HOW TO: Apply Local Policies to All Users Except Administrators on Windows Server 2003 in a Workgroup Setting (325351)
The information in this article applies to:
- Microsoft Windows Server 2003, Enterprise Edition
- Microsoft Windows Server 2003, Standard Edition
This article was previously published under Q325351 SUMMARY This article describes how to apply local policies to all
users except administrators on a Windows Server 2003-based computer that is in
a workgroup setting. When you use a Windows Server 2003-based
computer in a workgroup setting (not a domain), you may have to implement local
policies on that computer that can apply to all users of that computer, but not
to administrators. This exception permits the administrator to retain unlimited
access and control of the computer, and also permits the administrator to
restrict the users who can log on to that computer. The Windows
Server 2003-based computer must be in a workgroup setting for this procedure to
work. In this situation, the domain policies cannot overwrite the local
policies because the domain policies do not exist. Microsoft recommends that
you make backup copies of all the files that you edit during this procedure.
back to the top
Apply Local Policies to All Users Except Administrators To implement local policies to all users except administrators,
follow these steps:
- Log on to the computer as an administrator.
- Open your local security policy. To do this, do one of the
following:
- Click Start, click Run, type gpedit.msc, and then press
ENTER.
-or- - Click Start, click Run, type mmc, press ENTER, add the Group
Policy Object Editor, and then configure it for the local security
policy.
If the removal of the run command is one of the policies that you want, Microsoft
recommends that you edit the policy by means of Microsoft Management Console
(MMC), and then save the results as an icon. Then, you do not need the run command to reopen the policy. - Expand the User Configuration object, and then expand the Administrative Templates object.
- Enable whatever policies that you want (for example,
Desktop for "Hide My Network Places" or "Hide Internet Explorer Icon on
Desktop").
NOTE: Make sure that you select the correct policies; otherwise, you
may restrict the ability of the administrator to log on to the computer (and to
complete the necessary steps to configure the computer). Microsoft recommends
that you record any changes that you make (you can also use this information
for step 10). - Close the Gpedit.msc Group Policy snap-in. Or, if you use
MMC, save the console as an icon to make it accessible later, and then log off
the computer.
- Log on to the computer as an administrator.
You
can verify in this logon session the policy changes that were made earlier,
because, by default, the local policies apply to all users, which includes
administrators. - Log off the computer, and then log on to the computer as
all of the other users for this computer for whom you want these policies to
apply. The policies are implemented for all of these users and the
administrator.
NOTE: Any user account that is not logged on to the computer at this
step cannot have the policies implemented for that account. - Log on to the computer as an administrator.
- Click Start, point to Control Panel, and then click Folder Options. Click the View tab, click Show Hidden Files and Folders, and
then click OK so that you can view the Group Policy hidden folder. Or, open
Windows Explorer, click Tools, and then click Folder Options to view these settings.
- Copy the Registry.pol file that is located in the
%Systemroot%\System32\GroupPolicy\User folder to a backup location (for
example, to a different hard disk, floppy disk, or folder).
- Open your local policy again by using either the Gpedit.msc
Group Policy snap-in or your MMC icon, and then enable the exact features that
were disabled in the original policy that was created for that computer.
NOTE: When you do this, Policy Editor creates a new Registry.pol
file. - Close your policy editor, and then copy the backup
Registry.pol file that you created in step 10 back into the
%Systemroot%\System32\GroupPolicy\User folder.
When you are prompted
to replace the existing file, click Yes. - Log off the computer, and then log on as an
administrator.
You can verify that the changes that were originally
made are not implemented for you because you have logged on to the computer as
an administrator. - Log off the computer, and then log on as another user (or
users).
You can verify that the changes that were originally made are
implemented for you because you have logged on to the computer as a user (not
an administrator) to that computer . - Log on to the computer as an administrator to verify that
the local policy does not affect you as the local administrator to that
computer.
back to the top
Restore Original Local Policies To reverse the process described in the "Apply Local Policies to
All Users Except Administrators" section of this article, follow these steps:
- Log on to the computer as an administrator.
- Click Start, point to Control Panel, and then click Folder Options. Click the View tab, click Show Hidden Files and Folders, and
then click OK so that you can view the Group Policy hidden folder. Or, open
Windows Explorer, click Tools, and then click Folder Options.
- Move, rename, or delete the Registry.pol file from the
%Systemroot%\System32\GroupPolicy\User folder.
Another default
Registry.pol file is created by the Windows File Protection system after you
log off from or restart the computer. - Open the local policy. To do this, click Start, click Run, and then type gpedit.msc. Or, click Start, click Run, type mmc, and then load the local
security policy. Then, set all of the items that are set to either disable or enable to not configured to reverse any policy changes that were implemented to the
Windows Server 2003 registry as specified by the Registry.pol file.
- Log off the computer as an administrator, and then log on
to the computer again as an administrator.
- Log off the computer, and then log on to the computer as
all of the users on the local computer so that the changes can be reversed on
their accounts too.
back to the top
Modification Type: | Major | Last Reviewed: | 10/30/2003 |
---|
Keywords: | kbMgmtServices kbenv kbhowto kbHOWTOmaster KB325351 kbAudITPro |
---|
|