Help‎ > ‎Windows‎ > ‎

Create Security Zones GPO

[THIS DOCUMENT IS PART OF A LARGE WINDOWS SECURITY TUTORIAL]

A critical group policy in any implementation is one that sets the security zones.

On the workstation

Lauch the Group Policy Management tool

(Right click) Group Policy Objects -> New

Set the name: Sec Zones

(Right Click) Sec Zones -> GPO Status -> User Configuration Disabled
                 -Then-
(Right Click) Sec Zones -> Edit


Now that you are are Editing the "Sec Zones" GPO
Go to:
Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Internet Explorer -> Internet Control Panel -> Security Page

(Right CLick) "Site to Zone Assignment List" -> Edit

Enabled
Click on "Show..."

Values: 
1-Intranet
2-Trusted
3-Internet
4-Restricted

Add your zones!


done.


All rights reserved. No part of this work may be reproduced or transmitted, including copying, or other 
methods of transmission without the prior written permission of the author.

THIS DOCUMENT IS THE PERSONAL VIEWPOINT OF THE AUTHOR AND IS GIVEN AS SUCH.  THERE 
IS NO WARRANTY FOR THE INFORMATION CONTAINED IN THIS MANUAL TO THE EXTENT 
PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE 
COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THIS INFORMATION “AS IS” WITHOUT 
WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE 
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE 
ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE INFORMATION IS WITH YOU. 
SHOULD THIS INFORMATION PROVE INCORRECT OR BAD PRACTICE, YOU ASSUME THE COST OF 
DAMAGES AND ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY 
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THIS 
INFORMATION AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY 
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR 
INABILITY TO USE THIS INFORMATION (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA 
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE 
OF THE PROCESS DESCRIBED TO FUNCTION WITH ANY OTHER PROGRAMS), EVEN IF SUCH 
HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Comments