Use Pop-up Blocker

This policy setting allows you to manage whether unwanted pop-up windows appear. Pop-up windows that are opened when the end user clicks a link are not blocked. If you enable this policy setting most unwanted pop-up windows are prevented from appearing. If you disable this policy setting pop-up windows are not prevented from appearing. If you do not configure this policy setting pop-up windows are not prevented from appearing.

Display mixed content

This policy setting allows you to manage whether users can display nonsecure items and manage whether users receive a security information message to display pages containing both secure and nonsecure items. If you enable this policy setting and the drop-down box is set to Enable the user does not receive a security information message (This page contains both secure and nonsecure items. Do you want to display the nonsecure items?) and nonsecure content can be displayed. If the drop-down box is set to Prompt the user will receive the security information message on the Web pages that contain both secure (https://) and nonsecure (http://) content. If you disable this policy setting users cannot receive the security information message and nonsecure content cannot be displayed. If you do not configure this policy setting the user will receive the security information message on the Web pages that contain both secure (https://) and nonsecure (http://) content.

Turn off . NET Framework Setup

This policy setting prevents the user’s computer from starting Microsoft . NET Framework Setup when the user is browsing to . NET Framework content in Internet Explorer. The . NET Framework is the next-generation platform for Windows. It uses the common language runtime and incorporates support from multiple developer tools. It includes the new managed code APIs for Windows. If you enable this policy setting . NET Framework Setup is turned off. The user cannot change this behavior. If you disable this policy setting . NET Framework Setup is turned on. The user cannot change this behavior. If you do not configure this policy setting . NET Framework Setup is turned on by default. The user can change this behavior.

Allow scripting of Internet Explorer WebBrowser controls

This policy setting determines whether a page can control embedded WebBrowser controls via script. If you enable this policy setting script access to the WebBrowser control is allowed. If you disable this policy setting script access to the WebBrowser control is not allowed. If you do not configure this policy setting the user can enable or disable script access to the WebBrowser control. By default script access to the WebBrowser control is allowed only in the Local Machine and Intranet zones.

Allow loading of XAML files

This policy setting allows you to manage the loading of Extensible Application Markup Language (XAML) files. XAML is an XML-based declarative markup language commonly used for creating rich user interfaces and graphics that take advantage of the Windows Presentation Foundation. If you enable this policy setting and set the drop-down box to Enable XAML files are automatically loaded inside Internet Explorer. The user cannot change this behavior. If you set the drop-down box to Prompt the user is prompted for loading XAML files. If you disable this policy setting XAML files are not loaded inside Internet Explorer. The user cannot change this behavior. If you do not configure this policy setting the user can decide whether to load XAML files inside Internet Explorer.

Allow loading of XPS files

This policy setting allows you to manage the loading of XPS files. These files contain a fixed-layout representation of paginated content and are portable across platforms devices and applications. If you enable this policy setting and set the drop-down box to Enable XPS files are automatically loaded inside Internet Explorer. The user cannot change this behavior. If you set the drop-down box to Prompt the user is prompted for loading XPS files. If you disable this policy setting XPS files are not loaded inside Internet Explorer. The user cannot change this behavior. If you do not configure this policy setting the user can decide whether to load XPS files inside Internet Explorer.

Access data sources across domains

This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. If you disable this policy setting users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you do not configure this policy setting users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone.

Allow active scripting

This policy setting allows you to manage whether script code on pages in the zone is run. If you enable this policy setting script code on pages in the zone can run automatically. If you select Prompt in the drop-down box users are queried to choose whether to allow script code on pages in the zone to run. If you disable this policy setting script code on pages in the zone is prevented from running. If you do not configure this policy setting script code on pages in the zone can run automatically.

Turn on SmartScreen Filter scan

This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting SmartScreen Filter scans pages in this zone for malicious content. If you disable this policy setting SmartScreen Filter does not scan pages in this zone for malicious content. If you do not configure this policy setting the user can choose whether SmartScreen Filter scans pages in this zone for malicious content. Note: In Internet Explorer 7 this policy setting controls whether Phishing Filter scans pages in this zone for malicious content.