Solved

How to lockdown signatures in outlook 2010?

Posted on 2014-01-14
7
563 Views
Last Modified: 2016-05-30
How can I lock-down user's outlook signatures in Outlook 2010, so users are unable to change them?
Users are on Windows 7 PC's.
0
Comment
Question by:Princstf
  • 2
  • 2
7 Comments
 
LVL 37

Assisted Solution

by:Jamie McKillop
Jamie McKillop earned 250 total points
Comment Utility
Hello,

You can't prevent users from changing the signature but you can use a logon script to change the signature to whatever you want it to be each time the user logs on. See my blog post here for an explanation on how to set this up:

http://jamiemckillop.wordpress.com/2012/07/06/deploying-a-standard-outlook-signature-52/

-JJ
0
 
LVL 42

Expert Comment

by:Davis McCarn
Comment Utility
0
 

Author Comment

by:Princstf
Comment Utility
JJ and Airmark thank you for the post. Currently reviewing both suggestions.
0
 

Author Comment

by:Princstf
Comment Utility
Davis
Thank you for your comment.  Tested your suggestion, by making the user SIGNATURES Folder -(READ ONLY). However I need to apply this for over 200 users. I tried creating a GPO to lockdown users  %APPDATA%\Microsoft\Signatures folder, but the GPO do not seem to be working.  Not to sure I configured the GPO correctly. Please help!!
0
 
LVL 42

Accepted Solution

by:
Davis McCarn earned 250 total points
Comment Utility
I'm an old fashioned MS-Dos kinda guy so....

icacls %APPDATA%\Microsoft\Signatures /deny %username% (d,wd) /t

as part of a login script for non-admin users ought to do it. Check to see if there are other subfolders under Signatures that need write permissions first; though, OK? (I don't think their are; but, don't have a PC with Office 2010 to check, at the moment)

http://technet.microsoft.com/en-us/library/cc753525.aspx
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Companies keep a much closer eye on costs today, so changing to new Technology – Microsoft Office 365 is the smartest move to take.
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
The viewer will learn how to use the =DISCRINV command to create a discrete random variable, use this command to model a set of probabilities and outcomes in a Monte Carlo simulation, and learn how to find the standard deviation of a set of probabil…
The viewer will learn how to create two correlated normally distributed random variables in Excel, use a normal distribution to simulate the return on different levels of investment in each of the two funds over a period of ten years, and, create a …

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now