Solved

Disabled TCP/IP properties in Vista with Group Policy

Posted on 2009-07-09
8
711 Views
Last Modified: 2012-05-07
I am trying to disable my Vista and XP users' ability to change their TCP/IP settings through Group Policy in a Windows Server 2003 domain. Can someone provide step-by-step instructions? Thanks.
0
Comment
Question by:rbichon
  • 4
  • 3
8 Comments
 
LVL 57

Expert Comment

by:Mike Kline
ID: 24817134
What you need to do is setup a Group Policy object using the following setting
User Configuration\Administrative Templates\Network\Network Connections
>>Prohibit access to properties of a LAN connection
More on the setting here:
http://technet.microsoft.com/en-us/library/cc732613(WS.10).aspx
If your users are segregated in an OU then you can link the GPO to that OU.
..as with any group policy always try to test first (either in a lab or with a few test users first)
Thanks
Mike
0
 
LVL 6

Expert Comment

by:ahmad2121
ID: 24817170
Edit your GPO:

User Configuration > Policies > Administrative Templates > Network > Network Connections > "Enable Windows 2000 Network Connections settings for Administrators" > Set to "Enable"

Then, set "Prohibit TCP/IP advanced configuration" to "Enabled" (in the same path).

You can also "Prohibit access to properties of a LAN connection" (in the same path).

Save it, then login to a machine using that GPO, do gpupdate /force and try it out (make sure you login with a non-admin account).
0
 
LVL 1

Author Comment

by:rbichon
ID: 24817196
My users are admins on their machines. I need to disable it for them as well.
It doesn't seem to be working on my Vista machines. Remember, I am in a Windows Server 2003 domain. Do I have to do something special for the Vista users?
0
 
LVL 6

Expert Comment

by:ahmad2121
ID: 24817232
If they have admin, you are out of luck. There is no such thing as a "limited admin" in the admin group. You are either an admin with full access, or you are part of some other group. Even if you enforce a policy in the GPO to disable it for admins, they can still override that policy on their local machine.

you can disable it via registry policies:

http://www.activewin.com/tips/reg/1/reg_tip_7.shtml

but again, admins have access to everything so they would just be able to revert that.
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 1

Author Comment

by:rbichon
ID: 24817281
What if I make them Power Users?
0
 
LVL 6

Accepted Solution

by:
ahmad2121 earned 500 total points
ID: 24817395
Of course, any other set of users, you can get away with not letting them do things. Power Users is just Users with some additional abilities (like installing apps for example). If they were power users the above solutions would work.
0
 
LVL 1

Author Comment

by:rbichon
ID: 24817414
Okay. Thanks.
0
 
LVL 6

Expert Comment

by:ahmad2121
ID: 24817506
wanted to mention that if this is vista, power users don't have access to those options in the first place, so you dont need to do anything else :)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

[b]Ok so now I will show you how to add a user name to the description at login. [/b] First connect to your DC (Domain Controller / Active Directory Server) SET PERMISSIONS FOR SCRIPT TO UPDATE COMPUTER DESCRIPTION TO USERNAME 1. Open Active …
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now