B
Brad Berson
In a previous post I asked if there was a way to use Group Policies to
prevent users' login scripts from running. I'm concerned about the
damage potential in a Terminal Services environment, posed by login
scripts from business units that I cannot control but whose users must
have access to my servers.
There was no response at all here and none of my research turned up
anything terribly hopeful until I started reading about Software
Restriction Policies on Windows 2003.
I should be able to set a policy to disallow "\\*\*", which should
neatly remove the ability to run any program or script that isn't on
the Terminal Server's local drives, right?
But according to what I read, every time something violates the policy
the user is going to get an error message. That would make all the
user's logons rather ugly. Is there a way to disable the messages so
that violations would merely get logged quietly, if noticed at all?
Thanks for any help!
Brad
brad dott berson att bytebrothers dott org
prevent users' login scripts from running. I'm concerned about the
damage potential in a Terminal Services environment, posed by login
scripts from business units that I cannot control but whose users must
have access to my servers.
There was no response at all here and none of my research turned up
anything terribly hopeful until I started reading about Software
Restriction Policies on Windows 2003.
I should be able to set a policy to disallow "\\*\*", which should
neatly remove the ability to run any program or script that isn't on
the Terminal Server's local drives, right?
But according to what I read, every time something violates the policy
the user is going to get an error message. That would make all the
user's logons rather ugly. Is there a way to disable the messages so
that violations would merely get logged quietly, if noticed at all?
Thanks for any help!
Brad
brad dott berson att bytebrothers dott org