Skip to main content

Configuring Proxy Using GPO in Microsoft Server 2008

Configuring Machine as the Default Proxy Using GPO in Windows® Server 2008

To configure the Proxy Settings on all client machines to use GFI WebMonitor as a proxy server through Windows® Server 2008 GPO:
1. In command prompt, key in mmc.exe and press Enter.
2. In the Console Root window, navigate to File > Add/Remove Snap-in… to open the Add or Remove Snap-ins window.
Screenshot 14: Add/Remove Snap-ins window
3. Select Group Policy Management from the Available snap-ins list, and click Add.
4. Click OK.
Screenshot 15: Console Root domain window
5. Expand Group Policy Management > Forest > Domains and <domain>, then select the organizational unit where you wish to apply the group policy.
NOTE
To apply the group policy to all domain computers , select the domain node directly.
6. Right-click Default Domain Policy and click Edit to open the Group Policy Management Editor.
Screenshot 16: GPO Editor window
7. Expand User Configuration > Policies > Windows Settings > Internet Explorer Maintenance > Connection and double-click Proxy Settings to open the Proxy Settings dialog.
Screenshot 17: Proxy Settings dialog
8. Check Enable proxy settings checkbox.
9. Uncheck Use the same proxy server for all addresses checkbox.
10. In the HTTP and FTP text boxes key in the proxy server IP address and the port used (Default 8080).
11. Click OK to apply changes
12. Close Proxy Settings dialog.
13. Close Group Policy Management Editor dialog and save the management console.
IMPORTANT
When using Active Directory, the administrator can disable the Internet connection settings tab from the client machines. For more information refer to Disabling Internet Connection Settings On Client Machines.

Comments

Popular posts from this blog

Duplicate IP Address has been Detected Rule

A duplicate IP address has been detected on the network Rule Knowledgebase Summary This rule generates an alert when Windows® detects that he local machine’s IP address is in conflict with one or more identical IP addresses on the network. Until the IP address conflict is resolved, remote clients and applications may have difficulty accessing resources on any of the effected computers. Additionally, the local computer may not be able to access network resources. Related Events This rule generates an alert whenever the following events occur and are recorded in the System Event Log: The system detected an address conflict for IP address %2 with the system having network hardware address %3. The local interface has been disabled. Source: TCPIP; Event ID: 4198; The system detected an address conflict for IP address %2 with the system having network hardware address %3. The local interface has been disabled. Source: TCP...

Schedule Automatic backup config in Cisco Nexus

Schedule Automatic backup config in Cisco Nexus Nexus-Sw1(config)#feature scheduler   //Enable scheduler service in Nexus Nexus-Sw1(config)#scheduler job name backup-daily      // Job Name Nexus-Sw1(config)#scheduler aaa-authentication username abcd password abcd@123     // AAA - Authentication for Job created above (If AAA configured) Nexus-Sw1(config)#scheduler job name backup-daily copy running-config tftp://192.168.1.23/$(SWITCHNAME)-cfg.$(TIMESTAMP)         //IP of TFTP SERVER , file will saved with switch name and timestamp exit Nexus-Sw1(config)#scheduler schedule name backup-daily   // Setup Schedule to run for the JOB Nexus-Sw1(config-schedule)# time ?   daily    Specify a daily schedule   monthly  Specify a monthly schedule   start    Specify a future time schedule   weekly   Specify a weekly schedule...

How to enable SSH login access to a Cisco router

This guide walks you through how to setup SSH on a Cisco Router. SSH is by far more secure then telnet. Telnet allows your passwords to be sent in plain text that anyone can see and gain access to your network. SSH is all encrypted traffic. NOTE: This should work with any Cisco router provided the Cisco IOS on the router supports ssh. Firstly is ssh enabled? router#sh ip ssh SSH Disabled - version 2.0 %Please create RSA keys to enable SSH. Authentication timeout: 60 secs; Authentication retries: 5 In this case its not, if you got a error saying that sh ip ssh is not recognized then you would know that ssh is not supported or possibly that the command is different for your platform. How to enable SSH on a Cisco 800 series router# config term router(config)#crypto key generate rsa usage-keys label router-key The name for the keys will be: router-key Choose the size of the key modulus in the range of 360 to 2048 for your ...