?
Solved

'Application data' folder

Posted on 2010-09-16
2
Medium Priority
?
499 Views
Last Modified: 2012-05-10
Hi

I have a third-party HR application which needs to write information to the 'Application Data' folder under a users profile. We currently run under a Terminal services environment and access to this folder is denied to all end-users under our group policies.

Is there a way I could allow a small number of users access to this folder without having to grant the permission to everybody.
0
Comment
Question by:bronafon_ict
2 Comments
 
LVL 20

Expert Comment

by:wolfcamel
ID: 33691906
you should still be able to use group security - make the selected users members of the security group, and then give full permission to those users.
Alternatyively you may be able to run the program as administrator?
0
 
LVL 8

Accepted Solution

by:
kcoect earned 2000 total points
ID: 33692817
I find it interesting that you have users that are restricted to their own "Application Data" directory in their own profile.  I understand the restriction via GPO, but this is unusual since most applications that run and require temporary file storage will use the Application Data directory in a users profile.

That being said, you can do several things.
1) You can do what Wolfcamel stated above

2) You can exclude the users in question from the GPO that is preventing the access to the Application Data directory (by changing the scope of the GPO)

3) You can possibly script something in the login script that will use CALCS and change the security of those folcers for those individuals (making sure they run the correct login script)

Good luck!
0

Featured Post

Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best. In Part 2 we'll look at which ones co-exist together and why it'…
You have missed a phone call. The number looks like it belongs to the bunch of numbers which your company uses. How to find out who has just called you?
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

592 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question