Solved

Locking down FireFox 1.5, Dynamic Local Users

Posted on 2006-07-03
3
1,690 Views
Last Modified: 2013-12-04
Hi Experts,

I've been racking my brain on this one and all the answers I'm finding are for FireFox 1.0.x which is a bit dated and more importantly...don't seem to be working.

Here is the situation. I work for a school and I'm wanting to roll out FireFox for students to us. There is a catch though. I need to lock several settings in place. Homepage, proxy settings, view passwords, etc. Heck if I could set the settings and disable the "Options" and "About:config" menus I'd be happy.

As most of you know with Dynamic Local Users when a user logs in a copy of the "default user" account is copied to make that user's account. Here's the problem I'm running into. I've got a generic account setup almost the way I like it. (Can't figure out how to lock the homepage.) I copy that profile over to the "default user" account and restart.

Presto change-o everything should be working right? Nope...for some reason the settings I made on the generic account weren't pulled over.

Group Policy make this so much easier with IE, however FireFox doesn't have a detailed enough ADM file to make GroupPolicies effective. (I'd need a bit more than 4 settings. ha...maybe down the line that area will be developed.)

Suggestions?

0
Comment
Question by:Sebastien47136
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 125 total points
ID: 17038277
0
 
LVL 1

Author Comment

by:Sebastien47136
ID: 17046278
WetDog worked wonderfully. Thanks so much!
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 17046324
No problem
-rich
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question