disabling startup-program changes

  • Thread starter Thread starter Mow Row
  • Start date Start date
M

Mow Row

Hi there fellow Microsofters!

I am a part System Admin at a small office with no Windows domain (just
workgroup), and would like to carry out the following tasks on my co-workers'
Windows XP Pro computers (locally), while enabling them as administrators (so
they can install / uninstall software / maintain their PCs).

Here is the task I would like to carry out (remember, they have
Administrator accounts as well, but not via Safe Mode, and remember, there is
no domain):

Disable startup-programs from changing. That is, disabling the startup
programs from changing once they install any software. I am not asking how to
change the current startup programs; I know how to do that.

Thanks!
Row
 
Mow said:
Disable startup-programs from changing. That is, disabling the startup
programs from changing once they install any software. I am not asking how to
change the current startup programs; I know how to do that.

As long as you grant your users administrative privileges, you cannot
prevent them from doing anything. Nor can you prevent any malware they
install from having its way with their computers.


--

Bruce Chambers

Help us help you:


http://support.microsoft.com/default.aspx/kb/555375

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety. ~Benjamin Franklin

Many people would rather die than think; in fact, most do. ~Bertrand Russell

The philosopher has never killed any priests, whereas the priest has
killed a great many philosophers.
~ Denis Diderot
 
You can actually, by Access Rights (and disable User Account control).
Remember, I am a system admin, part that is.
 
Mow said:
You can actually, by Access Rights (and disable User Account control).


Which any of your administrative-level users can "undo," at their whim.

Remember, I am a system admin, part that is.

You shouldn't be. You lack the knowledge to safely execute the
requisite duties.


--

Bruce Chambers

Help us help you:


http://support.microsoft.com/default.aspx/kb/555375

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety. ~Benjamin Franklin

Many people would rather die than think; in fact, most do. ~Bertrand Russell

The philosopher has never killed any priests, whereas the priest has
killed a great many philosophers.
~ Denis Diderot
 
Mow said:
Hi there fellow Microsofters!

I am a part System Admin at a small office with no Windows domain
(just workgroup), and would like to carry out the following tasks
on my co-workers' Windows XP Pro computers (locally), while
enabling them as administrators (so they can install / uninstall
software / maintain their PCs).

Here is the task I would like to carry out (remember, they have
Administrator accounts as well, but not via Safe Mode, and
remember, there is no domain):

Disable startup-programs from changing. That is, disabling the
startup programs from changing once they install any software. I am
not asking how to change the current startup programs; I know how
to do that.

Until you take away their administrative rights - they can undo whatever you
do in many ways and do whatever they desire without much effort at all.
 
Bruce Chambers wrote:

--

Bruce Chambers

Help us help you:


http://support.microsoft.com/default.aspx/kb/555375

They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety. ~Benjamin Franklin

Many people would rather die than think; in fact, most do. ~Bertrand Russell

The philosopher has never killed any priests, whereas the priest has
killed a great many philosophers.
~ Denis Diderot

Come on, Bruce. Be polite. 4 lines maximum for your signature! Blank
lines are included in that count. 16 lines is excessive and rude.
Simplify your sig. We already know your nym. It's in the headers and
displayed by every NNTP client. Get rid of the off-topic MOTD cutsy
fluff.

Just 2 lines. Your 3-line reply got swamped by your excessive 16-line
signature.
 
NOTE: Do not mix up the posting order. Whether you prefer top- or
bottom-posting, /maintain the SAME order/. There is no top- or
bottom-posting order for the first post in a thread. That is
established by the first-level respondent. Bruce bottom-posted so
follow suit. Stop generating a jumbled mess by mixing top- and
bottom-posted messages together in your replies.

Mow said:
You can actually, by Access Rights (and disable User Account
control). Remember, I am a system admin, part that is.

If YOU, as an admin-level user, can enable ACLs then what is going to
prevent OTHERs, also as admin-level users, from removing those changes?
You're a system admin. So are THEY! You gave them permission to be so.

