Solved

Group Policy - App Restriction - By Device - By User

Posted on 2013-06-24
4
236 Views
Last Modified: 2013-07-22
I have a situation.

We want to block access to an application for users, but only when they log onto certain Terminals

At my site the users will be running their desktops via Remote Desktop, either accessing it from PC's or Thin Clients.

I need to prevent a program from being run when any user logs onto one of 4 thin clients in particular for security reasons.  If that user logs onto any other machine they need to be able to run the app.
0
Comment
Question by:mbkitmgr
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 4

Expert Comment

by:jprlopes
ID: 39270921
Create a GPO that includes that 4 computers (not the users) and deny them acess to that particular application.
The GPO will be:

Computer configuration > Windows Settings > Security Settings > Software restrictions Policies > Additional Rules
Right click and choose NEW HASH RULE
Then choose the path to the EXE of the program you want to block and choose NOT ALLOWED.

Apply this GPO to the 4 computers.
0
 
LVL 7

Accepted Solution

by:
mbkitmgr earned 0 total points
ID: 39335857
I spent some time resolving this myself.

1.

Create the Shortcut in GP Prefs

2.

Set the scoping to not apply the shortcut to the Terminal Devices with the names of the devices used
If anyone wants a step by step I am happy to provide
0
 
LVL 7

Author Closing Comment

by:mbkitmgr
ID: 39345539
Self Resolved
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
When asking a question in a forum or creating documentation, screenshots are vital tools that can convey a lot more information and save you and your reader a lot of time
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question