Solved

How to use group policy to restrict user from accessing network shared folder?

Posted on 2014-03-21
4
3,742 Views
Last Modified: 2014-03-26
Hi Experts,

How to use group policy to restrict user from accessing network shared folder?

Thanks much
0
Comment
Question by:howruaz9
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 7

Expert Comment

by:XGIS
ID: 39947044
Hello howruaz9...  My question is group policy the appropriate way to do this...The best way is always via groups and folder permissions. Controlling access to folders is not really what group policy designed for.  There is a high likelihood that the same requirement will exist for another user in the future.  Simply place people in that role group to ensure they have restricted access.
0
 

Author Comment

by:howruaz9
ID: 39947615
Thank you very much XGIS

I totally agree with you. but my job is setup a group of exam laptops. Anyone uses these laptop can visit internet, but can't access internal network shared folder. Can I use group policy to do this?
0
 
LVL 7

Accepted Solution

by:
XGIS earned 500 total points
ID: 39948071
According to Microsoft it cannot be done..

BUT this resource says otherwise with a walkthrough example....

and then there are more recent resources from MS with a basic walkthrough that help you achieve your goal...
0
 

Author Closing Comment

by:howruaz9
ID: 39956757
Thanks very much XGIS - I appreciate it.
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question