diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md
index 12fd5be044..1206fca386 100644
--- a/windows/client-management/mdm/policy-csp-internetexplorer.md
+++ b/windows/client-management/mdm/policy-csp-internetexplorer.md
@@ -212,6 +212,9 @@ manager: dansimp
InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains
+
+ InternetExplorer/EnableExtendedIEModeHotkeys
+
InternetExplorer/IncludeAllLocalSites
@@ -4270,6 +4273,58 @@ ADMX Info:
+
+**InternetExplorer/EnableExtendedIEModeHotkeys**
+
+
+
+|Edition|Windows 10|Windows 11|
+|--- |--- |--- |
+|Home|No|No|
+|Pro|Yes|Yes|
+|Business|Yes|Yes|
+|Enterprise|Yes|Yes|
+|Education|Yes|Yes|
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * User
+> * Device
+
+
+
+
+
+This policy setting lets admins enable extended Microsoft Edge Internet Explorer mode hotkeys, such as "Ctrl+S" to have "Save as" functionality.
+
+- If you enable this policy, extended hotkey functionality is enabled in Internet Explorer mode and work the same as Internet Explorer.
+
+- If you disable, or don't configure this policy, extended hotkeys will not work in Internet Explorer mode.
+
+
+
+The following list shows the supported values:
+
+- 0 (default) - Disabled.
+- 1 - Enabled.
+
+
+
+ADMX Info:
+- GP Friendly name: *Allows enterprises to provide their users with a single-browser experience*
+- GP name: *EnableExtendedIEModeHotkeys*
+- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
+- GP ADMX file name: *inetres.admx*
+
+
+
+
+
**InternetExplorer/IncludeAllLocalSites**
diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
index c23aac08e5..056c7c95d6 100644
--- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
+++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
@@ -25,6 +25,8 @@ manager: dansimp
LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus
+
+ LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus
LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly
@@ -272,8 +274,55 @@ The following list shows the supported values:
-
+**LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus**
+
+
+
+|Edition|Windows 10|Windows 11|
+|--- |--- |--- |
+|Home|No|No|
+|Pro|Yes|Yes|
+|Business|Yes|Yes|
+|Enterprise|Yes|Yes|
+|Education|Yes|Yes|
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+This setting allows the administrator to enable the guest Administrator account.
+
+Value type is integer. Supported operations are Add, Get, Replace, and Delete.
+
+
+
+GP Info:
+- GP Friendly name: *Accounts: Enable Guest Account Status*
+- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
+
+
+
+The following list shows the supported values:
+
+- 0 - disabled (local Administrator account is disabled).
+- 1 - enabled (local Administrator account is enabled).
+
+
+
+
+
+
+
**LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly**