Solved

How to create access right to domain users

Posted on 2004-10-10
4
151 Views
Last Modified: 2011-10-03
Hi, Can anyone tells me how create access right to domain users that connect to domain server.  I want to prevent users delete files in their local machines and more....

Thank you!
0
Comment
Question by:ioclaudia
4 Comments
 
LVL 23

Expert Comment

by:rhandels
ID: 12272172
Hi,

Do you mean they need access to folders on the server?? First of all, make sure to create a share and a mapping ot the server you want to use as a file server, second, create users and user group and then, create folders and make sure to give the users or user groups access to the files and folders..

This is the small version of what you want, if you need some more specifed information, i will need to have some more info. Security setup also depends on how many users you have..
0
 
LVL 2

Accepted Solution

by:
rkelley534 earned 125 total points
ID: 12273468
If you are wanting to restrict users from their local machines you will have to use Group Policy.

Once you install the Group Policy Management console you can then set computer and user restrictions on computers. It is best to place the computers that you want to restrict into their own Organizational Unit and apply group policy to that OU.

hope this helps
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Numerous times I have been asked this questions that what is it that makes my machine log on so slow, there have been cases where computers took 23 minute exactly after taking password and getting to the desktop. Interesting thing was the fact th…
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question