Turn on compatibility logging

This policy setting logs information that is blocked by new features in Internet Explorer. The logged compatibility information is displayed in the Windows Event Viewer. If you enable this policy setting the user can log information that is blocked by new Internet Explorer features. The user cannot turn off logging. If you disable this policy setting the user cannot log information that is blocked by new Internet Explorer features. The user cannot turn on logging. If you do not configure this policy setting the user can change the logging settings.

Prevent changing pop-up filter level

This policy setting prevents the user from changing the level of pop-up filtering. The available levels are as follows: High: Block all pop-ups. Medium: Block most automatic pop-ups. Low: Allow pop-ups from secure sites. If you enable this policy setting the user cannot change the filter level. You can specify the filter level by importing Privacy settings from your computer under Internet Explorer Maintenance. If you disable or do not configure this policy setting the user can manage pop-ups by changing the filter level. You may also want to enable the “Prevent managing pop-up exception list” and “Turn off pop-up management” policy settings to prevent the user from configuring pop-up behavior.

Turn off the Security Settings Check feature

This policy setting turns off the Security Settings Check feature which checks Internet Explorer security settings to determine when the settings put Internet Explorer at risk. If you enable this policy setting the feature is turned off. If you disable or do not configure this policy setting the feature is turned on.

Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet

This policy setting determines whether the user can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the user about executable files that Internet Explorer users do not commonly download from the Internet. If you enable this policy setting SmartScreen Filter warnings block the user. If you disable or do not configure this policy setting the user can bypass SmartScreen Filter warnings.

Prevent bypassing SmartScreen Filter warnings

This policy setting determines whether the user can bypass warnings from SmartScreen Filter. SmartScreen Filter prevents the user from browsing to or downloading from sites that are known to host malicious content. SmartScreen Filter also prevents the execution of files that are known to be malicious. If you enable this policy setting SmartScreen Filter warnings block the user. If you disable or do not configure this policy setting the user can bypass SmartScreen Filter warnings.

Turn off Managing SmartScreen Filter for Internet Explorer 8

This policy setting allows the user to enable the SmartScreen Filter which warns the user if the website being visited is known for fraudulent attempts to gather personal information through “phishing” or is known to host malware. If you enable this policy setting the user is not prompted to turn on SmartScreen Filter. You must specify which mode the SmartScreen Filter uses: on or off. All website addresses that are not on the filter’s allow list are sent automatically to Microsoft without prompting the user. If you disable or do not configure this policy setting the user is prompted to decide whether to turn on the SmartScreen Filter during the first-run experience.

Prevent managing the phishing filter

This policy setting prevents the user from managing a filter that warns the user if the website being visited is known for fraudulent attempts to gather personal information through “phishing. “If you enable this policy setting the user is not prompted to enable the phishing filter. You must specify which mode the phishing filter uses: manual automatic or off. If you select manual mode the phishing filter performs only local analysis and the user is prompted to permit any data to be sent to Microsoft. If the feature is fully enabled all website addresses that are not on the filter’s allow list are sent automatically to Microsoft without prompting the user. If you disable or do not configure this policy setting the user is prompted to decide the mode of operation for the phishing filter.

Prevent managing SmartScreen Filter

This policy setting prevents the user from managing SmartScreen Filter which warns the user if the website being visited is known for fraudulent attempts to gather personal information through “phishing” or is known to host malware. If you enable this policy setting the user is not prompted to turn on SmartScreen Filter. All website addresses that are not on the filter’s allow list are sent automatically to Microsoft without prompting the user. If you disable or do not configure this policy setting the user is prompted to decide whether to turn on SmartScreen Filter during the first-run experience.

Prevent “Fix settings” functionality

This policy setting prevents the user from using the “Fix settings” functionality related to Security Settings Check. If you enable this policy setting the user cannot use the “Fix settings” functionality. If you disable or do not configure this policy setting the user can use the “Fix settings” functionality. Note: When this policy setting is enabled the “Fix settings” command on the Notification bar shortcut menu should be disabled.

Turn on menu bar by default

This policy setting allows you to turn on or turn off the earlier menus (for example File Edit and View) in Internet Explorer. If you enable this policy setting the menu bar appears in Internet Explorer by default and the user cannot turn it off. If you disable this policy setting the menu bar appears in Internet Explorer by default and the user cannot turn it on. If you do not configure this policy setting the menu bar is turned off by default. The user can turn on or turn off the menu bar.