diff --git a/windows/client-management/mdm/policy-csp-datausage.md b/windows/client-management/mdm/policy-csp-datausage.md
index cb540b3415..652bf56c3c 100644
--- a/windows/client-management/mdm/policy-csp-datausage.md
+++ b/windows/client-management/mdm/policy-csp-datausage.md
@@ -112,7 +112,7 @@ If this policy setting is disabled or is not configured, the cost of 4G connecti
ADMX Info:
-- GP English name: *Set 4G Cost*
+- GP Friendly name: *Set 4G Cost*
- GP name: *SetCost4G*
- GP path: *Network/WWAN Service/WWAN Media Cost*
- GP ADMX file name: *wwansvc.admx*
diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md
index f70dd9c0e5..c7445826de 100644
--- a/windows/client-management/mdm/policy-csp-defender.md
+++ b/windows/client-management/mdm/policy-csp-defender.md
@@ -203,7 +203,7 @@ Allows or disallows scanning of archives.
ADMX Info:
-- GP English name: *Scan archive files*
+- GP Friendly name: *Scan archive files*
- GP name: *Scan_DisableArchiveScanning*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -273,7 +273,7 @@ Allows or disallows Windows Defender Behavior Monitoring functionality.
ADMX Info:
-- GP English name: *Turn on behavior monitoring*
+- GP Friendly name: *Turn on behavior monitoring*
- GP name: *RealtimeProtection_DisableBehaviorMonitoring*
- GP path: *Windows Components/Microsoft Defender Antivirus/Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -343,7 +343,7 @@ To best protect your PC, Windows Defender will send information to Microsoft abo
ADMX Info:
-- GP English name: *Join Microsoft MAPS*
+- GP Friendly name: *Join Microsoft MAPS*
- GP name: *SpynetReporting*
- GP element: *SpynetReporting*
- GP path: *Windows Components/Microsoft Defender Antivirus/MAPS*
@@ -414,7 +414,7 @@ Allows or disallows scanning of email.
ADMX Info:
-- GP English name: *Turn on e-mail scanning*
+- GP Friendly name: *Turn on e-mail scanning*
- GP name: *Scan_DisableEmailScanning*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -484,7 +484,7 @@ Allows or disallows a full scan of mapped network drives.
ADMX Info:
-- GP English name: *Run full scan on mapped network drives*
+- GP Friendly name: *Run full scan on mapped network drives*
- GP name: *Scan_DisableScanningMappedNetworkDrivesForFullScan*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -554,7 +554,7 @@ Allows or disallows a full scan of removable drives. During a quick scan, remova
ADMX Info:
-- GP English name: *Scan removable drives*
+- GP Friendly name: *Scan removable drives*
- GP name: *Scan_DisableRemovableDriveScanning*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -624,7 +624,7 @@ Allows or disallows Windows Defender IOAVP Protection functionality.
ADMX Info:
-- GP English name: *Scan all downloaded files and attachments*
+- GP Friendly name: *Scan all downloaded files and attachments*
- GP name: *RealtimeProtection_DisableIOAVProtection*
- GP path: *Windows Components/Microsoft Defender Antivirus/Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -756,7 +756,7 @@ Allows or disallows Windows Defender On Access Protection functionality.
ADMX Info:
-- GP English name: *Monitor file and program activity on your computer*
+- GP Friendly name: *Monitor file and program activity on your computer*
- GP name: *RealtimeProtection_DisableOnAccessProtection*
- GP path: *Windows Components/Microsoft Defender Antivirus/Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -826,7 +826,7 @@ Allows or disallows Windows Defender Realtime Monitoring functionality.
ADMX Info:
-- GP English name: *Turn off real-time protection*
+- GP Friendly name: *Turn off real-time protection*
- GP name: *DisableRealtimeMonitoring*
- GP path: *Windows Components/Microsoft Defender Antivirus/Real-time Protection*
- GP ADMX file name: *WindowsDefender.admx*
@@ -896,7 +896,7 @@ Allows or disallows a scanning of network files.
ADMX Info:
-- GP English name: *Scan network files*
+- GP Friendly name: *Scan network files*
- GP name: *Scan_DisableScanningNetworkFiles*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1028,7 +1028,7 @@ Allows or disallows user access to the Windows Defender UI. If disallowed, all W
ADMX Info:
-- GP English name: *Enable headless UI mode*
+- GP Friendly name: *Enable headless UI mode*
- GP name: *UX_Configuration_UILockdown*
- GP path: *Windows Components/Microsoft Defender Antivirus/Client Interface*
- GP ADMX file name: *WindowsDefender.admx*
@@ -1100,7 +1100,7 @@ Value type is string.
ADMX Info:
-- GP English name: *Exclude files and paths from Attack Surface Reduction Rules*
+- GP Friendly name: *Exclude files and paths from Attack Surface Reduction Rules*
- GP name: *ExploitGuard_ASR_ASROnlyExclusions*
- GP element: *ExploitGuard_ASR_ASROnlyExclusions*
- GP path: *Windows Components/Microsoft Defender Antivirus/Windows Defender Exploit Guard/Attack Surface Reduction*
@@ -1168,7 +1168,7 @@ Value type is string.