You're a bunch of same-rating admirals in a lifeboat issuing different
orders that none of you have to obey. One of the admirals (you) has the
combination to a locker but all the admirals have the combination, too.
Your special title of "system admin" merely means you get stuck and
stressed with having to manage more than one host. The other admins get
the luxury of just managing their one host.

So does your company actually have a software policy (as to what is
allowed on the users' hosts)? If not, you don't have permission to
alter any software configuration that the users contrive. If there is a
policy then simply generate images of what their hosts are supposed to
have and merely re-image their host when a problem arises. After all,
if this truly is a company environment, those users should not be
leaving company data on their hosts (it should get saved on a file
server) or there should be a client-server backup system in place to
save the data off their workstations (but not necessarily the apps since
the company software policy would let you define an image of what they
should have). If policies are not in place and the employees notified
of them, you have no leverage to exercise any control over what is on
their hosts.
 
VanguardLH said:
NOTE: Do not mix up the posting order. Whether you prefer top- or
bottom-posting, /maintain the SAME order/. There is no top- or
bottom-posting order for the first post in a thread. That is
established by the first-level respondent. Bruce bottom-posted so
follow suit. Stop generating a jumbled mess by mixing top- and
bottom-posted messages together in your replies.



If YOU, as an admin-level user, can enable ACLs then what is going to
prevent OTHERs, also as admin-level users, from removing those changes?
You're a system admin. So are THEY! You gave them permission to be so.

Ownership, I am the only one with it, hence am the only one that can reclaim
it ;]
You're a bunch of same-rating admirals in a lifeboat issuing different
orders that none of you have to obey. One of the admirals (you) has the
combination to a locker but all the admirals have the combination, too.
Your special title of "system admin" merely means you get stuck and
stressed with having to manage more than one host. The other admins get
the luxury of just managing their one host.

So does your company actually have a software policy (as to what is
allowed on the users' hosts)? If not, you don't have permission to
alter any software configuration that the users contrive. If there is a
policy then simply generate images of what their hosts are supposed to
have and merely re-image their host when a problem arises. After all,
if this truly is a company environment, those users should not be
leaving company data on their hosts (it should get saved on a file
server) or there should be a client-server backup system in place to
save the data off their workstations (but not necessarily the apps since
the company software policy would let you define an image of what they
should have). If policies are not in place and the employees notified
of them, you have no leverage to exercise any control over what is on
their hosts.

Yes, things that distract from work, like chatting and file-sharing :)
 
<snipped>

Mow said:
Ownership, I am the only one with it, hence am the only one that
can reclaim it ;]

On the ownership thing - anyone with administrative rights can take over
ownership of the files/folders on that system. If you mean legally - this
has no bearing on the technical side of your question - you might own the
company and the computers - maybe even had things signed that make you the
owner of all the data on said computers - but from a technical standpoint -
if a user is on the comp-uter, has administrative rights on the computer -
they can 'own' every file on it.

How to take ownership of a file or a folder in Windows XP
http://support.microsoft.com/kb/308421

Way too easy.

So, to answer your original question again from a purely technical and
factual standpoint:

Until you take away their administrative rights - they can undo whatever you
do in many ways and do whatever they desire without much effort at all.
 
Mow said:
VanguardLH said:
NOTE: Do not mix up the posting order. Whether you prefer top- or
bottom-posting, /maintain the SAME order/. There is no top- or
bottom-posting order for the first post in a thread. That is
established by the first-level respondent. Bruce bottom-posted so
follow suit. Stop generating a jumbled mess by mixing top- and
bottom-posted messages together in your replies.



If YOU, as an admin-level user, can enable ACLs then what is going to
prevent OTHERs, also as admin-level users, from removing those changes?
You're a system admin. So are THEY! You gave them permission to be so.

Ownership, I am the only one with it, hence am the only one that can reclaim
it ;]
You're a bunch of same-rating admirals in a lifeboat issuing different
orders that none of you have to obey. One of the admirals (you) has the
combination to a locker but all the admirals have the combination, too.
Your special title of "system admin" merely means you get stuck and
stressed with having to manage more than one host. The other admins get
the luxury of just managing their one host.

