Thursday, 6 March 2014

Setting proxy with .pac file in IE10 IE11 using registry and group policy gpo

Set Proxy settings using GPO

We have many computers with Windows8 now but 2008R2 server which doesn't like anything newer than Internet Explorer 9.
Setting proxy for IE8 and IE9 was simple with Interet Explorer .adm files.

You can use Internet Explorer Administration Kit (IEAK) for deploying customized Internet Explorer and it works, but for me works only if you deploy full installation with only changed proxy settings. It was very weird to me, so I searched another way.

Finally, my thoughts were directed to Windows registry. Everyone nows that if something is hidden from your eyes you can set it through the registry.

And this is it, keys that set your path for proxy .pac file!

For adding proxy address:
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v AutoConfigURL /t REG_SZ /d "http://yourproxyaddress.here/proxy.pac" /f

For removing proxy address:
reg del "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v AutoConfigURL /t REG_SZ /d "" /f

I've set gpo for that:
As you see I've used Preferences settings to add new registry settings
Settings in the add registry you can see below:



8 comments:

  1. This comment has been removed by a blog administrator.

    ReplyDelete
  2. The proxy server may be found on the computer of the user or at different points within the destination and computer servers found over internet. The proxy server may pass the responses and requests which was unmodified and which is usually know as gateway or even as a tunneling prox. Proxy Server List

    ReplyDelete
  3. Ensure your representatives keep the antivirus programming turned on, particularly while getting to the web. As malwares are ceaselessly experiencing development, so are programming organizations keeping pace with strategies on the most proficient method to counter them. https://how-to-remove.org/malware/browser-hijacker-removal/chjicha-club-removal/

    ReplyDelete
  4. While Napster used a central server to hold all the files being shared, newer file sharing programs connect users directly to one another without a central server.
    downloadshareitapp.com

    ReplyDelete
  5. This is the LAST thing that ought to ever be accomplished for infection evacuation. It's a bit much. However for reasons unknown, this is the wanted answer for most retail Palm Beach PC repair shops. https://how-to-remove.org/malware/browser-hijacker-removal/picasti-extension-removal/

    ReplyDelete
  6. I really appreciate this wonderful post that you have provided for Microleaves. I assure this would be beneficial for most of the people.

    ReplyDelete
  7. Great job for publishing such a beneficial web site. Your web log isn’t only useful but it is additionally really creative too. There tend to be not many people who can certainly write not so simple posts that artistically. Continue the nice writing VPN For UK IP Address

    ReplyDelete
  8. In the event that you are searching for access to delegates, you should scan for intermediaries, which permit you access to couriers from their site. mexican vpn

    ReplyDelete