Solved

Proxy Server settings from W2K domain policy

Posted on 2004-09-07
10
240 Views
Last Modified: 2010-03-18
We use W2K AD domain policy to set our IE proxy server settings. Until recently we use ISA Server 2000 locally on one of our servers, but have now changed to an off site url for the proxy. Most of the time users log on and get the correct settings, but sometimes the old settings reappear! I have uninstalled the ISA Server software so where can this be coming from?

We don't have "automatically detect" enabled. Sometimes you can untick the incorrect proxy settings, reboot, and it comes good, but sometimes everthing is greyed out and we have to use regedit to clear out the incorrect settings. All the DC servers are synced and all have the correct settings so I'm baffled as to where the wrong settings are coming from !!
0
Comment
Question by:proneill
  • 4
  • 4
10 Comments
 
LVL 11

Expert Comment

by:Eric
ID: 12000144
hmm.. try making a policy disable the old policy , then have a policy later enable it.  I think once all clients are switched over it will be corrected.
Its not spiratic on the same pc's is it?  

also what if you forward the DNS to the extrnal host
0
 

Author Comment

by:proneill
ID: 12015656
Thanks for your response. Not sure how I would make a policy to disable - it only allows for enabling in the GP Proxy Settings.

I don't know what spiratic means but on the same pc it can be ok on one user's logon but not another.

Our dns is internal except for our web site and mail settings which are done on an external host. I can't make any changes to this setup
0
 

Author Comment

by:proneill
ID: 12015674
I've just realised what you probably mean - put the settings so that there's no proxy, then later re-enable it. I'll give this a try!
0
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

 
LVL 11

Expert Comment

by:Eric
ID: 12017081
hehe I spell wrong because I say things wrong.

spiratic=sporadic  :D

meaning... does it work sometimes with the same user, and not other times.

also try putting a logon script in the problematic GPO.

make it say

net send "yourcomputername" %username% GPO success on %computername%


it will give you a popup window on your pc if the script is executing.  Or simply put a pause in it, so it will stay visable.

and you can confirm its running

IE:

@echo Applied GPO Test
@echo If you see this message the client has successfuly applied GPO "GPO Name"
pause



Just ideas for troubleshooting.  
0
 
LVL 11

Expert Comment

by:Eric
ID: 13168143
Bah....
did my suggestion work?
0
 

Author Comment

by:proneill
ID: 13181418
Had to pay Microsoft to investigate this one. Turned out to be a synch error on one of the DCs
0
 
LVL 11

Expert Comment

by:Eric
ID: 13182951
ahh.. been there.

Were you able to repair it or did they make you reload the servers?

They tried to get me to reload, but I said no, then suddenly they came up with a solution :)
0
 

Accepted Solution

by:
modulo earned 0 total points
ID: 13190524
PAQed with points refunded (250)

modulo
Community Support Moderator
0
 

Author Comment

by:proneill
ID: 13190776
This was the gist of the registry hack:

HKey Local Machine\System\CurrentControlSet\Services\NTFRS\Parameters\Backup\Restore\ProcessatStartup. If there is not an entry forBurflags create one, edit, menu,new dword value, Burflags, OK. If there is one, r-click, modify, type d2 in value data box, OK.

The net stop NTFRS, net start NTFRS.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Greetings, Experts! First let me state that this website is top notch. I thoroughly enjoy the community that is shared here; those seeking help and those willing to sacrifice their time to help. It is fantastic. I am writing this article at th…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

680 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question