Windows XP Group Policy Security

Source: Internet
Author: User
Tags password protection

Sometimes our computers will be used by other users,
Maybe some of your documents do not want to be seen by others,
Or someone else will inadvertently change your system settings,
Is there a good way to prevent it?
We know that in the registry, we can change many system settings,
However, it is difficult to modify the configuration, and the Group Policy puts various configuration modules together,
This facilitates user settings.

Open Mode: Run -- gpedit. msc

It should be noted that the "Computer Configuration" here sets the system configuration of the entire computer and is used for the running environment of all users on the computer; "user configuration" is used to set the system configuration of the current user. It takes effect only for the current user and goes into the correct question.

1. Hide the computer drive
Location: user configuration management template \ Windows component Windows Resource Manager

After I enabled it, I found that all the disk drives on my computer were missing. However, after entering the drive letter in the address bar, I can still access it, if you enable the following settings to prevent access from the "my computer" drive, you will not be able to access the drive by entering the drive letter in the address bar, but you can directly Enter cmd in the running process, in Dos, we can still see that the CMD command is also disabled.
Location: user configuration management template/System


2. Disable Registry
Location: user configuration management template/System


3. Disable Control Panel
Location: user configuration management template/System

To hide the Internet option in the control panel, add Inetcpl. cpl to the hidden control panel program. For the specific name, see the file ending with cpl in WindowsSystem32.

4. Hide folders
After hiding the folder, you only need to display all the files in the folder option. You can delete this option in the Group Policy:
Location: user configuration management template \ Windows component Windows Resource Manager


5. Disable the thumbnail cache.
Sometimes we let go of the image in the folder and then removed it, but it can still be read by others in the thumbnail cache.
Location: user configuration management template \ Windows component Windows Resource Manager


6. Remove the "document" menu from the Start Menu.
The document column in the Start Menu records the documents we have edited. You can remove this menu:
Location: user configuration management template \ Windows component taskbar and Start Menu \


7. Hide the 'screen saver 'Tab
Sometimes we set screen password protection, but it is easy to be modified. We can hide this option.
User Configuration management template \ control panel display,


8. Modifying TCP/IP attributes is prohibited.
The IP address we set may be changed, so you only need to close its property page.
Location: user configuration management template \ Network Connection
Set the following two items to enable:

 

9. Delete the Task Manager
Don't underestimate the task manager. In addition to terminating programs and processes, it can also restart and shut down, search for program execution file names, and change the priority of program running.
Location: user configuration management template \ System C trl + Alt + Del Option


10. Disable "Add/delete programs"
It prevents other users from using it to install or uninstall programs, which can be implemented by using group policies.
Location: user configuration management template \ Control Panel Add/delete programs


11. Disable "Internet Options" under the IE "Tools" menu"
In order to prevent others from making changes to IE browser settings at will.
Location: user configuration management template \ Windows component Internet Explorer menu


12. Run only licensed Windows Applications
If you enable this setting, you can only run the programs that you add to the "List of applications allowed to run.


In general, the Group Policy has powerful functions and many other functions. You just need to dig them up and try again to prevent other users from modifying our settings through the Group Policy, you can mount gpedit in System32. change the msc name, for example, to myedit. msc does not affect normal use.

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.