Solved

Mapping to a share based on computer name and security group

Posted on 2011-09-22
1
260 Views
Last Modified: 2012-05-12
How would you map to a share on a NAS based on both a security group and a particular computer name?  The backgound on this is that a few users in my organization have access via RDP to a bank of several servers that run some type of high-res mapping software, and those servers will have access to a large share on a NAS.

Is there a way for when these particular users access these servers, that the logon to them will map a drive to the NAS that is shared amongst these servers?  I don't want to map this drive to their normal network logons as they don't need access to this NAS from their regular workstations.

Hope this makes sense...???
0
Comment
Question by:gunschee
1 Comment
 
LVL 42

Accepted Solution

by:
kevinhsieh earned 250 total points
Comment Utility
Use group policy preferences to map the drive. Assign that GPO to the OU where the workstations are located. Use security group filtering if necessary to limit it to a security group of workstations. You will also need to turn on group policy loopback processing (via GPO) for those workstations so that they will apply the drive mappings (a user setting) to users that logon.
0

Featured Post

Why do Marketing keep bothering you?

Is your marketing department constantly asking for new email signature updates? Are they requesting a different design for every department? Do they need yet another banner added? Don’t let it get you down! There is an easy way to manage all of these requests...

Join & Write a Comment

I was supporting a handful of Windows 2008 (non-R2) 2 node clusters with shared quorum disks. Some had SQL 2008 installed and some were just a vendor application that we supported. For the purposes of this article it doesn’t really matter which so w…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now