Active Directory Lockdown to specific OUs via remote desktop?

Posted on 2012-09-17
Medium Priority
Last Modified: 2012-10-24

I am starting to understand the delegation wizard in AD 2008 so thats fine but what I need help with is what would be the best practice to do the following:

Allow a security group to remote desktop to a Win2008 server that has access to AD but will only show specific Organisational Units, then lock down the server so this is all that the users can do.

E.g. remote connect to server1, then have AD/MMC load up that shows 2 OUs instead of the whole AD structure.

Any advice would be great as I am unsure where to start with this.

Question by:Colchester_Institute
1 Comment
LVL 39

Accepted Solution

Krzysztof Pytko earned 1500 total points
ID: 38404640

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question