Tag: Computer Configuration
Allow cut copy or paste operations from the clipboard via script
This policy setting allows you to manage whether scripts can perform a clipboard operation (for example cut copy and paste) in a specified region. If you enable this policy setting a script can perform a clipboard operation. If you select Prompt in the drop-down box users are queried as to whether to perform clipboard operations. If you disable this policy setting a script cannot perform a clipboard operation. If you do not configure this policy setting a script cannot perform a clipboard operation.
Allow loading of XAML Browser Applications
This policy setting allows you to manage the loading of XAML Browser Applications (XBAPs). These are browser-hosted ClickOnce-deployed applications built via WinFX. These applications run in a security sandbox and take advantage of the Windows Presentation Foundation platform for the web. If you enable this policy setting and set the drop-down box to Enable XBAPs are automatically loaded inside Internet Explorer. The user cannot change this behavior. If you set the drop-down box to Prompt the user is prompted for loading XBAPs. If you disable this policy setting XBAPs are not loaded inside Internet Explorer. The user cannot change this behavior. If you do not configure this policy setting the user can decide whether to load XBAPs inside Internet Explorer.
Allow scripting of Internet Explorer WebBrowser controls
This policy setting determines whether a page can control embedded WebBrowser controls via script. If you enable this policy setting script access to the WebBrowser control is allowed. If you disable this policy setting script access to the WebBrowser control is not allowed. If you do not configure this policy setting the user can enable or disable script access to the WebBrowser control. By default script access to the WebBrowser control is allowed only in the Local Machine and Intranet zones.
Turn off . NET Framework Setup
This policy setting prevents the user’s computer from starting Microsoft . NET Framework Setup when the user is browsing to . NET Framework content in Internet Explorer. The . NET Framework is the next-generation platform for Windows. It uses the common language runtime and incorporates support from multiple developer tools. It includes the new managed code APIs for Windows. If you enable this policy setting . NET Framework Setup is turned off. The user cannot change this behavior. If you disable this policy setting . NET Framework Setup is turned on. The user cannot change this behavior. If you do not configure this policy setting . NET Framework Setup is turned on by default. The user can change this behavior.
Allow loading of XAML files
This policy setting allows you to manage the loading of Extensible Application Markup Language (XAML) files. XAML is an XML-based declarative markup language commonly used for creating rich user interfaces and graphics that take advantage of the Windows Presentation Foundation. If you enable this policy setting and set the drop-down box to Enable XAML files are automatically loaded inside Internet Explorer. The user cannot change this behavior. If you set the drop-down box to Prompt the user is prompted for loading XAML files. If you disable this policy setting XAML files are not loaded inside Internet Explorer. The user cannot change this behavior. If you do not configure this policy setting the user can decide whether to load XAML files inside Internet Explorer.
Allow loading of XPS files
This policy setting allows you to manage the loading of XPS files. These files contain a fixed-layout representation of paginated content and are portable across platforms devices and applications. If you enable this policy setting and set the drop-down box to Enable XPS files are automatically loaded inside Internet Explorer. The user cannot change this behavior. If you set the drop-down box to Prompt the user is prompted for loading XPS files. If you disable this policy setting XPS files are not loaded inside Internet Explorer. The user cannot change this behavior. If you do not configure this policy setting the user can decide whether to load XPS files inside Internet Explorer.
Include local path when user is uploading files to a server
This policy setting controls whether or not local path information is sent when the user is uploading a file via an HTML form. If the local path information is sent some information may be unintentionally revealed to the server. For instance files sent from the user’s desktop may contain the user name as a part of the path. If you enable this policy setting path information is sent when the user is uploading a file via an HTML form. If you disable this policy setting path information is removed when the user is uploading a file via an HTML form. If you do not configure this policy setting the user can choose whether path information is sent when he or she is uploading a file via an HTML form. By default path information is sent.
Turn on SmartScreen Filter scan
This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting SmartScreen Filter scans pages in this zone for malicious content. If you disable this policy setting SmartScreen Filter does not scan pages in this zone for malicious content. If you do not configure this policy setting the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. Note: In Internet Explorer 7 this policy setting controls whether Phishing Filter scans pages in this zone for malicious content.
Show security warning for potentially unsafe files
This policy setting controls whether or not the “Open File – Security Warning” message appears when the user tries to open executable files or other potentially unsafe files (from an intranet file share by using File Explorer for example). If you enable this policy setting and set the drop-down box to Enable these files open without a security warning. If you set the drop-down box to Prompt a security warning appears before the files open. If you disable this policy setting these files do not open. If you do not configure this policy setting the user can configure how the computer handles these files. By default these files are blocked in the Restricted zone enabled in the Intranet and Local Computer zones and set to prompt in the Internet and Trusted zones.
Allow websites to prompt for information by using scripted windows
This policy setting determines whether scripted windows are automatically displayed. If you enable this policy setting scripted windows are displayed. If you disable this policy setting the user must choose to display any scripted windows by using the Notification bar. If you do not configure this policy setting the user can enable or disable the Notification bar behavior.