ADMX Info:
-- GP English name: *Configure Attack Surface Reduction rules*
+- GP Friendly name: *Configure Attack Surface Reduction rules*
- GP name: *ExploitGuard_ASR_Rules*
- GP element: *ExploitGuard_ASR_Rules*
- GP path: *Windows Components/Microsoft Defender Antivirus/Windows Defender Exploit Guard/Attack Surface Reduction*
@@ -1235,7 +1235,7 @@ The default value is 50.
ADMX Info:
-- GP English name: *Specify the maximum percentage of CPU utilization during a scan*
+- GP Friendly name: *Specify the maximum percentage of CPU utilization during a scan*
- GP name: *Scan_AvgCPULoadFactor*
- GP element: *Scan_AvgCPULoadFactor*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
@@ -1312,7 +1312,7 @@ OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/CheckForSignaturesBeforeRunni
ADMX Info:
-- GP English name: *Check for the latest virus and spyware definitions before running a scheduled scan*
+- GP Friendly name: *Check for the latest virus and spyware definitions before running a scheduled scan*
- GP name: *CheckForSignaturesBeforeRunningScan*
- GP element: *CheckForSignaturesBeforeRunningScan*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
@@ -1392,7 +1392,7 @@ For more information about specific values that are supported, see the Microsoft
ADMX Info:
-- GP English name: *Select cloud protection level*
+- GP Friendly name: *Select cloud protection level*
- GP name: *MpEngine_MpCloudBlockLevel*
- GP element: *MpCloudBlockLevel*
- GP path: *Windows Components/Microsoft Defender Antivirus/MpEngine*
@@ -1471,7 +1471,7 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se
ADMX Info:
-- GP English name: *Configure extended cloud check*
+- GP Friendly name: *Configure extended cloud check*
- GP name: *MpEngine_MpBafsExtendedTimeout*
- GP element: *MpBafsExtendedTimeout*
- GP path: *Windows Components/Microsoft Defender Antivirus/MpEngine*
@@ -1534,7 +1534,7 @@ Added in Windows 10, version 1709. This policy setting allows user-specified app
ADMX Info:
-- GP English name: *Configure allowed applications*
+- GP Friendly name: *Configure allowed applications*
- GP name: *ExploitGuard_ControlledFolderAccess_AllowedApplications*
- GP element: *ExploitGuard_ControlledFolderAccess_AllowedApplications*
- GP path: *Windows Components/Microsoft Defender Antivirus/Windows Defender Exploit Guard/Controlled Folder Access*
@@ -1597,7 +1597,7 @@ Added in Windows 10, version 1709. This policy settings allows adding user-speci
ADMX Info:
-- GP English name: *Configure protected folders*
+- GP Friendly name: *Configure protected folders*
- GP name: *ExploitGuard_ControlledFolderAccess_ProtectedFolders*
- GP element: *ExploitGuard_ControlledFolderAccess_ProtectedFolders*
- GP path: *Windows Components/Microsoft Defender Antivirus/Windows Defender Exploit Guard/Controlled Folder Access*
@@ -1664,7 +1664,7 @@ The default value is 0, which keeps items in quarantine, and does not automatica
ADMX Info:
-- GP English name: *Configure removal of items from Quarantine folder*
+- GP Friendly name: *Configure removal of items from Quarantine folder*
- GP name: *Quarantine_PurgeItemsAfterDelay*
- GP element: *Quarantine_PurgeItemsAfterDelay*
- GP path: *Windows Components/Microsoft Defender Antivirus/Quarantine*
@@ -1739,7 +1739,7 @@ OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/DisableCatchupFullScan
ADMX Info:
-- GP English name: *Turn on catch-up full scan*
+- GP Friendly name: *Turn on catch-up full scan*
- GP name: *Scan_DisableCatchupFullScan*
- GP element: *Scan_DisableCatchupFullScan*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
@@ -1819,7 +1819,7 @@ OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/DisableCatchupQuickScan
ADMX Info:
-- GP English name: *Turn on catch-up quick scan*
+- GP Friendly name: *Turn on catch-up quick scan*
- GP name: *Scan_DisableCatchupQuickScan*
- GP element: *Scan_DisableCatchupQuickScan*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
@@ -1891,7 +1891,7 @@ Added in Windows 10, version 1709. This policy enables setting the state (On/Off
ADMX Info:
-- GP English name: *Configure Controlled folder access*
+- GP Friendly name: *Configure Controlled folder access*
- GP name: *ExploitGuard_ControlledFolderAccess_EnableControlledFolderAccess*
- GP element: *ExploitGuard_ControlledFolderAccess_EnableControlledFolderAccess*
- GP path: *Windows Components/Microsoft Defender Antivirus/Windows Defender Exploit Guard/Controlled Folder Access*
@@ -1968,7 +1968,7 @@ Supported values:
ADMX Info:
-- GP English name: *Configure low CPU priority for scheduled scans*
+- GP Friendly name: *Configure low CPU priority for scheduled scans*
- GP name: *Scan_LowCpuPriority*
- GP element: *Scan_LowCpuPriority*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
@@ -2046,7 +2046,7 @@ If you do not configure this policy, network blocking will be disabled by defaul
ADMX Info:
-- GP English name: *Prevent users and apps from accessing dangerous websites*
+- GP Friendly name: *Prevent users and apps from accessing dangerous websites*
- GP name: *ExploitGuard_EnableNetworkProtection*
- GP element: *ExploitGuard_EnableNetworkProtection*
- GP path: *Windows Components/Microsoft Defender Antivirus/Windows Defender Exploit Guard/Network Protection*
@@ -2118,7 +2118,7 @@ Allows an administrator to specify a list of file type extensions to ignore duri
ADMX Info:
-- GP English name: *Path Exclusions*
+- GP Friendly name: *Path Exclusions*
- GP name: *Exclusions_Paths*
- GP element: *Exclusions_PathsList*
