Solved

Granular Install Permissions Group Policy

Posted on 2013-01-15
4
263 Views
Last Modified: 2013-02-04
Hi

Is it possible to control via Group Policy specific applications which users can install/upgrade themselves without the need for logging on as admin?

Thinking along the lines of standard desktop applications like Adobe Reader, Flash, Java, etc.
0
Comment
Question by:bikerhong
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 95

Expert Comment

by:John Hurst
ID: 38778352
Look at Beyond Trust:

http://www.beyondtrust.com/PowerBroker-Desktops-Windows-Edition.aspx?section=PowerBroker-Desktops-Windows-Edition

This is a granular extension to Group Policies that allow specific permission for installs. It is worth considering.

... Thinkpads_User
0
 

Author Comment

by:bikerhong
ID: 38778437
Thank you, but was hoping for something built in and free :)
0
 
LVL 22

Expert Comment

by:Joseph Moody
ID: 38778444
If you don't want to buy anything, you can use AppLocker (http://automatedoutofajob.blogspot.com/2011/12/selecting-programs-that-users-can.html)
0
 
LVL 95

Accepted Solution

by:
John Hurst earned 500 total points
ID: 38778455
There is nothing built in that will permit granular installs, and even the free offerings are very limited.
.... Thinkpads_User
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question