Discard changes at shutdown, sandbox type program

Posted on 2009-12-16
Last Modified: 2012-05-08

I have the task of setting up 4 laptops that will be given out as loaner laptops to family members and patients at a facility for personal web/email use. These laptops will be on a completely separate physical network with just a cable or dsl connection to the internet. I would like to set them up in a way that will discard any changes the user may make to the laptop at shut down or log off.
How would I go about doing this without using a very restrictive GP?  Is there programs (paid or free) that would do this for me without user interaction? I am aware of the program called sandboxie, although I have not downloaded it to try yet I feel as if it may be too much user intervention required. Ideally I would like a method that would run as a service in the background that I can set and forget. If the user downloads a program or virus or changes something those changes would be lost at shut down.

Any suggestions would be greatly appreciated!
Question by:cbossert
    LVL 40

    Expert Comment

    One way is to use a virtual machine which loads when you boot.

    But that would be a bit OTT maybe.
    LVL 8

    Accepted Solution

    Microsoft offer a standalone application called Steadystate that offers just such a solution. You can configure disk protection, which discards all changes on shutdown.

    In addition you can lock down various UI settings with a simple GUI
    LVL 8

    Expert Comment

    LVL 70

    Expert Comment

    SteadyState is OK (and free), DeepFreeze is better but costs

    Author Closing Comment

    Perfect this is just what I was looking for!! thank you
    LVL 8

    Expert Comment


    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    I thought I'd write this up for anyone who has a request to create an anonymous whistle-blower-type submission form created using SharePoint 2010 (this would probably work the same for 2013). It's not 100% fool-proof but it's as close as you can get…
    Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
    Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…
    With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now