Active Directory

Controlling IE cache size via GPO

I have seen this question several times at different message boards, so I’ve decided to write something on it.

The built-in GPO settings do not provide a method for controlling the size of the “Temporary Internet Files”, hence the users (if no restriction on the user profile size exist) can quickly fill up the disk space on their computers. The problem becomes more serious with Terminal Services – user profiles start growing and chewing up the disk space on the server.

Follow the steps outlined in the Adding New Administrative Templates to a GPO article on general instructions on how to add or remove an .ADM file from the Administrative Templates section in GPO.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

Note: As with many custom Administrative Templates, you will need to remove the requirement to show policy settings that can be fully managed in the GPO editor. Follow the above link for instructions on how to do that.

Next, go to User Configuration > Administrative Templates > Windows Components > Internet Explorer Cache and configure the cache size.

Needless to say, as with any GPO setting, this option will only work on Windows 2000 operating systems and higher, and requires you to have an Active Directory in place.

Grab it from HERE (1kb)

Related articles

You may find these related articles of interest to you:

Links

Guy’s Windowmaker’s Blog

Related Topics:

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: