Solved

allowing access to cd rom program without relaxing permissions

Posted on 2007-11-26
3
289 Views
Last Modified: 2013-12-23
Hello expert,

I trying to allow users access to training software that can only be run from
cd.
For security requirements the workstation that will be using the software
 has deny access to cd rom and usb ports.
I do not want to relax my security policy , but will like to allow users to access
above training cd.

Could any expert offer suggestions
0
Comment
Question by:jomfra
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 84

Expert Comment

by:oBdA
ID: 20352286
If the software that controls the access to the CD drive doesn't specifically allow for this setup, and you can't make an iso of the CD and mount this on the workstations, then there's exactly nothing you can do under the given restrictions, sorry.
0
 
LVL 37

Accepted Solution

by:
bbao earned 250 total points
ID: 20393748
your current control policy does not allow users to access *physical* CDROM. but it does not mean the policy cannot cover the CDROM in a virtual machine. therefore, cover your training software CD into an ISO file, and setup a virtual machine to run the software.

you may consider using MS Virtual PC. it is *free*.

Microsoft Virtual PC 2007
http://www.microsoft.com/windows/products/winfamily/virtualpc/overview.mspx

hope it helps,
bbao
0
 

Author Comment

by:jomfra
ID: 20395334
hello bbao,

thanks for the suggestion it solved my problem keep up the good work

regards
0

Featured Post

Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question