Solved

Application Access in Active Directory

Posted on 2009-05-07
2
212 Views
Last Modified: 2012-05-06
Hello all,

I was wondering if it is possible through group policies give certain users full rights for certain applications. My problem is I have stand alone Norton 2009s which constantly ask for admin access to update along with a few 3rd party apps which get frequent updates.

I am running Windows 2008 x64 Standard.

Thank You

0
Comment
Question by:devereandpartners
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 27

Accepted Solution

by:
bluntTony earned 500 total points
ID: 24324946
If you can't raise the users' local permissions (might be worth trying Power Users?), then really all you can control via group policy is file system and registry permissions. If you can figure out which files/keys are restricted to local admins and consequently non allowing normal users to perform certan tasks, then you can change this via group policy. Either that, or the software might have registry key you can edit to allow non-admins to perform certain tasks.

Unfortunately because it's 3rd party software there's not going to be anything in the GPMC to modify the application's settings. This would be where a custom adm template might come into play, either supplied by the software vendor or you can write one yourself (if you can find out the registry entries you need to edit).

Without any knowledge of these applications I'm afraid I couldn't be any more specific.


0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question