Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

How to disable Ctrl+C and Ctrl+V for users?

Posted on 2011-10-26
2
Medium Priority
?
2,079 Views
Last Modified: 2012-06-21
Dear Sir,

I need to disable the users from using Ctrl+C and Ctrl+V to copy and create shortcuts on their desktop.
I have a Domain Controller Win 2K8 R2 in place.

I need help.

Thank you.
0
Comment
Question by:ISC-IT-Admin
2 Comments
 
LVL 2

Accepted Solution

by:
phill_cahill earned 2000 total points
ID: 37029774
Create the users as a limited user and disable write access to the desktop folder.  The user cannot paste anything onto the desktop without the need to disable CTRL-C or CTRL-V.
0
 
LVL 1

Author Comment

by:ISC-IT-Admin
ID: 37029810
Can you please guide me a step by step on how to create a limited user and disable the write access on the desktop folder?

Thanks.
0

Featured Post

Simplify Active Directory Administration

Administration of Active Directory does not have to be hard.  Too often what should be a simple task is made more difficult than it needs to be.The solution?  Hyena from SystemTools Software.  With ease-of-use as well as powerful importing and bulk updating capabilities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question