Hi all
It's much better to do this at your proxy or firewall. Policy doesn't
really lend itself to this goal. While an ipsec policy or pointing the
proxy to the loopback address will work, it makes things tricky as Andy
suggests.
I've seen attempts to prevent internet access by adding Internet Explorer to
the disallowed programs list in policy. This is problematic however because
of the shell integration and users can get to web sites via Windows
Explorer.
My first suggestion would be to lock this down at the firewall or proxy. If
you can't do this, a combination of ipsec policy, loopback as the proxy
address and disallowing Internet Explorer from running would be an approach.
Kind regards
--
Mark Renoden [MSFT]
Windows Platform Support Team
Email: (e-mail address removed)
Please note you'll need to strip ".online" from my email address to email
me; I'll post a response back to the group.
This posting is provided "AS IS" with no warranties, and confers no rights.