?
Solved

Restrict CD/DVD-ROM and hardware attach access

Posted on 2010-09-02
3
Medium Priority
?
383 Views
Last Modified: 2012-05-10
Afternoon,

I would like to know how to stop users being able to burn discs and attach portable storage devices to their computers.
I would like to do this via GPO

Regards
0
Comment
Question by:cbsbutler
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 5

Accepted Solution

by:
bernardbrink earned 2000 total points
ID: 33585818
0
 
LVL 3

Expert Comment

by:Willy Van den Houten
ID: 33585881
The easiest way to use is with the Group Policy Managment Console

GPMC

http://www.microsoft.com/downloads/details.aspx?FamilyID=0a6d4c24-8cbd-4b35-9272-dd3cbfc81887&displaylang=en
0
 
LVL 53

Expert Comment

by:Will Szymkowski
ID: 33585955
You will need to make a custome ADM template to accomplish this. Take a look at the KB artical as it will show exactly what you need to do and also give you structure.
http://support.microsoft.com/default.aspx?scid=kb;en-us;555324

Hope this helps~!
0

Featured Post

Are your AD admin tools letting you down?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question