Solved

IExplorer on terminal server W2K8 R2

Posted on 2010-08-28
3
1,068 Views
Last Modified: 2012-05-10
Hi Y'l
I'm strugling with a terminal server W2K8 R2 and Iexplorer 8.
My clients find it slow and some site's just don't funksjon like site's with java or google maps.
When I log on as a admin either on the console or i a session it works.
What 'm I missing
Rene Oslo
0
Comment
Question by:aksessikt
  • 2
3 Comments
 
LVL 6

Expert Comment

by:oferam
ID: 33549424
Have you checked the enhaced security configuration is off for all users?

http://technet.microsoft.com/en-us/library/dd883248(WS.10).aspx

Quote:



To apply Enhanced Security Configuration to specific users by using a computer running Windows Server 2008 

1.Log on to the computer with a user account that is a member of the local Administrators group.



2.Click Start, point to Administrative Tools, and then click Server Manager.



3.If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.



4.Under Security Information, click Configure IE ESC.



Note  

Server Manager opens with the same window that was in use when it was last closed. If you do not see the Security Information section, click Server Manager in the console tree.

 



5.Under Administrators, click On (Recommended) or Off, depending on your desired configuration.



6.Under Users, click On (Recommended) or Off, depending on your desired configuration.



7.Click OK.



8.Restart Internet Explorer to apply Enhanced Security Configuration.



Notes 



When you apply Internet Explorer Enhanced Security Configuration to the Administrators group, the settings are applied to administrators. For Windows Server 2003, when you apply Internet Explorer Enhanced Security Configuration to All other user groups, the settings are applied to all groups except for the Administrators group. For Windows Server 2008, when you apply Internet Explorer Enhanced Security Configuration to Users, the settings are applied to all groups except for the Administrators group.





For more information about Internet Explorer security zones, see About URL Security Zone Templates (http://go.microsoft.com/fwlink/?LinkId=12658).





When you apply Internet Explorer Enhanced Security Configuration to any user group while Internet Explorer is open, you must exit Internet Explorer and restart it for the changes to take effect.

Open in new window

0
 

Author Comment

by:aksessikt
ID: 33549457
Thanks. Checked it although I knew it was off for both users and admins.
0
 

Accepted Solution

by:
aksessikt earned 0 total points
ID: 33594370
I had to switch of trough a policy så this is solved
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
IE issues 1 12
2003 File Server upgrade 11 48
Firefox cannot connect to my ViceVersa Engine page 3 27
Export all user attributes in Active Directory 2008 R2 4 43
Do you come here a lot? Are you lazy like me and don't want to go through the "trouble" of having to click your Dock's Safari icon and then having to click your Experts Exchange Favorites bookmark to get here? Well then this article is for you.
New Windows 7 Installations take days for Windows-Updates to show up and install. This can easily be fixed. I have finally decided to write an article because this seems to get asked several times a day lately. This Article and the Links apply to…
This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now