Remove Run menu from Start Menu

Allows you to remove the Run command from the Start menu Internet Explorer and Task Manager. If you enable this setting the following changes occur:(1) The Run command is removed from the Start menu. (2) The New Task (Run) command is removed from Task Manager. (3) The user will be blocked from entering the following into the Internet Explorer Address Bar:— A UNC path: -> -> -> —Accessing local drives: e. g. C:— Accessing local folders: e. g. -> temp>Also users with extended keyboards will no longer be able to display the Run dialog box by pressing the Application key (the key with the Windows logo) + R. If you disable or do not configure this setting users will be able to access the Run command in the Start menu and in Task Manager and use the Internet Explorer Address Bar. Note:This setting affects the specified interface only. It does not prevent users from using other methods to run programs. Note: It is a requirement for third-party applications with Windows 2000 or later certification to adhere to this setting.

Remove programs on Settings menu

This policy setting allows you to remove programs on Settings menu. If you enable this policy setting the Control Panel Printers and Network and Connection folders are removed from Settings on the Start menu and from Computer and File Explorer. It also prevents the programs represented by these folders (such as Control. exe) from running. However users can still start Control Panel items by using other methods such as right-clicking the desktop to start Display or right-clicking Computer to start System. If you disable or do not configure this policy setting the Control Panel Printers and Network and Connection folders from Settings are available on the Start menu and from Computer and File Explorer. Also see the “Disable Control Panel” “Disable Display in Control Panel” and “Remove Network Connections from Start Menu” policy settings.

Remove and prevent access to the Shut Down Restart Sleep and Hibernate commands

This policy setting prevents users from performing the following commands from the Start menu or Windows Security screen: Shut Down Restart Sleep and Hibernate. This policy setting does not prevent users from running Windows-based programs that perform these functions. If you enable this policy setting the Power button and the Shut Down Restart Sleep and Hibernate commands are removed from the Start menu. The Power button is also removed from the Windows Security screen which appears when you press CTRL+ALT+DELETE. If you disable or do not configure this policy setting the Power button and the Shut Down Restart Sleep and Hibernate commands are available on the Start menu. The Power button on the Windows Security screen is also available. Note: Third-party programs certified as compatible with Microsoft Windows Vista Windows XP SP2 Windows XP SP1 Windows XP or Windows 2000 Professional are required to support this policy setting.

Remove common program groups from Start Menu

Removes items in the All Users profile from the Programs menu on the Start menu. By default the Programs menu contains items from the All Users profile and items from the user’s profile. If you enable this setting only items in the user’s profile appear in the Programs menu. Tip: To see the Program menu items in the All Users profile on the system drive go to ProgramData -> Microsoft -> Windows -> Start Menu -> Programs.

Prevent users from customizing their Start Screen

This policy setting allows you to prevent users from changing their Start screen layout. If you enable this setting you will prevent a user from selecting an app resizing a tile pinning/unpinning a tile or a secondary tile entering the customize mode and rearranging tiles within Start and Apps. If you disable or do not configure this setting you will allow a user to select an app resize a tile pin/unpin a tile or a secondary tile enter the customize mode and rearrange tiles within Start and Apps.

Clear history of recently opened documents on exit

Clear history of recently opened documents on exit. If you enable this setting the system deletes shortcuts to recently used document files when the user logs off. As a result the Recent Items menu on the Start menu is always empty when the user logs on. In addition recently and frequently used items in the Jump Lists off of programs in the Start Menu and Taskbar will be cleared when the user logs off. If you disable or do not configure this setting the system retains document shortcuts and when a user logs on the Recent Items menu and the Jump Lists appear just as it did when the user logged off. Note: The system saves document shortcuts in the user profile in the System-drive -> Users -> User-name -> Recent folder. Also see the “Remove Recent Items menu from Start Menu” and “Do not keep history of recently opened documents” policies in this folder. The system only uses this setting when neither of these related settings are selected. This setting does not clear the list of recent files that Windows programs display at the bottom of the File menu. See the “Do not keep history of recently opened documents” setting. This policy setting also does not hide document shortcuts displayed in the Open dialog box. See the “Hide the dropdown list of recent files” setting. This policy also does not clear items that the user may have pinned to the Jump Lists or Tasks that the application has provided for their menu. See the “Do not allow pinning items in Jump Lists” setting.

Add “Run in Separate Memory Space” check box to Run dialog box

Lets users run a 16-bit program in a dedicated (not shared) Virtual DOS Machine (VDM) process. All DOS and 16-bit programs run on Windows 2000 Professional and Windows XP Professional in the Windows Virtual DOS Machine program. VDM simulates a 16-bit environment complete with the DLLs required by 16-bit programs. By default all 16-bit programs run as threads in a single shared VDM process. As such they share the memory space allocated to the VDM process and cannot run simultaneously. Enabling this setting adds a check box to the Run dialog box giving users the option of running a 16-bit program in its own dedicated NTVDM process. The additional check box is enabled only when a user enters a 16-bit program in the Run dialog box.

Prevent access to the command prompt

This policy setting prevents users from running the interactive command prompt Cmd. exe. This policy setting also determines whether batch files (. cmd and . bat) can run on the computer. If you enable this policy setting and the user tries to open a command window the system displays a message explaining that a setting prevents the action. If you disable this policy setting or do not configure it users can run Cmd. exe and batch files normally. Note: Do not prevent the computer from running batch files if the computer uses logon logoff startup or shutdown batch file scripts or for users that use Remote Desktop Services.

Prevent access to registry editing tools

Disables the Windows registry editor Regedit. exe. If you enable this policy setting and the user tries to start Regedit. exe a message appears explaining that a policy setting prevents the action. If you disable this policy setting or do not configure it users can run Regedit. exe normally. To prevent users from using other administrative tools use the “Run only specified Windows applications” policy setting.

Run only specified Windows applications

Limits the Windows programs that users have permission to run on the computer. If you enable this policy setting users can only run programs that you add to the list of allowed applications. If you disable this policy setting or do not configure it users can run all applications. This policy setting only prevents users from running programs that are started by the File Explorer process. It does not prevent users from running programs such as Task Manager which are started by the system process or by other processes. Also if users have access to the command prompt (Cmd. exe) this policy setting does not prevent them from starting programs in the command window even though they would be prevented from doing so using File Explorer. Note: Non-Microsoft applications with Windows 2000 or later certification are required to comply with this policy setting. Note: To create a list of allowed applications click Show. In the Show Contents dialog box in the Value column type the application executable name (e. g. Winword. exe Poledit. exe Powerpnt. exe).