?
Solved

Windows 2008, GPOs, Trusted URLs

Posted on 2014-01-15
2
Medium Priority
?
172 Views
Last Modified: 2014-01-22
I have a single GPO that was created, this GPO has 3 URLs. (Internet Explorer Maintenance).

http://*.random.com
http://*.somewhere.com
http://*.whereever.net

That works as expected, when I log on using my test machine, with my credentials I see the URLs as expected.

However when some other users (yes not all of them) log on the see the 3 URLs + 2 more, i need to find out where those 2 other urls are stored at? which GPO what file? etc.

I do not think we have replication issues because i get the same 3 URLs every time and by running the set command i am able to see what server is providing auth and most likely the sysvol\GPO that i am getting.


How do i search all my GPOs for instances of those 2 other URLs?


Thanks...

Robert
0
Comment
Question by:castellansolutions
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Author Comment

by:castellansolutions
ID: 39784336
Also i check the seczones file in the GPO and sure enough the HKCU and HKLM entries both show 5 URLs listed, in the one GPO. But i don't get all 5 when i log in?

I just checked before my post (it was  my last thing to check).
0
 
LVL 13

Accepted Solution

by:
Jaihunt earned 2000 total points
ID: 39784945
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Suggested Courses
Course of the Month11 days, 12 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question