The new forums will be named Coin Return (based on the most recent vote)! You can check on the status and timeline of the transition to the new forums here.
Please vote in the Forum Structure Poll. Polling will close at 2PM EST on January 21, 2025.

Calling All Windows Network Admins!

sushiboysushiboy Registered User regular
Where I work we have one computer that is for customer use. It is on a domain (with a Win2003 server). I want to be able to lock that computer down so that customers can only do things that they have business doing. As it is now, pretty much everything is open. I have been at other companies where some computers would have things such as My Computer, Control Panel, Network Neighborhood, etc blocked or disabled. How would I go about doing such a thing? What is that called? Thanks in advance!

Wii - 5850 0852 0940 2934
AC:CF - 1032 4742 8889
PM me if you add any of my codes
sushiboy on

Posts

  • DeicistDeicist Registered User regular
    edited May 2009
    sushiboy wrote: »
    Where I work we have one computer that is for customer use. It is on a domain (with a Win2003 server). I want to be able to lock that computer down so that customers can only do things that they have business doing. As it is now, pretty much everything is open. I have been at other companies where some computers would have things such as My Computer, Control Panel, Network Neighborhood, etc blocked or disabled. How would I go about doing such a thing? What is that called? Thanks in advance!

    You need to research group policies.

    Your basic approach would be to set up a group in active directory, put that machine in the group then apply a group policy to the group.

    Group policies are pretty complex though, you're gonna need to do some reading.

    Deicist on
  • iTunesIsEviliTunesIsEvil Cornfield? Cornfield.Registered User regular
    edited May 2009
    Tallus wrote: »
    Group policies are [strike]pretty complex[/strike] the devil though, you're gonna need to do some reading.
    Fix'd. :wink:

    iTunesIsEvil on
  • Red_CascadeRed_Cascade Registered User regular
    edited May 2009
    As Tallus said, group policy is what you want to be looking at. MS have a guide for hiding sections of the Control Panel here, but I think that would hide it for everyone in the domain so even that would need some tinkering around.

    Best thing is before you do anything, do some reading on Group Policy and extablish exactly what you want to hide before you do anything. GP isn't the most user friendly tool in the box.

    Red_Cascade on
  • SlagmireSlagmire Registered User regular
    edited May 2009
    Tallus wrote: »
    Group policies are [strike]pretty complex[/strike] the devil though, you're gonna need to do some reading.
    Fix'd. :wink:

    Tallus is quite right about setting it up initially as a group in AD, then applying the group policy to that group. In fact, there's so much truth in all the responses you've gotten, there's
    limes.jpg

    http://www.amazon.com/70-290-Microsoft-Environment-Networking-Technology/dp/1423902890/ref=sr_1_21?ie=UTF8&s=books&qid=1242309758&sr=1-21

    This is the text book I had for Server 2003 and it really helped explain how to set up group policies (amongst many other things). If you were to get a book, this would be the one I'd get.

    Slagmire on
  • InfidelInfidel Heretic Registered User regular
    edited May 2009
    You don't want an AD "group" despite dealing with group policy here. That bit is a little confusing.

    You want to create an Organizational Unit (basically a folder in your AD) which is what you apply group policy to.

    Make a new OU in your AD somewhere sensible, call it "Public Machines" or such a thing, and Move the computer accounts you wish to be part of it into this OU.

    Then you create a GPO that changes the settings you want, like locking out control panel and desktop features. You can even restrict allowed applications to a list, etc. As mentioned there is a lot to Group Policy so you'll want to do some research.

    Infidel on
    OrokosPA.png
  • xzzyxzzy Registered User regular
    edited May 2009
    I came into the thread hoping to learn something, and am leaving it with the realization that user administration under unix is fucking easy. A child could do it.

    Windows guys that can lock down their system and know what they're doing must be some big brain bastards.

    xzzy on
  • DeicistDeicist Registered User regular
    edited May 2009
    ze infidel is correct, the element you want is rather confusingly called an OU in active directory. I made the switch to linux last year so my terminology is getting all kinds of screwed up.

    Deicist on
  • chamberlainchamberlain Registered User regular
    edited May 2009
    Tallus wrote: »
    Group policies are [strike]pretty complex[/strike] [strike]the devil though[/strike], awesome you're gonna need to do some reading.
    Fix'd. :wink:

    They aren't that bad. Create a test OU, add one machine to it, then fuck around. You can't really break anything. If it gets really, really screwed up, just remove the GPO and start over.

    chamberlain on
  • HoundxHoundx Registered User regular
    edited May 2009
    You may want to consider Windows Steadystate

    Houndx on
  • Epyon9283Epyon9283 Registered User regular
    edited May 2009
    Tallus wrote: »
    ze infidel is correct, the element you want is rather confusingly called an OU in active directory. I made the switch to linux last year so my terminology is getting all kinds of screwed up.

