Solved

IE6/IE7 to IE8 upgrade withgroup policy

Posted on 2010-11-18
4
781 Views
Last Modified: 2012-06-21
Hi,
I am looking to upgrade approx 1,500 computers across a vast network, with various bandwidths, from IE6/7 - IE8. I found this on the net:

http://technet.microsoft.com/en-us/library/cc985339.aspx

Can i use the above to upgrade from IE6/7 to IE8. OR does anyone have other links that i should be looking at. I think Group Policy is the way to do it, i would like to customise it too.Any help/tips appreciated
0
Comment
Question by:LCMaurice
  • 2
  • 2
4 Comments
 
LVL 42

Expert Comment

by:kevinhsieh
ID: 34166789
Not sure what customizations you would like to do. The easiest way to deploy is to approve IE8 in WSUS. That's what I did.
0
 

Author Comment

by:LCMaurice
ID: 34167019
Hi Kevin....i would like to get rid of the stupid start up pop up when you open IE8 for the first time, thats just one off the top of my head.
WSUS? Im not too up on bandwidth trottle (thats a feature right?)...as our network is well scattered. 200 sites...ranging from 2mb/100mb line, 5 year old pc's to up to date ones.
0
 
LVL 42

Accepted Solution

by:
kevinhsieh earned 500 total points
ID: 34168054
The first run dialog can be turned off with group policy.

http://social.answers.microsoft.com/Forums/en-US/InternetExplorer/thread/335a09f0-23fb-4832-95e9-da0766322a4a
http://technet.microsoft.com/en-us/library/cc985351.aspx

Unless you have a mechanism to stage the installation files at each location, you're going to have to pull everything over the WAN anyway. WSUS is nice because the user doesn't have to wait for IE8 to install when starting the computer.


How to throttle BITS bandwidth
http://blogs.technet.com/b/sus/archive/2008/06/30/wsus-how-to-throttle-bits.aspx
0
 

Author Closing Comment

by:LCMaurice
ID: 34490747
good
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I annotated my article on ransomware somewhat extensively, but I keep adding new references and wanted to put a link to the reference library.  Despite all the reference tools I have on hand, it was not easy to find a way to do this easily. I finall…
Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now