Solved

Windows 2008, GPOs, Trusted URLs

Posted on 2014-01-15
2
169 Views
Last Modified: 2014-01-22
I have a single GPO that was created, this GPO has 3 URLs. (Internet Explorer Maintenance).

http://*.random.com
http://*.somewhere.com
http://*.whereever.net

That works as expected, when I log on using my test machine, with my credentials I see the URLs as expected.

However when some other users (yes not all of them) log on the see the 3 URLs + 2 more, i need to find out where those 2 other urls are stored at? which GPO what file? etc.

I do not think we have replication issues because i get the same 3 URLs every time and by running the set command i am able to see what server is providing auth and most likely the sysvol\GPO that i am getting.


How do i search all my GPOs for instances of those 2 other URLs?


Thanks...

Robert
0
Comment
Question by:castellansolutions
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Author Comment

by:castellansolutions
ID: 39784336
Also i check the seczones file in the GPO and sure enough the HKCU and HKLM entries both show 5 URLs listed, in the one GPO. But i don't get all 5 when i log in?

I just checked before my post (it was  my last thing to check).
0
 
LVL 13

Accepted Solution

by:
Jaihunt earned 500 total points
ID: 39784945
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question