Use Pop-up Blocker

This policy setting allows you to manage whether unwanted pop-up windows appear. Pop-up windows that are opened when the end user clicks a link are not blocked. If you enable this policy setting most unwanted pop-up windows are prevented from appearing. If you disable this policy setting pop-up windows are not prevented from appearing. If you do not configure this policy setting pop-up windows are not prevented from appearing.

Display mixed content

This policy setting allows you to manage whether users can display nonsecure items and manage whether users receive a security information message to display pages containing both secure and nonsecure items. If you enable this policy setting and the drop-down box is set to Enable the user does not receive a security information message (This page contains both secure and nonsecure items. Do you want to display the nonsecure items?) and nonsecure content can be displayed. If the drop-down box is set to Prompt the user will receive the security information message on the Web pages that contain both secure (https://) and nonsecure (http://) content. If you disable this policy setting users cannot receive the security information message and nonsecure content cannot be displayed. If you do not configure this policy setting the user will receive the security information message on the Web pages that contain both secure (https://) and nonsecure (http://) content.

Show security warning for potentially unsafe files

This policy setting controls whether or not the “Open File – Security Warning” message appears when the user tries to open executable files or other potentially unsafe files (from an intranet file share by using File Explorer for example). If you enable this policy setting and set the drop-down box to Enable these files open without a security warning. If you set the drop-down box to Prompt a security warning appears before the files open. If you disable this policy setting these files do not open. If you do not configure this policy setting the user can configure how the computer handles these files. By default these files are blocked in the Restricted zone enabled in the Intranet and Local Computer zones and set to prompt in the Internet and Trusted zones.

Allow updates to status bar via script

This policy setting allows you to manage whether script is allowed to update the status bar within the zone. If you enable this policy setting script is allowed to update the status bar. If you disable or do not configure this policy setting script is not allowed to update the status bar.

Turn on Protected Mode

This policy setting allows you to turn on Protected Mode. Protected Mode helps protect Internet Explorer from exploited vulnerabilities by reducing the locations that Internet Explorer can write to in the registry and the file system. If you enable this policy setting Protected Mode is turned on. The user cannot turn off Protected Mode. If you disable this policy setting Protected Mode is turned off. The user cannot turn on Protected Mode. If you do not configure this policy setting the user can turn on or turn off Protected Mode.

Turn off . NET Framework Setup

This policy setting prevents the user’s computer from starting Microsoft . NET Framework Setup when the user is browsing to . NET Framework content in Internet Explorer. The . NET Framework is the next-generation platform for Windows. It uses the common language runtime and incorporates support from multiple developer tools. It includes the new managed code APIs for Windows. If you enable this policy setting . NET Framework Setup is turned off. The user cannot change this behavior. If you disable this policy setting . NET Framework Setup is turned on. The user cannot change this behavior. If you do not configure this policy setting . NET Framework Setup is turned on by default. The user can change this behavior.

Allow loading of XAML Browser Applications

This policy setting allows you to manage the loading of XAML Browser Applications (XBAPs). These are browser-hosted ClickOnce-deployed applications built via WinFX. These applications run in a security sandbox and take advantage of the Windows Presentation Foundation platform for the web. If you enable this policy setting and set the drop-down box to Enable XBAPs are automatically loaded inside Internet Explorer. The user cannot change this behavior. If you set the drop-down box to Prompt the user is prompted for loading XBAPs. If you disable this policy setting XBAPs are not loaded inside Internet Explorer. The user cannot change this behavior. If you do not configure this policy setting the user can decide whether to load XBAPs inside Internet Explorer.

Allow scripting of Internet Explorer WebBrowser controls

This policy setting determines whether a page can control embedded WebBrowser controls via script. If you enable this policy setting script access to the WebBrowser control is allowed. If you disable this policy setting script access to the WebBrowser control is not allowed. If you do not configure this policy setting the user can enable or disable script access to the WebBrowser control. By default script access to the WebBrowser control is allowed only in the Local Machine and Intranet zones.

Allow loading of XAML files

This policy setting allows you to manage the loading of Extensible Application Markup Language (XAML) files. XAML is an XML-based declarative markup language commonly used for creating rich user interfaces and graphics that take advantage of the Windows Presentation Foundation. If you enable this policy setting and set the drop-down box to Enable XAML files are automatically loaded inside Internet Explorer. The user cannot change this behavior. If you set the drop-down box to Prompt the user is prompted for loading XAML files. If you disable this policy setting XAML files are not loaded inside Internet Explorer. The user cannot change this behavior. If you do not configure this policy setting the user can decide whether to load XAML files inside Internet Explorer.