If users have local admin privileges on their workstations, they can circumvent many Group Policy settings by editing the registry directly (provided they know enough to know where to look in the registry). This is bad news for administrators, and I’m often asked how they can prevent users from doing this. Here’s a way one administrator does it on his network–it might work for you if your needs and environment are similar enough:
- Use software restriction policies to prevent users from running executables in any path except those you specify.
- Use Group Policy to restrict users from accessing the paths to executables in Windows Explorer.
- Use Group Policy to deny users access to the command prompt and regedit.
- Give users read-only mandatory user profiles.
- Use Group Policy to cause users’ computers to forcibly log them off if Group Policy settings are not applied when they log on.
Combining these five restrictions together gives users very little wiggle room for doing things like installing unauthorized apps on their machines.