Solved

Group Policies

Posted on 2004-10-09
3
298 Views
Last Modified: 2010-04-10
I just created a group policy to restricted darn near everything, but in the process my .bat file that puts shortcuts on the desktop stopped working.  I get access denied error message when it trys to create the shortcut.  

What policy(ies) do I need to enable or disable in order to let the .bat file create shortcuts on the desktop?


thanks!!!!
0
Comment
Question by:Sglennlmb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 

Author Comment

by:Sglennlmb
ID: 12268540
oh yeah I'm on 2003 server.
0
 

Accepted Solution

by:
lightx earned 500 total points
ID: 12268606
if u like to run bat file and create same dirs on same desktop

1. or u need administrator rite
2. or u should be the user with the desktop u used to run it
to make it clear u cant create without administrator right over same another desktop user because is not urs

3.with ntfs u could give u rights to do what u like with dirs however u should have admin rights here too
0
 

Author Comment

by:Sglennlmb
ID: 12268644
I see what your saying...kind of

but I got it working with your ummmm, advice


thanks
0

Featured Post

Why Off-Site Backups Are The Only Way To Go

You are probably backing up your data—but how and where? Ransomware is on the rise and there are variants that specifically target backups. Read on to discover why off-site is the way to go.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question