Well the user needs to be a local administrator which in most cases is not
desirable as they can then do things like create a user account to logon to
and bypass Group Policy user configuration, disable applications, install
kazaa, etc. But to answer your question go to the controlling Group Policy
for "computer configuration"/administrative templates/network/network
connections/Windows firewall and set prohibit use of Internet Connection
Firewall to not configured or disabled. There are other settings you can
review in the domain and standard profile depending on what you want to
manage and be sure to read the full explanation of each settings. If you are
not sure of the controlling Group Policy run rsop.msc on one of the
computers and you should see the settings applied I mentioned and it will
show what Group Policy is applying the setting. I would suggest however that
you manage the Windows Firewall to have the most security advantage for your
domain which you should be able to do with all the various settings in
domain and standard profile. I would feel very uncomfortable letting users
disable the Windows Firewall but that is your call. --- Steve