    OU is term common to all directory servers (LDAP) AFAIK. AD is inconsistent in many other ways though.
    xzzy wrote: »
    I came into the thread hoping to learn something, and am leaving it with the realization that user administration under unix is fucking easy. A child could do it.

    Windows guys that can lock down their system and know what they're doing must be some big brain bastards.

    It's far easier to centrally manage client security settings in a AD/Windows environment.

    Epyon9283 on
  • InfidelInfidel Heretic Registered User regular
    edited May 2009
    Epyon9283 wrote: »
    Tallus wrote: »
    ze infidel is correct, the element you want is rather confusingly called an OU in active directory. I made the switch to linux last year so my terminology is getting all kinds of screwed up.

    OU is term common to all directory servers (LDAP) AFAIK. AD is inconsistent in many other ways though.

    No, I'm saying the confusing part is not OUs but "Group Policy" having little to do with real groups. :lol:

    Infidel on
    OrokosPA.png
  • Epyon9283Epyon9283 Registered User regular
    edited May 2009
    Infidel wrote: »
    Epyon9283 wrote: »
    Tallus wrote: »
    ze infidel is correct, the element you want is rather confusingly called an OU in active directory. I made the switch to linux last year so my terminology is getting all kinds of screwed up.

    OU is term common to all directory servers (LDAP) AFAIK. AD is inconsistent in many other ways though.

    No, I'm saying the confusing part is not OUs but "Group Policy" having little to do with real groups. :lol:

    Yeah I never got that. Why call it group policy if you can't apply it to groups?

    Epyon9283 on
  • sushiboysushiboy Registered User regular
    edited May 2009
    I came into the thread hoping to learn something, and am leaving it with the realization that user administration under unix is fucking easy. A child could do it.

    Windows guys that can lock down their system and know what they're doing must be some big brain bastards.

    Yea, before I started mucking with Windows servers, I for some reason had this idea that they would be the easiest to administer. I quickly found out that was far from the case.
    You may want to consider Windows Steadystate

    I think I will give that a try, and if I dont have luck with that, I guess I will dive into books regarding Group Policies. Thanks for all your help everyone!

    sushiboy on
    Wii - 5850 0852 0940 2934
    AC:CF - 1032 4742 8889
    PM me if you add any of my codes
  • VoodooVVoodooV Registered User regular
    edited May 2009
    Tallus wrote: »
    Group policies are [strike]pretty complex[/strike] [strike]the devil though[/strike], awesome you're gonna need to do some reading.
    Fix'd. :wink:

    They aren't that bad. Create a test OU, add one machine to it, then fuck around. You can't really break anything. If it gets really, really screwed up, just remove the GPO and start over.

    for truth. This is exactly what I do whenever I want to try something new. I use GPOs to set my WSUS settings, install Adobe reader, flash, and Java, configure IE settings, etc for the 500+ pcs that I support

    make the network do the work so you don't have to.

    GPOs are intimidating when you first try and tackle them, but they really aren't that bad

    VoodooV on
  • sushiboysushiboy Registered User regular
    edited May 2009
    Just tried SteadyState. That doesnt cover everything that I was thinking of. Oh well. Was worth a try. Now I guess it is off to the library to see if they have any decent Win2003 books (and maybe even the one mentioned by Slagmire).

    sushiboy on
    Wii - 5850 0852 0940 2934
    AC:CF - 1032 4742 8889
    PM me if you add any of my codes
  • VoodooVVoodooV Registered User regular
    edited May 2009
    Since GP is so big, you may not want a general Server2K3 book, I know there are some books out there dedicated to nothing but GP.

    But hey, just start small like I did. name one specific thing you wish to set across your network, google it, making sure you add in "group policy" and read away. That's kinda how I got started.

    VoodooV on
  • NailbunnyPDNailbunnyPD Registered User regular
    edited May 2009
    Tallus wrote: »
    Group policies are [strike]pretty complex[/strike] the devil though, you're gonna need to do some reading.
    Fix'd. :wink:

    Nah, they are not the devil unless you are trying to do something complicated. At the basic level, Group Policies are just overly complex.
    Epyon9283 wrote: »
    Yeah I never got that. Why call it group policy if you can't apply it to groups?

    You can apply it to groups. You can set policies across the entire AD and permit specified groups to execute the policy. You could also consider OUs groups, if the "Group" term wasn't already assigned in Windows.

    I see what you're saying, but its not entirely accurate the way you phrased it.

    In addition, its infinitely easier to manage in a hierarchy tree than it would be to assign the policies to groups proper. It has its limitations, which can sometimes be worked around, but all in all, its a very effective system.

    NailbunnyPD on
    XBL: NailbunnyPD PSN: NailbunnyPD Origin: NailbunnyPD
    NintendoID: Nailbunny 3DS: 3909-8796-4685
    steam_sig-400.png
Sign In or Register to comment.