Configure-Internet-Site-Zone-using-Group-Policy-Preferences-5.png

Configure Internet Site Zone using Group Policy Preferences

Microsoft Internet Explorer has a built-in security feature that classify sites into four separated zones, namely Internet, Local Intranet, Trusted Sites, and Restricted Sites. Each of these zones has different way of handling site contents. For example, downloading content from sites in Internet zone will prompt a message to the user before it is able […]
Backup-and-Restore-Group-Policy-Object-in-Windows-6.png

Backup and Restore Group Policy Object in Windows

Group Policy Object is one of the critical elements for Windows domain environment. It is the job for administrator to manage the GPO carefully as the simplest mistake in GPO setting can potentially lead to a major service disruption. The best way to mitigate that risk is by backing up the GPO before doing any […]
How-to-Configure-Proxy-Settings-using-Group-Policy-Preferences-4.png

Configure Proxy Settings using Group Policy Preferences

A proxy server is a dedicated server that acts as the intermediate between server that provides service and its requesting client. With proxy server configured, client doesn’t have to communicate directly through the internet, thus increasing the security. Also, proxy server can help reduce internet bandwidth usage with its caching ability. For these reasons, proxy […]
Block-GPO-using-Delegation-Option-in-Windows-8.png

Block GPO using Delegation Option in Windows

There are multiple ways to block GPO from applying to specific users or computers. While methods like item-level targeting, security filtering, or WMI filtering, can practically provide better control of the policy scope, administrator also needs to know that one can block GPO using delegation option in Windows. This is not the best way to […]
Configure-Windows-Firewall-Rule-using-Group-Policy-4.png

Configure Windows Firewall Rule using Group Policy

Every Windows OS comes with a native firewall as the basic protection against malicious programs. Windows Firewall controls the incoming and outgoing traffic from and to the local system based on the criteria defined in the rules. The criteria can be program name, protocol, port, or IP address. In a domain environment, administrator can centrally […]