Solved

Proxy Config via GP

Posted on 2009-04-01
2
305 Views
Last Modified: 2012-05-06
Hi all
i want to do this via group policy
i want one username if he is login from some group of computers to put proxy1 at IE for internet , and if he is login from another group of computers will put proxy2 for internet , i see that proxy configuration via GP is at user configuration but i will apply the policy at group of  computer accounts , and the computer configuration at GP does not have any settings for proxy , can you help me .
0
Comment
Question by:ahfaris
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 21

Accepted Solution

by:
snusgubben earned 500 total points
ID: 24043632
0
 

Author Comment

by:ahfaris
ID: 24066530
I want to say that solution accepted above not solve my problem , the problem solved by applying the article below step by step :
http://searchenterprisedesktop.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid192_gci1277560,00.html 
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question