Proxy settings not applying from GP, error in brndlog.txt

Posted on 2009-04-28
Last Modified: 2013-12-08
I am having trouble getting new proxy settings to apply on some computers in our organisation. I am not sure exactly how proxy settings have been applied in the past, but for some reason, the old settings are not being replaced. The policy is attempting to use internet explorer maintenance settings to set the new proxy. I have tried the setting in group policy Process even if the Group Policy objects have not changed but this has not helped. Looking at brndlog.txt, on affected clients I am getting the error ! Processing of this Wininet.dll connection settings failed. I have googled that without much success. I have run gpupdate /force & restarted. RSOP.msc does not show any errors and as far as it is concerned the proxy is applying OK. If any one can give a pointer, I would be grateful. My only fix so far is to move the user from the particular OU with the policy, move it to a unrestricted OU alter the settings manually and then put the user back again - this has worked on 3 + occasions.
Question by:derbytelegraph

    Author Comment

    To add to that, today I have tried adding the registry entries for the new proxy server manualy - this works and IE uses the new proxy, but when I do a gpupdate /force, it puts back the old proxy settings, despite the fact that rsop.msc says it is successfully applying the new proxy :-/ - I cant work out where these old settings are coming from.

    Accepted Solution

    Think I might be there now.....the above led me to belive that maybe the IE maintenance policy wasnt refresshing properly on computers.....another rsop confirmed this, I had set it on the wrong OU. Corrected this mistake and I have just done a gpupdate on affected machines - they now have the correct settings, I want them to do a restart just to confirm it, but it looks like this was the problem. Apologies for wasting anyones time - school boy error ! I will close this when its confirmed fixed.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Join & Write a Comment

    Introduction You may have a need to setup a group of users to allow local administrative access on workstations.  In a domain environment this can easily be achieved with Restricted Groups and Group Policies. This article will demonstrate how to…
    I annotated my article on ransomware somewhat extensively, but I keep adding new references and wanted to put a link to the reference library.  Despite all the reference tools I have on hand, it was not easy to find a way to do this easily. I finall…
    This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
    This Micro Tutorial will demonstrate how to add subdomains to your content reports. This can be very importing in having a site with multiple subdomains.

    732 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now