Category: At least Internet Explorer 6.0 in Windows XP with Service Pack 2 or Windows Server 2003 with Service Pack 1
Pop-up allow list
This policy setting allows you to specify a list of web sites that will be allowed to open pop-up windows regardless of the Internet Explorer process’s Pop-Up Blocker settings. If you enable this policy setting you can enter a list of sites which will be allowed to open pop-up windows regardless of user settings. Only the domain name is allowed so www. contoso. com is valid but not http://www. contoso. com. Wildcards are allowed so *. contoso. com is also valid. If you disable this or do not configure this policy setting you will not be able to provide a default Pop-up Blocker exception list. Note: You can disable users from adding or removing websites to the exception list by enabling “Turn off Managing Pop-up Allow list” policy.
Pop-up allow list
This policy setting allows you to specify a list of web sites that will be allowed to open pop-up windows regardless of the Internet Explorer process’s Pop-Up Blocker settings. If you enable this policy setting you can enter a list of sites which will be allowed to open pop-up windows regardless of user settings. Only the domain name is allowed so www. contoso. com is valid but not http://www. contoso. com. Wildcards are allowed so *. contoso. com is also valid. If you disable this or do not configure this policy setting you will not be able to provide a default Pop-up Blocker exception list. Note: You can disable users from adding or removing websites to the exception list by enabling “Turn off Managing Pop-up Allow list” policy.
Do not allow users to enable or disable add-ons
This policy setting allows you to manage whether users have the ability to allow or deny add-ons through Add-On Manager. If you enable this policy setting users cannot enable or disable add-ons through Add-On Manager. The only exception occurs if an add-on has been specifically entered into the ‘Add-On List’ policy setting in such a way as to allow users to continue to manage the add-on. In this case the user can still manage the add-on through the Add-On Manager. If you disable or do not configure this policy setting the appropriate controls in the Add-On Manager will be available to the user.
Do not allow users to enable or disable add-ons
This policy setting allows you to manage whether users have the ability to allow or deny add-ons through Add-On Manager. If you enable this policy setting users cannot enable or disable add-ons through Add-On Manager. The only exception occurs if an add-on has been specifically entered into the ‘Add-On List’ policy setting in such a way as to allow users to continue to manage the add-on. In this case the user can still manage the add-on through the Add-On Manager. If you disable or do not configure this policy setting the appropriate controls in the Add-On Manager will be available to the user.
Trusted Sites Zone Restricted Protocols
For each zone the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through restricted protocols from running in an unsafe manner either by prompting the user or simply disabling the content. For each zone this list of protocols may be configured here and applies to all processes which have opted in to the security restriction. If you enable this policy setting for a zone this sets the list of protocols to be restricted if that zone is set to Prompt or Disable for “Allow active content over restricted protocols to access my computer. “If you disable or do not configure this policy setting for a zone no protocols are restricted for that zone regardless of the setting for “Allow active content over restricted protocols to access my computer. “Note. If policy for a zone is set in both Computer Configuration and User Configuration both lists of protocols will be restricted for that zone.
Trusted Sites Zone Restricted Protocols
For each zone the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through restricted protocols from running in an unsafe manner either by prompting the user or simply disabling the content. For each zone this list of protocols may be configured here and applies to all processes which have opted in to the security restriction. If you enable this policy setting for a zone this sets the list of protocols to be restricted if that zone is set to Prompt or Disable for “Allow active content over restricted protocols to access my computer. “If you disable or do not configure this policy setting for a zone no protocols are restricted for that zone regardless of the setting for “Allow active content over restricted protocols to access my computer. “Note. If policy for a zone is set in both Computer Configuration and User Configuration both lists of protocols will be restricted for that zone.
Restricted Sites Zone Restricted Protocols
For each zone the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through restricted protocols from running in an unsafe manner either by prompting the user or simply disabling the content. For each zone this list of protocols may be configured here and applies to all processes which have opted in to the security restriction. If you enable this policy setting for a zone this sets the list of protocols to be restricted if that zone is set to Prompt or Disable for “Allow active content over restricted protocols to access my computer. “If you disable or do not configure this policy setting for a zone no protocols are restricted for that zone regardless of the setting for “Allow active content over restricted protocols to access my computer. “Note. If policy for a zone is set in both Computer Configuration and User Configuration both lists of protocols will be restricted for that zone.
Restricted Sites Zone Restricted Protocols
For each zone the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through restricted protocols from running in an unsafe manner either by prompting the user or simply disabling the content. For each zone this list of protocols may be configured here and applies to all processes which have opted in to the security restriction. If you enable this policy setting for a zone this sets the list of protocols to be restricted if that zone is set to Prompt or Disable for “Allow active content over restricted protocols to access my computer. “If you disable or do not configure this policy setting for a zone no protocols are restricted for that zone regardless of the setting for “Allow active content over restricted protocols to access my computer. “Note. If policy for a zone is set in both Computer Configuration and User Configuration both lists of protocols will be restricted for that zone.
Local Machine Zone Restricted Protocols
For each zone the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through restricted protocols from running in an unsafe manner either by prompting the user or simply disabling the content. For each zone this list of protocols may be configured here and applies to all processes which have opted in to the security restriction. If you enable this policy setting for a zone this sets the list of protocols to be restricted if that zone is set to Prompt or Disable for “Allow active content over restricted protocols to access my computer. “If you disable or do not configure this policy setting for a zone no protocols are restricted for that zone regardless of the setting for “Allow active content over restricted protocols to access my computer. “Note. If policy for a zone is set in both Computer Configuration and User Configuration both lists of protocols will be restricted for that zone.
Local Machine Zone Restricted Protocols
For each zone the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through restricted protocols from running in an unsafe manner either by prompting the user or simply disabling the content. For each zone this list of protocols may be configured here and applies to all processes which have opted in to the security restriction. If you enable this policy setting for a zone this sets the list of protocols to be restricted if that zone is set to Prompt or Disable for “Allow active content over restricted protocols to access my computer. “If you disable or do not configure this policy setting for a zone no protocols are restricted for that zone regardless of the setting for “Allow active content over restricted protocols to access my computer. “Note. If policy for a zone is set in both Computer Configuration and User Configuration both lists of protocols will be restricted for that zone.