Stage 5: System policies and restrictions

You can specify desktop, shell, and security settings across your organization.

You can customize numerous settings, ranging from whether users can delete printers to whether or not they can add items to the new Windows Desktop Update.

You should understand the impact of the security settings on your users, especially if you have roaming users who share computers with other users. For more information, see the note below.

To set system policies and restrictions

  1. Double-click each category to display the options.
  2. Select or clear the check boxes you want.

Note
The settings displayed in the wizard are contained in administration (.adm) files that come with the IEAK. If you are familiar with .adm files, you can use the wizard to set the policies and restrictions you have set up in your own .adm files by clicking Import.

User settings can be stored in a central location, and then follow users from computer to computer as they log on. This could be useful, for example, for a user who needs low security settings but who uses a computer that is typically operated by someone whose security settings are very restrictive.

Customizing security settings

You can allow three typical levels of customization for security settings: