Solved

How can I lock my computer down into a kind of "Kiosk Mode"?

Posted on 2009-05-09
3
643 Views
Last Modified: 2013-11-25
I am trying to lock down a workstation in a workgroup environment that runs a Point of Sale Retail software program.  What I'd like to have happen is this:

When a POS user logs on, the computer logs onto Windows, starts the software (which runs in full screen mode), and disallows the user to access the desktop, start menu, any controls, etc.  However, I would like the ability to override that control for administrative access.

Anyone have any good ideas, or am i just going ot have to slog through Group Policy Editor until I can combine enough polices to do what I want?  Any security templates out there that seem appropriate?

Thanks in advance.
0
Comment
Question by:clenh2o
3 Comments
 
LVL 23

Accepted Solution

by:
Admin3k earned 250 total points
ID: 24344537
an idea here , is to modify registry to set shell=yoursoftware.exe instead of explorer.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell=explorer.exe
replace explorer.exe with your executable, please backup the key first 
you can edit the registry to block Task manager & regedit 
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
add thebelow two  Dword values 
DisableTaskMgr
DisableRegistryTools
set their values to 1 to disable TM,& registry editing  or 0 to enable them.
the same can be applied for registry editing tools , this time theDword value is
of course you will need to test the above scenarios carefully before promoting it to a production environment.
hope this helps.


0
 
LVL 23

Assisted Solution

by:Danny Child
Danny Child earned 250 total points
ID: 24350447
Check out Windows tool for Steady State - tutorial here:
http://lifehacker.com/397786/kid+proof-your-pc-with-steadystate

hth, Danny
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ensuring effective and secure communication in the age of healthcare BYOD.
How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question