Solved

How To Limit Users to Assigned Computer

Posted on 2008-10-02
3
339 Views
Last Modified: 2012-05-05
Best practice to limit staff to logging on to the network from the 1 computer assigned to them ONLY?

Presently employees are frequently logging on from computers in other buildings on our campus instead of limiting their use to just the PC on their desk.  We don't (can't) use roaming profiles & this practice causes several problems I would like to avoid by preventing  their network access to the PC assigned to them only, if possible?

Small single site, W2K3 AD evironment.  Standard desktop O/S is XP Pro SP2.
0
Comment
Question by:dealvis
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 18

Accepted Solution

by:
Don S. earned 250 total points
ID: 22627149
Simply enter the computer name that you want to limit them to in the Logon To button in the account tab in their user profile in AD.
0
 

Author Comment

by:dealvis
ID: 22627410
Perfect Solution, exactly what we wanted - Thank You Don!!
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question