- GP path: *Windows Components/Microsoft Defender Antivirus/Exclusions*
@@ -2182,7 +2182,7 @@ Allows an administrator to specify a list of directory paths to ignore during a
ADMX Info:
-- GP English name: *Extension Exclusions*
+- GP Friendly name: *Extension Exclusions*
- GP name: *Exclusions_Extensions*
- GP element: *Exclusions_ExtensionsList*
- GP path: *Windows Components/Microsoft Defender Antivirus/Exclusions*
@@ -2252,7 +2252,7 @@ Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\E
ADMX Info:
-- GP English name: *Process Exclusions*
+- GP Friendly name: *Process Exclusions*
- GP name: *Exclusions_Processes*
- GP element: *Exclusions_ProcessesList*
- GP path: *Windows Components/Microsoft Defender Antivirus/Exclusions*
@@ -2319,7 +2319,7 @@ Added in Windows 10, version 1607. Specifies the level of detection for potenti
ADMX Info:
-- GP English name: *Configure detection for potentially unwanted applications*
+- GP Friendly name: *Configure detection for potentially unwanted applications*
- GP name: *Root_PUAProtection*
- GP element: *Root_PUAProtection*
- GP path: *Windows Components/Microsoft Defender Antivirus*
@@ -2394,7 +2394,7 @@ Controls which sets of files should be monitored.
ADMX Info:
-- GP English name: *Configure monitoring for incoming and outgoing file and program activity*
+- GP Friendly name: *Configure monitoring for incoming and outgoing file and program activity*
- GP name: *RealtimeProtection_RealtimeScanDirection*
- GP element: *RealtimeProtection_RealtimeScanDirection*
- GP path: *Windows Components/Microsoft Defender Antivirus/Real-time Protection*
@@ -2466,7 +2466,7 @@ Selects whether to perform a quick scan or full scan.
ADMX Info:
-- GP English name: *Specify the scan type to use for a scheduled scan*
+- GP Friendly name: *Specify the scan type to use for a scheduled scan*
- GP name: *Scan_ScanParameters*
- GP element: *Scan_ScanParameters*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
@@ -2546,7 +2546,7 @@ The default value is 120
ADMX Info:
-- GP English name: *Specify the time for a daily quick scan*
+- GP Friendly name: *Specify the time for a daily quick scan*
- GP name: *Scan_ScheduleQuickScantime*
- GP element: *Scan_ScheduleQuickScantime*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
@@ -2617,7 +2617,7 @@ Selects the day that the Windows Defender scan should run.
ADMX Info:
-- GP English name: *Specify the day of the week to run a scheduled scan*
+- GP Friendly name: *Specify the day of the week to run a scheduled scan*
- GP name: *Scan_ScheduleDay*
- GP element: *Scan_ScheduleDay*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
@@ -2704,7 +2704,7 @@ The default value is 120.
ADMX Info:
-- GP English name: *Specify the time of day to run a scheduled scan*
+- GP Friendly name: *Specify the time of day to run a scheduled scan*
- GP name: *Scan_ScheduleTime*
- GP element: *Scan_ScheduleTime*
- GP path: *Windows Components/Microsoft Defender Antivirus/Scan*
@@ -2783,7 +2783,7 @@ OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/SignatureUpdateFallbackOrder
ADMX Info:
-- GP English name: *Define the order of sources for downloading definition updates*
+- GP Friendly name: *Define the order of sources for downloading definition updates*
- GP name: *SignatureUpdate_FallbackOrder*
- GP element: *SignatureUpdate_FallbackOrder*
- GP path: *Windows Components/Microsoft Defender Antivirus/Signature Updates*
@@ -2862,7 +2862,7 @@ OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/SignatureUpdateFileSharesSour
ADMX Info:
-- GP English name: *Define file shares for downloading definition updates*
+- GP Friendly name: *Define file shares for downloading definition updates*
- GP name: *SignatureUpdate_DefinitionUpdateFileSharesSources*
- GP element: *SignatureUpdate_DefinitionUpdateFileSharesSources*
- GP path: *Windows Components/Microsoft Defender Antivirus/Signature Updates*
@@ -2942,7 +2942,7 @@ OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/SignatureUpdateInterval
ADMX Info:
-- GP English name: *Specify the interval to check for definition updates*
+- GP Friendly name: *Specify the interval to check for definition updates*
- GP name: *SignatureUpdate_SignatureUpdateInterval*
- GP element: *SignatureUpdate_SignatureUpdateInterval*
- GP path: *Windows Components/Microsoft Defender Antivirus/Signature Updates*
@@ -3010,7 +3010,7 @@ Checks for the user consent level in Windows Defender to send data. If the requi
ADMX Info:
-- GP English name: *Send file samples when further analysis is required*
+- GP Friendly name: *Send file samples when further analysis is required*
- GP name: *SubmitSamplesConsent*
- GP element: *SubmitSamplesConsent*
- GP path: *Windows Components/Microsoft Defender Antivirus/MAPS*
@@ -3101,7 +3101,7 @@ The following list shows the supported values for possible actions:
ADMX Info:
-- GP English name: *Specify threat alert levels at which default action should not be taken when detected*
+- GP Friendly name: *Specify threat alert levels at which default action should not be taken when detected*
- GP name: *Threats_ThreatSeverityDefaultAction*
- GP element: *Threats_ThreatSeverityDefaultActionList*
- GP path: *Windows Components/Microsoft Defender Antivirus/Threats*
diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md
index 1031aada9c..a1644a0373 100644
--- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md
+++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md
@@ -172,7 +172,7 @@ The default value is 10.
