Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Making a Group Policy to enable Proxy settings when user logs on to domain

Posted on 2004-10-26
Medium Priority
Last Modified: 2008-02-01
Here is what I'm trying to do.  We are trying to get Internet Filtering enabled.  We are looking to purchase this program that is set up as a proxy.  So we need to set up Internet Explorer to go through a proxy.  I don't really want to go to every branch office to manually set up internet explorer going through a proxy so I figured there has to be a Group Policy or even a login script that would be able to do what I want to do.  I just want the login script or group policy(don't know what one would be better) to automatically config Internet Explorer to route through a proxy also for security reason I want to find out if I could do a reg edit over the domain so they won't be able to get into the internet tools to go around the proxy.  I'm running a Windows 2003 domain with about 95 client computers ranging from win98 up to winXP.  If you need anymore info then let me know

Question by:jwittkopf
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3

Accepted Solution

nihlcat earned 700 total points
ID: 12411731
In the GP for the users go to User Configuration > Windows Settings > Internet Explorer Maintenance >Connection > Proxy Settings

Expert Comment

ID: 12411776
Also, under User Configuration>Administrative Templates> Internet Explorer
There are options to block users from changing settings

Author Comment

ID: 12412002
yup...like a min after I wrote this question I found the policies...I will still give you the points though thanks anyways

Expert Comment

ID: 12412034
Congrats!  Most kind of you.

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

So you have two Windows Servers and you have a directory/folder/files on one that you'd like to mirror to the other?  You don't really want to deal with DFS or a 3rd party solution like Doubletake. You can use Robocopy from the Windows Server 200…
Scenerio: You have a server running Server 2003 and have applied a retail pack of Terminal Server Licenses.  You want to change servers or your server has crashed and you need to reapply the Terminal Server Licenses. When you enter the 16-digit lic…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question