Win7 disables win key, win7 shields website, win7 shields f8 key method

  

In the corporate LAN, sometimes in the network management or work needs, we often need to limit the use of some functions of the computer, to prevent the use of these inappropriate features freely lead to some computer security, computer file management risks. For example, we often need to disable the USB port, shield the U port, disable the use of the Win button, disable the keyboard screen capture, disable the operating system, press F8 to enter the safe mode. So how do you implement it? The author believes that it can be achieved in the following two ways:

Method 1, through the operating system comes with computer permissions restrictions to achieve, mainly through user permissions, group policies, registry, computer management, etc. Aspects of the permissions to achieve.

For example, if we want to disable the Win key, we only need to do the following:

1. Open the Start menu "Run”, enter “regedt32”, open&ldquo ; Registry Manager

2, find the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlKeyboard Layout item in the registry;

3, click the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlKeyboard Layout item, create a new "ld=; binary value" in the right window, Named “Scancode Map” (note the space);

4. Double-click the newly created “Scancode Map” key value, and enter it in the “Value data” column. 00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b,e0,00,00,5c,e0,00,00,00,00” (actual Input without comma) These 24 numbers;

5, after confirming, log out of the system (restart the system is also OK), enter the system again and you will find that the WIN button does not respond.

And if we want to disable the F8 key, prevent the computer from booting and press F8 to enter the operating system security mode, you can use the following command:

Prohibit booting from the registry Press F8 to enter safe mode For Win XP, Win7 and later operating systems.

To log in to Windows XP/Win7 and other operating systems using an administrator-level account, enter “regedit” in the "Run" window to open the Registry Editor and find HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SafeBoot Key value, rename the "Minimal" and "Network" under SafeBoot, renamed "Minimal1" and "Network1" or other names different from the original key value. After the modification is completed, others press F8 at startup. When the key enters any of the security modes, the system will automatically restart, which prevents the user from trying to boot and press the F8 key to enter the operating system security mode.

In the same way, we can disable the U port, disable the U disk, disable the PrtScr key, etc. through the registry, thus preventing the computer from using the U disk, prohibiting the use of computer screen capture and other functions

Second, through the computer security management software to disable the Win button, disable the Print screen button and prohibit booting, press the F8 button to enter the operating system security mode.

In addition to the operating system's registry, group policy, computer management, user rights allocation, etc. to prohibit screen capture, prohibit Win key, prohibit USB port use, we can also pass special computer security management software To achieve the shielding of the above functions. For example, there is a "Broaden to USB interface disable software" (download address: http://www.grabsun.com/monitorusb.html), you only need to automatically disable the U disk, mobile hard disk and after the computer is installed. The use of a USB port such as a mobile phone does not affect the use of a non-USB storage device, thereby preventing the computer from using the U disk to copy computer files at will, and protecting the security of the computer file.


Figure: Disable the computer U port, shield USB interface

At the same time, in order to protect the security of the operating system itself, the general trend to the USB disable software can also disable the registry, prohibit the group The strategy, disable the Win key, disable the F8 key, and prohibit booting the computer through the PE disk, prohibiting the CD-ROM from booting the computer, etc., thus fully protecting the security of the computer operating system. As shown below:


Figure: Disable Win key, mask PrtScn


Figure: prohibit modification of registry, prohibit modification of group policy, prohibit Boot into the operating system security mode

In short, whether through the operating system's own permission settings function module, or through third-party computer security management software can achieve computer-related hotkeys disabled, but through the operating system The settings are easily re-enabled by some technically-savvy employees by means of reverse modification to enable related hotkeys or disabled operating system function modules; third-party computer security management software can prevent employees from being disabled by operating system-related functional modules. The reverse modification behavior allows for more thorough, secure, and efficient disabling and management of operating system related functions.

Copyright © Windows knowledge All Rights Reserved