How to Add Trust Sites into IE before IE10 through Group Policy

Due to IE10 published, I’ll conclude the methods that how to add trust sites in to IE of the version before IE10.

General, there are three methods to set trust sites to client machine by GPO from DC configured on windows 2003 or windows 2008.

If the client machine is newer than windows 7 (including windows 7) or preferences installed in windows XP, there is the fourth method named “Group Policy Preferences”.

Then I’ll introduce and compare these methods below:

First method:

=============

Name:  “Import the current security zones and privacy settings” in IE Maintenance

Steps:

1)      1) Open GPO for IE settings in DC of windows 2003 or 2008.

2)      2) Navigate to: “User Configuration\Policies\Windows Settings\ Internet Explorer Maintenance\Security”

3)      3) Double-click Security Zones, click Continue if prompted. Click “Import the current security zones and privacy settings”, click Modify Settings.

4)      4) Change settings and click OK. Run "gpupdate /force" on client machine and test the result.

Advantages: simple and adapted by major of DC administrator.

Disadvantages:

1)      1) If DC enable “IE ESC” in its feature configuration, the client machine also must enable its ESC feature so that it could get the GPO successfully, otherwise the client will fail to apply that setting. But unfortunately, excepting windows 2003 or 2008 as client, other OS such as XP, windows 7 all do not have this feature. So if you want to set trust sites by “Import the current security zones and privacy settings”,

Generally, there are two choose:

A.      Disable ESC in DC and confirm all windows 2003&2008 clients disable their ESC.

B.      Enable ESC on DC and keep your all client machines as windows 2003&2008 with ESC enabled.

Reference: http://social.technet.microsoft.com/Forums/en/winserverGP/thread/4a3221aa-d2eb-4ce8-ad6f-4f896e0800b3

2)      2) The second disadvantage: if using “Import the current security zones and privacy settings” to just set “TrustedSites”, other content in other security zones or “Custom level…” will be applied in same time even you did not to configure them.

Second method:

=============

Name: “Site to the zone assignment list” in Administrative Templates.

Steps:

http://blogs.msdn.com/b/askie/archive/2012/06/05/how-to-configure-internet-explorer-security-zone-sites-using-group-polices.aspx

Advantages:

1)      1) This method will only apply what you expected security zone to clients without the content of other security zones or parts such as “Custom level…”

2)      2) It make DC administrator easy to control the trusted sites if their company restraint the end-user strictly on access internet because the end-user in this domain could not edit “TrustedSites” and other similar security zones after their domain using this GPO.

Disadvantages: When we configure “Site to Zone assignment list GPO” then end-users will NOT be able to add their own sites to any zone. Options to add sites on client machine will be greyed out after IE7 version. In IE6, it appears not grey and seems end-user still can add other web sites. In fact, they will find their update disappear just now after they re-enter the “Internet Properties” page.

Third method:

=============

Name: “Logon Scripts”

Steps:

1)      1) Choose a client machine with IE settings and open IE.

2)      2) Add all web sites you need set to “Trusted sites” security zone.

3)      Run “regedit” in CMD window, entering path “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains”

4)    4)  Export “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains” and “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Ranges” if you set IP trusted sites.

5)    5)  Combine them to “trustedsites.reg” files.

6)    6) Created a file named “regadd.cmd” under “SysVol” path of GPO in DC, add below content to “regadd.cmd”: reg import trustedsites.reg

Note: “SysVol” path of GPO in DC is \\DomainName\SysVol\DomainName\Policies\<GUID Of GPO>\User\Scripts\Logon

You also can find it by enter into “User Configuration | Policies | Windows Settings | Scripts | Logon | Add | Browse… ” as following picture shows:

Advantages: this is a flexible method without the disadvantages of other two methods above.

Disadvantages: Customer has to re-logon by apply the logon script and there exists risks when client machine fails to run the scripts.

Fourth method:

=============

Name: “Group Policy Preferences”

Steps:

1)    1)  Enter “User Configuration | Preferences | Windows Settings | Registry” in DC and add registry key as below picture:

2)      Run “gpupdate /force” in client machine and will get the result as following page:

Advantages: this is a more flexible method that DC administrator can consider and end-user still update their trusted sites list as they want.

