This discovers the Proxies and establishes the possibility for the presence of the proxy servers based on the presence of a registry key entry.