Solved

Account Security

Posted on 2012-03-21
2
408 Views
Last Modified: 2012-03-25
Yes guys here is the situation, I have a batch of laptops that being used for students at a school. The OS is Windows 7, they are not connected to a network/domain currently. I have limited accounts enable for them to use however I would like them to have the ability to install peripherals e.g printers, 3g/4g modems while still maintaining limited privileges to other parts of the system. I searched in the GPO and couldn't find anything, I also tried different groups with no success. What built in windows or third party utilities would give me these permissions.
0
Comment
Question by:Arkel Thompson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 10

Expert Comment

by:abbright
ID: 37747901
When you want to give users the ability to install all sorts of printers, modems, etc. this usually includes the installation of drivers and additional software. In order to install these kinds of software users need administrative permission.
If you know the brands and types of printers, modems, you can install the necessary software and users then can connect these devices without requiring administrative permissions.
0
 
LVL 3

Accepted Solution

by:
pma111 earned 500 total points
ID: 37752759
Power users seem to sometimes let you install such. There used to be tools where you could sign or whitelist tools so that non elevated users could install them, this was common so users themselves could update tools like flash, adobe reader etc. I cant find any specifics but I'll do some digging. This may be of interest also:

http://technet.microsoft.com/en-us/library/cc725772(v=ws.10).aspx

http://dave.harris.net/allow-non-administrators-to-install-printer-drivers/
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question