Heh. I like it. And of course, thumbcuffs would work wonders to prevent inapropriate surfing... :^)
-----Original Message----- From: Puckett, Richard [mailto:[EMAIL PROTECTED]] Sent: Tuesday, October 15, 2002 4:03 PM To: '[EMAIL PROTECTED]' Subject: RE: [ActiveDir] Disable IE via GPO If you were really evil, you could toss in a wscript.echo statement after the objLatestProcess.TargetInstance.Terminate line that says "stop downloading viruses already!" (or a more sensible usage warning). :-) Richard > -----Original Message----- > From: Puckett, Richard > Sent: Tuesday, October 15, 2002 5:52 PM > To: '[EMAIL PROTECTED]' > Subject: RE: [ActiveDir] Disable IE via GPO > > > > James, > > There are a couple of different ways you could approach this. > > One quick thought would be a custom logon script that targets > this user specifically at logon and runs a wscript (not > cscript) call against the below code (converted from the MS > Script Repository). This creates a temporary event consumer > that continually watches for instances of IEXPLORE.EXE and > kills them (good for a practical joke too :-)). Using > wscript ensures that no command window is created and the > script is only recognizable by the wscript.exe process active > in task manager. Of course this doesn't preclude him > renaming IEXPLORE.EXE to something else, or logging on > locally to avoid the logon script, but it's at least one option. > > > Put wscript.exe %LOGONSERVER%\netlogon\killie.vbs in the > logon script field (to suppress any display of a command > prompt). Then stick the following into a .VBS file and copy > it into the netlogon share. > > 'KillIE.VBS > > strComputer = "." > Set objWMIService = GetObject("winmgmts:" _ > & "{impersonationLevel=impersonate}!\\" & strComputer & > "\root\cimv2") > Set colMonitoredProcesses = objWMIService. _ > ExecNotificationQuery("select * from __instancecreationevent " _ > & " within 1 where TargetInstance isa > 'Win32_Process'") i = 0 Do While i = 0 > Set objLatestProcess = colMonitoredProcesses.NextEvent > If objLatestProcess.TargetInstance.Name = "IEXPLORE.EXE" Then > objLatestProcess.TargetInstance.Terminate > End If > Loop > > > Hope this helps, > Richard > > > > -----Original Message----- > > From: James Liddil [mailto:[EMAIL PROTECTED]] > > Sent: Tuesday, October 15, 2002 3:54 PM > > To: [EMAIL PROTECTED] > > Subject: [ActiveDir] Disable IE via GPO > > > > > > W2K/Exchange2K Environment. We have a visiting scientist who > > I was asked to give an account to. Turns out he has been > > reading his web mail and it is highly infected based on the > > number of alerts I got. The one machine he uses I have > > pulled of the internet. But I now find he went to another > > machine and did some web mail (virus alert again). So at > > this point my hands are tied by the managements lack of > > policies. So I need a way to prevent him from using IE > > regardless of the machine. It seems in GPO I can lock it > > down but not totally disable it. Or is there a way? > > > > Jim Liddil > > List info : http://www.activedir.org/mail_list.htm > > List FAQ : http://www.activedir.org/list_faq.htm > > List archive: > > http://www.mail-archive.com/activedir%> 40mail.activedir.org/ > > > List info : http://www.activedir.org/mail_list.htm > List FAQ : http://www.activedir.org/list_faq.htm > List archive: > http://www.mail-archive.com/activedir%> 40mail.activedir.org/ > List info : http://www.activedir.org/mail_list.htm List FAQ : http://www.activedir.org/list_faq.htm List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/ List info : http://www.activedir.org/mail_list.htm List FAQ : http://www.activedir.org/list_faq.htm List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/