|
Restrictions (windows nt)Desktop restrictions can be implemented by editing the following Explorer values in the registry: (all values default to 0) HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer NoCommonGroups REG_DWORD NoDesktop REG_DWORD NoDrives REG_DWORD NoFileMenu REG_DWORD NoFind REG_DWORD NoNetConnectDisconnect REG_DWORD NoNetHood REG_DWORD NoRun REG_DWORD NoSetFolders REG_DWORD NoSetTaskbar REG_DWORD NoTrayContextMenu REG_DWORD NoViewContextMenu REG_DWORD RestrictRun REG_DWORD NoClose REG_DWORD To really lock down the desktop, replace the Explorer or Progman shell with your own launcher. Edit HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon\Shell and replace the current .exe with YourOwnLauncher.exe. See "Restricting system features ..." on a subsequent Tips page. we learned that setting the RestrictRun Value in the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer key to 1 would allow us to configure allowed programs at the RestrictRun key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun RestrictRun can only works from the Explorer process. It does not prevent users from running programs, such as Task Manager, that are started by the system process or by other processes such as CMD.EXE. For Windows NT to operate properly, users must be permitted to run Systray.exe and setup.exe (both are in %SystemRoot%\System32). The value entries in this subkey represent local programs which can appear in any order. The value entries have the following syntax: Decimal number (starting with 1) of type REG_SZ with a data string which is the name of executable file. Example: 1 REG_SZ setup.exe HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System All of the following entries are type REG_DWORD and have a default of 0. If these entries are set to 1, the restriction is enabled. DisableTaskMgr - Prevents TaskMgr.exe from running. This entry is only supported from NT 4.0 with SP2 or greater. NoDispAppearancePage - Removes the ability to change the colors or color scheme on the desktop from Control Panel. NoDispBackgroundPage - Removes the ability to change wallpaper and backround pattern from Control Panel. NoDispCPL - Disables the Display option in Control Panel NoDispScrSavPage - The Screen Saver tab does not appear in the Display Properties page of Control Panel. NoDispSettingsPage - The Settings and Plus tab do not appear in the Display Properties page of Control Panel. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. All are type REG_DWORD with a default value of 0. EnforceShellExtensionSecurity - A value of 1 causes Windows NT to only load the shell extensions listed in the Approved subkey (HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved). NoDriveAutoRun - A bitmapped valuethat determines wether the autorun feature is disabled on that drive. If the drives bit is set to 1, autorunis disabled. NoSaveSettings - A value of 1 prevent changes to the positions of icons and open windows, and the size and position of the taskbar from being saved. NoStartBanner - A value of 1 hides the arrow and Click here to begin caption that appear on the taskbar when you start Windows NT. NoStartMenuSubFolders - Hides the folders at the top section of the Start menu when the value is set to 1. Items appear, but folders are hidden. A few more restrictions are located at HKEY_CURRENT_USER\Software\Microsoft\Windows: NoWorkgroupContents - If the value of this entry is 1, Network Neighborhood does not display computers in the local workgroup or domain. NoEntireNetwork - A value of 1 restricts Network Neighborhood from displaying or accessing computers outside the local workgroup or domain. The user can still use the Start/Run, Map/Connect Network Drive, and the Command Prompt.
In other tips on these pages, you have seen registry hacks to the HKEY_CURRENT_USER hive. Any hack that you can make to HKEY_CURRENT_USER can be made to the default user hive. To modify the default user hive, highlight the HKEY_USERS window and click Load Hive from the Registry menu. Select the Ntuser.dat file (usually from %windir%\Profiles\Default User directory). Type NTUSER in the Key Name dialogue box. Now you can add or modify any Key or Value within this hive. When you finish, highlight NTUSER and select Permissions from the Security menu. Add Read permission to the Everyone group. Check the "Replace Permission on Existing Subkeys" box and click Ok. Select Unload Hive from the Registry menu and exit Regedt32. Copy the profile to the Netlogon share on the PDC which is usually at C:\%windir%\System32\Repl\Export\Scripts. When a new user logs on, they will receive the default profile. |
|
|