Solved

GPO on Terminal Server

Posted on 2011-03-04
10
324 Views
Last Modified: 2012-05-11
Hello Experts,
I have to setup certain rights for some users, the environment is TS 2008 R2.

Please find attached Excel List for Rights Matrix... there are certain things which I have abbreviated with ABC & XYZ, however you can just consider them to be as some program or location.



Regards,
A
rightsmatrix.xls
0
Comment
Question by:Ackles
  • 5
  • 5
10 Comments
 
LVL 59

Expert Comment

by:Darius Ghassem
ID: 35040893
What is the problem? Can you give me a little more information?

What I think you are trying to do is apply different GPOs to different users on a Terminal Server, is this correct?

You should use GPO Loopback processing to set these GPOs to be applied to the Users when they are logged into the TS server. This allows you to apply User configuration GPOs to only a certain computer.

You then want to deny GPOs for Computer GPOs for users you don't want the GPOs applied too
0
 
LVL 11

Author Comment

by:Ackles
ID: 35040905
Well there is no problem & actually it is the whole problem....

Our IT guy is not here & I don't have much knowledge bout GPO's, so I was looking if someone cOuld guide me before I mess up completely...

Thanks
A
0
 
LVL 59

Expert Comment

by:Darius Ghassem
ID: 35040942
Very detailed GPO plan walking through something this difficult without GPO experience.

 
0
 
LVL 11

Author Comment

by:Ackles
ID: 35040952
I understand , I know how to apply GPO, but not sure bout Loopback...
Let me k ow if u can help?
A
0
 
LVL 59

Accepted Solution

by:
Darius Ghassem earned 500 total points
ID: 35040965
http://support.microsoft.com/kb/231287
http://www.experts-exchange.com/Software/Server_Software/File_Servers/Active_Directory/A_1876-Understanding-Group-Policy-Loopback-Processing.html
http://support.microsoft.com/kb/260370

Take a look at the links get a better understanding of loopback processing.

Do you know about security filtering gpos?

http://www.windowsnetworking.com/articles_tutorials/Group-Policy-Security-Filtering.html

http://technet.microsoft.com/en-us/library/cc779291(WS.10).aspx

You will need to security filter in the GPOs you don't want to be applied to certain users.

When configuring GPOs like the detailed configuration you want testing is a big part and will take time.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 59

Expert Comment

by:Darius Ghassem
ID: 35040976
Once you have read the links let me know what questions you have this will allow me to better help you if you understand the concept which in turn allow you to better ask questions on information you don't understand. We can build on this from there. Poking around GPOs is the only way you will find exactly what you want and how you want to apply the security settins
0
 
LVL 11

Author Comment

by:Ackles
ID: 35040978
Thanks a lot, I will test it & post the results... But will take sometime .
A
0
 
LVL 11

Author Comment

by:Ackles
ID: 35145841
Hi I have made quite a progress but I am stuck on one point.
I want to disable Windows PowerShell as it's always sitting on the Task Bar.

I found this, however still can't make it work:

http://www.kolltveit.org/?p=265

Can you please help?

A
0
 
LVL 59

Expert Comment

by:Darius Ghassem
ID: 35157875
Should work fairly easy GPO you are just denying Read access which is file security.

You can do the same thing by going to the Icon and going to properties and denying Read Access
0
 
LVL 11

Author Closing Comment

by:Ackles
ID: 35160052
I learnt a lot, Thanks
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Normally after a failure of Domain Controller, when promoting new DC the DC is renamed, we will discuss the options in Dcpromo to re-create the DC with the same name. Scenario: You are a small IT shop with two Domain Controllers (Domain Contr…
A procedure for exporting installed hotfix details of remote computers using powershell
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now