Solved

Enforce Proxy GP for 2 seperate Proxy Servers

Posted on 2006-06-28
2
364 Views
Last Modified: 2010-04-07
Our company has 2 locations.  The 2 offices are connected via VPN (ISA2004 to ISA2000).  There is only one domain.  Primary Domain Server is in the main office along with a secondary domain controller.  A secondary controller is also located in the remote office.  How do I configure a GP(s) to force all the client workstations to use the appropriate proxy server  (main users to main proxy and remote users to remote proxy).  Currently, there is a GP under default domain policy/user configuration/internet explorer maintenance/connection/proxy settings.  In that setting I have exceptions defined for the remote IP addresses (10.1.2.*).  But that does not seem to be working properly as the GP seems to be applied to the remote workstations. The GP does work for the main office workstations.
0
Comment
Question by:drest
2 Comments
 
LVL 10

Accepted Solution

by:
Sorenson earned 250 total points
ID: 17003712
As you have two sites connected via a vpn, under AD sites and subnets, do you have the two sites and two subnets defined?  I would take these GPO settings out of the default domain policy, and add these settings to a new GPO attached to each site.  This would let you specify the correct Proxy server to use, for the correct site (and subnet).  
0
 

Author Comment

by:drest
ID: 17010617
we do not have 2 sites and 2 subnets.  I am researching how to configure 2 sites/2 subnets and I will try your suggestion.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now