Solved

how to disable proxy settings change

Posted on 2011-09-26
7
427 Views
Last Modified: 2013-11-25
Wanted to know the right way to do this. I saw somewhere that you go to User Config>Policies>Windows Settings>Internet Explorer Maintenance>Connection and then you can uncheck the 'enable proxy settings' box but am not sure that this is the right way. Can someone let me know?
0
Comment
Question by:breno520
  • 3
  • 2
7 Comments
 
LVL 9

Expert Comment

by:Bill_Fleury
ID: 36600778
If you are asking if this is how you would do it via group policy, then YES, that would be the setting you clear in the policy you are applying to that user.
0
 

Author Comment

by:breno520
ID: 36713098
Oh ok. So if i uncheck it then it will not only push out the proxy settings but also deny end users from editing the proxy entry or disabling it then right?
0
 
LVL 9

Expert Comment

by:Bill_Fleury
ID: 36714270
From what I believe, yes.  It's been quite some time since I played with group policy, but yes to the best of my recollection that's true.
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 

Author Comment

by:breno520
ID: 36719641
When I uncheck it, the settings are simply disabled and are still able to be changed. I need it set where should a user try to disable the proxy, everything will be grayed out so they can't.
breno520-505458.flv
0
 

Author Comment

by:breno520
ID: 36904055
Ended up being that i was using the wrong GPO setting to change. This was an automatic configuration of a proxy url and had to use the respective GPO setting to disable end user intervention. Thnx.
0
 

Accepted Solution

by:
ee_auto earned 0 total points
ID: 37271897
Question PAQ'd and stored in the solution database.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Documentation is a big contentious issue in Agile. There is a reason for this. When you start your presentation on Agile you start by going through the 4 statements of agile manifesto (https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&…
A safe way to clean winsxs folder from your windows server 2008 R2 editions
This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now