ADMX Info:
-- GP English name: *Absolute Max Cache Size (in GB)*
+- GP Friendly name: *Absolute Max Cache Size (in GB)*
- GP name: *AbsoluteMaxCacheSize*
- GP element: *AbsoluteMaxCacheSize*
- GP path: *Windows Components/Delivery Optimization*
@@ -236,7 +236,7 @@ Added in Windows 10, version 1703. Specifies whether the device is allowed to p
ADMX Info:
-- GP English name: *Enable Peer Caching while the device connects via VPN*
+- GP Friendly name: *Enable Peer Caching while the device connects via VPN*
- GP name: *AllowVPNPeerCaching*
- GP element: *AllowVPNPeerCaching*
- GP path: *Windows Components/Delivery Optimization*
@@ -306,7 +306,7 @@ One or more values can be added as either fully qualified domain names (FQDN) or
ADMX Info:
-- GP English name: *Cache Server Hostname*
+- GP Friendly name: *Cache Server Hostname*
- GP name: *CacheHost*
- GP element: *CacheHost*
- GP path: *Windows Components/Delivery Optimization*
@@ -376,7 +376,7 @@ This policy allows you to configure one or more Delivery Optimization in Network
ADMX Info:
-- GP English name: *Cache Server Hostname Source*
+- GP Friendly name: *Cache Server Hostname Source*
- GP name: *CacheHostSource*
- GP element: *CacheHostSource*
- GP path: *Windows Components/Delivery Optimization*
@@ -457,7 +457,7 @@ After the max delay is reached, the download will resume using HTTP, either down
ADMX Info:
-- GP English name: *Delay background download from http (in secs)*
+- GP Friendly name: *Delay background download from http (in secs)*
- GP name: *DelayBackgroundDownloadFromHttp*
- GP element: *DelayBackgroundDownloadFromHttp*
- GP path: *Windows Components/Delivery Optimization*
@@ -520,7 +520,7 @@ Specifies the time in seconds to delay the fallback from Cache Server to the HTT
ADMX Info:
-- GP English name: *Delay Background download Cache Server fallback (in seconds)*
+- GP Friendly name: *Delay Background download Cache Server fallback (in seconds)*
- GP name: *DelayCacheServerFallbackBackground*
- GP element: *DelayCacheServerFallbackBackground*
- GP path: *Windows Components/Delivery Optimization*
@@ -593,7 +593,7 @@ Specifies the time in seconds to delay the fallback from Cache Server to the HTT
ADMX Info:
-- GP English name: *Delay Foreground download Cache Server fallback (in seconds)*
+- GP Friendly name: *Delay Foreground download Cache Server fallback (in seconds)*
- GP name: *DelayCacheServerFallbackForeground*
- GP element: *DelayCacheServerFallbackForeground*
- GP path: *Windows Components/Delivery Optimization*
@@ -667,7 +667,7 @@ The recommended value is 1 minute (60).
ADMX Info:
-- GP English name: *Delay Foreground download from http (in secs)*
+- GP Friendly name: *Delay Foreground download from http (in secs)*
- GP name: *DelayForegroundDownloadFromHttp*
- GP element: *DelayForegroundDownloadFromHttp*
- GP path: *Windows Components/Delivery Optimization*
@@ -739,7 +739,7 @@ Specifies the download method that Delivery Optimization can use in downloads of
ADMX Info:
-- GP English name: *Download Mode*
+- GP Friendly name: *Download Mode*
- GP name: *DownloadMode*
- GP element: *DownloadMode*
- GP path: *Windows Components/Delivery Optimization*
@@ -816,7 +816,7 @@ This Policy specifies an arbitrary group ID that the device belongs to. Use this
ADMX Info:
-- GP English name: *Group ID*
+- GP Friendly name: *Group ID*
- GP name: *GroupId*
- GP element: *GroupId*
- GP path: *Windows Components/Delivery Optimization*
@@ -886,7 +886,7 @@ Starting with Windows 10, version 1903, you can use the Azure Active Directory (
ADMX Info:
-- GP English name: *Select the source of Group IDs*
+- GP Friendly name: *Select the source of Group IDs*
- GP name: *GroupIdSource*
- GP element: *GroupIdSource*
- GP path: *Windows Components/Delivery Optimization*
@@ -958,7 +958,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts
ADMX Info:
-- GP English name: *Maximum Background Download Bandwidth (in KB/s)*
+- GP Friendly name: *Maximum Background Download Bandwidth (in KB/s)*
- GP name: *MaxBackgroundDownloadBandwidth*
- GP element: *MaxBackgroundDownloadBandwidth*
- GP path: *Windows Components/Delivery Optimization*
@@ -1024,7 +1024,7 @@ The default value is 259200 seconds (3 days).
