Internet explorer security settings

Posted on 2009-12-29
Last Modified: 2013-11-21
I have recently installed a system comprising of a SBS2008 Premium server & a Windows 2008 server, configured as a terminal server & the site is using the existing Wyse thin clients.
The site performs a lot of Web based work & the users cannot change the Internet Security settings to allow access to their sites, download Java etc.
I have moved the users from my terminal server GPO to the standard SBS Users container with no change & I even granted Administrator privlidges to a user & still the IE settings were grayed out.
How do I allow access to these options withi IE??
Question by:JazIT
    LVL 6

    Expert Comment

    What do you mean by: "I have moved the users..." ?
    Do you mean moving of user profile ?


    Author Comment

    I created a new Organizational Unit & applied a GPO & moved the users into that OU so that my policies could be applied to them.
    Moving a user back into the default, SBS Users OU made no difference to the Security Level options, under Internet Options. That is, they are greyed out still.
    LVL 6

    Expert Comment

    I hope that I understand your problem, I am not absolutely sure...

    In any of group policy settings there are three options:
    not configured

    If you enable something and then set not-configured,
    there will be applied policies from above GPO container if it exists (by rules for applying policies)
    Try to set "disabled" in new policies in new OU.

    LVL 6

    Expert Comment

    To be more exact, I must to add to my sentence:
    "If you enable something and then set not-configured,
    there will be applied policies from above GPO container if it exists (by rules for applying policies)"

    If above GPO container does not exist and you have previously activated some policy and then you will set "not configured" (default setting),
    then your policies are still valid. You must set "disabled" on policy you want to remove.
    LVL 6

    Accepted Solution

    You can use the Group Policy Management tool to help sort out which settings are being applied and by which policies.  Just run the Group Policy Results Wizard inside the tool.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    HOW TO REMOTELY CLEAN MEROND.O WITH ESET SILENTLY PROBLEM       If you have the fortunate luck to contract the Merond.O virus on your network, it can be quite troublesome to remove as it propagates to network shares on your network. In my case, the …
    You may have discovered the 'Compatibility View Settings' workaround for making your SBS 2008 Remote Web Workplace 'connect to a computer' section stops 'working around' after a Windows 10 client upgrade.  That can be fixed so it 'works around' agai…
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now