Solved

Logon Hours for Groups

Posted on 2001-09-15
7
329 Views
Last Modified: 2010-04-13
I'm running AD and was wondering if you can limit Logon Hours for a group of people.  Yes I know you can do it user by user but that's just way too tedious.  Are there any GPO settings that would do the trick?  Or maybe a script?
0
Comment
Question by:juraj
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
7 Comments
 
LVL 25

Accepted Solution

by:
dew_associates earned 200 total points
ID: 6485319
1. In the User Manager window, double-click a user account that requires logon hour restrictions (refer to the ?User Accounts Planning Worksheet?).

2. In the User Properties dialog box, click Hours.
By default, all hours on all days are allowed. This is represented by a filled box for every hour of every day. A filled box indicates that the user is allowed to log on during that hour. An empty box indicates that the user cannot log on.

3. Position the mouse pointer on the rectangle on the day and hour that you want to disallow access. Press the mouse button, and drag the pointer through the last hour that you want to disallow. The area that you want to disallow should now be shaded.

4. Click Disallow. The area will still be shaded, but the line indicating hours of access should be gone.
For more information about using the Logon Hours dialog box, click Help.

5. Repeat steps 3 and 4 for all of the times that you want the user to be disallowed.

6. Click OK to return to the User Properties dialog box.

7. Click OK to return to the User Manager window.

8. Restrict logon hours for any other users who only need to log on during specified times.

To test logon hours
1. Log off and then attempt to log on as the user account that you created for the sales representative.

2. If prompted, change the password to student.
Remember, passwords are case-sensitive.
Were you able to successfully log on? Why or why not?

3. Log off and then attempt to log on as the user who is restricted to logging on during night time hours.

4. If prompted, change the password to student.
Were you able to successfully log on? Why or why not?
0
 
LVL 5

Expert Comment

by:cempasha
ID: 8493664
Hi juraj

- This question is still open and needs to be closed. If any of the comments above helped you, please accept that comment as an answer. If not please send an update about your issue so that the question can be finalised. Thank you

- Experts, please feel free to add any comments in here, if you keep silent points of question can be removed

- *** PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER ***

Pasha

Cleanup Volunteer
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 8498995
The questioner apparently edited the original question, as the last three sentences did not appear in the original question.

In short, this can be done by using the noted procedures and then creating a GPO from the individual setting as created from the steps noted above. Apply the GPO to those present in the student group.
0
Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

 
LVL 1

Expert Comment

by:netwiz562
ID: 8958290
**** CLEAN UP ****

No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

RECOMMENDATION: [ Award points to dew_associates ]

Please leave any comments here within the next seven days.

¡PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

------------------------------
Rajiv Makhijani
EE Cleanup Volunteer
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 8958556
Thanks
0
 
LVL 1

Expert Comment

by:netwiz562
ID: 8959193
dew_associates,

I thank you for being one of the few experts who actually cares what happens to all these past ignored questions and for providing your input on my recommendations to make sure the right decision is made

Thanks,
Rajiv Makhijani
EE Cleanup Volunteer

DO NOT ACCEPT AS ANSWER
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 8959212
Not a problem.
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question