Solved

allowing access to cd rom program without relaxing permissions

Posted on 2007-11-26
3
294 Views
Last Modified: 2013-12-23
Hello expert,

I trying to allow users access to training software that can only be run from
cd.
For security requirements the workstation that will be using the software
 has deny access to cd rom and usb ports.
I do not want to relax my security policy , but will like to allow users to access
above training cd.

Could any expert offer suggestions
0
Comment
Question by:jomfra
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 85

Expert Comment

by:oBdA
ID: 20352286
If the software that controls the access to the CD drive doesn't specifically allow for this setup, and you can't make an iso of the CD and mount this on the workstations, then there's exactly nothing you can do under the given restrictions, sorry.
0
 
LVL 37

Accepted Solution

by:
bbao earned 250 total points
ID: 20393748
your current control policy does not allow users to access *physical* CDROM. but it does not mean the policy cannot cover the CDROM in a virtual machine. therefore, cover your training software CD into an ISO file, and setup a virtual machine to run the software.

you may consider using MS Virtual PC. it is *free*.

Microsoft Virtual PC 2007
http://www.microsoft.com/windows/products/winfamily/virtualpc/overview.mspx

hope it helps,
bbao
0
 

Author Comment

by:jomfra
ID: 20395334
hello bbao,

thanks for the suggestion it solved my problem keep up the good work

regards
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question