Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Preventing users from deleting internet history

Posted on 2004-08-10
6
670 Views
Last Modified: 2010-04-11
We are in a win2k environment and I was just wondering if there was/is a way to prevent users from deleting their history.  
0
Comment
Question by:dabryantIT
6 Comments
 
LVL 15

Expert Comment

by:Yan_west
ID: 11762778
As per a newsgroup post:

You can disable your users from going into Tools...Internet Options
altogether.

You add a DWORD value in the registry to configure each restriction at
either of the following registry locations. Use the DWORD value, 0x1 to
enable the
restriction and 0x0 to disable it.

For all users on a particular workstation, the registry location is:
   
HKEY LOCAL MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Exp
lorer

For specific users on a particular workstation, the registry location
is:
   
HKEY CURRENT USER\Software\Microsoft\Windows\CurrentVersion\Policies\Expl
orer

NOTE: Internet Explorer checks the HKEY LOCAL MACHINE key first. If
there
are no restrictions found there, it checks the HKEY CURRENT USER key for

restrictions.  When you restrict a feature, the associated keyboard
shortcut is also
restricted.


Add this key:
NoBrowserOptions             Disable tools | internet options menu item.


However, that won't stop the savvy from going to the \Windows\History
folder and manually deleting things there.
0
 
LVL 15

Expert Comment

by:Yan_west
ID: 11762799
0
 

Author Comment

by:dabryantIT
ID: 11763126
I can't seem to get the reg entry to work.  Also I cannot find the Explorer key under HKEY LOCAL MACHINE.  I have found the one under HKLEY CURRENT USER, but I cannot get that to work either.
0
The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

 
LVL 4

Accepted Solution

by:
shard26 earned 250 total points
ID: 11764194
are you using active directory?

if yes, you can set a GPO:

User Configuration - Administrative Templates -  Internet Explorer

and disable whatever you want
0
 
LVL 24

Expert Comment

by:SunBow
ID: 11765289
A history is a log, which by nature can grow until the disk fills and computer crashes.  So really it should be regularly cleaned under authority of creater/generator, the user.  For record keeping and control, either the files can be stored on server instead of workstation, or, for permanent recordkeeping, copy or write to CD which may not be erased. Good for any type of logging.

There are simple defeats for many concepts for limitting user control. For a system permitting only limitted size or quantity, one can simply make overflow by adding more. Other workarounds they can try should not be mentioned here in public.
0
 

Author Comment

by:dabryantIT
ID: 11765304
Yeah we are using AD.  I'll check up on the GPO's.  Thanks.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Review of a VPN cert policy 4 43
desktop security assessment (windows devices). 2 41
Setting up NAT translation for RDP 6 39
Standalone trial or freeware to do SSL scan 4 30
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question