So does your company actually have a software policy (as to what is
allowed on the users' hosts)? If not, you don't have permission to
alter any software configuration that the users contrive. If there is a
policy then simply generate images of what their hosts are supposed to
have and merely re-image their host when a problem arises. After all,
if this truly is a company environment, those users should not be
leaving company data on their hosts (it should get saved on a file
server) or there should be a client-server backup system in place to
save the data off their workstations (but not necessarily the apps since
the company software policy would let you define an image of what they
should have). If policies are not in place and the employees notified
of them, you have no leverage to exercise any control over what is on
their hosts.

Yes, things that distract from work, like chatting and file-sharing :)

Unless there are established company policies, YOU can't dictate what
goes on the employees' hosts. Don't assume power that you don't have.

For example, a QA tester may have ties with WinRunner forums (because
that software is used at work), or use chat rooms of WinRunner users (to
get away from the spam in the Yahoo Groups for WinRunner), or may use
instant messaging between groups of WinRunner users rather than use a
Usenet group or an e-mail scheme to communicate with other in a
forum-like manner. The access to those other users is seen as a
critical resource in the QA tester performing their duties at work. You
banning the use of those communications channels is interfering with the
employee getting their job done. By that way, I've been in that
scenario and the sysadmin that interfered with my job got reported to my
manager, to his manager, and even to the Sales, Marketing, and the CIO
due to his impact on my scheduling of QA testing due to lack in finding
some needed solutions from other WinRunner users that were more expert
than I. Without a company policy established to dictate what could be
on my host, he had no permission to change anything on it. In fact, as
part of this fiasco, we had to sit down with the IT folks and tell them
that everything in our Alpha Lab was off limits to them. Nothing in
there they could touch or alter. We didn't even want the pre-built
Dells they were pushing onto the workstations since we had and needed
our own-built hosts that met our requirements. We had our own subnet to
isolate our traffic, especially test-loading traffic, from the corporate
network. This boob admin removed other software from my hosts without
warning, without asking, and without permission and the company policies
enforced by the IT department do not cover our hosts in the Alpha Lab
(whether physically or on our desks but connected to the lab network,
not through the corporate network).

Another example is e-mail. Unless policies are in place that dictate
that only company-related business will employ e-mail services at work
then you have no means to enforce the employees do not conduct personal
communications via e-mail using company resources. You also have
nothing to enforce or punish someone that move company e-mail content to
an off-company location, like redirecting their e-mails from work to
some non-company server, like Hotmail or to their home computer or even
to another company's mail server should that be a part-time worker that
has another job elsewhere. You can't enforce what was never defined.

We are jealous over control of our test hosts and protect them from the
boobs in the IT dept who are not allowed to enforce the general company
policies on them. However, there are activities or traffic that do
involve the corporate network and where we need special privileges we
first ask for them and get documented the response allowing us those
privileges. *BUT* there are company policies in the first place.
Without them, YOU have no power to dictate what software is on a host.
Do you even have company policies regarding abuse of company resources?

For a user to commit abuse means it had to be defined in the first
place. I can guarantee you that if you permit any connections to the
Internet that your users will figure out how to thwart your attempts to
limit what types of network traffic that they can generate. All I would
need is some allowed traffic, encrypt it, and have another server handle
to where that traffic is directed to get any content that I want into
the corporate network. Unless your company cuts its internal network
off from all external networks, you won't be able to deter unwanted
traffic until you establish policies that threaten the employment of the
worker.

No policies, no enforcement. Should you ever attempt to terminate an
employee for arbitrary cause, like claiming they generated unwanted
network traffic that impacted its performance or its reasonable use by
other employees, expect a wrongful termination lawsuit to ensue.
Without policies in place, your company would have no standing in the
court case because abuse was never defined. You trying to stem abuse
without any policies to back up those actions means the employees are
still free to do anything they want to thwart your actions. Unless you
are enforcing the rules, you are an arbitrary adversary to be overcome.
You could very well be the one impacting the overall performance of the
employees and the one that gets replaced.
 