ADMX Info:
-- GP English name: *Max Cache Age (in seconds)*
+- GP Friendly name: *Max Cache Age (in seconds)*
- GP name: *MaxCacheAge*
- GP element: *MaxCacheAge*
- GP path: *Windows Components/Delivery Optimization*
@@ -1090,7 +1090,7 @@ The default value is 20.
ADMX Info:
-- GP English name: *Max Cache Size (percentage)*
+- GP Friendly name: *Max Cache Size (percentage)*
- GP name: *MaxCacheSize*
- GP element: *MaxCacheSize*
- GP path: *Windows Components/Delivery Optimization*
@@ -1175,7 +1175,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts
ADMX Info:
-- GP English name: *Maximum Foreground Download Bandwidth (in KB/s)*
+- GP Friendly name: *Maximum Foreground Download Bandwidth (in KB/s)*
- GP name: *MaxForegroundDownloadBandwidth*
- GP element: *MaxForegroundDownloadBandwidth*
- GP path: *Windows Components/Delivery Optimization*
@@ -1260,7 +1260,7 @@ The default value is 500.
ADMX Info:
-- GP English name: *Minimum Background QoS (in KB/s)*
+- GP Friendly name: *Minimum Background QoS (in KB/s)*
- GP name: *MinBackgroundQos*
- GP element: *MinBackgroundQos*
- GP path: *Windows Components/Delivery Optimization*
@@ -1325,7 +1325,7 @@ The default value is 0. The value 0 (zero) means "not limited" and the cloud ser
ADMX Info:
-- GP English name: *Allow uploads while the device is on battery while under set Battery level (percentage)*
+- GP Friendly name: *Allow uploads while the device is on battery while under set Battery level (percentage)*
- GP name: *MinBatteryPercentageAllowedToUpload*
- GP element: *MinBatteryPercentageAllowedToUpload*
- GP path: *Windows Components/Delivery Optimization*
@@ -1394,7 +1394,7 @@ The default value is 32 GB.
ADMX Info:
-- GP English name: *Minimum disk size allowed to use Peer Caching (in GB)*
+- GP Friendly name: *Minimum disk size allowed to use Peer Caching (in GB)*
- GP name: *MinDiskSizeAllowedToPeer*
- GP element: *MinDiskSizeAllowedToPeer*
- GP path: *Windows Components/Delivery Optimization*
@@ -1460,7 +1460,7 @@ The default value is 100 MB.
ADMX Info:
-- GP English name: *Minimum Peer Caching Content File Size (in MB)*
+- GP Friendly name: *Minimum Peer Caching Content File Size (in MB)*
- GP name: *MinFileSizeToCache*
- GP element: *MinFileSizeToCache*
- GP path: *Windows Components/Delivery Optimization*
@@ -1526,7 +1526,7 @@ The default value is 4 GB.
ADMX Info:
-- GP English name: *Minimum RAM capacity (inclusive) required to enable use of Peer Caching (in GB)*
+- GP Friendly name: *Minimum RAM capacity (inclusive) required to enable use of Peer Caching (in GB)*
- GP name: *MinRAMAllowedToPeer*
- GP element: *MinRAMAllowedToPeer*
- GP path: *Windows Components/Delivery Optimization*
@@ -1592,7 +1592,7 @@ By default, %SystemDrive% is used to store the cache.
ADMX Info:
-- GP English name: *Modify Cache Drive*
+- GP Friendly name: *Modify Cache Drive*
- GP name: *ModifyCacheDrive*
- GP element: *ModifyCacheDrive*
- GP path: *Windows Components/Delivery Optimization*
@@ -1660,7 +1660,7 @@ The default value is 20.
ADMX Info:
-- GP English name: *Monthly Upload Data Cap (in GB)*
+- GP Friendly name: *Monthly Upload Data Cap (in GB)*
- GP name: *MonthlyUploadDataCap*
- GP element: *MonthlyUploadDataCap*
- GP path: *Windows Components/Delivery Optimization*
@@ -1722,7 +1722,7 @@ Note that downloads from LAN peers will not be throttled even when this policy i
ADMX Info:
-- GP English name: *Maximum Background Download Bandwidth (percentage)*
+- GP Friendly name: *Maximum Background Download Bandwidth (percentage)*
- GP name: *PercentageMaxBackgroundBandwidth*
- GP element: *PercentageMaxBackgroundBandwidth*
- GP path: *Windows Components/Delivery Optimization*
@@ -1797,7 +1797,7 @@ Note that downloads from LAN peers will not be throttled even when this policy i
ADMX Info:
-- GP English name: *Maximum Foreground Download Bandwidth (percentage)*
+- GP Friendly namee: *Maximum Foreground Download Bandwidth (percentage)*
- GP name: *PercentageMaxForegroundBandwidth*
- GP element: *PercentageMaxForegroundBandwidth*
- GP path: *Windows Components/Delivery Optimization*
@@ -1860,7 +1860,7 @@ Option 1 (Subnet mask) applies to both Download Mode LAN (1) and Group (2).