Disadvantages: there are several main disadvantages:

1)   1)    This is a new feature started by Window 2008. In other words, if your DC is windows 2003, it does include this feature: http://technet.microsoft.com/en-us/library/cc731892(v=ws.10).aspx

2)   2)   Windows 2003, windows Vista and windows XP clients need install “Group Policy Preferences client Side Extensions” if they want to apply these settings from “Group Policy Preferences” of windows 2008 DC: http://www.microsoft.com/en-us/download/search.aspx?q=KB943729

3)   3)   Preference settings will: tattoo.

a.       In other words, when a GPO goes out of scope, the preference value will remain in the registry. An administrator is responsible for making sure these values are set to disable, prior to the GPO going out of scope, if the administrator wants the preference setting removed. The preference setting will not be replaced with the original application configuration value.

b.       Even remove the setting of this registry key in GPO, the value in client machine will not be removed, otherwise you still set it as another value from “Group Policy Preferences” or “delete” the one you want to remove from “Group Policy Preferences”.

Reference: http://blogs.technet.com/b/grouppolicy/archive/2008/03/04/gp-policy-vs-preference-vs-gp-preferences.aspx

How to Add Trust Sites into IE before IE10 through Group Policy

时间: 2024-11-09 09:51:16

How to Add Trust Sites into IE before IE10 through Group Policy的相关文章

add Admob with Cocos2d-x on iOS

add Admob with Cocos2d-x on iOS (2013-02-27 14:12:00) 转载▼ 标签: c=blog&q=it&by=tag" target="_blank" style="text-decoration:none; color:rgb(62,115,160); white-space:nowrap">it   1. download admob, setup your account 2. add

[转]OpenVPN官网的HOWTO

因为墙的原因,打不开.特此转一下: HOWTO Introduction OpenVPN is a full-featured SSL VPN which implements OSI layer 2 or 3 secure network extension using the industry standard SSL/TLS protocol, supports flexible client authentication methods based on certificates, sm

Windows7WithSP1/TeamFoundationServer2012update4/SQLServer2012

[Info   @09:03:33.737] ====================================================================[Info   @09:03:33.743] Team Foundation Server Administration Log[Info   @09:03:33.748] Version  : 11.0.61030.0[Info   @09:03:33.748] DateTime : 05/24/2014 17:0

修改注册表来修改IE的设置---资料汇总

转载:http://blog.csdn.net/wangqiulin123456/article/details/17068649 1. 添加删除受信任站点: /HKEY_CURRENT_USER/SoftWare/Microsoft/Windows/CurrentVersion/Internet  Settings/ZoneMap/Ranges下有一个信任站点就有一个RangeN(N为1,2,3...)的记录 2. Internet自定义级别的修改: /HKEY_CURRENT_USER/So

General-Purpose Operating System Protection Profile

1 Protection Profile Introduction ? This document defines the security functionality expected to be provided by a general-purpose operating system capable of operating in a networked environment. It also provides a set of assurance components that de

Three Steps to Migrate Group Policy Between Active Directory Domains or Forests Using PowerShell

Three Steps Ahead Have you ever wished that you had three legs? Imagine how much faster you could run.  Today we are going to look at three steps to migrating GPOs between domains or forests with PowerShell.  Now that is fast! The Problem Have you ev

Windows Error Codes

http://www.briandunning.com/error-codes/?source=Windows Windows Error Codes List All Error Codes | Search Errors: FileMaker Error Codes Lasso Error Codes MySQL Error Codes Windows System Errors About this databaseThis is a free public resource. It is

在 OS X 上使用 S/MIME 加密和签名邮件

邮件安全尤其值得关注,我已经不止一次见到过对邮件泄漏,篡改或者伪造的抱怨,比如: . 不管你是什么职业,学会使用加密邮件,并对邮件进行数字签名从而保证你的邮件不被接收者之外的人读取或恶意篡改,是每个人应该掌握的技能.这篇文章介绍了在 OS X 上使用 S/MIME 证书对你的邮件进行加密(encrypt)和数字签名(digital signing),相较于使用 GnuPG 收发加密邮件而言,使用 S/MIME 证书对邮件进行加密和签名要更加轻量级,对 GnuPG 的支持还要额外安装插件.此外,移

Juniper SSG系列防火墙ScreenOS的IPsec VPN

自己之前的手记, Route-Based Site-to-Site VPN, AutoKey IKE 2端都是固定IP的 BO1是分公司1,HO是总公司 BO1 # 定义隧道 set interface "tunnel.1" zone "Untrust" # 端口自己看着办 set interface tunnel.1 ip unnumbered interface ethernetXX/XX # 定义IP组及IP set address "Untrust