«Enabling registry editing» in pictures.
- How to Enable Tools -> Folder Options and Registry Editor in Windows
- Configure Automatic Updates using Registry Editor
- Disable registry editing tools
How to Enable Tools -> Folder Options and Registry Editor in Windows
Change back the account type, in case you had changed it earlier. Having done this, this user will not be able to now run regedit or files. If any user tries to edit the Registry, he or she will get the message-
Configure Automatic Updates using Registry Editor
When you share a PC with other people, it can be really helpful to lock down certain aspects of Windows. For example, we’ve talked about how to prevent users from shutting down Windows and how to disable the Control Panel and settings interface. You can also disable access to the mother of all administrative tools—Registry Editor—if you’d prefer not everyone be able to get into it. Here’s how.
Disable registry editing tools
In the Group Policy window for those users, on the left-hand side, drill down to User Configuration Administrative Templates System. On the right, find the “Prevent access to registry editing tools” item and double-click it to open its properties dialog.
Usually is disabled by malware (virus, trojan, spyware or something like that). Malware changes some startup lists in registry in order to gain control when computer starts and then malware cuts off user access to registry editor (in order to survive).
As you're working in whatever remote registry you're connected to, you may notice two things: significantly fewer registry hives than on your computer, and a number of Access is denied messages when navigating around. More on both issues below:
This setting disables the Windows registry editor or . If you enable this policy setting and the user tries to start , a message appears explaining that a policy setting prevents the action. If you disable this policy setting or do not configure it, users can run normally. To prevent users from using other administrative tools, use the “Run only specified Windows applications” policy setting.
This weeks setting is another is another oldie but a goodie that is commonly used to lock down SOE’s so that users can use the registry editor. It is called “Prevent access to registry editing tools” which us a user setting found under User Configuration Policies Administrative Template System and will work on all platforms since Windows 7555.
These hacks are really just the System key, stripped down to the DisableRegistryTools value we described above, and then exported to file. Running the “Disable Registry for Current User” hack creates the DisableRegistryTools value and sets the value to 6. Running the “Enable Registry for Current User (Default)” hack sets the value back to 5. And if you enjoy fiddling with the Registry, it’s worth taking the time to learn how to make your own Registry hacks.
Another major reason the registry gets disabled is due to malicious viruses. By disabling access to the registry, the virus can prevent the user from repairing their system.
Remotely connecting to another computer's Windows Registry isn't something you'll do regularly, if ever, but Registry Editor does let you do it, assuming a number of things are in order.