Solved

Server 2012 Allow VPN Access

Posted on 2014-11-07
9
164 Views
Last Modified: 2014-11-26
Hi guys,

I have a Server 2012 running that's configured for PPTP remote access. Now it seems that one domain group has access to the VPN. I cant see to find anything in NPS where this is defined? How do i track this down?
0
Comment
Question by:Cobra25
  • 5
  • 4
9 Comments
 
LVL 24

Expert Comment

by:lionelmm
ID: 40430171
This is defined in AD users and groups--this may be what you are looking for http://technet.microsoft.com/en-us/library/cc995159.aspx
0
 
LVL 4

Author Comment

by:Cobra25
ID: 40433213
Right now, they are set to Allow Access on the Dial-In tab in AD.

I tested with my account with Allow Access too, but it wouldnt let me authenticate until i was a member of that AD group.
0
 
LVL 24

Expert Comment

by:lionelmm
ID: 40433342
You need to be a member of the group that allows remote access
0
 
LVL 4

Author Comment

by:Cobra25
ID: 40441131
Lionelmm, yes that is true, but i am not sure where that group is defined!
0
Integrate social media with email signatures

Is your company active on social media? Do you also use email signatures? Including social media icons in your email signature is a great way to get fans for free. Let all your email users know you’re on social media quickly and easily, in a single click.

 
LVL 24

Expert Comment

by:lionelmm
ID: 40441300
Look in AD Users and Computers--then the built-in group and then Remote Desktop Users.
0
 
LVL 4

Author Comment

by:Cobra25
ID: 40441307
Why am i looking there?
0
 
LVL 24

Expert Comment

by:lionelmm
ID: 40442392
To see if that user is a member of that group
0
 
LVL 4

Accepted Solution

by:
Cobra25 earned 0 total points
ID: 40458345
I created a new NPS policy and resolved this issue.
0
 
LVL 4

Author Closing Comment

by:Cobra25
ID: 40466482
Resolved our own issue.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
OfficeMate Freezes on login or does not load after login credentials are input.
In this Micro Tutorial viewers will learn how to use Windows Server Backup to create full image of their system. Tutorial shows how to install Windows Server Backup Feature on Windows 2012R2 and how to configure scheduled Bare Metal Recovery backup.…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now