Solved

Internet Explorer Proxy Settings Not Retained.

Posted on 2004-03-22
7
412 Views
Last Modified: 2010-05-18
Here's what I'm trying to do:  
Launch IE --> Tools --> Internet Options --> Connections --> LAN settings --> Advanced

I enter an IP address in the "Exceptions" textbox which is NOT retained when I go back to this menu.
What could be stopping the entry I made from being retained???
0
Comment
Question by:exhaust
  • 4
  • 3
7 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 10653311
is there any policies being enforced on you click start >run >gpedit.msc

and look in User Configuration > Windows Settings > Internet Explorer Maintenance >Connection > Proxy Settings
0
 
LVL 3

Author Comment

by:exhaust
ID: 10655127
Good suggestion Pete, I went in there to hardcode the exception address I wanted.  It retains it, but as soon as I logoff and back on.  It's gone
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 20 total points
ID: 10659885
Then you are either - not logged in as an administrator, OR theres a group policy over-riding it (speak to IT) or theres something resetting the registry at login (I.e. a logon script)

Pete
0
How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

 
LVL 57

Expert Comment

by:Pete Long
ID: 10688972
ThanQ
0
 
LVL 3

Author Comment

by:exhaust
ID: 10695043
By the way, it's still not resolved (exception entries not retained).  But I know it's related to the Novell login script or Novell Workstation Manager which overwrites the entries.

Thanks Pete
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 10695254
Try removing the novell client reboot and change the entry -see if its retained, at least then you will know for sure :)
0
 
LVL 3

Author Comment

by:exhaust
ID: 10695441
Good Idea!  Thanks again
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this article, I will show you HOW TO: Create your first Windows Virtual Machine on a VMware vSphere Hypervisor 6.5 (ESXi 6.5) Host Server, the Windows OS we will install is Windows Server 2016.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now