?
Solved

Create group policy to logon to network

Posted on 2004-09-22
3
Medium Priority
?
376 Views
Last Modified: 2010-03-18
Hi,

I need to create a group policy in Windows 2000 AD where only group members can use a specified workstation.
i.e. When somebody who is not member of the group can not use the specified workstation to logon to the network or logon locally.
Does anybody know how to set this policy.

Thanks, Stekker
0
Comment
Question by:stekker
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 15

Accepted Solution

by:
adamdrayer earned 750 total points
ID: 12122782
if you are using Active Directory, in the properies for each user, on the "account" tab, you can specifiy which computers the user is allowed to logon to.  This is for the domain however.  In order to prevent users from logging on to the local computer, you will have to modify the local users and groups of that computer.  This can be found in the control panel
0
 

Author Comment

by:stekker
ID: 12123634
Hi Adam,

Thanks for your comment but we are thinking about a group policy. A group for each department. All groups are already created in the Active Directory. I  like to set the policy by groups.

Do you have any idear.

thanks,
0
 
LVL 15

Expert Comment

by:adamdrayer
ID: 12123662
unfortuantely, Group Policy doesn't get applied until the user successfully logs into the domain.
0

Featured Post

Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…

741 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question