Solved

How to disable Internet Explorer Connection Settings...

Posted on 2003-11-28
8
1,455 Views
Last Modified: 2013-12-04
Hello gurus,

I'm trying to disable on Internet Explorer (any version > 5.0) the Connection Settings (on the Tools -> Internet Options Menu) for my wide user network. I have a Domain Controller on WinNT sp6 and use security policies for each group of users. What I would like to acomplish is to disable (gray-font) the Internet Options submenu, so that user cannot modify anny Internet Explorer Settings. Is there any way this can be done? How?

Thanks....
0
Comment
Question by:juangalavis
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
8 Comments
 
LVL 44

Expert Comment

by:CrazyOne
ID: 9841183
Well i have no idea if NT 4 has the Group Policy but I do know you can do that in Win2000 and XP.

Start > Run gpedit.msc

User Configuration > Administrative Components > Windows Components > Internet Explorer
Double click "Disable Internet Connection Wizard"


MS explaination

Prevents users from running the Internet Connection Wizard.

If you enable this policy, the Setup button on the Connections tab in the Internet Options dialog box appears dimmed.

Users will also be prevented from running the wizard by clicking the Connect to the Internet icon on the desktop or by clicking Start, pointing to Programs, pointing to Accessories, pointing to Communications, and then clicking Internet Connection Wizard.

If you disable this policy or do not configure it, users can change their connection settings by running the Internet Connection Wizard.

Note: This policy overlaps with the "Disable the Connections page" policy (located in \User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel), which removes the Connections tab from the interface. Removing the Connections tab from the interface, however, does not prevent users from running the Internet Connection Wizard from the desktop or the Start menu.
0
 
LVL 1

Expert Comment

by:NetwerkMerc
ID: 9849461
What you are going to need is the Internet Explorer Administration Kit and build a custom distribution.  You can pretty much customize just about everything including adding predefined lists of "trusted" and "restricted" sites, content advisor configurations, allow and deny cookie lists.  Very cool.  You can then make profiles, and have a different distribution for each profile based on a single "template" distribution, one for IT, one for users, one for the execs.  You can also define when a given distribution should be used (ie the laptop user at home will use HIS instance of IE and at the office only uses the custom).

per IEAK's help:
"If you are a corporate administrator, you can also use system policies and restrictions to determine whether users can change their connection settings. You can set policies and restrictions in Stage 5 of the Internet Explorer 6 Customization Wizard or through automatic configuration"

http://www.microsoft.com/windows/ieak/default.asp

-Eric
Security and Virus forum moderator
<edited by YensidMod>
0
 
LVL 1

Expert Comment

by:NetwerkMerc
ID: 9849474
Ohh yea...this can prevent them from running the wizard, actually you can do it many ways.  They can run it, but it won't affect the customized distribution.  You WILL want to tighten your user and system GP as well.  But out of the box, this will do it and you can depoy in many ways and supports a full unattended install.  

-Eric
Security and Virus forum moderator
<edited by YensidMod>
0
MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.

 
LVL 1

Expert Comment

by:NetwerkMerc
ID: 10005347
Status update?
0
 
LVL 1

Expert Comment

by:NetwerkMerc
ID: 10249821
Is this thing on?  Please reply or close the topic.

-Eric
0
 

Author Comment

by:juangalavis
ID: 10250582
Your answers were ok, but did not fullfiled my expectations (or at least I couldn't resolve my problem). I managed to find the solution on this webpage www.solont.com, it's in spanish, but that's my mother language, so it was just great!..... below the solution:

Disabling Connection Settings:
La activación de esta característica impide a los usuarios cambiar la configuración de acceso telefónico. Si se habilita esta opción, el botón Configuración en la ficha Conexiones, en el cuadro de diálogo Opciones de Internet aparecerá atenuado. Para activar esta opción siga los pasos enumerados a continuación:
1.- Inicio > Ejecutar > escriba, Regedit.exe y presione Enter.
2.- Ubíquese en la siguiente clave del registro de configuraciones:
3.- HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel\
4.- Cree o configure el valor DWORD decimal Connection Settings a (1)
5.- Cierre el editor del registro.
6.- Los cambios surtirán efecto una ves que inicie sesión nuevamente.
La contracción (HKCU\) Se refiere a la clave del registro (HKEY_CURRENT_USER\) que es la clave del usuario concurrente de la maquina local. Este cambio en el registro afecta a todos los usuarios que inicien sesión en la maquina.

Disabling Internet Connection Wizard:
La activación de esta característica impide a los usuarios ejecutar el Asistente para la conexión a Internet. Si se habilita esta opción, el botón Instalación en la ficha Conexiones, en el cuadro de diálogo Opciones de Internet, aparecerá atenuado. Para activar esta opción siga los pasos enumerados a continuación:
1.- Inicio > Ejecutar > escriba, Regedit.exe y presione Enter.
2.- Ubíquese en la siguiente clave del registro de configuraciones:
3.- HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel\
4.- Cree o configure el valor DWORD decimal Connwiz Admin Lock a (1)
5.- Cierre el editor del registro.
6.- Los cambios surtirán efecto una ves que inicie sesión nuevamente.
La contracción (HKCU\) Se refiere a la clave del registro (HKEY_CURRENT_USER\) que es la clave del usuario concurrente de la maquina local. Este cambio en el registro afecta a todos los usuarios que inicien sesión en la maquina.

Disabling Advanced Configuration Settigs:
La activación de esta característica impide a los usuarios cambiar la configuración en la ficha Avanzadas en el cuadro de diálogo Opciones de Internet. Si activa esta valor los usuarios no pueden cambiar las configuraciones avanzadas de Internet, tales como seguridad, multimedia e impresión. Los usuarios no pueden activar ni desactivar las casillas de verificación en la ficha Avanzadas. Para activar esta opción siga los pasos enumerados a continuación:
1.- Inicio > Ejecutar > escriba, Regedit.exe y presione Enter.
2.- Ubíquese en la siguiente clave del registro de configuraciones:
3.- HKCU\Software\Policies\Microsoft\InternetExplorer\ControlPanel
4.- Cree o configure el valor DWORD decimal Advanced a (1).
5.- Cierre el editor del registro.
6.- Los cambios surtirán efecto una ves que inicie sesión nuevamente.
La contracción (HKCU\) Se refiere a la clave del registro (HKEY_CURRENT_USER\) que es la clave del usuario concurrente de la maquina local. Este cambio en el registro afecta a todos los usuarios que inicien sesión en la maquina.

Thanx a lot guys..... we are now migrating to w2k and XP, things would be much easier there.....
0
 
LVL 2

Accepted Solution

by:
Lunchy earned 0 total points
ID: 10284378
PAQed, with points refunded (500)

Lunchy
Friendly Neighbourhood Community Support Admin
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question