Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

RDP serial port problems W2008R2 AD controller and TS server

Posted on 2013-11-04
3
Medium Priority
?
980 Views
Last Modified: 2013-11-20
Hello,

First of all let me start by saying this is a client machine and we have already reiterated many times that allowing regular users to connect to their AD controller to run applications is a horrendously bad idea and violates several security and configuration recomendations..

That said, the client insists on doing it anyway so here is my question

When running their application from a local logon on the console they can access a serial device. When running application through RDP and attempting to run same application using a redirected client serial port the application cannot operate the serial device.

The port is redirecting properly, we see it with change port /query and the configuration of rdp-tcp and the specific policies for device redirection are all correct for allowing this to work.

Under R2 I can replicate the error on a non domain controller, and it goes away when the user is added to the local administrators group of the server.. Unfortunately there is no local group on an AD controller, and adding them to the domain admins group does not make this work. This gives me the impression that it is a default User Access policy issue (UAC itself is disabled in both cases to prevent token filtering issues).

Are there any specific user access permissions affecting the serial ports in GPedit ?

Thanks in advance..
0
Comment
Question by:bigdug
  • 2
3 Comments
 
LVL 28

Expert Comment

by:asavener
ID: 39644532
This doesn't directly answer that question, but have you tried adding the users to the Server Operators group?
0
 
LVL 28

Accepted Solution

by:
asavener earned 1500 total points
ID: 39644536
http://technet.microsoft.com/en-us/library/cc725887%28v=ws.10%29.aspx

Computer Configuration\Policies\Administrative Templates\Windows Components\Terminal Services\Terminal Server\Device and Resource Redirection

 Do not allow COM port redirection
      

This policy setting allows you to specify whether to prevent the redirection of data to client COM ports from the remote computer in a Terminal Services session.

You can use this policy setting to prevent users from redirecting data to COM port peripherals or mapping local COM ports while they are logged on to a Terminal Services session. By default, Terminal Services allows this COM port redirection.

If you enable this policy setting, users cannot redirect server data to the local COM port.

If you disable this policy setting, Terminal Services always allows COM port redirection.

If you do not configure this policy setting, COM port redirection is not specified at the Group Policy level. However, an administrator can still disable COM port redirection by using the Terminal Services Configuration tool.
      

At least Windows XP Professional or Windows Server 2003
0
 
LVL 1

Author Closing Comment

by:bigdug
ID: 39663918
It turned out to be a combination of two things. The first was this policy, and the second was that one of the helpful users had reenabled UAC.. Not sure which of the two caused this odd behaviour but changed both and it stopped. The odd part was seeing in in portQry, that makes me think UAC was the main issue. I beleive if the policy was taking effect it would not map at all..  Too many cooks in the kitchen with this problem I'm afraid..
0

Featured Post

Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses

877 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question