Y
YaronM
Hi,
I've been working with local security policies since SP1 and used many
registry tweaks to lock-down the user's desktop.
now, after I upgraded my builds to SP2 level, I'm getting some strange
behaviour from Windows.
My purpose is to lock the user's access to the local drive (i.e. C: Flash
and Z: Ram-disk). that way, the user can only browse the internet using IE
and launching application using my custom-shell.
I've used the following reg-policies on the HKCU to prevent access for the
user only (not the admin account):
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"DisallowRun"=dword:00000001
"NoViewOnDrive"=dword:67108863
"NoDrives"=dword:67108863
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun]
"1"="ewfmgr.exe"
"2"="mmc.exe"
"3"="musrmgr.exe"
"4"="tweakui.exe"
"5"="explorer.exe"
the number 67108863 represent "all drives". the problem is that on SP1, when
a user launched IE and on the address-bar entered C:\ or some sort of a
local path- it gave him "access denied" errors. now, in SP2 if I type C:\ it
doesn't allow but if I launch c:\windows it does... ( (P.S. I tried
setting the number that represnt C+Z only.. same behaviour).
maybe I am looking in the wrong direction.. is there a way to turn IE to be
an Internet-Browser only, without having this irritating synergy with the
Explorer shell ?
just a thought: maybe I could rename explorer.exe to MSshell.exe and set it
to be the admin's defeault shell, that way in the user's session the IE will
not find it...
anyways, if anyone could share it's expirience I will be most thankful !
Cheers,
YaronM
I've been working with local security policies since SP1 and used many
registry tweaks to lock-down the user's desktop.
now, after I upgraded my builds to SP2 level, I'm getting some strange
behaviour from Windows.
My purpose is to lock the user's access to the local drive (i.e. C: Flash
and Z: Ram-disk). that way, the user can only browse the internet using IE
and launching application using my custom-shell.
I've used the following reg-policies on the HKCU to prevent access for the
user only (not the admin account):
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"DisallowRun"=dword:00000001
"NoViewOnDrive"=dword:67108863
"NoDrives"=dword:67108863
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun]
"1"="ewfmgr.exe"
"2"="mmc.exe"
"3"="musrmgr.exe"
"4"="tweakui.exe"
"5"="explorer.exe"
the number 67108863 represent "all drives". the problem is that on SP1, when
a user launched IE and on the address-bar entered C:\ or some sort of a
local path- it gave him "access denied" errors. now, in SP2 if I type C:\ it
doesn't allow but if I launch c:\windows it does... ( (P.S. I tried
setting the number that represnt C+Z only.. same behaviour).
maybe I am looking in the wrong direction.. is there a way to turn IE to be
an Internet-Browser only, without having this irritating synergy with the
Explorer shell ?
just a thought: maybe I could rename explorer.exe to MSshell.exe and set it
to be the admin's defeault shell, that way in the user's session the IE will
not find it...
anyways, if anyone could share it's expirience I will be most thankful !
Cheers,
YaronM