In the company LAN, sometimes we need to forbid the computer to install software at will. Although we can forbid the computer to install software and run programs at will through group policy or registry, it is easy to be reversed by some technical staff to achieve the purpose of re installing software or running programs. Therefore, this paper provides a way to prevent the computer from installing software at will through a third-party software, that is, through a “Dashi to computer USB control system” (download address:http://www.grabsun.com/monitorusb.html）To prohibit the computer from installing software and running programs at will. The specific methods are as follows:
Click “set list of forbidden programs” after “forbidden programs” on the right side of “general trend to USB control system”, and then add program name (i.e. description) here. As shown in the figure below:
Photo: forbid the computer to install software, only let the computer install some programs
If you want to prevent the computer from installing some programs, you must first obtain the “description” of the application program. There are two methods:
Method 1. Press the CTRL + Alt + Del key to open the “task manager”, and then switch to “application” to view the “description” of the program.
For example, we need to prohibit “shooter video player”, and then directly click “set list of prohibited programs” after “prohibited programs”, and then add the word “shooter” here. If you find a wrong seal, you can add a complete description of “shooter video player”, as shown in the figure below:
Figure: view the “description” of the application
Figure: add the keyword “shooter” to be masked
Method 2: find the installation path of the program on the desktop, start the program or directly on the computer disk, then right-click and select “properties”, as shown in the figure below:
Figure: open program installation path
Note: clicking “open file location” will automatically locate the application name of the program shortcut. As shown in the figure below:
Figure: view application description
Then click “set list of forbidden programs” after “forbidden programs”, add “flush” here, and close this dialog box, as shown in the figure below:
Figure: adding a description of the application
3. By adding the class name of the application program to restrict the computer to install software at will, prohibit the computer to run programs at will, only let the computer run specific software, only let the computer install specific programs. The specific methods are as follows:
Click “set forbidden program list”, and then click “deep detection of program features”, and a small window will pop up to display the application class name. At this time, you can switch to the program we want to prohibit (click in the blank space and top of the program), and then the class name will be displayed in the small window box showing the class name, and then click “copy” to copy successfully, Then paste it into the box of “set forbidden program list” and click “add”. Then you can successfully add the class name of this program, and then you can control it more accurately and quickly. As shown in the figure below:
Figure: features of depth detection program
Figure: class name obtained successfully
Figure: add to the “list of prohibited programs”, and then close to take effect
If you want to realize the “open only program”, only let the computer run some programs, only let the computer install some software, only let the computer run fixed programs, the method is the same as above, and will not be repeated.
In a word, the general trend to the computer USB interface management software and the computer U port disable software is the current domestic behavior of managing the use of computer USB port, forbidding the use of U disk and mobile hard disk, and completely preventing computer files from leaking computer files through email attachments, network disk, FTP file upload and QQ file sending. It is the current domestic behavior of protecting the security of computer files To protect the intangible assets and trade secrets of the computer, the most closely protected and effective computer anti leakage software. In addition, we can also carry out customized development at any time according to the needs of users, so as to fully meet the needs of enterprises and institutions to protect the security of computer files, standardize the behavior of employees using computers, and truly escort the steady operation of enterprises and institutions.