Solved

Group policy proxy settings on laptops

Posted on 2006-11-28
8
338 Views
Last Modified: 2010-05-18
I have an ISA server that I just use as proxy.  I enforce this via group policy, because using the .pac file on the dns servers cause too much of a delay for corporate.  Now, here is my problem, when users of laptops go home, there pc's are still looking for the isa server and can not find it therefore, they can not browse the net at home.  How can I avoid this for the lappys?  I was thinking I could put something on a log off script, but have never really messed with log off scripts.  If the logoff script is the best way to do this, could you explain or link me ot a reference?  IF its not the best way, what is and how can I i implement this?
Thanks,
0
Comment
Question by:corphealth
  • 3
8 Comments
 
LVL 104

Accepted Solution

by:
Sembee earned 500 total points
ID: 18052281
A log off script will not work if the user puts their laptop in to suspend and then takes it home.

Simon.
0
 

Author Comment

by:corphealth
ID: 18367979
That obviously wasn't a solution.
0
 

Author Comment

by:corphealth
ID: 18368228
I'm sorry no expert commented on this or offered any help.
Thanks!
0
 

Author Comment

by:corphealth
ID: 18368363
I have a paid subscription, so I don't know why there has to be volunteers.  If you read the question his response in no way address my problem.  And to not simply delete this question could lead others awry.
That's all I am saying.  I may not have time to respond sometimes, and as a paying customer that should be my right, unless I missed something under the TOS about being required to respond to answers that in no way encapsulate my problem.
Thanks!
-Chip
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
Recently, I had the need to build a standalone system to run a point-of-sale system. I’m running this on a low-voltage Atom processor, so I wanted a light-weight operating system, but still needed Windows. I chose to use Microsoft Windows Server 200…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question