Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to configured Internet Explorer Proxy Server such that no other application will use the same proxy ?

Posted on 2016-08-18
2
Medium Priority
?
29 Views
Last Modified: 2016-08-26
When the IE proxy was set, the whole system will try to follow the same proxy. The problem is that I do not want any application to follow (such as google chrome, and all the rest). I know there is custom setting in each application such that the application does not use IE's proxy but this is no what I want.
0
Comment
Question by:Claws Ho
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Accepted Solution

by:
LesterClayton earned 2000 total points
ID: 41762045
Sadly, you cannot restrict other applications to not use IIS Proxy.  The proxy setting is not actually part of Internet Explorer, although you can access the settings from IE.  You'll find that the proxy settings are also part of your control panel (Internet Options), so any application can read the relevant registry keys and then make use of the settings.

Applications that use the Proxy Server don't "identify" themselves, so you couldn't even configure the proxy server to only allow certain applications either.
0
 

Author Closing Comment

by:Claws Ho
ID: 41772539
OK
0

Featured Post

Are You Ready for GDPR?

With the GDPR deadline set for May 25, 2018, many organizations are ill-prepared due to uncertainty about the criteria for compliance. According to a recent WatchGuard survey, a staggering 37% of respondents don't even know if their organization needs to comply with GDPR. Do you?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
How does someone stay on the right and legal side of the hacking world?
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question