diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md index 12fd5be044..1206fca386 100644 --- a/windows/client-management/mdm/policy-csp-internetexplorer.md +++ b/windows/client-management/mdm/policy-csp-internetexplorer.md @@ -212,6 +212,9 @@ manager: dansimp
InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains
+
+ InternetExplorer/EnableExtendedIEModeHotkeys +
InternetExplorer/IncludeAllLocalSites
@@ -4270,6 +4273,58 @@ ADMX Info:
+ +**InternetExplorer/EnableExtendedIEModeHotkeys** + + + +|Edition|Windows 10|Windows 11| +|--- |--- |--- | +|Home|No|No| +|Pro|Yes|Yes| +|Business|Yes|Yes| +|Enterprise|Yes|Yes| +|Education|Yes|Yes| + + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + + +This policy setting lets admins enable extended Microsoft Edge Internet Explorer mode hotkeys, such as "Ctrl+S" to have "Save as" functionality. + +- If you enable this policy, extended hotkey functionality is enabled in Internet Explorer mode and work the same as Internet Explorer. + +- If you disable, or don't configure this policy, extended hotkeys will not work in Internet Explorer mode. + + + +The following list shows the supported values: + +- 0 (default) - Disabled. +- 1 - Enabled. + + + +ADMX Info: +- GP Friendly name: *Allows enterprises to provide their users with a single-browser experience* +- GP name: *EnableExtendedIEModeHotkeys* +- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management* +- GP ADMX file name: *inetres.admx* + + + + +
**InternetExplorer/IncludeAllLocalSites** diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index c23aac08e5..056c7c95d6 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -25,6 +25,8 @@ manager: dansimp
LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus +
+ LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus
LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly @@ -272,8 +274,55 @@ The following list shows the supported values:
- +**LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus** + + + +|Edition|Windows 10|Windows 11| +|--- |--- |--- | +|Home|No|No| +|Pro|Yes|Yes| +|Business|Yes|Yes| +|Enterprise|Yes|Yes| +|Education|Yes|Yes| + + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This setting allows the administrator to enable the guest Administrator account. + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + + +GP Info: +- GP Friendly name: *Accounts: Enable Guest Account Status* +- GP path: *Windows Settings/Security Settings/Local Policies/Security Options* + + + +The following list shows the supported values: + +- 0 - disabled (local Administrator account is disabled). +- 1 - enabled (local Administrator account is enabled). + + + + +
+ + **LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly**