?
Solved

Restrict users from opening unlicensed applications from "File explorer"

Posted on 2011-02-15
1
Medium Priority
?
565 Views
Last Modified: 2012-08-13
Hi

We have a Citrix XenApp farm and multiple Terminal Servers.
We offer them a range of application via our platforms, but for the use of for example MS Access, we have an issue.

User A: we give an MS Access shortcut
User B: we don't give an MS Access shortcut

But User B will always be able to open MS Access files via File explorer, so in fact he uses MS Access => he needs a license.

What is the most common way to restrict this?
Via NTFS security on the application's executable?

Thanks for your answer.
0
Comment
Question by:ISBNET
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 19

Accepted Solution

by:
basraj earned 2000 total points
ID: 34896516
yes, try it
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Citrix policies are the most efficient method to configure and tune XenDesktop environments, allowing organizations to control connection, security and bandwidth settings based on various combinations of users, devices or connection types.  Citrix …
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question