Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Group Policy in AD

Posted on 2013-11-26
3
Medium Priority
?
296 Views
Last Modified: 2014-01-13
I have a policy that creates map drives for my users in AD. I need to add another network share to a limited number of employees where they could have access to it upon login.
1.created folder, shared it to users that have permissions. I don't know how to attach users and one group to a policy, considering that the same users have different map drives already .
Not sure if I explained clearly but I need these users to have another map drive when they login.

Thank you in advance for your help.

sw
0
Comment
Question by:swolff1
3 Comments
 
LVL 8

Expert Comment

by:J S
ID: 39679434
I'd create a security group, add the users that require the mapped drive.  Create a group policy remove authenticated users from security filtering and add the security group you created.
0
 
LVL 14

Accepted Solution

by:
brendanmeyer earned 2000 total points
ID: 39679487
If you are using GP Preferences; as Jasons73 said;
1. create a group
2. add the users
3. set the permissions on the folder to this group
4. in gp Preferences, add the mapped drive, then on the last tab, there is 'item-level targeting', use this, and add new item->Security group amd then add the same group (make sure primary group is not ticked)

this will let you to use the existing GPO instead of creating a new one just to map 1 drive
0
 

Author Comment

by:swolff1
ID: 39777878
Thank you.
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

927 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question