Solved

Group Policy Deny Registry Security

Posted on 2004-09-26
2
615 Views
Last Modified: 2008-03-10
If have created a Security group for all of the usres on this network.

But some of the users can install programs and make registry changes which I want to prohibit.

I presuem I need to create a Group Policy and apply the policy to the User Group.

What and where is the registry policy token regarding registry access?

0
Comment
Question by:inthedark
2 Comments
 
LVL 3

Accepted Solution

by:
markoid earned 500 total points
ID: 12154562
Yes you do.
There is a policy uder computer configuration \windows settings\security settings\registry.
You can add keys here that you want to restrict access to.
Or you could control acces to regedit and regedt32 under computer configuration \windows settings\security settings\file system.
Apply the group policy to the OU the security group is in.
0
 
LVL 17

Author Comment

by:inthedark
ID: 12188378
Thanks I will try this out.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
The Nano Server Image Builder helps you create a custom Nano Server image and bootable USB media with the aid of a graphical interface. Based on the inputs you provide, it generates images for deployment and creates reusable PowerShell scripts that …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question