Solved

How can I safely lock down USB ports on thin clients in a virtual desktop infrastructure?

Posted on 2010-09-23
6
1,155 Views
Last Modified: 2012-05-10
I am trying to determine the best thin clients to quote. We are setting up a 10 user View test group and the client (financial entity) requires USB lock down. This test group will not be part of production environment nor tied to its AD. WHat is the best product/way to lock down these USB ports to prevent end user usage?

Thank you,

Mike
0
Comment
Question by:Square1
6 Comments
 
LVL 4

Accepted Solution

by:
nutwoo earned 250 total points
ID: 33746572
I would create GPO with the USB ports disabled, apply to AD OU with the hosts within.

this may help you
http://www.experts-exchange.com/OS/Miscellaneous/Q_22043807.html
0
 
LVL 4

Assisted Solution

by:ekincam
ekincam earned 250 total points
ID: 33758681
The BIOS of our thin clients allows the USB ports to be disabled.  The BIOS can then be password protected.  But this requires you touch each machine so it may not be the best solution.

Another, more permanent solution, would be to fill them with some type of glue or epoxy.
0
 
LVL 5

Expert Comment

by:AC_Nova
ID: 33787243
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 5

Expert Comment

by:AC_Nova
ID: 33787249
no active directory tie in.
0
 
LVL 4

Expert Comment

by:nutwoo
ID: 33787506
What make and model thin client do you have ?
0
 

Author Closing Comment

by:Square1
ID: 33788780
satisfied with input
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

You may have a outside contractor who comes in once a week or seasonal to do some work in your office but you only want to give him access to the programs and files he needs and keep privet all other documents and programs, can you do this on a loca…
Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
Teach the user how to use create log bundles for vCenter Server or ESXi hosts Open vSphere Web Client: Generate vCenter Server and ESXi host log bundle:  Open vCenter Server Appliance Web Management interface and generate log bundle: Open vCenter Se…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now