Solved

'Application data' folder

Posted on 2010-09-16
2
489 Views
Last Modified: 2012-05-10
Hi

I have a third-party HR application which needs to write information to the 'Application Data' folder under a users profile. We currently run under a Terminal services environment and access to this folder is denied to all end-users under our group policies.

Is there a way I could allow a small number of users access to this folder without having to grant the permission to everybody.
0
Comment
Question by:bronafon_ict
2 Comments
 
LVL 20

Expert Comment

by:wolfcamel
ID: 33691906
you should still be able to use group security - make the selected users members of the security group, and then give full permission to those users.
Alternatyively you may be able to run the program as administrator?
0
 
LVL 8

Accepted Solution

by:
kcoect earned 500 total points
ID: 33692817
I find it interesting that you have users that are restricted to their own "Application Data" directory in their own profile.  I understand the restriction via GPO, but this is unusual since most applications that run and require temporary file storage will use the Application Data directory in a users profile.

That being said, you can do several things.
1) You can do what Wolfcamel stated above

2) You can exclude the users in question from the GPO that is preventing the access to the Application Data directory (by changing the scope of the GPO)

3) You can possibly script something in the login script that will use CALCS and change the security of those folcers for those individuals (making sure they run the correct login script)

Good luck!
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ADFS Setup 4 41
PowerShell script to display all email addresses where the department = X 3 27
2008 R2 time server is invalid 6 31
Unable to hit site 2 23
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question