Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Win2K Desktop Icons

Posted on 2004-08-02
4
Medium Priority
?
229 Views
Last Modified: 2013-12-04
Hey all,
Can someone give me the specifc Group Policy or reg hack that prevents users from deleting their desktop icons? I locve Mondays! :-)
Thanks...David
0
Comment
Question by:stevenshealthcare
  • 3
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 375 total points
ID: 11699516
This locks their placement on the desktop- not from being deleted I believe... I'm not on a M$ machine right now to test...
Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Right-click in the right pane and select New, DWORD Value name NoSaveSettings and press the Enter key. Right-click on the new NoSaveSettings item and select Modify. Enter 1 in the Value data box. After this, whenever you restart Windows, your settings will return to their current state.
-rich

0
 
LVL 10

Author Comment

by:stevenshealthcare
ID: 11715839
Good information Rich. I'll give it a try and let you know how it works. David
0
 
LVL 10

Author Comment

by:stevenshealthcare
ID: 11731082
Okay, luckily I printed out all of the changes I made to the Group Policy prior to pc deployment.
I found two fields that I belive are the cause of my restrictions. The fields are marked "Enabled". They are;
"Restrict the user from entering author mode", and "Restrict users to the explicity permitted list of snap-ins."
These both appear under the Microsoft Manager field which is a sub field of Administrative Templates. Both of these fields are accessed under the User Configuration tab within the Group Policy.
Hope this helps. David
0
 
LVL 10

Author Comment

by:stevenshealthcare
ID: 11731144
I got lucky and found the snap-in that I thought might exist. Just so that you and others know it and other snap-ins can be located at: http://www.kellys-korner-xp.com/xp_tweaks.htm
Thanks for your help.
David
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
This lesson discusses how to use a Mainform + Subforms in Microsoft Access to find and enter data for payments on orders. The sample data comes from a custom shop that builds and sells movable storage structures that are delivered to your property. …
Despite its rising prevalence in the business world, "the cloud" is still misunderstood. Some companies still believe common misconceptions about lack of security in cloud solutions and many misuses of cloud storage options still occur every day. …
Suggested Courses

783 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question