Solved

GPO to change Proxy Settings based on Computer Object

Posted on 2011-03-16
2
661 Views
Last Modified: 2012-05-11
Hello,

We are attempting to write a GPO that will hard code the proxy server for our users.  We are attempting to accomplish at the COMPUTER/WORKSTATION level, and NOT at the user level.  The GPO must be at the root of our domain based on our infrastructure, so it cannot be applied to a specific OU.  We are looking to accomplish this via the ACL on the GPO object itself.  Any help would be much appreciated.
0
Comment
Question by:Techop09
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 11

Expert Comment

by:wrmichael
ID: 35151985
0
 
LVL 4

Accepted Solution

by:
bigstyler earned 250 total points
ID: 35152547
Hi,

first, you can totally define the USER policy at the top of the domain ; and then the proxy will be configured for every users (or for a specific group of users).

Otherwise try to define a GPO with the proxy settings on the User Configuration side and apply the "loopback processing" setting on this GPO too : http://support.microsoft.com/kb/231287/en-us
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question