Solved

Lock down terminal service to only allow access to PeachTree

Posted on 2006-07-12
6
323 Views
Last Modified: 2010-05-18
I am in the process of setting up PeachTree for an accountant on a terminal server.   I created a new OU for the user and via the GP for that OU have been able to lock down the desktop, explorer, and several other things.  Basically from the desktop the user can't do anything but click on the PeachTree icon.  However that is where the problem is at.  Once they open PeachTree, they can then browse the local drives, mapped drives, and also the network.  From a security stand point I don't want them to be able to access anything but the mapped drive where their data files reside.  Any suggestions on how I can lock down the ability to browse from the PeachTree application?  I contacted PeachTree about it, and they indicated there is nothing I can do to the program to resolve the issue.
0
Comment
Question by:techhd
  • 3
  • 2
6 Comments
 
LVL 33

Accepted Solution

by:
NJComputerNetworks earned 500 total points
ID: 17093686
Edit security (NTFS permissions) so that the user does not have access.
0
 
LVL 33

Expert Comment

by:NJComputerNetworks
ID: 17093699
0
 
LVL 21

Expert Comment

by:mcsween
ID: 17093971
If you want them to only be allowed to run Peachtree set the following policy in your GPO

User Config --> Windows Componets --> Terminal Services --> Start a program on connection

With this policy set the user will connect to Terminal Services and Peachtree will launch and they will not even see the desktop or start menu.  When they close Peachtree the terminal server session will end.

How are they browsing the network/local drives once Peachtree is open?

0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:techhd
ID: 17095113
PeachTree has a browse option to locate the database files.  You then get a drop down that gives the drives.  There is also a network browse where it opens the window for mapping a network drive, where I am able to browse the network.

Tomorrow I will try the NTFS permissions for the local drives which might take care of that problem.  I still need a solution that stops them from browsing the network.  Even though they can't browse into folders due to permissions, I don't want them to be able to even see anything on the network like the shares.

0
 

Author Comment

by:techhd
ID: 17102033
Editing the Security in NTFS, did eliminate the ability to browse the hard drive from within PeachTree.  I am still looking for some suggestions on how I can block the ability to browse the network?
0
 

Author Comment

by:techhd
ID: 17261263
I was able to find resolution to stop an individual from browsing the network.  I shut off the computer browser service.  I now have the server locked down that even through Peach Tree the individual will not be able to browse anything.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
removing Exchange from an old windows 2003 DC 8 62
setup share and NTFS permissions. 12 86
change home folder path 4 56
Questions about DHCP migration 5 82
Scenerio: You have a server running Server 2003 and have applied a retail pack of Terminal Server Licenses.  You want to change servers or your server has crashed and you need to reapply the Terminal Server Licenses. When you enter the 16-digit lic…
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

827 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question