Solved

Making a Group Policy to enable Proxy settings when user logs on to domain

Posted on 2004-10-26
241 Views
Last Modified: 2008-02-01
Here is what I'm trying to do.  We are trying to get Internet Filtering enabled.  We are looking to purchase this program that is set up as a proxy.  So we need to set up Internet Explorer to go through a proxy.  I don't really want to go to every branch office to manually set up internet explorer going through a proxy so I figured there has to be a Group Policy or even a login script that would be able to do what I want to do.  I just want the login script or group policy(don't know what one would be better) to automatically config Internet Explorer to route through a proxy also for security reason I want to find out if I could do a reg edit over the domain so they won't be able to get into the internet tools to go around the proxy.  I'm running a Windows 2003 domain with about 95 client computers ranging from win98 up to winXP.  If you need anymore info then let me know

Thanks
0
Question by:jwittkopf
    4 Comments
     
    LVL 6

    Accepted Solution

    by:
    In the GP for the users go to User Configuration > Windows Settings > Internet Explorer Maintenance >Connection > Proxy Settings
    0
     
    LVL 6

    Expert Comment

    by:nihlcat
    Also, under User Configuration>Administrative Templates> Internet Explorer
    There are options to block users from changing settings
    0
     
    LVL 1

    Author Comment

    by:jwittkopf
    yup...like a min after I wrote this question I found the policies...I will still give you the points though thanks anyways
    0
     
    LVL 6

    Expert Comment

    by:nihlcat
    Congrats!  Most kind of you.
    0

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Numerous times I have been asked this questions that what is it that makes my machine log on so slow, there have been cases where computers took 23 minute exactly after taking password and getting to the desktop. Interesting thing was the fact th…
    Learn about cloud computing and its benefits for small business owners.
    This video Micro Tutorial is the second in a two-part series that shows how to create and use custom scanning profiles in Nuance's PaperPort 14.5 (http://www.experts-exchange.com/articles/17490/). But the ability to create custom scanning profiles a…
    Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

    856 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    13 Experts available now in Live!

    Get 1:1 Help Now