Solved

setup generic email alias for guests to use with printing functions

Posted on 2004-09-21
3
202 Views
Last Modified: 2010-04-14
Asked to setup guest accounts that are restricted to mail , internet , and printing on network.

Should I create a OU called Guests then set policies and then add my guest users in the ou ?
0
Comment
Question by:cogit
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
valicon earned 250 total points
ID: 12119096
Yes, create the OU as you have stated, place the guests in the OU and then follow this link to accomplish the restrictions:

http://support.microsoft.com/?kbid=323525

Hope this helps :)
0
 
LVL 12

Expert Comment

by:valicon
ID: 12119113
Use this specifically:

Editing the Group Policy in a Domain
To edit a domain-wide policy to restrict users from running specific Windows programs:
Click Start, point to Programs, point to Administrative Tools, and then click Active Directory Users and Computers.
Right-click your domain, and then click Properties.
Click the Group Policy tab.
In the Group Policy Object Links box, click the group policy to which you want to apply this setting. For example, click Default Domain Policy.
Click Edit.
Expand User Configuration, expand Administrative Templates, and then expand System.
In the right pane, double-click Don't run specified Windows applications.
Click Enabled, and then click Show.
Click Add, and then type the executable file name of the program that you want to restrict users from running. For example, type iexplore.exe.
Click OK, click OK, and then click OK.
Quit Group Policy Object Editor, and then click OK.


0
 

Author Comment

by:cogit
ID: 12119244
how about for nt 4
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question