You can specify desktop, shell, and security settings across your organization.
Internet content providers, Internet service providers, and corporate administrators can specify default settings for their users.
Corporate administrators can customize and restrict numerous settings, ranging from whether users can delete printers to whether or not they can add items to their desktops.
For more information, see Understanding Settings and Restrictions.
You should understand the impact of the security settings on your users, especially if you have roaming users who share computers with other users. For more information, see the note below.
To set system policies and restrictions
Notes
User settings can be stored in a central location and then follow users from computer to computer as they log on. This could be useful, for example, for a user who needs low security settings but who uses a computer that is typically operated by someone whose security settings are very restrictive.
You can allow three typical levels of customization for security settings:
To lock down all settings
You can specify that settings can't be changed, without locking out roaming users who have different profiles. The Windows roaming user feature allows users to download their settings from a server.
To restrict a user from changing policies for a zone
To restrict a user from adding or deleting sites
In this stage of the wizard, you can customize many user settings, including security levels and ratings. Customizing the settings in this stage doesn't determine whether the user can control the settings.