Solved

configure system to allow access only for some programs

Posted on 2003-12-02
3
145 Views
Last Modified: 2013-12-04
Hello!

so far I grant access to two xp admin accounts in my computer for my two brothers. They don't know a word about computers, so I'd like to grant them limited access to the computer only for programs like "msn messenger", "microsoft word", "kazaa" and a limited list of websites.

I am wondering if you could give to me a detailed explanation on how to create two windows accounts (I am not sure whether is better two admin or two limited) so my brothers are able to enjoy chatting in msn and downloading all kind of stuff in kazaa, while I am still the only administrator of the computer.

- I don't want them being able to install games.
- I don't want them being able to change screen resolution
- I don't want them being able to modify files in other folders than their personal "My Documents" folder.
- I want them being able to change their desktop wallpaper, and the position of the icons in the desktop, but not to add or remove icons to or from the desktop.

You probably are answering to this questions that I should create two "limited" accounts, but I think it is not enough. I want to provide them access only to msn and kazaa, and not to worry whether they can mess up the start menu-programs list or stupid things like that.

I know that there is a message I could obtain when trying to access to some programs from a limited account. In that situation a msgbox ask the user to enter an admin password to run the program as an admin. How to avoid this?
0
Comment
Question by:VraBulA
3 Comments
 
LVL 41

Accepted Solution

by:
graye earned 125 total points
ID: 9863535
You need to check out WinXP's ability to use "Software Restriction Policies".  This feature can be tuned to allow or disallow individual programs.

But beware... it's not for the faint-of-heart...  you'll have to learn alot about the entire subject of Security Policies (something that most folks go to classes for!)
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now