How can we limit access to RDC users connecting to Microsoft 2012 server for POS system?

Posted on 2014-07-17
Last Modified: 2014-08-01
I have a client getting ready to deploy new retail POS system for three store locations.  The POS software is installed on an Dell server running Microsoft 2012 standard.  The server will be located at main store.  The other two locations will connect via RDC software already purchased from Microsoft.  It appears that out of the box the users that remote into the server have full access to everything on the server.  What would be the best way to limit access to other parts of the server other than the POS software?  Thank you in advance for giving feedback on this question.
Question by:ITSupportGuy1
    LVL 19

    Accepted Solution

    On server you can install RemoteApps role and create and distribute rdp file to shops. So users will start rdp file which opens terminal session to server and opens application directly
    LVL 14

    Expert Comment

    by:Don Thomson
    Make sure that the User Code Passwords given to each of the remote stores is limited to only the apps and folders on the server that they need to do their job.  We just did the same type of setup with a client and we restricted them from just about everything then opened up what they needed to run as they found something that they couldn't do but needed to.  We actually had to install the receipt printers locally on each remote terminal then once they connected to the server we set up a VPN back top their local PC and then double clicked on the Slip printer through a shortcut we set up - It was the only way we could make it work so that the Cash drawer opened properly.

    Author Closing Comment

    Thank you for your feedback.  We looked an many different options and this was one that was recommended by the vender as well.  We are going with custom RDC code straight to the POS software.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Join & Write a Comment

    Understanding the various editions available is vital when you decide to purchase Windows Server 2012. You need to have a basic understanding of the features and limitations in each edition in order to make a well-informed decision that best suits y…
    I don't know if many of you have made the great mistake of using the Cisco Thin Client model with the management software VXC. If you have then you are probably more then familiar with the incredibly clunky interface, the numerous work arounds, and …
    This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…
    This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now