Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Access Rules - Windows 2008 R2 Enterprise 64bit

Posted on 2011-04-28
1
Medium Priority
?
197 Views
Last Modified: 2012-05-11
I recently installed a payroll program on a Terminal Server and all the users now have the shorrtcut icon on their desktops when they login through RDC. I want to remove the icon from  all the users' profiles and only have it available for two specific users (accounting dept). Please tell me how I could accomplish this.
0
Comment
Question by:Generator
1 Comment
 
LVL 7

Accepted Solution

by:
daveforster earned 2000 total points
ID: 35488480
The easiest way would be to delete it from C:\Users\Public\Desktop folder and add it to the specific users folder C:\Users\%Username%\Desktop.

That way your every day users won't see the icon.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Understanding the various editions available is vital when you decide to purchase Windows Server 2012. You need to have a basic understanding of the features and limitations in each edition in order to make a well-informed decision that best suits …
2017 was a scary year for cyber security.  Hear what our security experts say that hackers have in store for us in 2018.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question