Solved

Blocking Internet access via 127.0.0.1 Method

Posted on 2007-04-03
3
231 Views
Last Modified: 2008-05-31
I've already created a Group Policy that restricts 'net access from IE by forcing the proxy address to use 127.0.0.1 and it works fine.

"Do not use proxy server for local address" is checked so that clients can access the corporate intranet site.

By the same token, I assumed that accessibility to Outlook Web Access would be functional too.  For example, "http://mail2/" redirects to "https://mail2.domain.com".  This results in "page cannot be displayed".

It looks as if the secure page is not being treated as a "local address", even though Active Directory contains a valid A record for mail2.  I've tried "https://10.0.0.6/exchange/" to no avail.

I've even added the above IP address into the "Exceptions" box without success.

What's the best workaround to allow accessibility to OWA under these conditions?

Thanks in advance.
0
Comment
Question by:Elmo_Oxygen
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 250 total points
ID: 18847482
Elmo_Oxygen,

you would be better off playing with contecnt advisor as everything you are currently trying to hit goes through your 127.0.0.1 address which means it falls over :)

Regards,

James
0

Featured Post

Resolve Critical IT Incidents Fast

If your data, services or processes become compromised, your organization can suffer damage in just minutes and how fast you communicate during a major IT incident is everything. Learn how to immediately identify incidents & best practices to resolve them quickly and effectively.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question