?
Solved

how to deny using datacard devices?

Posted on 2011-02-16
11
Medium Priority
?
1,273 Views
Last Modified: 2012-05-11
some our users uses datacard devices for internet surfing.
it uses dial numbers.
how can i prevent dialing from group policy?
0
Comment
Question by:Mirceyhun
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
11 Comments
 
LVL 2

Expert Comment

by:storkyIV
ID: 34905119
Hello,

In server 2008:

Users Configuration>Policies>Administrative Templates>Network>Network Connections.

User Configuration>Preferences>Control Panel Settings>Network Options and from here you can setup a new Diap-Up Connections and set the Action to Delete if the user has any existing DUN connections...
0
 

Author Comment

by:Mirceyhun
ID: 34905469
it didnt help...
0
 
LVL 24

Expert Comment

by:Mike Thomas
ID: 34921549
You cannot do this using group policy unless you are able and willing to force a fake proxy setting (IP), or better still use a proxy setting (IP) of a proxy server hosted on your network, this would result in all internal browsing sessions to work and all through external connections (via data cards) to fail.


0
Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

 
LVL 29

Expert Comment

by:pwindell
ID: 34921589
If it is not against company policy then you can't do anything.

If it is against comapny policy,... fire them.  You'll only have to fire one of them,...the rest will stop immediately.

If the company won't do that,...then they are basicvally saying that they "allow" the behavor.

Computers are not babysitters.  You are not going to find a technical solution to a human behavor problem.  That may seem over simplistic,...but I am just being straight with you.  If the company won't deal with its humans, on a human level, human-to-human,...then the war is over and you lost.
0
 

Author Comment

by:Mirceyhun
ID: 34923562
thanks pwindell. i want to resolve this problem technicaly first. if it would not help... i will "fire"
0
 
LVL 29

Accepted Solution

by:
pwindell earned 2000 total points
ID: 34927229
I wish there was a [good] technical solution,...there is not,...I don't think there is even a "bad" solution.

Whatever measures you choose to take before getting to the point of someone being fired is going to have to be a human-to-human thing.

Options might consist of:
1. Confiscate the Data Cards.  Return them to the person when they leave to go home or do it by mail
2. Create an official computer use policy that the users must sign and agree to
3. Suspend first offenders for a period of time (day, week, whatever).
4. If it involves going to porn sites,..report it to their wife  :-)
0
 

Author Comment

by:Mirceyhun
ID: 34931713
:)
how to
 Create an official computer use policy that the users must sign and agree to ?
0
 
LVL 29

Expert Comment

by:pwindell
ID: 34943559
Ask your Human Resource Dept.

It is a document.  Someone writes it up.  Users sign it.  It is kept in employee's HR Files.  It provides legal grounds to fire someone if they violate the agreement.
0
 

Author Closing Comment

by:Mirceyhun
ID: 34953257
Thanks
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Suggested Courses

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question