Solved

How do I set proxy server settings through GPO management.

Posted on 2014-01-23
2
715 Views
Last Modified: 2014-01-23
I am looking to create a GPO that can be applied to certain users within our domain that forces internet proxy settings for Internet access and disables the ability for the user to override them.

We are running Active Directory and MS Server 2008 with Windows 7 clients.

Any help much appreciated.

Z
0
Comment
Question by:zander1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Accepted Solution

by:
SvenIA earned 500 total points
ID: 39802473
This link is a step-by-step to create a GPO to configure proxy settings.

http://techlib.barracuda.com/display/WSFLEXV41/How+to+Configure+Proxy+Settings+Using+Group+Policy+Management

You can create a group and add the specific users. Then configure item level targeting for the GPO pointing to that specific group.
0
 

Author Closing Comment

by:zander1
ID: 39802486
Excellent. Thanks
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question