Solved

Securing a user from the network

Posted on 2006-07-14
3
247 Views
Last Modified: 2013-12-04
How do you secure a user from ONLY having access to log into the network using vpn or remote desktop to have access ONLY to email, nothing else?
0
Comment
Question by:Solar6838
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17112787
you are asking a lot....you are going to have do some hefty work with group policies

http://www.microsoft.com/downloads/details.aspx?FamilyID=7821C32F-DA15-438D-8E48-45915CD2BC14&displaylang=en
0
 
LVL 88

Accepted Solution

by:
rindi earned 500 total points
ID: 17113626
I wouldn't give him access to VPN or remote desktop in such a situation, but rather enable web access for his email...
0
 
LVL 37

Expert Comment

by:bbao
ID: 17113735
another official solution kit:

Microsoft Shared Computer Toolkit for Windows XP
http://www.microsoft.com/windowsxp/sharedaccess/default.mspx

"This toolkit helps make it easy for anyone to set up, safeguard, and manage shared computers running Windows XP, such as those in schools, libraries, Internet cafes, and other public places."
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have been asked to explain on many, many occasions the correct way to setup network cards and DNS settings on ISA Server 2004, 2006 and forefront Threat management gateway (FTMG) and have willing done so. I have also promised my self everytime tha…
As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question