Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Which group policy settings are used in restricting Server 2008's Remote Apps?

Posted on 2009-02-13
2
Medium Priority
?
367 Views
Last Modified: 2012-05-06
We have a terminal server that we are using currently, but we have just installed a new 2008 server, with this comes the Remote apps feature. When a regular domain user uses the remote app from their desktop it works fine, however when a terminal server user tries this, it logs it off without starting the program. I am sure that it is some restriction that we have on the group policy for terminal users but i cannot find which one is making it not work. Also the terminal users can run the program if they actually fully remote into the computer and have the desktop, etc, but just cannot use the remote app feature.
0
Comment
Question by:jasontomlinson1
2 Comments
 
LVL 23

Accepted Solution

by:
redrumkev earned 2000 total points
ID: 23641529
jasontomlinson1,

How are you doing?

Here is a great resource with white papers on 2008 TS:
http://ts.veranoest.net/ts_policies.htm

Remote applications:
http://technet.microsoft.com/en-us/library/cc730673.aspx
Also, I know this basic, but have you done all of these, just a good double check:
http://www.msterminalservices.org/articles/Managing-Terminal-Services-Group-Policy.html

Hope this helps,
Kevin
0
 

Author Closing Comment

by:jasontomlinson1
ID: 31546678
Thanks that link helped
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many companies are making the switch from Microsoft to Google Apps (https://www.google.com/work/apps/business/). Use this article to learn more about what Google Apps has to offer and to help if you’re planning on migrating to Google Apps. It is …
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question