ADMX Info:
-- GP English name: *Select a method to restrict Peer Selection*
+- GP Friendly name: *Select a method to restrict Peer Selection*
- GP name: *RestrictPeerSelectionBy*
- GP element: *RestrictPeerSelectionBy*
- GP path: *Windows Components/Delivery Optimization*
@@ -1933,7 +1933,7 @@ Added in Windows 10, version 1803. Specifies the maximum background downloa
ADMX Info:
-- GP English name: *Set Business Hours to Limit Background Download Bandwidth*
+- GP Friendly name: *Set Business Hours to Limit Background Download Bandwidth*
- GP name: *SetHoursToLimitBackgroundDownloadBandwidth*
- GP path: *Windows Components/Delivery Optimization*
- GP ADMX file name: *DeliveryOptimization.admx*
@@ -2007,7 +2007,7 @@ Added in Windows 10, version 1803. Specifies the maximum foreground downloa
ADMX Info:
-- GP English name: *Set Business Hours to Limit Foreground Download Bandwidth*
+- GP Friendly name: *Set Business Hours to Limit Foreground Download Bandwidth*
- GP name: *SetHoursToLimitForegroundDownloadBandwidth*
- GP path: *Windows Components/Delivery Optimization*
- GP ADMX file name: *DeliveryOptimization.admx*
diff --git a/windows/client-management/mdm/policy-csp-desktop.md b/windows/client-management/mdm/policy-csp-desktop.md
index dfbed26745..9a3bcc48ee 100644
--- a/windows/client-management/mdm/policy-csp-desktop.md
+++ b/windows/client-management/mdm/policy-csp-desktop.md
@@ -90,7 +90,7 @@ If you enable this setting, users are unable to type a new location in the Targe
ADMX Info:
-- GP English name: *Prohibit User from manually redirecting Profile Folders*
+- GP Friendly name: *Prohibit User from manually redirecting Profile Folders*
- GP name: *DisablePersonalDirChange*
- GP path: *Desktop*
- GP ADMX file name: *desktop.admx*
diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md
index 64e37f5868..157279f8f5 100644
--- a/windows/client-management/mdm/policy-csp-deviceguard.md
+++ b/windows/client-management/mdm/policy-csp-deviceguard.md
@@ -95,7 +95,7 @@ For more information about System Guard, see [Introducing Windows Defender Syste
ADMX Info:
-- GP English name: *Turn On Virtualization Based Security*
+- GP Friendly name: *Turn On Virtualization Based Security*
- GP name: *VirtualizationBasedSecurity*
- GP element: *SystemGuardDrop*
- GP path: *System/Device Guard*
@@ -164,7 +164,7 @@ Added in Windows 10, version 1709. Turns on virtualization based security(VBS) a
ADMX Info:
-- GP English name: *Turn On Virtualization Based Security*
+- GP Friendly name: *Turn On Virtualization Based Security*
- GP name: *VirtualizationBasedSecurity*
- GP path: *System/Device Guard*
- GP ADMX file name: *DeviceGuard.admx*
@@ -230,7 +230,7 @@ Added in Windows 10, version 1709. This setting lets users turn on Credential Gu
ADMX Info:
-- GP English name: *Turn On Virtualization Based Security*
+- GP Friendly name: *Turn On Virtualization Based Security*
- GP name: *VirtualizationBasedSecurity*
- GP element: *CredentialIsolationDrop*
- GP path: *System/Device Guard*
@@ -298,7 +298,7 @@ Added in Windows 10, version 1709. Specifies the platform security level at the
ADMX Info:
-- GP English name: *Turn On Virtualization Based Security*
+- GP Friendly name: *Turn On Virtualization Based Security*
- GP name: *VirtualizationBasedSecurity*
- GP element: *RequirePlatformSecurityFeaturesDrop*
- GP path: *System/Device Guard*
diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md
index 62ce04adc6..9d7aa06011 100644
--- a/windows/client-management/mdm/policy-csp-deviceinstallation.md
+++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md
@@ -129,7 +129,7 @@ Peripherals can be specified by their [hardware identity](/windows-hardware/driv
ADMX Info:
-- GP English name: *Allow installation of devices that match any of these device IDs*
+- GP Friendly name: *Allow installation of devices that match any of these device IDs*
- GP name: *DeviceInstall_IDs_Allow*
- GP path: *System/Device Installation/Device Installation Restrictions*
- GP ADMX file name: *deviceinstallation.admx*
@@ -253,7 +253,7 @@ Peripherals can be specified by their [device instance ID](/windows-hardware/dri
ADMX Info:
-- GP English name: *Allow installation of devices that match any of these device instance IDs*
+- GP Friendly name: *Allow installation of devices that match any of these device instance IDs*
- GP name: *DeviceInstall_Instance_IDs_Allow*
- GP path: *System/Device Installation/Device Installation Restrictions*
- GP ADMX file name: *deviceinstallation.admx*
@@ -376,7 +376,7 @@ Peripherals can be specified by their [hardware identity](/windows-hardware/driv
ADMX Info:
-- GP English name: *Allow installation of devices using drivers that match these device setup classes*
+- GP Friendly name: *Allow installation of devices using drivers that match these device setup classes*
- GP name: *DeviceInstall_Classes_Allow*
