Solved

Disable file deletion/exploration in comdlg32?

Posted on 2003-11-16
1
265 Views
Last Modified: 2008-02-01
I would like to know if there are some more (I already have 3 from msdn, but they don't stop deleting/exploring) registry values I could use to stop a person from changing their Save or Open directory.  I just want it limited to the desktop.  Or if there is a way to stop file deletion, that would work too.
0
Comment
Question by:wordracr
1 Comment
 
LVL 7

Accepted Solution

by:
wtrmk74 earned 145 total points
Comment Utility
Bakup Your Registry !
this information requires you to add or modify information that is not standard in the Windows Registry.
___________________________________________________________________
Specifying the Default Download Directory in Internet Explorer

To specify the default download directory for the Internet Explorer

Start Regedit
Go to HKEY_USERS \ .DEFAULT \ Software \ Microsoft \ Internet Explorer
Add a String value called Download Directory
For it's value, enter in the Directory where you want your downloaded files to go

___________________________________________________________________
Disabling the Ability to Change the Default Download Directory

If you want user's not to be able to change the Default Download Directory

Start Regedit
Go to HKEY_USERS \ .DEFAULT \ Software \ Policies \ Microsoft \ Internet Explorer \ Restrictions
Create a DWORD value called NoSelectDownloadDir
Give it a value of 1

___________________________________________________________________
If you want to restrict file deletion
logon as Administrator
goto My Computer
C: Drive
right click properties
Security Tab
Add the Administrator account with full control
Delete the Everyone account
Add the Users account
now select the type of actions you wish this account to have

___________________________________________________________________
if you would like more information on customizing your Internet Explorer for end users
for instance to disable the ability to Save As
go to
http://www.winguides.com/registry/display.php/442/

___________________________________________________________________

wtrmk74
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article will show you how to create an ISO CD-ROM/DVD-ROM image (*.iso), and MD5 checksum signature, for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5). It's a good idea to compare checksums, because many installations fail because of a corr…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now