We do? continuously source developers globaly to work remotely on windows machines provided by us and run in our computing center.
Depending on the task and the level of trust established between those parties and us, we need a method to restrict the developers? / users of our Windows machines to use only authorized functions.
For example, functions temporarily not autorized could be contacting the internet, installing programs, running certain programs, communicating with other computers, copying files to and from other computers, contacting other machines, downloading? or uploading files, etc.
a) describes in detail the methods and/or tools to use to flexibly restrict a windows machine and/or user from executing unwanted functions.
b) Demonstrates the methods/toosl by configuring a windows machine to block various functions
c) Demonstrates that the unwanted functions are securely blocked
d) Describes the conditions which need to be maintained at all times for the blockage to work
e) Describes how to test that the blockage is switched on as needed.