- GP path: *System/Device Installation/Device Installation Restrictions*
- GP ADMX file name: *deviceinstallation.admx*
@@ -509,7 +509,7 @@ If you disable or do not configure this policy setting, the default evaluation i
ADMX Info:
-- GP English name: *Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria*
+- GP Friendly name: *Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria*
- GP name: *DeviceInstall_Allow_Deny_Layered*
- GP path: *System/Device Installation/Device Installation Restrictions*
- GP ADMX file name: *deviceinstallation.admx*
@@ -618,7 +618,7 @@ If you disable or do not configure this policy setting, the setting in the Devic
ADMX Info:
-- GP English name: *Prevent device metadata retrieval from the Internet*
+- GP Friendly name: *Prevent device metadata retrieval from the Internet*
- GP name: *DeviceMetadata_PreventDeviceMetadataFromNetwork*
- GP path: *System/Device Installation*
- GP ADMX file name: *DeviceSetup.admx*
@@ -700,7 +700,7 @@ If you disable or do not configure this policy setting, Windows is allowed to in
ADMX Info:
-- GP English name: *Prevent installation of devices not described by other policy settings*
+- GP Friendly name: *Prevent installation of devices not described by other policy settings*
- GP name: *DeviceInstall_Unspecified_Deny*
- GP path: *System/Device Installation/Device Installation Restrictions*
- GP ADMX file name: *deviceinstallation.admx*
@@ -817,7 +817,7 @@ Peripherals can be specified by their [hardware identity](/windows-hardware/driv
ADMX Info:
-- GP English name: *Prevent installation of devices that match any of these device IDs*
+- GP Friendly name: *Prevent installation of devices that match any of these device IDs*
- GP name: *DeviceInstall_IDs_Deny*
- GP path: *System/Device Installation/Device Installation Restrictions*
- GP ADMX file name: *deviceinstallation.admx*
@@ -934,7 +934,7 @@ Peripherals can be specified by their [device instance ID](/windows-hardware/dri
ADMX Info:
-- GP English name: *Prevent installation of devices that match any of these device instance IDs*
+- GP Friendly name: *Prevent installation of devices that match any of these device instance IDs*
- GP name: *DeviceInstall_Instance_IDs_Deny*
- GP path: *System/Device Installation/Device Installation Restrictions*
- GP ADMX file name: *deviceinstallation.admx*
@@ -1064,7 +1064,7 @@ Peripherals can be specified by their [hardware identity](/windows-hardware/driv
ADMX Info:
-- GP English name: *Prevent installation of devices using drivers that match these device setup classes*
+- GP Friendly name: *Prevent installation of devices using drivers that match these device setup classes*
- GP name: *DeviceInstall_Classes_Deny*
- GP path: *System/Device Installation/Device Installation Restrictions*
- GP ADMX file name: *deviceinstallation.admx*
diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md
index 730e173e27..b394ffb753 100644
--- a/windows/client-management/mdm/policy-csp-devicelock.md
+++ b/windows/client-management/mdm/policy-csp-devicelock.md
@@ -969,7 +969,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
GP Info:
-- GP English name: *Minimum password age*
+- GP Friendly name: *Minimum password age*
- GP path: *Windows Settings/Security Settings/Account Policies/Password Policy*
@@ -1037,7 +1037,7 @@ If you enable this setting, users will no longer be able to enable or disable lo
ADMX Info:
-- GP English name: *Prevent enabling lock screen camera*
+- GP Friendly name: *Prevent enabling lock screen camera*
- GP name: *CPL_Personalization_NoLockScreenCamera*
- GP path: *Control Panel/Personalization*
- GP ADMX file name: *ControlPanelDisplay.admx*
@@ -1107,7 +1107,7 @@ If you enable this setting, users will no longer be able to modify slide show se
ADMX Info:
-- GP English name: *Prevent enabling lock screen slide show*
+- GP Friendly name: *Prevent enabling lock screen slide show*
- GP name: *CPL_Personalization_NoLockScreenSlideshow*
- GP path: *Control Panel/Personalization*
- GP ADMX file name: *ControlPanelDisplay.admx*
diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md
index 82dbb630ae..12a6952ffa 100644
--- a/windows/client-management/mdm/policy-csp-display.md
+++ b/windows/client-management/mdm/policy-csp-display.md
@@ -91,7 +91,7 @@ This policy allows you to disable Per-Process System DPI for a semicolon-separat
ADMX Info:
-- GP English name: *Configure Per-Process System DPI settings*
+- GP Friendly name: *Configure Per-Process System DPI settings*
- GP name: *DisplayPerProcessSystemDpiSettings*
- GP element: *DisplayDisablePerProcessSystemDpiSettings*
- GP path: *System/Display*
@@ -159,12 +159,12 @@ Per Process System DPI will not work for all applications as some older desktop
In some cases, you may see some unexpected behavior in some desktop applications that have Per-Process System DPI applied. If that happens, Per Process System DPI should be disabled.
