Solved

Locking down a laptop for only Internet Explorer use

Posted on 2010-08-18
6
415 Views
Last Modified: 2013-12-08
Hi, I am looking for an easy way to lockdown an entire laptop and that only the Internet Explorer or Firefox can be used.

Something like a KIOSK mode.

Problem is that it has to be done on 3 laptops wich are currently been used in a corporate environment and only for 2 days be converted to something like the KIOSK mode, without harming the current environment.

Does anyone have any good and easy ideas about this?

I know it can be done by using policies and making a new user and adjust these policies, but i was hoping for an easier way.
0
Comment
Question by:RemcoVi
  • 3
  • 2
6 Comments
 
LVL 8

Accepted Solution

by:
jessmca earned 250 total points
ID: 33470591
why not use a live cd for the 2 days and not take any chances.  The users would not have any access to your data and no risk whatsoever
0
 

Author Comment

by:RemcoVi
ID: 33470607
Thats a great idea, never thought of that one. Do you know a good livecd with Firefox or preferable Internet Explorer?
0
 
LVL 3

Assisted Solution

by:VBDotNetCoder
VBDotNetCoder earned 250 total points
ID: 33470703
If linux will not be a problem, I think the best choice is Ubuntu live CD, since it recognizes all the hardware and it has a lot of utilities and software installed onit including internet browsers.
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Comment

by:RemcoVi
ID: 33498492
I still saw some trouble using a livecd because you still can find the local hard drive and mess that one up.

What i have done is locked down one user with policies, it was a challenge, but the user can only open internet explorer now and it worked perfectly.
0
 

Author Closing Comment

by:RemcoVi
ID: 33498516
Because you both where helpfull.
0
 
LVL 3

Expert Comment

by:VBDotNetCoder
ID: 33500146
Thanks for the points :)  Glad it's resolved.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Google currently has a new report that is in beta and coming soon to Webmaster Tool accounts. This Micro Tutorial will highlight new features for Google Webmaster Tools.
How to create a custom search shortcut to site-search Experts Exchange using Google in the Firefox browser. This eliminates the need to type out site:experts-exchange.com whenever you want to search the site. Launch your Bookmark Menu: Press 'Ctrl +…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now