0

I would like to know if you guys have a solution to my problem. I have a terminal server 2012 that can be accessed remotely after a VPN connection and from the LAN.

My question is how can I create a policy that denies drive mapping when a specific user connects via VPN, and to allow drive mapping when connecting via LAN for the same user.

What do you think will be the best approach for that matter?

thanks,

OrenYa
  • 1
  • As far as I know, you can't really do this with group policy. Perhaps blocking SMB traffic over the VPN would do what you need? – Nathan C Dec 02 '14 at 15:28
  • Clarify: Do you mean block VPN users from mapping drives in their session on the term server, or block VPN users from mapping drives from their physical system to the term server? – tfrederick74656 Dec 02 '14 at 17:29
  • Yes, block only VPN users from mapping drives, and to allow mapping within the LAN only. User accounts are the same for both VPN connection and from the LAN controlled by AD. – OrenYa Dec 22 '14 at 12:06

0 Answers0