• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 251
  • Last Modified:

How to remove the hidden control panel, etc from XP

I have a customer whose Windows XP was horribly disabled by the last IT person, completely without her knowledge.  I can't see the control panel, plus most items from the standard start menu are simply gone.

Rather than  doing this piecemeal, is there a way I can return an account to the normal XP setup, which is what she really wanted?  Or must I track down every missing thing in the registry and remove the disable switch?
1 Solution
Brian GeeCommented:
Is this a standalone computer (or one that was/is connected to a domain)? Is she an administrator on this computer? I would try starting a brand new Windows (administrator) profile to see if the new profile will have all of what is typically defaulted to new users in XP.
If this is a standalone system, or if she is an Administrator then it doesn't make sense for features to be hidden.
If so, perhaps maybe due to some nasties.

Try running this tool to remove the hidden flags and see.
Your best bet is to do what Yobri suggested. I would just remake a new one and If the problems come back look at your group policy  statting from the domain controller on down and check to see if the control panel is being disabled. Usually this is the case when the administrator does not want the end user changing what they have enacted for the network environment. Either do that approach or spend countless hours looking for reversals to policy's, registry entry's, drivers, and other products that are unknown to the user given this task to complete for that account. You will still need to dump the security policy's, currently running events, list of installed software, TCP/IP settings, so on. So you are aware about your current situation and can compile a report so you have a referrence for better understanding on how the network is currently being run. If you come to conclusion that there is breach in security you can then follow Rpggamergirl and run a full security sweep for rogue intrusions. Either way you need to get intimate with how it is setup and currently running. This cuts out many hours of IT frustration and not knowing what is going on internally as this allows you to pinpoint problems as it enable you give a passdown of information to anyone who needs to do work of any type on the network.
DaveWWWAuthor Commented:
Thanks, I did that and in fact just went with the new profile.  All is fine.

Featured Post

Veeam and MySQL: How to Perform Backup & Recovery

MySQL and the MariaDB variant are among the most used databases in Linux environments, and many critical applications support their data on them. Watch this recorded webinar to find out how Veeam Backup & Replication allows you to get consistent backups of MySQL databases.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now