I'm about to deploy a Terminal Server into my domain. A bit of background on this: we have about 60 outside people that will need to access this Terminal Server through a VPN connection. We have an additional 30 users on the inside that will be accessing it as well. So, I'm going to put the server into our domain as a DC, since everyone already has accounts in our domain (the outside people are for mail only up until now).
Right now, and for the forseable future, they will only be running one application on the TS. So, I've found the setting in the users profile (Environment) to set a specific program to start on logon. I've tested this on my test server, and best I can determine, when I do this, the user that is logged in can not get to anything else on the Terminal Server. If the program is closed, the session ends. If the program is minimized, there's nothing else on the desktop, just the minimized program.
Am I correct in my assumption that this is a pretty safe bet that the users can not get to anything else on this Terminal Server (other than through known hacks, etc....after all, if a system running Windows is turned on, it's a vulnerability)?
I am going to use GPO's to further inhibit the users, as well as strict NTFS settings, but this method seems to provide a very narrow ability for the users to cause any problems for us. Now, if I have to run a second program on the TS, then I have a problem, but for now, I don't see that happening.
Thanks.
Dave
Right now, and for the forseable future, they will only be running one application on the TS. So, I've found the setting in the users profile (Environment) to set a specific program to start on logon. I've tested this on my test server, and best I can determine, when I do this, the user that is logged in can not get to anything else on the Terminal Server. If the program is closed, the session ends. If the program is minimized, there's nothing else on the desktop, just the minimized program.
Am I correct in my assumption that this is a pretty safe bet that the users can not get to anything else on this Terminal Server (other than through known hacks, etc....after all, if a system running Windows is turned on, it's a vulnerability)?
I am going to use GPO's to further inhibit the users, as well as strict NTFS settings, but this method seems to provide a very narrow ability for the users to cause any problems for us. Now, if I have to run a second program on the TS, then I have a problem, but for now, I don't see that happening.
Thanks.
Dave