Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Terminal services question

Posted on 2004-10-12
Medium Priority
Last Modified: 2013-12-04
Hello I have a client that has about 10 people that vpn/then terminal into the server to work from home. she has noticed taht the veritas backup exec icon is represented on every user. how do I make sure this icon is not visible to all useres just to admin, and the one specific user
Question by:eberhardt2329
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2

Expert Comment

ID: 12294082
The shortcut is probably in the "all users" profile.  Go to \Documents and Settings\All Users\.  You didn't say where the shortcut was, but probably under Start Menu\Programs or if it is on the desktop remove it from te desktop.  Of course you will want to make sure that the shortcut is under the Administrators profile.  The root of all profiles is \Documents and Settings.

Author Comment

ID: 12311244
so it should be in both places, and if I remove it from the all users profile it will still be in the admin profile?

Accepted Solution

netspec01 earned 2000 total points
ID: 12311468
It is probably only in the All User's profile.  Check the administrator profile.  If it is not there, you can just do a cut and past from the All User's profile to the administrator's profile.

Author Comment

ID: 12313173
ok thanks

Expert Comment

ID: 12341403
Glad to help!

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
This lesson discusses how to use a Mainform + Subforms in Microsoft Access to find and enter data for payments on orders. The sample data comes from a custom shop that builds and sells movable storage structures that are delivered to your property. …
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question