Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Windows Security Officer v7.5.5.4

Posted By: belecox
Windows Security Officer v7.5.5.4

Windows Security Officer v7.5.5.4 | 3,30 Mb

Windows Security Officer - a standalone application to control access to the operating system. With this system of protection and control, you can establish a clear framework of who has the right to use your computer's resources, specifically what he can do and when.

Windows Security Officer enables total control over the computer and its resources. That is, you can clearly determine the number of users with access to a computer and the degree of opportunities for each of them. You can place limitations on the use of network printers, those or other programs, and much more. For example, you can give a user access to the settings screen, but change the splash screen to prohibit the desktop. Also possible to install a clear time of computer use for specific users. If time has expired, the computer automatically shuts down and the user can not log into sisteme not come until the scheduled time.

Windows Security Officer also provides the opportunity to share directories on different profiles of users and thus create for each user their separate working environment. Additionally, you can hide some items from the Start menu, hide partition, icons on the desktop, etc. Using the program is also regulated with the help of Windows Security Officer. Add the program to the list of permitted and only program of this list will be available to the user. It is possible to prohibit or permit the use of CD-ROM. Or allow reading only certain drives, creating a list of CD-ROM drive.

Use Windows Security Officer can be anywhere: home, office, schools, universities, etc.

General restrictions:
• Restricting access to the event log.
• Restrict network access to CD-ROM.
• Restrict network access to drives.
• Disable password caching.
• Disable Windows Installer.
• Disable access to printers.
• Enable / disable the password "asterisks".
• Disable the option "Save Password in Dial-Up Networking".
• Do not display last user name.
• Enable / disable "Fast User Switching".
• Enable / disable forced entry into the system, without the possibility of changing the account.
• Disable access to the modems.
• & ratings maximum number of remote access attempts authentication.
• & ratings maximum period of time for authentication.

User Restrictions:
• Delete command "Run" from the Start menu.
• Delete command "Search" from the Start menu.
• Remove the Favorites folder from the Start menu.
• Delete the folder "Recent Documents" from the Start menu.
• Remove common program groups in the Start menu.
• Hide "Windows Update".
• Hide "Control Panel", "Printers and Faxes" and "Network Connections from the Start menu.
• Disable the command "LogOff" - change the user logout.
• Disable command Shut Down.
• Hide and disable access to Control Panel.
• Disable Windows Hotkeys (keyboard shortcuts).
• Hide all the icons on the desktop.
• Set the classical form of the envelope.
• Turn off Active Desktop.
• Deny change your desktop background.
• Disable the popup menu.
• Hide system clock.
• Hide the desktop "My Network Places.
• Remove the option Connect / disconnect a network drive.
• Disable registry editing tools.
• Disable the autorun CD-ROM, etc. ..
• Disable Task Manager.

IE Browser restrictions:
• Disable access to the Internet using Internet Explorer.
• Disable the Favorites menu.
• Disable downloading files using Internet Explorer.
• Hide the popup menu HTML.
• Disable AutoComplete.
• Disable "Prompt me to save passwords.
• Deny access to the toolbar in Internet Explorer.
• Disable the command "Open" in menu "File" (CTRL + O and Ctrl + L).
• Disable the item "Create Window" (CTRL + N).
• Disable the "Save As".
• Disable the item "Close" in the menu "File" (ALT + F4).
• Disable Internet Options ".
• Restrict ActiveX objects in the program Internet Explorer.

Monitoring user activity:
Use the option "Enable logging of user activity" (Enable logging of user actions) to know when a user is logged on.

Setting up a schedule when the user can use the computer and the amount of time per day:
• Create a separate schedule for each user or group.
• Create time slots for each day of the week.

Built-in "Folder Guard":
• Ability to enable / disable access to certain files and folders.
• Two levels of protection: "Hide" and "Read Only".
• Ability to disable deleting files.
• Works with folders, network and fully supports protection of removable media (such as floppies, CD, DVD, ZIP and some SCSI and RAID drives).