Securing your Remote Workspace environment by using Windows Group Policies

Securing your Remote Workspace environment by using Windows Group Policies

In this quick article, we’ll show you how to secure your current Thinfinity Remote Workspace environment by using Windows Group Policies to restrict and limit the usage of your users to only what’s necessary.

Group Policy is a series of settings in the Windows registry that concern security and other operational behaviors.

Group Policy lets you prevent users from accessing parts of the system, run specific scripts when the system starts up or shuts down, and forces a particular home page to open for every user in the network. All this being said, let’s start with this tutorial.

 

First, you’ll need to create a GPO.

  1. Open ‘Start’.
  2. Search for MMC and click the first result to open the ‘Microsoft Management Console’.
  3. Click the ‘File’ menu.
  4. Select the ‘Add/Remove Snap-in’ option.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 01

 

  1. Under the ‘Available snaps-ins’ section, select the ‘Group Policy Object Editor snap-in’.
  2. Click the ‘Add’ button.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 02

 

  1. Click the ‘Browse’ button.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 03

 

  1. Click the ‘Users’ tab.
  2. Select the user or group you want to apply a specific set of policies.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 04

 

  1. Click the ‘OK’ button.
  2. Click the ‘Finish’ button.
  3. Click ‘OK’ again.
  4. And now let’s save the changes we did by clicking in the ‘File’ menu.
  5. Select the ‘Save As’ option.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 05

 

  1. Now, let’s confirm a name for the snap-in.
  2. Select a location to store the console.
  3. Click the ‘Save’ button.

 

Once you complete these steps, you can use the new console to set custom policies that will only apply to that specific user or group of users, and that’s what we are going to do. 

If you now open the saved file, you’ll be prompted with all the group policies that are available, so from here we should be able to start restricting the user experience.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 06

 

After this final step, we are ready to start restricting a user or even a group of users using ‘Windows Group Policies’.

 


 

Restrict access to the Command Prompt

The command prompt is very useful for system administrators, but in the wrong hands, it can turn into a nightmare because it gives users the opportunity to run commands that could harm your network. Therefore, it’s best to disable it for regular users. You can do that by using the ‘Prevent access to the command prompt’ policy. 

You’ll be able to find this policy under -User configuration/Administrative Templates/System- If you enable this policy, the affected user or group of users won’t be able to load Windows command prompt.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 07

 


 

Disable Windows Control Panel

‘Control Panel’ restrictions are vital for business networks and school environments. If you want to prevent end-users from changing settings, this is a good step to take.

You’ll be able to find this policy under -Administrative Templates/Control Panel- and then enable ‘Prohibit Access to Control Panel and PC settings’.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 08

 


 

Hide Specified Drives in ‘My Computer’

With ‘Windows Policies’, you can also restrict access to any drives. In this case, we are going to disable access to all drives, but you can as well restrict only one drive (the C:// drive for example)

You can find this policy under – User configuration/Administrative Templates/Windows Components/File Explorer – and then search for the ‘Hide these specified drives in My Computer’ option and enable that. Once you enable that option, you’ll be able to restrict which drives you want to restrict.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 09

 


Disable “add or remove programs”

Disable the ability to add or remove programs is definitely on our list. Imagine giving the end-user the ability to add or remove programs at will… You can imagine the downsides of that. So let’s review how to easily disable this option.

In this case, you can find this policy under – User Configuration/Administrative Templates/Control Panel/Add or Remove Programs – And enable the policy called ‘Remove Add or Remove Programs’.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 10

 


Remove ‘Run’ from the start menu

The run dialog is one of the oldest Windows features and allows users to manually execute any application or script by calling the full path of the .exe or script you want to call. Disabling the ‘Run’ button in the start menu is often done as a prevention from users running unauthorized software or batch scripts.

You can find this policy under – User Configuration/Administrative Templates/Start Menu and Taskbar – and now enable the policy called ‘Remove Run menu from Start Menu’.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 11

 


Remove access to Windows Task Manager

The Windows Task Manager is an advanced feature that gives you access to tools to start and stop applications, monitor system performance, running apps and servers and much more. Although it is a handy tool, sometimes you may want to disable access to prevent users from restarting specific programs, changing processes priorities, or because you need to comply with your organization’s policies. In any case, we have the solution for you.

You can find this GPO under – User Configuration/Administrative Templates/System/Ctrl+Alt+Del Options – Here you can find a policy called ‘Remove Task Manager’ If you enable this setting, your end-users won’t be able to load the task manager.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 12

 


Disable access to the Windows Registry

Improper changes to the Windows Registry may make your computer run abnormally or prevent it from booting properly. Definitely, messing around in the Windows Registry can cause all kinds of problems if you’re not careful. So this is an important policy to disable. You can find this policy under – User Configuration/Administrative Templates/System – Under this section you’ll find the policy called ‘Prevent access to registry editing tools’ If you enable this setting, users won’t be able to load Windows Registry by searching for the regedit.msc reference.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 13

 


Prevent running specific Windows applications

This is by far one of the most useful policies for a Windows Administrator. A computer used by multiple users will always require some restrictions for better use. Some applications may not be suitable for some group of users, or you may not want to share with other users. In certain situations, you might want to restrict some of the programs on your computer. The reason can be privacy-related for the users or to be safe from issues caused by misuse of the programs.

To disable this policy, go to – User Configuration/Administrative Templates/System – Here you can find the policy called ‘Don’t run specified Windows applications’ In this case, you just need to enable the policy and open the list of disallowed applications and start typing the .exe you want to disallow. As you can see, in this case, we have disabled the use of Powershell and Powershell_ISE applications.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 14

 


 

Remove and prevent access to the Shut Down, Restart, Sleep and Hibernate commands

Some personal computers or servers should be running all the time for specific tasks. Servers are commonly used to deliver services that are constantly required, which is why they are never turned off. Similarly, some personal computers will be running certain processes that take a long time and the computer should be running for it.

However, someone can accidentally click on one of the power options, which results in terminating the processes on your system. If used by multiple users, then another user can also use the power option without knowing that it should be running.

In this case, you can find this policy under – User Configuration/Administrative Templates/Start Menu and Taskbar – In this section, you’ll find a policy called ‘Remove and prevent access to the Shut-Down, Restart, Sleep and Hibernate commands’ and if you enable this policy, end-users won’t be able to Shut Down, Restart, Sleep or Hibernate your servers.

 

Securing your Remote Workspace environment by using Windows Group Policies, step 15

 

Now, you know how to manage Group Policies to make your Windows.

Congratulations!

 

Have any questions?

Book a call today to learn more about how Thinfinity can help your organization. We are always available to guide you and provide the best solution based on your specific needs.

Leave a comment

Privacy Preferences
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.