Solved

Policies to disable browsing 'my computer' don't prevent users from doing the same thing in Word and Excel

Posted on 2006-07-14
5
145 Views
Last Modified: 2013-12-04
Hi,

On a W2K3 Terminal Server with many policies I found a very stupid securty leak. With the policies I've disallowed users to browse 'my computer'. They cannot go to c:\ or d:\ from the explorer address bar.

But when a user starts MS Office Word (or any other office application) it's possible to click 'my computer' from the 'file/open' menu. Also it's possible to browse to c:\ and d:\ from the file location bar.

Is there a way to make office applications more secure? To disable those features?

Frank.
0
Comment
Question by:tagnet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 

Author Comment

by:tagnet
ID: 17111985
Allready found this article http://support.microsoft.com/kb/826214/en-us
but that only removes the 'my places' icons. It still keeps the option open to manually enter a path in de file/open menu.

Anyone who has a solution for that?
0
 
LVL 88

Accepted Solution

by:
rindi earned 250 total points
ID: 17113631
Use ntfs file permissions and change the security there.
0
 
LVL 37

Expert Comment

by:bbao
ID: 17113737
another kit:

Microsoft Shared Computer Toolkit for Windows XP
http://www.microsoft.com/windowsxp/sharedaccess/default.mspx

"This toolkit helps make it easy for anyone to set up, safeguard, and manage shared computers running Windows XP, such as those in schools, libraries, Internet cafes, and other public places."
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question