Solved

How to use group policy to restrict user from accessing network shared folder?

Posted on 2014-03-21
4
3,146 Views
Last Modified: 2014-03-26
Hi Experts,

How to use group policy to restrict user from accessing network shared folder?

Thanks much
0
Comment
Question by:howruaz9
  • 2
  • 2
4 Comments
 
LVL 7

Expert Comment

by:XGIS
Comment Utility
Hello howruaz9...  My question is group policy the appropriate way to do this...The best way is always via groups and folder permissions. Controlling access to folders is not really what group policy designed for.  There is a high likelihood that the same requirement will exist for another user in the future.  Simply place people in that role group to ensure they have restricted access.
0
 

Author Comment

by:howruaz9
Comment Utility
Thank you very much XGIS

I totally agree with you. but my job is setup a group of exam laptops. Anyone uses these laptop can visit internet, but can't access internal network shared folder. Can I use group policy to do this?
0
 
LVL 7

Accepted Solution

by:
XGIS earned 500 total points
Comment Utility
According to Microsoft it cannot be done..

BUT this resource says otherwise with a walkthrough example....

and then there are more recent resources from MS with a basic walkthrough that help you achieve your goal...
0
 

Author Closing Comment

by:howruaz9
Comment Utility
Thanks very much XGIS - I appreciate it.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now