: Check the log file in C:\Temp folder or run “Test-ComputerSecureChannel -verbose” from PowerShell to verify the Secure Channel is working again.

    Example of successful result in log file (c:\temp\SecureChannel_PS.log ) is below:

Feedback
0 out of 0 found this helpful

scroll to top icon