Solved

RemoteApp / Group Policy - 'browsing' to select a file

Posted on 2010-11-24
5
795 Views
Last Modified: 2012-05-10
Hi All - I'm deploying a MS Access application with RemoteApp. There is a feature in the access application  that requires the user to "browse for a file".  This of course brings up a windows dalogue box to locate a file (not local to the user, but on the RD server).  I would like to restrict the user to a certain directory on the server...and also make this certain directory the default.  How can I accomplish this through group policy?
0
Comment
Question by:polaris101
  • 3
  • 2
5 Comments
 
LVL 11

Accepted Solution

by:
Paul S earned 500 total points
ID: 34207940
setup a virtual drive

subst x: c:\users\allowed\folder\only

then use this to hide all drives including c:
http://support.microsoft.com/kb/231289

only x: should be visible.

if you need a more sophisticated solution write a script that dynamically maps a drive using the subst command.
0
 

Author Comment

by:polaris101
ID: 34266743
THanks for the reply.  The virtual drive will work perfectly.  However, regarding the MS article to hide all drives.... When opening windows explorer, the drives are hidden, but, if you type in C:/, it brings you right to the root of C:/...I was assuming that it would through some kind of error message ...but nope.  Any other thoughts on restricting access to local drives?
0
 

Author Comment

by:polaris101
ID: 34267082
Ok, nevermind, I found another policy to restrict and hide those drives.  Another question for ya:  What is the best way to run the map virtual drive script for all users?  .bat, .cmd in Logon Script GP ?
Thanks! Scott
0
 
LVL 11

Expert Comment

by:Paul S
ID: 34294129
any scripting language should be fine. I use vbscript the most, but also .cmd for really simple scripts.
0
 
LVL 11

Expert Comment

by:Paul S
ID: 34294133
vbscript are easier to hide then .cmd, that is why I use them more.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

Synchronize a new Active Directory domain with an existing Office 365 tenant
OfficeMate Freezes on login or does not load after login credentials are input.
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now