Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How To Limit Users to Assigned Computer

Posted on 2008-10-02
3
Medium Priority
?
361 Views
Last Modified: 2012-05-05
Best practice to limit staff to logging on to the network from the 1 computer assigned to them ONLY?

Presently employees are frequently logging on from computers in other buildings on our campus instead of limiting their use to just the PC on their desk.  We don't (can't) use roaming profiles & this practice causes several problems I would like to avoid by preventing  their network access to the PC assigned to them only, if possible?

Small single site, W2K3 AD evironment.  Standard desktop O/S is XP Pro SP2.
0
Comment
Question by:dealvis
3 Comments
 
LVL 18

Accepted Solution

by:
Don S. earned 750 total points
ID: 22627149
Simply enter the computer name that you want to limit them to in the Logon To button in the account tab in their user profile in AD.
0
 

Author Comment

by:dealvis
ID: 22627410
Perfect Solution, exactly what we wanted - Thank You Don!!
0

Featured Post

Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Wouldn't it be nice if objects in Active Directory automatically moved into the correct Organizational Units? This is what AutoAD aims to do and as a plus, it automatically creates Sites, Subnets, and Organizational Units.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question