Which of the following methods can I disable a user from changing the IP address?

Source: Internet
Author: User

In general, the LAN usually uses static IP addresses for servers and DHCP-based automatic allocation for clients. However, users in the network always prefer to set IP addresses without permission. IP addresses may conflict with each other and cannot access the Internet. The following describes several methods to prevent unauthorized IP address changes.

1. The local connection cannot be modified.

It can be said that many people modify the IP address only because they can see where they can be modified. If we can hide all the menu commands that can be used to modify the local connection attribute, this can also prevent IP address modification.

Follow the preceding steps to open the Group Policy Editor, select "user configuration-manage template-desktop" on the left, and double-click "Hide network neighbors on the desktop" on the right ", in the displayed window, set it to "enabled". In this way, right-click the network neighbor icon on the desktop to open the local connection.

Next, select "user configuration-management template-control panel" in the Group Policy, and set "forbidden access control panel" to "enabled ", in this way, you can not only disable network and dial-up connections in the control panel to open the local connection window, but also disable all settings provided in the control panel.

The last option is to open the network and dial-up connections through the settings menu. You can also select "user configuration-management template-network and dial-up connections" in the Group Policy ", enable the "delete network and dial-up connections from the Start Menu.

2. Hide the local connection icon for cainiao

When the network connection is normal, a small icon of local connection will be displayed on the right side of the system taskbar, which looks like two computers. Many cainiao users use this icon to modify the IP address. As long as you double-click the icon, you can quickly open the local connection window and modify the IP address. Therefore, if we hide this icon, we can prevent many novice users from modifying the IP address without permission.

Right-click the "Network Neighbor" icon on the desktop and select the "attribute" command in the pop-up menu. The local connection icon is displayed in the open network and dial-up connection window. Right-click the local connection icon and select "properties" in the pop-up menu to open the Properties window for the local connection, at the bottom of the "regular" tab in the window, cancel the "icon displayed in the notification area after connection" and click "OK" to save the settings, in this way, the local connection status icon on the taskbar disappears.

Although this is a simple step, more than 50% of users do not know how to modify the IP address.

3. Shielding local connections

Through the first method, although some users can be rejected, it does not work for people with computer experience. Because they know that they can directly open the Local Connection Properties window through the network neighbors to modify. Therefore, our second trick is to make the attribute of the local connection unavailable, so as to block this part of the user.

We know that the control of system functions is implemented through the registry, but it is troublesome to modify the registry and the risks are high. We can achieve this through group policies.

Open the "run" window and enter "gpedit. then press enter to open the Group Policy Editor. In the displayed window, select "user configuration-management template-Network-network connection" on the left ", double-click the "prohibit access to LAN connection properties" item on the right, set it to "enabled" in the window that appears, and click "OK" to save the settings, in this way, the attribute window of the local connection cannot be opened, and it is impossible to modify the IP address.

Through the above methods, we can say that you can basically avoid the problem of changing the IP address without permission. Of course, to avoid the occurrence of similar incidents, we suggest that network administrators should do a good job in basic user training so that users can develop good network usage habits, so that some common faults will not happen again, this reduces the workload of your business.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.