Shenan Stanley said:
<snipped>

Mow said:
Ownership, I am the only one with it, hence am the only one that
can reclaim it ;]

On the ownership thing - anyone with administrative rights can take over
ownership of the files/folders on that system. If you mean legally - this
has no bearing on the technical side of your question - you might own the
company and the computers - maybe even had things signed that make you the
owner of all the data on said computers - but from a technical
standpoint - if a user is on the comp-uter, has administrative rights on
the computer - they can 'own' every file on it.

How to take ownership of a file or a folder in Windows XP
http://support.microsoft.com/kb/308421

Way too easy.

So, to answer your original question again from a purely technical and
factual standpoint:

Until you take away their administrative rights - they can undo whatever
you
do in many ways and do whatever they desire without much effort at all.

Check it; I tried it and it works! If I take ownership of something, and
even if they are admins, they cannot take over! Just TWO steps:
1. disable administrative tools, gpedit.msc, mmc (search > locate >
properties > permissions > remove all)
2. disable ownership (Computer Configuration > Windows Settings > Security
Settings > Local Policies > User Rights Assignment > Take ownership of files
.... > choose only Administrator)

Seriously, I am a GOD admin, so BOW before me!
MoWrOw
 
MoWrOw said:
Shenan Stanley said:
<snipped>

Mow said:
Ownership, I am the only one with it, hence am the only one that
can reclaim it ;]

On the ownership thing - anyone with administrative rights can take over
ownership of the files/folders on that system. If you mean legally - this
has no bearing on the technical side of your question - you might own the
company and the computers - maybe even had things signed that make you the
owner of all the data on said computers - but from a technical
standpoint - if a user is on the comp-uter, has administrative rights on
the computer - they can 'own' every file on it.

How to take ownership of a file or a folder in Windows XP
http://support.microsoft.com/kb/308421

Way too easy.

So, to answer your original question again from a purely technical and
factual standpoint:

Until you take away their administrative rights - they can undo whatever
you
do in many ways and do whatever they desire without much effort at all.

Check it; I tried it and it works! If I take ownership of something, and
even if they are admins, they cannot take over! Just TWO steps:
1. disable administrative tools, gpedit.msc, mmc (search > locate >
properties > permissions > remove all)
2. disable ownership (Computer Configuration > Windows Settings > Security
Settings > Local Policies > User Rights Assignment > Take ownership of files
... > choose only Administrator)

Seriously, I am a GOD admin, so BOW before me!
MoWrOw

Nope. Won't work. gpedit.msc merely gives you a hierarchical structure
to the registry entries used to record those policies. The other admins
can still use regedit.exe, reg.exe, or other registry editors to undo
those policies. In fact, with permission of the IT dept., I put a .reg
file in my Startup group (since I was in a domain group for *local*
administrators [so they can manage their own hosts]) that undid the
screensaver timeout policy they pushed onto my host. As long as I can
edit the registry, I can make whatever changes I want there when logged
under a local admin account. gpedit.msc (and secpol.msc) are not the
only means to modify the registry to define policies there.

Then it is always possible to image the OS partition when it is in the
state you want and undo everything anyone did on the host.

You can also install another instance of Windows in another partition
(on the same or different drive than the default OS) and use that
instance to import the registry into regedit.exe, make your changes,
like to the policy settings, and put the registry files back on the
slave drive. Or haul the hard disk with the OS on it to another host
running Windows and import the registry to that instance of Windows.

You're a god only in your mind. The only ones that will bow to you are
those that enjoy receiving a rim job from you.
 
VanguardLH said:
MoWrOw wrote:
....

