Solved

Group Policy - restrict deleting recycle bin /enable locking desktop

Posted on 2007-11-22
1
1,114 Views
Last Modified: 2012-06-22
Hi,

I work at a school where the students continuously delete desktop shortcuts to applications residing on the server.  I have tried through group policy to lock the desktop down but STILL the girls are able to delete the items and they don't reappear when the girls log back on.  I am even thinking of going along the route of blocking emptying the recycle bin, so the teachers can just restore the deleted shortcuts if need be.

What am I doing wrong?  How do I set up a standard desktop for each pupil.  They only have one shared login so this would be the easiest option.  I feel like I have exhausted all the options for locking the desktop and everything that should be enabled or disabled already is.  Help!

Many Thanks,
Emma.
0
Comment
Question by:nugentcareICT
1 Comment
 
LVL 28

Accepted Solution

by:
Michael Pfister earned 500 total points
ID: 20333504
Emmy, if you use XP or Win 2000 as a desktop os,  create a mandatory roaming user profile for the students user name. This profile can't be overwritten and will be restored to the students machine, each time a user logs in.

I think this article gives a nice overview: http://www.enterprisenetworkingplanet.com/netos/article.php/625291
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Preface Having the need * to contact many different companies with different infrastructures * do remote maintenance in their network required us to implement a more flexible routing solution. As RAS, PPTP, L2TP and VPN Client connections are no…
A quick step-by-step overview of installing and configuring Carbonite Server Backup.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question