Configuring Internet Restrictions with Internet Communications Management with Group Policy
Configuring Internet Restrictions with Internet Communications Management with Group Policy
Within Group Policy an administrator can restrict what traffic is allowed to access the Internet from within the corporate network. These restrictions can be configured at both the computer and user nodes in Group Policy. These setting are located for the computer at Computer Configuration\Policies\Administrative Templates\System\Internet Communications Management (See Figure 1) and User Configuration\Policies\Administrative Templates\System\Internet Communications Management (See Figure 2).
Figure 1.
Figure 2.
Within either configuration you enable Restrict Internet communications you will restrict all Internet Communication within the Internet Communication setting node.
If you desire to control Internet communications individually you can use the Internet Communication setting node (Shown below) to configure each.
Computer configuration
User configuration
Before configuring restrictions to specific Internet based traffic thoroughly test to ensure the desire traffic is being restricted and allowed traffic is not being restricted.
As you can see there numerous setting to basically control all communications between corporate computers and the Internet.
For more information and an explanation of each setting go to Group Policy Settings Listed Under the Internet Communication Management Category in Windows 7 and Windows Server 2008 R2
Why Does My Network Icon Have an Exclamation Mark?
How to Disable Network Connectivity Status Indicator (NCSI) with Group Policy
Configuring Network Connectivity Status Indicator (NCSI) with Group Policy
Until next time – Ride Safe!
Rick Trader
Windows Server Instructor – Interface Technical Training
Phoenix, AZ
You May Also Like
A Simple Introduction to Cisco CML2
0 3850 0Mark Jacob, Cisco Instructor, presents an introduction to Cisco Modeling Labs 2.0 or CML2.0, an upgrade to Cisco’s VIRL Personal Edition. Mark demonstrates Terminal Emulator access to console, as well as console access from within the CML2.0 product. Hello, I’m Mark Jacob, a Cisco Instructor and Network Instructor at Interface Technical Training. I’ve been using … Continue reading A Simple Introduction to Cisco CML2
Cable Testers and How to Use them in Network Environments
0 713 1This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader demonstrates how to use cable testers in network environments. Let’s look at some tools that we can use to test our different cables in our environment. Cable Testers Properly Wired Connectivity … Continue reading Cable Testers and How to Use them in Network Environments
Government Edition – Encrypting a USB Flash Drive in Windows 10
0 271 2In this video, Security Instructor Mike Danseglio demonstrates how to use BitLocker in Window 10 to secure files on a USB Flash drive that adhere to stricter data protection requirements as found inside Government entities. BitLocker 2-day instructor-led training is now available at Interface: BITLOCK: Planning and Deploying BitLocker Drive Encryption Training Video Transcription: Hi. … Continue reading Government Edition – Encrypting a USB Flash Drive in Windows 10
Pingback: Why Does My Network Icon Have an Exclamation Mark?