Nope. Won't work. gpedit.msc merely gives you a hierarchical
structure to the registry entries used to record those policies. The
other admins can still use regedit.exe, reg.exe, or other registry
editors to undo those policies. In fact, with permission of the IT
dept., I put a .reg file in my Startup group (since I was in a domain
group for *local* administrators [so they can manage their own
hosts]) that undid the screensaver timeout policy they pushed onto my
host. As long as I can edit the registry, I can make whatever
changes I want there when logged under a local admin account.
gpedit.msc (and secpol.msc) are not the only means to modify the
registry to define policies there.

It could work, by simply removing the ability to edit the registry while
the other changes are being made.
Then it is always possible to image the OS partition when it is in the
state you want and undo everything anyone did on the host.

And lose any created data in the meantime.
You can also install another instance of Windows in another partition
(on the same or different drive than the default OS) and use that
instance to import the registry into regedit.exe, make your changes,
like to the policy settings, and put the registry files back on the
slave drive. Or haul the hard disk with the OS on it to another host
running Windows and import the registry to that instance of Windows.

And double the cost of licenses. Every instance of the OS requires a
license; that would make 2 per machine.
 
There are many free tools that will remove Group Policy restrictions to not
run Task Manager, edit the registry, etc. I think Malwarebytes free tool
will check for and give you the option to remove such restrictions. It is
also possible to use PE boot to mount registry of another operating system,
edit, and dismount to remove any restrictions.

Steve


Twayne said:
VanguardLH said:
MoWrOw wrote:
...

Nope. Won't work. gpedit.msc merely gives you a hierarchical
structure to the registry entries used to record those policies. The
other admins can still use regedit.exe, reg.exe, or other registry
editors to undo those policies. In fact, with permission of the IT
dept., I put a .reg file in my Startup group (since I was in a domain
group for *local* administrators [so they can manage their own
hosts]) that undid the screensaver timeout policy they pushed onto my
host. As long as I can edit the registry, I can make whatever
changes I want there when logged under a local admin account.
gpedit.msc (and secpol.msc) are not the only means to modify the
registry to define policies there.

It could work, by simply removing the ability to edit the registry while
the other changes are being made.
Then it is always possible to image the OS partition when it is in the
state you want and undo everything anyone did on the host.

And lose any created data in the meantime.
You can also install another instance of Windows in another partition
(on the same or different drive than the default OS) and use that
instance to import the registry into regedit.exe, make your changes,
like to the policy settings, and put the registry files back on the
slave drive. Or haul the hard disk with the OS on it to another host
running Windows and import the registry to that instance of Windows.

And double the cost of licenses. Every instance of the OS requires a
license; that would make 2 per machine.
You're a god only in your mind. The only ones that will bow to you
are those that enjoy receiving a rim job from you.
 
Twayne said:
VanguardLH said:
MoWrOw wrote:
...

Nope. Won't work. gpedit.msc merely gives you a hierarchical
structure to the registry entries used to record those policies. The
other admins can still use regedit.exe, reg.exe, or other registry
editors to undo those policies. In fact, with permission of the IT
dept., I put a .reg file in my Startup group (since I was in a domain
group for *local* administrators [so they can manage their own
hosts]) that undid the screensaver timeout policy they pushed onto my
host. As long as I can edit the registry, I can make whatever
changes I want there when logged under a local admin account.
gpedit.msc (and secpol.msc) are not the only means to modify the
registry to define policies there.

It could work, by simply removing the ability to edit the registry while
the other changes are being made.

Then you use password crackers to log under the Administrator account to
gain access to the registry. In fact, there are commercial programs
that specifically address getting into a Windows host, like after
termination of an employee who refuses or cannot be reached to get their
password or the company isn't interested in pursuing a property and data
theft lawsuit against the ex-employee.
And lose any created data in the meantime.

And your point? The OP never stated that any changes made to the host's
disk(s) after its initial image had to be retained. In fact, if the
helpdesk cannot resolve the problem, often they'll just re-image your
host.
And double the cost of licenses. Every instance of the OS requires a
license; that would make 2 per machine.

In an environment as described, you think this will be the only host
running Windows in the entire company? Puh-lease.
 
Back
Top