customizing a desktop on a domain

Posted on 2007-10-02
Medium Priority
Last Modified: 2010-03-17
At work we are starting a domain.  How can I customize different people's desktops? There are some programs on some computers we do not want some people getting to, but some we want to have a shortcut on their desktop.
Question by:joshence

Accepted Solution

Pr1z earned 252 total points
ID: 19997552
The answer to your question could be very long ...

In short ...
You can controll access to applications via Security Groups.  You can deploy applications via Active Directory Group Policies.  You can add/remove shortcuts from the desktop via logon scripts.

There are many resources at http://www.microsoft.com//technet that will help you with each of these approaches.


LVL 23

Assisted Solution

ormerodrutter earned 248 total points
ID: 19997693
You may use Group policy to deploy (or in Windows' term assign) software to appropriate USERS/Groups.


Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question