Call Centre Lockdown

Posted on 2014-12-09
Last Modified: 2016-07-18
For legal compliance I have to lockdown windows workstations, removing right click, cut and paste and restricting URL's etc. Is there some software that will make this easy?
Question by:Mark_Collinge
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
LVL 20

Accepted Solution

netcmh earned 500 total points
ID: 40488835
I wish there was. This is an involved process. Your sysadmin, networkadmin, desktoptechnicians would all have to work to achieve this. If you're like me and are the only tech in the company, this falls squarely on your shoulders.

Start with a maintenance window to install EMET on all the workstations as a behavioural analysis and action tool. While you're at it, and AV with malware detection and sandboxing might be a good idea. Group policies to enforce the restrictions you have in mind will have to be developed and deployed. An appliance like the Fortigate or BlueCoat will help with the URL restrictions. There are other ways of doing this -dns redirection/rewriting etc. Then, writing accesslists to block malicious geo IPs and implementing it on the perimeter.

Too many parts to this. Too many things that can go wrong. So, a solid implementation plan is a MUST! Good luck.

Author Comment

ID: 40489205
It shouldn't be too bad if I can launch IE into Kiosk mode pointing at the URL with the CRM at logon, and disable right mouse click, ctrl-alt-del and shift-tab.
LVL 20

Assisted Solution

netcmh earned 500 total points
ID: 40489451
Disable Ctrl+alt+end and Alt+F4 as well, otherwise the kiosk mode is easily bypass-able. Please also read up on the iKat framework which is specifically designed for breaking kiosk modes.
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

LVL 54

Expert Comment

ID: 40489987
To make this question kind of answerable, you should maybe add
->what OS (including edition) are we talking about?
->are those computers domain joined?
->what are you trying to prevent?
->what would still need to run?

Because so far we have only "removing right click, cut and paste and restricting URL's" which is vague and then there is the almighty "etc." which could be anything and nothing.

Author Comment

ID: 40490004
In all fairness I asked if there was software available to lockdown a computer for PCI DSS compliance. The OS can be anything I decide it to be, domain or no domain, I did mention in a subsequent post that I needed access to a URL at login. But thanks anyway.
LVL 20

Expert Comment

ID: 41717043
My suggestions (ID: 40488835,  ID: 40489451) state that while there is no software that can easily do the task, a good plan with remedial software could provide the same outcome.
LVL 20

Expert Comment

ID: 41717296
Thank you.

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Sending a Secure fax is easy with eFax Corporate ( First, just open a new email message. In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question