Windows OS Hub
  • Windows
    • Windows 11
    • Windows 10
    • Windows Server 2025
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
  • Microsoft
    • Active Directory (AD DS)
    • Group Policies (GPOs)
    • Exchange Server
    • Azure and Microsoft 365
    • Microsoft Office
  • Virtualization
    • VMware
    • Hyper-V
    • Proxmox
  • PowerShell
  • Linux
  • Home
  • About

Windows OS Hub

  • Windows
    • Windows 11
    • Windows 10
    • Windows Server 2025
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
  • Microsoft
    • Active Directory (AD DS)
    • Group Policies (GPOs)
    • Exchange Server
    • Azure and Microsoft 365
    • Microsoft Office
  • Virtualization
    • VMware
    • Hyper-V
    • Proxmox
  • PowerShell
  • Linux

 Windows OS Hub / Group Policies / Prevent Users from Changing Proxy Settings in Windows

February 27, 2023

Prevent Users from Changing Proxy Settings in Windows

In a previous article, we showed how to configure proxy settings in Windows via GPO. However, even non-admin users can manually change the proxy settings on their computers. In this article, we’ll look at how to prevent users from changing proxy server settings in Windows using Group Policy.

After an administrator has assigned the proxy server settings to users through the GPO, the user can change them at any time. In Windows 10 and 11, you can change proxy settings from the Settings -> Network and Internet -> Proxy (ms-settings:network-proxy).

user can change proxy settings set by gpo in windows 10

Although the proxy settings will be overwritten every 90 minutes during a Group Policy refresh cycle, sometimes you need to completely prevent domain users from changing the proxy settings that are set using the GPO.

  1. Open the domain Group Policy Management Console (gpmc.msc) and edit your GPO with proxy settings;
  2. Go to the following GPO section User Configuration -> Administrative Templates -> Windows Components -> Internet Explorer;
  3. Find the Prevent changing proxy settings and set it to Enabled;
    There is a similar policy in the Computer Configuration section. The GPO option in this section will allow you to prevent changing proxy settings for all users of the computer.
    GPO option: Prevent changing proxy settings
  4. After updating the policies on the client, the Windows proxy settings page will display the message “Some of these settings are hidden or managed by your organization”. In this case, the text fields with proxy server options will become unavailable for editing (greyed out); Some of these proxy settings are hidden or managed by your organization - Proxy Server is Greyed Out

This policy applies to all browsers that use Windows proxy settings (Google Chrome, Microsoft Edge, Internet Explorer, and Mozilla Firefox with the Use system proxy settings mode) in both Windows 10 and Windows 11.

On Windows 10/11, you can hide the proxy settings options on the Settings panel. To do this, enable the Settings Page Visibility policy in the User (or Computer) section Configuration –> Administrative Templates –> Control Panel.

To hide the proxy settings page, you need to specify the following text in the policy settings:

Hide:Network-Proxy

hide proxy setting page in windows 10 settings

Update the Administrative Group Policy templates if this option is missing from the GPO editor.

The tab with proxy settings in the Settings app will be hidden after updating the local policy settings.

hide proxy settings windows 10

You can prevent changing proxy settings using the GPO option discussed above or through the registry. You can make changes to the registry via Group Policy Preferences (User Configuration -> Preferences -> Windows Settings -> Registry). Create a new registry value under the specified GPO with the following settings:

  • Hive: HKEY_CURRENT_USER
  • Key Path: SOFTWARE\Policies\Microsoft\Internet Explorer\Control Panel
  • Value name: Proxy
  • Value type: REG_DWORD
  • Value data: 1

hide Proxy settings in Windows via registry

In order to prevent the proxy settings lock policy from being applied to local computer administrators, you need to configure Item-Level Targeting.

To do this, go to the Common tab in the registry parameter options, enable the Remove this item when it is no longer applied option. Then enable the Item-Level Targeting option and click the Targeting button. Create a new rule: New Item -> Security Group -> Item option -> Is not and specify the name of the group for which this policy should not be applied. In our example, this is the mun_admins group, which was added on computers to the local administrators’ group through the GPO.

Requiring Admin Previleges to Change Proxy Settings

You can also prevent this policy from being applied to a specific group by using GPO security filtering. Add the groups to which the GPO should not apply on the Delegation tab in the Group Policy Management Console (for example, mun_admin) and set the Deny for these groups in the Apply Group Policy permissions.

don't apply proxy gpo for admin users

Please note that a user with local admin permissions can still edit the proxy server settings directly in their registry key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings.

A non-admin user can also run the Registry Editor and change the settings in their registry key bypassing the UAC prompt.

To change the proxy server address, just edit the value of the ProxyServer registry entry. Proxy settings made in this registry key are applied in Windows immediately.

set proxy setting in windows 10 via registry bypassing GPO

2 comments
7
Facebook Twitter Google + Pinterest
Group PoliciesWindows 10Windows 11Windows Server 2019
previous post
How to Disable Automatic Driver Updates on Windows
next post
Using Out-GridView to View and Select Table Data in PowerShell

Related Reading

How to Refresh (Update) Group Policy Settings on...

August 13, 2024

Configuring Windows Firewall Rules Using Group Policy

March 15, 2024

Updating List of Trusted Root Certificates in Windows

March 11, 2024

How to Hide or Show User Accounts from...

July 24, 2024

Updating Group Policy Administrative Templates (ADMX)

January 24, 2025

Troubleshooting: Group Policy (GPO) Not Being Applied to...

March 15, 2024

How to Disable NetBIOS, LLMNR, mDNS Protocols in...

March 20, 2025

Configuring Password Policy in Active Directory Domain

March 12, 2024

2 comments

badbanana October 28, 2018 - 8:57 am

hi, does this cover IE in Windows 10 1709?

Reply
admin October 30, 2018 - 5:47 am

In Windows 1803 and 1809, these IE 11 policy settings are applied normally.

Reply

Leave a Comment Cancel Reply

join us telegram channel https://t.me/woshub
Join WindowsHub Telegram channel to get the latest updates!

Recent Posts

  • Encrypt Any Client-Server App Traffic on Windows with Stunnel

    June 12, 2025
  • Failed to Open the Group Policy Object on a Computer

    June 2, 2025
  • Remote Desktop Printing with RD Easy Print Redirection

    June 2, 2025
  • Disable the Lock Screen Widgets in Windows 11

    May 26, 2025
  • Configuring Windows Protected Print Mode (WPP)

    May 19, 2025
  • Map a Network Drive over SSH (SSHFS) in Windows

    May 13, 2025
  • Configure NTP Time Source for Active Directory Domain

    May 6, 2025
  • Cannot Install Network Adapter Drivers on Windows Server

    April 29, 2025
  • Change BIOS from Legacy to UEFI without Reinstalling Windows

    April 21, 2025
  • How to Prefer IPv4 over IPv6 in Windows Networks

    April 9, 2025

Follow us

  • Facebook
  • Twitter
  • Telegram
Popular Posts
  • Updating List of Trusted Root Certificates in Windows
  • Configure Google Chrome Settings with Group Policy
  • Configuring FSLogix Profile Containers on Windows Server RDS
  • How to Find the Source of Account Lockouts in Active Directory
  • How to Disable or Enable USB Drives in Windows using Group Policy
  • How to Hide or Show User Accounts from Login Screen on Windows
  • Changing Default File Associations in Windows 10 and 11
Footer Logo

@2014 - 2024 - Windows OS Hub. All about operating systems for sysadmins


Back To Top