Solved

disable/disconnect internet browser

Posted on 2003-11-16
3
225 Views
Last Modified: 2010-03-18
How to completely disable or disconnect internet browser in a user connected within in the netwrok.  We have an employee despite of repetitive request to him not to surf during working hours and still he does. We delete the browser, we delete the setup (internet options) and he regain it. He just go to other computer and copy the setup and he can browse again. We don’t want to remove him because we know he is a good guy but we have only this comment to him. Any idea.
0
Comment
Question by:jccm
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 21

Accepted Solution

by:
marc_nivens earned 30 total points
ID: 9760331
This really depends on your current infrastructure.  For example, if you were running proxy/isa you could restrict this at the server.  And if you were running Active Directory you could restrict much of what this user could do with group policy.  Even if he's on Win9x you could still use policy editor on the machine to lock it down somewhat.

But... if you really want to get the point accross to this employee, install this:

http://www.devicode.com/kidsplorer/

I've never used it but it claims to be a "kid safe" browser that allows you to block the launching of other browsers and restrict the sites it can visit.
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question