Solved

Not Permitting Terminal Services Logon

Posted on 2008-06-23
12
413 Views
Last Modified: 2012-05-05
Good morning,
Our servers are not letting our users logon via terminal services.  We're running Windows Server 2003 in a terminal services environment.  Administrators can logon.  No other user can.  Where would I address this problem and how.
Thanks for your help.
0
Comment
Question by:cclausen1
  • 6
  • 5
12 Comments
 
LVL 3

Expert Comment

by:dblake15
Comment Utility
So your users are trying to RDP in??  If that is the case then you need to make sure that the users are part of the remote desktop users group or in My Computer properties, under the remote tab, you can add the group that you have the users in, with regards to AD.
0
 
LVL 31

Expert Comment

by:Henrik Johansson
Comment Utility
Normally the users nead to be added to the local group "Remote Desktop Users".
The groups allowed to log on through TS is controlled by the policy "Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on through Terminal Services" (default Administrators and Remote Desktop Users).
0
 

Author Comment

by:cclausen1
Comment Utility
Users are part of the Remote Desktop Users group.  I think a Group Policy was changed affecting this.  Is that possible?
0
 
LVL 31

Expert Comment

by:Henrik Johansson
Comment Utility
Yes, it's the user rights assignment in my previous post that has been changed through GPO or local policy.
Use rsop.msc (Resultant Set Of Policies) to analyze what GPO is setting the policy.
Create a new GPO to set the "...\User Rights\Allow log on through Terminal Services" to allow TS-access for both Administrators and Remote Desktop Users. Link the GPO to the OU containing the TS-server.
0
 

Author Comment

by:cclausen1
Comment Utility
The policy "Allow logon through Terminal Services" shows only administrators and the option of "adding" or "removing" users is greyed-out for all our servers.
0
 

Author Comment

by:cclausen1
Comment Utility
I have also enabled the group policy "Allow users to connect remotely using Terminal Services" at the domain and domain controller level.  This has had no effect unfortunately.
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 31

Expert Comment

by:Henrik Johansson
Comment Utility
The reason for it's grayed out is that a GPO is affecting the server. Run rsop.msc to see what GPO is applying the setting. If you were able to modify the setting, it would be overriden by the GPO.
You nead to modify the GPO (or create a new linked to the OU containing the server) to allow both Administrators and Remote Desktop Users.
Your last posts make me wonder if the server also is a DC?
0
 

Author Comment

by:cclausen1
Comment Utility
A DC is affected, but the two servers running as TSs are the ones we're focused on.  

I ran rsop.msc, but it wasn't evident.  Where would the policy blocking this most likely reside?  Under Users or Computer Config?

Thanks.
0
 
LVL 31

Expert Comment

by:Henrik Johansson
Comment Utility
User rights assignment is a part of computer configuration.

Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Allow log on through Terminal Services

rsop.msc is just for analyzing to find out what GPO is configuring the policy setting.

To solve the problem:
Place the TS-servers in their own OU.
Create a new GPO configuring the user right to log on through TS.
Link the GPO to the OU with the TS-servers.
0
 

Author Comment

by:cclausen1
Comment Utility
Is this done via the Group Policy Management tool?  If local policies are changed via the process you've outlined, will it propogate to all the servers.
0
 
LVL 31

Accepted Solution

by:
Henrik Johansson earned 250 total points
Comment Utility
Yes
Local policy has lowest priority and will be overruled if the policy is set through a GPO in the domain.
0
 

Author Closing Comment

by:cclausen1
Comment Utility
Thanks.
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Suggested Solutions

I guess it is not common knowledge to most Wintel engineers/administrators: If you have an SNMP-based monitoring system in your environment (and it's common to have SNMP or Syslog) it's reasonably easy to enable monitoring of the Windows Event logs,…
Recently, I had the need to build a standalone system to run a point-of-sale system. I’m running this on a low-voltage Atom processor, so I wanted a light-weight operating system, but still needed Windows. I chose to use Microsoft Windows Server 200…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now