[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Laptop GPO lockdown

Posted on 2004-08-17
7
Medium Priority
?
690 Views
Last Modified: 2012-06-21
Is there a way to apply a group policy to a XPpro laptop when it's off the Win 2K network, and keep my clients from loading programs and accepting addware?
0
Comment
Question by:rikicsofde
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
7 Comments
 
LVL 104

Expert Comment

by:Sembee
ID: 11820150
If the machine is part of the domain and the machine can dial in to the domain then it is quite simple.

Get the user to connect to the network at the login prompt using "Connecting using Dial up Networking". This will make the machine act as part of the domain - meaning that the GP setting will be applied from the server. That setting will then stick until the machine is removed from the domain or gets an updated GP.

You can also use this process to keep online and offline passwords in sync by getting the user to change their password after logging in to the maching in this way.

Simon.
0
 

Author Comment

by:rikicsofde
ID: 11820677
The proplem isn't that simple. The client is the CEO and what to be able to connect to the internet anytime, anywhere without worry his computer will be open to programs he did not want.
0
 
LVL 104

Expert Comment

by:Sembee
ID: 11820763
It will be almost impossible to lock a machine down that hard. You would have to run a "block everything but..." list. This would very difficult to create. Windows has many small executables that it uses all the time (take a look at task manager) all of which would be have to be listed.

I am afraid to say that there isn't a technical solution to this problem.

Simon.
0
NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

 

Author Comment

by:rikicsofde
ID: 11821417
Thank you simon this is the conclusion I came up with as well.  Is it possible to to stop clients from doing this thru local group policy?
0
 

Accepted Solution

by:
SilverSox earned 1500 total points
ID: 11821749
You could install spybot S&D this comes with an immunization tool that stops most spyware / addware, also get him to use a different web browser as IE will accept anything !! FireFox is the one I use and it has some great features including popup blocking software!
0
 

Author Comment

by:rikicsofde
ID: 11821848
Thank you for the guideance... We seem to be on the same page.

Rik.
0
 

Expert Comment

by:SilverSox
ID: 11828479
At the end of the day you’ve got to keep it simple.

I use group policy for desktop machines but laptops are in a world of there own and when your dealing with “suits” you cant afford to be trying out new things out!

Spybot is the best in the business even Microsoft recommend it on there site ans they don’t have anything themselves! Just be sure to update it when you install it and run the immunize tool it’s the business.

Keep windows updated, your Anti Virus updated and your already ahead of the competition!

Its all about layered security!

Good Luck  
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Downtime reduced, data recovered by utilizing an Experts Exchange Business Account Challenge The United States Marine Corps employs more than 200,000 active-duty Marines with operations in four continents, all requiring complex networking system…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question