Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 451
  • Last Modified:

new tablets

I have appx 50 new tablets for our mobile work force that need to be for lack of a better description "locked down".

These users will be using an application installed on the tablet and then will be sending the data to the terminal server and update one of the databases with data entered.  Internet access will be needed for an ftp site which will house manuals and other industry related documentation.  Email may be necessary.

Wireless broadband is going to be the medium for access to the server.

The overall goal is to reduce time spent on correcting what the users will screw up.
If I can have just one or two options for them and thats it I increase my chances.
1)Remove all unnecessary software
2)Control browsing ( is host file manipulation the best option )
3)Remove access to all system or critical files.

Is there a program that can control this process if these tablets are not a part of a domain and a GPO is not used?  Possibly a better description may be a program that would assess the OS and all installed software and let me choose what to keep and what to restrict access to.

Thanks in advance

scania89
0
scania89
Asked:
scania89
  • 4
  • 3
1 Solution
 
John HurstBusiness Consultant (Owner)Commented:
With XP, Vista or Windows 7, and a machine not on a domain, it is fairly straightforward to use a Standard (Restricted) User.

Make a model of the tablet, remove what you don't want, install what you do want, set up a standard profile for the user, ghost it across to the other tablets, set up each user as restricted, and then if you wish to, use the local Group Policy to ensure that any ability to install or change is further restricted.
.. Thinkpads_User
0
 
scania89Author Commented:
Sorry for the delay.  Each tablet will have 8 users with apps that all will need to use.  What is the easiest way to setup an application so no matter who logs on it will lauch correctly especially at startup

thanks
0
 
John HurstBusiness Consultant (Owner)Commented:
The easiest way I have found is to set up one tablet (one PC), set up a Model User on that computer, install the applications and then run all these applications in the Model User to ensure all is working. Copy the Model User profile to the Default Profile. Now put this image on all the tablets. When a user logs on for the first time (must have been made a user on the tablet), they will get the default user interface with all the applications you set up. ... Thinkpads_User
0
Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

 
scania89Author Commented:
what imaging software would you recommend
0
 
John HurstBusiness Consultant (Owner)Commented:
There are a number of imaging tools like Ghost and Acronis. I have always used Symantec Ghost with good results. At least one PC maker (IBM/Lenovo) includes imaging software (Rescue and Recovery) with their computers and it works also). ... Thinkpads_User
0
 
scania89Author Commented:
thanks for the insight and direction
0
 
John HurstBusiness Consultant (Owner)Commented:
Thank you and good luck. ... Thinkpads_User
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

  • 4
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now