Solved

How to use group policy to restrict user from accessing network shared folder?

Posted on 2014-03-21
4
3,239 Views
Last Modified: 2014-03-26
Hi Experts,

How to use group policy to restrict user from accessing network shared folder?

Thanks much
0
Comment
Question by:howruaz9
  • 2
  • 2
4 Comments
 
LVL 7

Expert Comment

by:XGIS
ID: 39947044
Hello howruaz9...  My question is group policy the appropriate way to do this...The best way is always via groups and folder permissions. Controlling access to folders is not really what group policy designed for.  There is a high likelihood that the same requirement will exist for another user in the future.  Simply place people in that role group to ensure they have restricted access.
0
 

Author Comment

by:howruaz9
ID: 39947615
Thank you very much XGIS

I totally agree with you. but my job is setup a group of exam laptops. Anyone uses these laptop can visit internet, but can't access internal network shared folder. Can I use group policy to do this?
0
 
LVL 7

Accepted Solution

by:
XGIS earned 500 total points
ID: 39948071
According to Microsoft it cannot be done..

BUT this resource says otherwise with a walkthrough example....

and then there are more recent resources from MS with a basic walkthrough that help you achieve your goal...
0
 

Author Closing Comment

by:howruaz9
ID: 39956757
Thanks very much XGIS - I appreciate it.
0

Featured Post

Scale it in WD Gold

With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco 2960 PACL 9 93
View Security Group Permisssions 6 74
Ipad question 2 80
How to restore security permissions on a file server 4 34
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now