Tag: Computer Configuration
Process List
This policy setting allows you to manage whether the listed processes respect add-on management user preferences (as entered into Add-on Manager) or policy settings. By default only Internet Explorer processes use the add-on management user preferences and policy settings. This policy setting allows you to extend support for these user preferences and policy settings to specific processes listed in the process list. If you enable this policy setting and enter a Value of 1 the process entered will respect the add-on management user preferences and policy settings. If you enter a Value of 0 the add-on management user preferences and policy settings are ignored by the specified process. The Value Name is the name of the executable. If a Value Name is empty or the Value is not 0 or 1 the policy setting is ignored. Do not enter Internet Explorer processes in this list because these processes always respect add-on management user preferences and policy settings. If the All Processes policy setting is enabled the processes configured in this policy setting take precedence over that setting. If you do not configure this policy processes other than the Internet Explorer processes will not be affected by add-on management user preferences or policy settings (unless “All Processes” is enabled).
All Processes
Internet Explorer contains dynamic binary behaviors: components that encapsulate specific functionality for the HTML elements to which they are attached. This policy setting controls whether the Binary Behavior Security Restriction setting is prevented or allowed. If you enable this policy setting binary behaviors are prevented for all processes. Any use of binary behaviors for HTML rendering is blocked. If you disable or do not configure this policy setting binary behaviors are allowed for all processes.
Admin-approved behaviors
For each zone the Binary and Scripted Behavior security restrictions may be configured to allow only a list of admin-approved behaviors. This list may be configured here and applies to all processes which have opted in to the behavior and to all zones. (Behaviors are components that encapsulate specific functionality or behavior on a page. )If you enable this policy setting this sets the list of behaviors permitted in each zone for which Script and Binary Behaviors is set to ‘admin-approved’. Behaviors must be entered in #package#behavior notation e. g. #default#vml. If you disable this policy setting no behaviors will be allowed in zones set to ‘admin-approved’ just as if those zones were set to ‘disable’. If you do not configure this policy setting only VML will be allowed in zones set to ‘admin-approved’. Note. If this policy is set in both Computer Configuration and User Configuration both lists of behaviors will be allowed as appropriate.
Internet Explorer Processes
Internet Explorer contains dynamic binary behaviors: components that encapsulate specific functionality for the HTML elements to which they are attached. This policy setting controls whether the Binary Behavior Security Restriction setting is prevented or allowed. If you enable this policy setting binary behaviors are prevented for the File Explorer and Internet Explorer processes. If you disable this policy setting binary behaviors are allowed for the File Explorer and Internet Explorer processes. If you do not configure this policy setting binary behaviors are prevented for the File Explorer and Internet Explorer processes.
Prevent specifying cipher strength update information URLs
This policy setting prevents the user from specifying a URL that contains update information about cipher strength. When the user logs on to a secure page the page cannot grant access unless the Internet browser connects with a prespecified encryption. To ensure that the browser meets this requirement this policy setting allows you to specify the URL to update the browser security setting. If you enable this policy setting the user cannot specify the cipher strength update information URL. You must specify the cipher strength update information URL. If you disable or do not configure this policy setting the user can specify the cipher strength update information URL.
Add-on List
This policy setting allows you to manage a list of add-ons to be allowed or denied by Internet Explorer. Add-ons in this case are controls like ActiveX Controls Toolbars and Browser Helper Objects (BHOs) which are specifically written to extend or enhance the functionality of the browser or web pages. This list can be used with the ‘Deny all add-ons unless specifically allowed in the Add-on List’ policy setting which defines whether add-ons not listed here are assumed to be denied. If you enable this policy setting you can enter a list of add-ons to be allowed or denied by Internet Explorer. For each entry that you add to the list enter the following information:Name of the Value – the CLSID (class identifier) for the add-on you wish to add to the list. The CLSID should be in brackets for example ‘{000000000-0000-0000-0000-0000000000000}’. The CLSID for an add-on can be obtained by reading the OBJECT tag from a Web page on which the add-on is referenced. Value – A number indicating whether Internet Explorer should deny or allow the add-on to be loaded. To specify that an add-on should be denied enter a 0 (zero) into this field. To specify that an add-on should be allowed enter a 1 (one) into this field. To specify that an add-on should be allowed and also permit the user to manage the add-on through Add-on Manager enter a 2 (two) into this field. If you disable this policy setting the list is deleted. The ‘Deny all add-ons unless specifically allowed in the Add-on List’ policy setting will still determine whether add-ons not in this list are assumed to be denied.
Use UTF-8 for mailto links
This policy setting allows you to manage whether Internet Explorer uses 8-bit Unicode Transformation Format (UTF-8) for mailto links. If you enable this policy setting Internet Explorer encodes mailto links in UTF-8. If you disable or do not configure this policy setting Internet Explorer sends mailto links encoded through the user’s code page. This behavior matches the behavior of Internet Explorer 6 and earlier. The user can change this behavior on the Internet Explorer Tools menu: Click Internet Options click the Advanced tab and then under International select the “Use UTF-8 for mailto links” check box.
Prevent ignoring certificate errors
This policy setting prevents the user from ignoring Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificate errors that interrupt browsing (such as “expired” “revoked” or “name mismatch” errors) in Internet Explorer. If you enable this policy setting the user cannot continue browsing. If you disable or do not configure this policy setting the user can choose to ignore certificate errors and continue browsing.
Disable the Programs page
Removes the Programs tab from the interface in the Internet Options dialog box. If you enable this policy users are prevented from seeing and changing default settings for Internet programs. If you disable this policy or do not configure it users can see and change these settings. When you set this policy you do not need to set the following policies for the Programs tab because this policy removes the Programs tab from the interface:”Disable changing Messaging settings””Disable changing Calendar and Contact settings””Disable the Reset Web Settings feature””Disable changing default browser check”
Disable the Security page
Removes the Security tab from the interface in the Internet Options dialog box. If you enable this policy it prevents users from seeing and changing settings for security zones such as scripting downloads and user authentication. If you disable this policy or do not configure it users can see and change these settings. When you set this policy you do not need to set the following Internet Explorer policies because this policy removes the Security tab from the interface:”Security zones: Do not allow users to change policies””Security zones: Do not allow users to add/delete sites”