Drew,
The registry keys you want to modify are:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall
\DomainProfile \EnableFirewall=0
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall
\StandardProfile \EnableFirewall=0
In your situation, it would probably be best to follow the advice in Linney's first link to e-mail each user a .REG file to import that makes the above changes. Of course, that makes the assumption that every user has admin rights. By default, the firewall only lets in connections initiated by
Remote Assistance, so I don't think you're going to find any quick tips to get around it. You would need a hacker's tool to exploit running services to find a backdoor, but I don't think your CIO would want you doing that!
For future reference when building/reimaging computers, this article from Technet talks about using the
Unattend.txt, as well as discussing some of the options already mentioned in this thread:
~cdogg
"
Insanity: doing the same thing over and over again and expecting different results." - Einstein
[tab][navy]For posting policies, click [/navy]
here.