Allow video and animation on a webpage that uses an older media player

This policy setting allows the playing of video and animation through older media players in specified zones. Video and animation playback through the object tag may still be allowed because this involves external controls or media players. The dynsrc attribute on the img tag specifies an older media player. Also as of Internet Explorer 8 this policy setting controls HTML+TIME media elements that refer to audio and video files. If you enable this policy setting video and animation can be played through older media players in specified zones. If you disable this policy setting video and animation cannot be played through older media players. If you do not configure this policy setting video and animation can be played through older media players in specified zones.

Allow scriptlets

This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting the user can run scriptlets. If you disable this policy setting the user cannot run scriptlets. If you do not configure this policy setting the user can enable or disable scriptlets.

Turn off first-run prompt

This policy setting controls the first-run response that the user sees on a zone-by-zone basis. When the user encounters a new control that has not previously run in Internet Explorer he or she may be prompted to approve the control. This policy setting determines whether the user is prompted. If you enable this policy setting the first-run prompt is turned off in the corresponding zone. If you disable this policy setting the first-run prompt is turned on in the corresponding zone. If you do not configure this policy setting the first-run prompt is turned off by default.

Include local path when user is uploading files to a server

This policy setting controls whether or not local path information is sent when the user is uploading a file via an HTML form. If the local path information is sent some information may be unintentionally revealed to the server. For instance files sent from the user’s desktop may contain the user name as a part of the path. If you enable this policy setting path information is sent when the user is uploading a file via an HTML form. If you disable this policy setting path information is removed when the user is uploading a file via an HTML form. If you do not configure this policy setting the user can choose whether path information is sent when he or she is uploading a file via an HTML form. By default path information is sent.

Turn on Cross-Site Scripting Filter

This policy controls whether or not the Cross-Site Scripting (XSS) Filter will detect and prevent cross-site script injections into websites in this zone. If you enable this policy setting the XSS Filter is turned on for sites in this zone and the XSS Filter attempts to block cross-site script injections. If you disable this policy setting the XSS Filter is turned off for sites in this zone and Internet Explorer permits cross-site script injections.

Turn on Cross-Site Scripting Filter

This policy controls whether or not the Cross-Site Scripting (XSS) Filter will detect and prevent cross-site script injections into websites in this zone. If you enable this policy setting the XSS Filter is turned on for sites in this zone and the XSS Filter attempts to block cross-site script injections. If you disable this policy setting the XSS Filter is turned off for sites in this zone and Internet Explorer permits cross-site script injections.

Turn on Cross-Site Scripting Filter

This policy controls whether or not the Cross-Site Scripting (XSS) Filter will detect and prevent cross-site script injections into websites in this zone. If you enable this policy setting the XSS Filter is turned on for sites in this zone and the XSS Filter attempts to block cross-site script injections. If you disable this policy setting the XSS Filter is turned off for sites in this zone and Internet Explorer permits cross-site script injections.

Run . NET Framework-reliant components not signed with Authenticode

This policy setting allows you to manage whether . NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box Internet Explorer will prompt the user to determine whether to execute unsigned managed components. If you disable this policy setting Internet Explorer will not execute unsigned managed components. If you do not configure this policy setting Internet Explorer will execute unsigned managed components.

Userdata persistence

This policy setting allows you to manage the preservation of information in the browser’s history in favorites in an XML store or directly within a Web page saved to disk. When a user returns to a persisted page the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting users can preserve information in the browser’s history in favorites in an XML store or directly within a Web page saved to disk. If you disable this policy setting users cannot preserve information in the browser’s history in favorites in an XML store or directly within a Web page saved to disk. If you do not configure this policy setting users can preserve information in the browser’s history in favorites in an XML store or directly within a Web page saved to disk.

Allow script-initiated windows without size or position constraints

This policy setting allows you to manage restrictions on script-initiated pop-up windows and windows that include the title and status bars. If you enable this policy setting Windows Restrictions security will not apply in this zone. The security zone runs without the added layer of security provided by this feature. If you disable this policy setting the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process. If you do not configure this policy setting the possible harmful actions contained in script-initiated pop-up windows and windows that include the title and status bars cannot be run. This Internet Explorer security feature will be on in this zone as dictated by the Scripted Windows Security Restrictions feature control setting for the process.