Solved

Limit workstation to a single user.

Posted on 2011-02-28
5
730 Views
Last Modified: 2012-08-13
Good afternoon and thank you for taking the time out to address my question. Your time and expertise is greatly appreciated.

Rundown:
Server runs SBS 2008 Standard
Domain network w/ 16 wks.

I just finished setting up a new pc on the domain. I want to limit that wks to only one user. Where as no other user but one is able to logon.

I did find this setting in AD users & computers, but i would mean that i would have to add each pc manually for each user. A very mundane and time consuming process.
I'm almost certain that there has to be an easier way to accomplish this.




Capture01.JPG
0
Comment
Question by:loshdog
  • 3
  • 2
5 Comments
 
LVL 21

Expert Comment

by:snusgubben
Comment Utility
By doing that you say: EHawileh can only log on to the computer named STAT01PC.
Every other domain user can log on to it.

It would be better to remove domain users from the local user group on the computer, and add EHawileh to the local user group.
0
 

Author Comment

by:loshdog
Comment Utility
Hello and thank you for your input.

Just so that i understand this correctly.
New pc is STAT20PC. I want EHawileh to be the only user allowed to logon to this machine.
The best way to do this is from the workstation itself by removing the local users or domain users from the list and allow only EHawileh to connect?

I think i got this right???  :)
0
 
LVL 21

Accepted Solution

by:
snusgubben earned 500 total points
Comment Utility
That should do it. Remove the "domain\domain users" group from the local user group on the computer, and add EHawileh to the local user group.

(or local admin group if he should be a local admin on the computer)
0
 
LVL 21

Expert Comment

by:snusgubben
Comment Utility
* You can also use Restricted Groups, but I think that is overkill for this task...
0
 

Author Closing Comment

by:loshdog
Comment Utility
I just implemented your solution and it worked like a charm.

Thank you very much.... :)
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now