Solved

How can I safely lock down USB ports on thin clients in a virtual desktop infrastructure?

Posted on 2010-09-23
6
1,194 Views
Last Modified: 2012-05-10
I am trying to determine the best thin clients to quote. We are setting up a 10 user View test group and the client (financial entity) requires USB lock down. This test group will not be part of production environment nor tied to its AD. WHat is the best product/way to lock down these USB ports to prevent end user usage?

Thank you,

Mike
0
Comment
Question by:Square1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 4

Accepted Solution

by:
nutwoo earned 250 total points
ID: 33746572
I would create GPO with the USB ports disabled, apply to AD OU with the hosts within.

this may help you
http://www.experts-exchange.com/OS/Miscellaneous/Q_22043807.html
0
 
LVL 4

Assisted Solution

by:ekincam
ekincam earned 250 total points
ID: 33758681
The BIOS of our thin clients allows the USB ports to be disabled.  The BIOS can then be password protected.  But this requires you touch each machine so it may not be the best solution.

Another, more permanent solution, would be to fill them with some type of glue or epoxy.
0
 
LVL 5

Expert Comment

by:AC_Nova
ID: 33787243
0
Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

 
LVL 5

Expert Comment

by:AC_Nova
ID: 33787249
no active directory tie in.
0
 
LVL 4

Expert Comment

by:nutwoo
ID: 33787506
What make and model thin client do you have ?
0
 

Author Closing Comment

by:Square1
ID: 33788780
satisfied with input
0

Featured Post

Are You Headed to Black Hat USA 2017?

Getting ready for Black Hat next week? Kick things off with the WatchGuard Badge Challenge and test your puzzle and cipher skills. Do you have what it takes to earn our limited edition Firebox Badge? Get started today - https://crimsonthorn.net

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
The viewer will learn how to successfully download and install the SARDU utility on Windows 7, without downloading adware.

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question