Solved

same IE 5.0 Proxy setting for all users

Posted on 2000-04-15
2
190 Views
Last Modified: 2013-12-23
I have installed IE 5.0 on my network, replaced with netscape.
when any user ist time login to wks,  IE connection wizard starts up and user has to do the whole proxy setting exercise.
Is it possible that once administrator set proxy setting will be saved for all
users?
0
Comment
Question by:shahid1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Expert Comment

by:saile01
ID: 2720175
yes it s possible

you will configure your ie5 for using "url proxy settings"
in the internet option, connexion, proxy setting

with this you can make configuration file for: home page, internet settings, proxy settings,...


generaly we make this config file on the proxy machine
0
 
LVL 1

Accepted Solution

by:
AndySB earned 30 total points
ID: 2723673
I would suggest you definately get your self a copy of the Internet Explorer Zero Administration kit.  It will basically allow you to create you own custom install which will include any settings that you wish to set as you have mentioned above.  Have a look at the Microsoft Web Site for details
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Slow network share for Windows 10 laptops 8 89
FTP output from Wireshak 6 113
forward schedule of change 1 85
Freeproxy running on Server 2012 R2 2 198
FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question