Solved

locking mac properties

Posted on 2006-11-09
12
381 Views
Last Modified: 2013-11-17
Is there a way to lock the mac properties so you have to login as an administrator in order to be able to download, install, change desktop settings??
0
Comment
Question by:stevek65
12 Comments
 
LVL 6

Expert Comment

by:manicsquirrel
ID: 17919955
When you login as administrator and change a desktop setting you are only changing it for the administrator.  It doesn't affect the other user profiles.
0
 
LVL 2

Accepted Solution

by:
Kelmon earned 50 total points
ID: 17971476
I don't think that it is possible to impose all the restrictions that you are looking for but you can certainly restrict the options of the user by creating a new user account (System Preferences > Accounts) and don't select the "Allow user to administer this computer" check box in the account setup panel.  A Standard User account has restricted permissions that will prevent, for example, significant changes to the system setup in System Preferences (they can, however, do stuff like setting the screensaver and background) and installing new applications into the system Applications folder.  As far as I am aware it is not possible to prevent downloads but you can at least prevent the downloaded applications from being installed in the main Applications folder or running with permissions that could enable them to do harm.

OS X Leopard (10.5) looks like it'll give you more control over these sorts of actions using the new Parental Controls that will be available when the OS is release early next year, assuming it remains on schedule.
0
 
LVL 2

Expert Comment

by:Kelmon
ID: 17971487
Oh, one other thing.  In case it wasn't obvious (and it probably wasn't), you'll also want to either disable the "Automatically log in as" option entirely in the Accounts panel's Login Options or set this option to the new Standard User account that you created.  As long as the user has logged on as the new Standard User then any attempts to do something potentially bad will require them to supply the user name and password of a user account on the Mac that has Admin privileges, such as the one created when the OS was installed.
0
 
LVL 6

Expert Comment

by:manicsquirrel
ID: 17971570
I did just have one idea that might work.

1. Log into the particular user's profile that you are concerned about and set the environment up the way you want it.  
2. Log out and log back in with your own administrative login or the root login.
3. Open the System Preferences panel->Accounts; remove administrative credentials from the concerned user.  This will prevent them from installing software, but not downloading it.
4. Open the concerned users Preferences folder in the finder: %drive%\Users\%username%\Library\Preferences\
5. Locate their Desktop preferences file, com.apple.desktop.plist
6. Show Get Info (command I) for this file.  Change the Ownership to yourself, and give yourself Read & Write access, set Others to Read Only.
7. Now when the concerned user logs inthe will not be able to change the desktop, because they cannot write the settings to the desktop preferences file.  They will not be able to install software because you took away their administrative credentials.

Note: this is just my theory.  I haven't tested it.
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 6

Expert Comment

by:manicsquirrel
ID: 19198837
I actually think my suggestion explicitly addressed and provided a solution for each item the author asked in his question.
0
 
LVL 20

Expert Comment

by:Venabili
ID: 19199050
I do not think it will actually work - the parts that will work are covered before you...
Had you tried it?
0
 
LVL 6

Expert Comment

by:manicsquirrel
ID: 19199182
Actually, I did try it and wrote down the steps as I performed it, but it's not that big of a deal.
0
 
LVL 6

Expert Comment

by:manicsquirrel
ID: 19199190
Actually, I didn't test it.
0
 
LVL 1

Expert Comment

by:Computer101
ID: 20120446
Forced accept.

Computer101
EE Admin
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Information security is a multi-billion dollar industry. Just as lucrative is the black market industry which trades stolen identities, credit card numbers and software exploits all over the world. Nothing is hack-proof. The best one can do is make …
In this article we discuss how to recover the missing Outlook 2011 for Mac data like Emails and Contacts manually.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now