?
Solved

Windows 2008, GPOs, Trusted URLs

Posted on 2014-01-15
2
Medium Priority
?
177 Views
Last Modified: 2014-01-22
I have a single GPO that was created, this GPO has 3 URLs. (Internet Explorer Maintenance).

http://*.random.com
http://*.somewhere.com
http://*.whereever.net

That works as expected, when I log on using my test machine, with my credentials I see the URLs as expected.

However when some other users (yes not all of them) log on the see the 3 URLs + 2 more, i need to find out where those 2 other urls are stored at? which GPO what file? etc.

I do not think we have replication issues because i get the same 3 URLs every time and by running the set command i am able to see what server is providing auth and most likely the sysvol\GPO that i am getting.


How do i search all my GPOs for instances of those 2 other URLs?


Thanks...

Robert
0
Comment
Question by:castellansolutions
2 Comments
 
LVL 6

Author Comment

by:castellansolutions
ID: 39784336
Also i check the seczones file in the GPO and sure enough the HKCU and HKLM entries both show 5 URLs listed, in the one GPO. But i don't get all 5 when i log in?

I just checked before my post (it was  my last thing to check).
0
 
LVL 13

Accepted Solution

by:
Jaihunt earned 2000 total points
ID: 39784945
0

Featured Post

Receive 1:1 tech help

Solve your biggest tech problems alongside global tech experts with 1:1 help.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
I’m willing to make a bet that your organization stores sensitive data in your Windows File Servers; files and folders that you really don’t want making it into the wrong hands.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question