Search back through the Knowledge Base. There is a well known documented
solution involving reghacks, etc.
Personally, I found it easier to just install some software that profiles
the machines at night, and tells me if someone put something on them. Then I
jsut send an e-mail requesting that the software disappear. works like a
champ.
www.beitsmart.com
--
James Wedding, P.E.
IT Manager
Jones & Boyd, Inc.
Dallas, TX
jwedding@*NOSPAM*jones-boyd.com
Search before you ask, it's been asked before.