?
Solved

setup generic email alias for guests to use with printing functions

Posted on 2004-09-21
3
Medium Priority
?
203 Views
Last Modified: 2010-04-14
Asked to setup guest accounts that are restricted to mail , internet , and printing on network.

Should I create a OU called Guests then set policies and then add my guest users in the ou ?
0
Comment
Question by:cogit
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
valicon earned 1000 total points
ID: 12119096
Yes, create the OU as you have stated, place the guests in the OU and then follow this link to accomplish the restrictions:

http://support.microsoft.com/?kbid=323525

Hope this helps :)
0
 
LVL 12

Expert Comment

by:valicon
ID: 12119113
Use this specifically:

Editing the Group Policy in a Domain
To edit a domain-wide policy to restrict users from running specific Windows programs:
Click Start, point to Programs, point to Administrative Tools, and then click Active Directory Users and Computers.
Right-click your domain, and then click Properties.
Click the Group Policy tab.
In the Group Policy Object Links box, click the group policy to which you want to apply this setting. For example, click Default Domain Policy.
Click Edit.
Expand User Configuration, expand Administrative Templates, and then expand System.
In the right pane, double-click Don't run specified Windows applications.
Click Enabled, and then click Show.
Click Add, and then type the executable file name of the program that you want to restrict users from running. For example, type iexplore.exe.
Click OK, click OK, and then click OK.
Quit Group Policy Object Editor, and then click OK.


0
 

Author Comment

by:cogit
ID: 12119244
how about for nt 4
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Check out the latest tech news, community articles, and expert highlights in August's newsletter.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question