Group Policy - Lock a user down so all he can do is see our Intranet page


I have a couple users at my company that I need to lock down so they can only see our Intranet.  I have looking into the Kiosk mode for IE, but it would allow the user to still browse other pages other then our Intranet page.  Additionally, it would not be intuitive to the user how to logoff or shutdown since the start menu is hidden.

Who is Participating?
trywaredkConnect With a Mentor Commented:
I did remember, that I got something about it in my knowledgebase, but not that I got so much.
Take what you need, from registry and/or USER group policies ....

HOW TO: Restrict Users from Running Specific Windows Programs in Windows 2000

Description of the Software Restriction Policies in Windows XP;en-us;310791

Remember to Enforce a Remote Access Security Policy in Windows 2000;en-us;Q313082&sd=tech 

HOW TO: Apply Local Policies to all Users Except Administrators on Windows 2000 in a Workgroup Setting;EN-US;293655

Local Policies to all Users except Administrators (only workgroup);en-us;293655

Refresh policy from windows 2003 server:

How do I use Group Policy to implement Internet Explorer Advanced Settings?

Internet Explorer Group Policy security settings need some extra help?

One can restrict the programs that a user can run
 Accepted Answer from trywaredk  Date: 06/15/2003 10:56AM CEST  
Internet Explorer Control Panel Restrictions (Part 1)

Internet Explorer Control Panel Restrictions (Part 2)

Disable Network Messenger Service (Windows NT/2000/XP)

Disable MSN Instant Messenger

Disable Run Commands Specified in the Registry - This restriction is used to disable the ability to run startup programs specified in the registry when Windows launches.

Disable Registry Editing Tools

Disable Command Prompt and Batch Files

Disable the Windows Key (Windows NT/2000/XP) Popular
This tweak disables the Windows key that is found between the Ctrl and Alt keys on a Windows enhanced keyboard.

Disable the Windows Hotkeys (All Windows)
This restriction allows you to disable the use of the Windows hotkey combinations that provide shortcuts to the Start Menu and task swapping.

Secure Access to Floppy Drives (Windows NT/2000/XP)
This setting determines whether data in the floppy disk drive is accessible to other users.

Disable Ability to Skip Startup Programs (Windows NT/2000/XP)
Normally if you hold the Shift key while Windows is loading you can prevent the Startup applications from being launched. This setting disables the ability to by-pass these programs.

Disable CD Burning (Windows XP)
This restriction is used to disable the use of the inbuilt CD recording functions of Windows.

Disable File Download in Internet Explorer

Disable Internet Access

Disable Control Panel

Windows Netmeeting Policies and Restrictions (All Windows)
These restrictions and policies can be used to disable or restrict access to certain features of Windows Netmeeting.

MSN Instant Messenger Restrictions (All Windows)
These restrictions are used to disable various features of the Microsoft MSN Instant Messenger client.

Automatic Hidden Shares (Windows NT/2000/XP)
When networking has been installed on a Windows machine, it will automatically create hidden shares to the local disk drives. It is possible to disable the sharing at run-time, but this tweak will stop the automatic sharing altogether.

Manage the Encrypting File System (Windows 2000/XP)
When you use Encrypting File System (EFS), you can store data securely because selected NTFS file system files and folders can be encrypted. This setting allows you to enable or disable EFS.

Add or Remove Programs Restrictions (Windows 2000/XP)
These restrictions apply to the Add/Remove Programs feature of Control Panel. They allow you to entirely or individually disable components.

Control the CD-ROM Autorun Function (Windows NT/2000/XP) Popular
Normally when you insert a disc into your CD-ROM drive, the contents are automatically launched. This tweak allows you to disable this behavior.

Restrict Access to the Windows Update Feature (All Windows)
The Windows Update feature allows users to easily update Windows components and software over the Internet. These settings allow can be used to grant or restrict access to this function.

Restrict Task Creation and Deletion (Windows 2000/Me/XP)
These settings allow you to restrict the creation and deletion of items in Task Scheduler.

Prevent Access to the Contents of Selected Drives (Windows 2000/Me/XP)
This restriction prevents users from using My Computer or Explorer to access the content of selected drives. Also, they cannot use Run, Map Network Drive, or the Dir command to view the directories on these drives.

Network Connection Restrictions (Windows 2000/XP)
These restrictions control access to the features and properties of LAN, RAS and other network connections.

Enable Remote Assistance (Windows XP) -  :o) Don't use this setting!!!
The Remote Assistance feature is a convenient way for an administrator to remotely connect to a computer and with permission view the screen, move the mouse, use the keyboard and chat online.

Check for Internet Explorer Updates (All Windows)
Internet Explorer 5 and higher has the ability to automatically check for software updates. This tweak controls that feature.

Configure Remote Access Client Account Lockout (Windows 2000/XP) New
You can use the remote access account lockout feature to specify how many times a remote access authentication has to fail against a valid user account before the user is denied access. Use this tweak to set the number of failed logins before the account is locked-out and the time before the lockout is reset.

Hide the Last User Name (All Windows) Popular
This setting can be used to blank the username box on the logon screen. This will prevent people that are logging on from knowing the last user to access the system.

Secure Access to Floppy Drives (Windows NT/2000/XP)
This setting determines whether data in the floppy disk drive is accessible to other users.

Manage Floppy Access from Recovery Console (Windows 2000/XP) New
If this setting is enabled, a user has full access to all drives on the system and can copy files from the hard drive to the floppy disk when using the Recovery Console.
Using Group Policy Objects to Hide Specified Drives in My Computer for Windows 2000

----------------------- IF THE ABOVE SOLUTIONS DOES'NT WORK, THEN ------------------------------

HOWTO: Enabling Local Auditing Policies on Windows 2000;en-us;252412

HOW TO: Enable and Apply Security Auditing in Windows 2000 Server and Windows 2000 Professional:;en-us;Q300549&sd=tech

Many Regards
Jorgen Malmgren

:o) Your brain is like a parachute. It works best when it's open
Pete LongTechnical ConsultantCommented:
why use a policy? just put in a firewall that blocks all TCP port 80 (web) traffic from that particular pc to the outside of your network
swabeuiAuthor Commented:
I thought about this (in fact I have implemented similar policies already), but the computers in question are shared and other users do not have to share the same restrictions.  I would also have to make the IPs static or at least assigned in DHCP which I would rather not do if I don't have to right now.
Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

Another option is to install a 3rd party software product such as cyber patrol to limit Internet access or indeed block all www sites for that user account.
swabeuiAuthor Commented:
I think I might have it solved it.  I have setup Internet Explorer to use a Proxy server and to bypass the server on local addresses as well as "certain" websites.  I set the proxy server to point to the local machine so if they try to go anywhere except for the places I have listed as "bypass" sites, they get an error.

On top of all that, I of course locked down the controls so they can't undo this little trick.  The user was mighty surprised at the effectiveness of the policy when I applied it to thier account today.

I am going to run some other tests to see if it is what I want, and if so I will award points, etc... at that time.

Use C:\Programs\Internet Explorer\iexplore.exe as user based custom shell

Implement a User Based Custom Shell (Windows 2000/XP)

Replacing the Microsoft Graphical Identification and Authentication DLL (MSGINA.DLL)
When I did my MCSE (which I did in a technical school) I implemented this on my final project by using a Shell as trywaredk already mentioned in the last post.

The page restriction I did with the help of ISA server 2000. My configuration logged the user out automatically if he closed Internet Explorer.

Hope this helps,

Daniel F.
:o) Glad I could help you - thank you for the points
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.