Solved

Disabling Access to Control Panel on a Remote Desktop Server.

Posted on 2010-11-24
3
402 Views
Last Modified: 2012-05-10
We want to set up a server that is configured for Remote Desktop access for a small group of users that will be running a couple of applications from a remote location.  Setting up the Remote Desktop portion was a piece of cake but now I want to disable the Control Panel and Administrative tools on the Start menu.  Obviously we can't allow just any user to be making changes that could affect everybody else using the server.  I found several articles that provide information about configuring the Local Policies/Administrative Templates to disable the Control Panel but they didn't convey how to disable the Control Panel for normal users while making it available for the Administrator, either local or domain.  Our network is setup as a Windows 2003 domain so it's possible to configure the group policies in Active Directory to disable the Control Panel but it disabled it for all of the accounts including the Administrator accounts and it did it on all of the servers on the domain.  I believe that the answer may be in using Organization Units but I have been able to figure out how to configure them to target only the server providing the Remote Desktop applications.


So here's what I need.  I need to know how to configure either the local policy on the Remote desktop server or the domain group policies so that they disable the Control Panel and eventually the Administrative Tools for the normal domain user accounts that are logging in via remote desktop while still allowing the Administrator to be able to access and use the applications in both of these panels.  I believe the policy should apply only to the remote desktop server but I suppose it wouldn't hurt if it applied to all of the servers as long as the Administrator was still able to access these applications.


I seem to be dancing all around this but I am never able to find the right combination that will accomplish what I'm trying to do.



0
Comment
Question by:srulison
  • 2
3 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 500 total points
ID: 34209849
You could setup a group policy to lockdown the box for the users and use that in conjunction with loopback  processing  http://sdmsoftware.com/blog/2009/01/06/please-explain-loopback-processing/ and security fitering.  See this question I helped with

http://www.experts-exchange.com/Software/Server_Software/File_Servers/Active_Directory/Q_26409306.html

Thanks

Mike
0
 

Author Comment

by:srulison
ID: 34214853
Thank you for your response.  You probably are on the right track but I will need to do some research security filtering and loopback processing.  working with Group Policies is very new to me and I am beginning to see that there is a lot more to it than meets the eye.  I will look over the links that you gave me and google the filtering and loopback processing over the weekend.

Thanks again.

Steve.
0
 

Author Closing Comment

by:srulison
ID: 34311707
I believe that the information provided will be very helpful in configuring these policies for a remote desktop server.   Unfortunately, after I posted this question I got called away on another problem and it will be a while before I will be able to get back to this project.
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This script can help you clean up your user profile database by comparing profiles to Active Directory users in a particular OU, and removing the profiles that don't match.
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question