Alan's Blog

"Yeah. I wrote a script that will do that."

Menu
  • About My Blog
Menu

A Low Privilege Internet Explorer Shortcut

Posted on November 28, 2009March 9, 2015 by Alan

Your users should never have administrative rights on their workstations.  But many Admins are administrators of their local system, and are obviously running with elevated permissions when they log onto servers. 

You should never cruise the internet on a server.  But you may need to go to Windows Update, or to vendor sites for drivers. The problem is that even trusted sites may become compromised.  If you are on the internet with elevated rights, any malware that hits you will run with your elevated rights.  Bad things can happen when a malware process runs as a domain admin. 

Windows 2003’s attempt to harden IE is so annoying that it typically results in administrators turning it off.  I wrote a command file and vbscript to address this problem.  LowPrivIE.zip contains InstallIEShortcut.cmd, batchcreateshortcut.vbs and a readme.txt file.  Unzip all files into a common folder and add a current version of psexec from SysInternals.com.  (For more information on psexec, see my post at www.akaplan.com/?p=240.)  Run the InstallIEShortcut command file to add a non-admin IE shortcut to the all users desktop of a local or remote computer.  The shortcut uses psexec -l to create an instance of IE without administrator rights.

The batch file accepts a computer name as an argument, so you can use a FOR command to
run it against a list of computers.  An example is in the readme file. 

Tags: psexec, Internet+Explorer

Leave a Reply

You must be logged in to post a comment.

Search

Please Note

All the scripts are saved as .txt files. Newer files have a “View Script” button which will let you save or open a script in notepad. For earlier posts, the easiest way to download with IE is to right click on the link and use “Save Target As”. Rename file from Name_ext.txt to Name.ext.

To see a full post after searching, please click on the title.

PowerShell Scripts were written with version 3 or later.

https connections are supported.

All new users accounts must be approved, as are comments. Please be patient.  If you find a post error or a script which doesn’t work as expected, I appreciate being notified.  My email is my first name at the domain name, and you are welcome to contact me that way.

Tags

1E ACLS Active Directory ActiveDirectory ADSI Advanced Functions Audit Change Administrator Password COMObject Computer Groups DateTime Desktop DNS Excel FileScriptingObject Forms General GPO GPS Group Policy Hacks ISE Lockout logons NAV740 Nessus OU OU permissions Outlook Pick Folder Power PowerShell Powershell Scriptlets RDP SCCM schedule reboot Scripting Security Shell.Application user information VBA Windows Update WMI WordPress WPF

Categories

akaplan.com

  • Back to Home Page

Archives

Scripting Sites

  • A Big Pile of Small Things
  • Adam, the Automator
  • Art of the DBA
  • Ashley McGlone
  • Boe Prox
  • Carlo Mancini
  • DexterPOSH
  • Doug Finke
  • Jaap Brasser's Blog
  • JeffOps The Scripting Dutchman
  • Jonathan Medd's Blog
  • Keith Hill's Blog
  • LazyWinAdmin
  • Nana Lakshmanan
  • PowerShell Magazine
  • PowerShell Team Blog
  • PowerShell.org
  • PwrShell.net
  • Richard Siddaway's Blog
  • Ryan Yates' Blog
  • Skatterbrainz
  • The Lonely Administrator

SQL Site

  • Art of the DBA

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
©2025 Alan's Blog | Theme by SuperbThemes

Terms and Conditions - Privacy Policy