-Enabling this setting lets you specify the system-wide default for desktop applications as well as per-application overrides. If you disable or do not configure this setting, Per Process System DPI will not apply to any processes on the system.
+Enabling this setting lets you specify the system-wide default for desktop applications and per-application overrides. If you disable or do not configure this setting. Per Process System DPI will not apply to any processes on the system.
ADMX Info:
-- GP English name: *Configure Per-Process System DPI settings*
+- GP Friendly name: *Configure Per-Process System DPI settings*
- GP name: *DisplayPerProcessSystemDpiSettings*
- GP element: *DisplayGlobalPerProcessSystemDpiSettings*
- GP path: *System/Display*
@@ -231,7 +231,7 @@ This policy allows you to enable Per-Process System DPI for a semicolon-separate
ADMX Info:
-- GP English name: *Configure Per-Process System DPI settings*
+- GP Friendly name: *Configure Per-Process System DPI settings*
- GP name: *DisplayPerProcessSystemDpiSettings*
- GP element: *DisplayEnablePerProcessSystemDpiSettings*
- GP path: *System/Display*
@@ -299,7 +299,7 @@ If GDI DPI Scaling is configured to both turn off and turn on an application, th
ADMX Info:
-- GP English name: *Turn off GdiDPIScaling for applications*
+- GP Friendly name: *Turn off GdiDPIScaling for applications*
- GP name: *DisplayTurnOffGdiDPIScaling*
- GP element: *DisplayTurnOffGdiDPIScalingPrompt*
- GP path: *System/Display*
@@ -309,10 +309,10 @@ ADMX Info:
To validate on Desktop, do the following:
-1. Configure the setting for an app which has GDI DPI scaling enabled via MDM or any other supported mechanisms.
+1. Configure the setting for an app, which has GDI DPI scaling enabled via MDM or any other supported mechanisms.
2. Run the app and observe blurry text.
-
+Each cloud resource can also be paired optionally with an internal proxy server by using a trailing comma followed by the proxy address.
@@ -374,7 +374,7 @@ If GDI DPI Scaling is configured to both turn off and turn on an application, th
ADMX Info:
-- GP English name: *Turn on GdiDPIScaling for applications*
+- GP Friendly name: *Turn on GdiDPIScaling for applications*
- GP name: *DisplayTurnOnGdiDPIScaling*
- GP element: *DisplayTurnOnGdiDPIScalingPrompt*
- GP path: *System/Display*
@@ -384,7 +384,7 @@ ADMX Info:
To validate on Desktop, do the following:
-1. Configure the setting for an app which uses GDI.
+1. Configure the setting for an app, which uses GDI.
2. Run the app and observe crisp text.
diff --git a/windows/client-management/mdm/policy-csp-dmaguard.md b/windows/client-management/mdm/policy-csp-dmaguard.md
index 24279ffb4d..2ca5164a50 100644
--- a/windows/client-management/mdm/policy-csp-dmaguard.md
+++ b/windows/client-management/mdm/policy-csp-dmaguard.md
@@ -93,7 +93,7 @@ Supported values:
ADMX Info:
-- GP English name: *Enumeration policy for external devices incompatible with Kernel DMA Protection*
+- GP Friendly name: *Enumeration policy for external devices incompatible with Kernel DMA Protection*
- GP name: *DmaGuardEnumerationPolicy*
- GP path: *System/Kernel DMA Protection*
- GP ADMX file name: *dmaguard.admx*
diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md
index 18cce493eb..7d2b8ebb1e 100644
--- a/windows/client-management/mdm/policy-csp-education.md
+++ b/windows/client-management/mdm/policy-csp-education.md
@@ -86,7 +86,7 @@ Added in Windows 10, version 2004. This policy setting allows you to control whe
ADMX Info:
-- GP English name: *Allow Graphing Calculator*
+- GP Friendly name: *Allow Graphing Calculator*
- GP name: *AllowGraphingCalculator*
- GP path: *Windows Components/Calculator*
- GP ADMX file name: *Programs.admx*
@@ -203,7 +203,7 @@ Added in Windows 10, version 1709. Allows IT Admins to prevent user installatio
ADMX Info:
-- GP English name: *Prevent addition of printers*
+- GP Friendly name: *Prevent addition of printers*
- GP name: *NoAddPrinter*
- GP path: *Control Panel/Printers*
- GP ADMX file name: *Printing.admx*
diff --git a/windows/client-management/mdm/policy-csp-errorreporting.md b/windows/client-management/mdm/policy-csp-errorreporting.md
index b4f27cc7c0..a24a91ef51 100644
--- a/windows/client-management/mdm/policy-csp-errorreporting.md
+++ b/windows/client-management/mdm/policy-csp-errorreporting.md
@@ -112,7 +112,7 @@ If you disable or do not configure this policy setting, then the default consent
ADMX Info:
-- GP English name: *Customize consent settings*
+- GP Friendly name: *Customize consent settings*
- GP name: *WerConsentCustomize_2*
- GP path: *Windows Components/Windows Error Reporting/Consent*
- GP ADMX file name: *ErrorReporting.admx*
@@ -182,7 +182,7 @@ If you disable or do not configure this policy setting, the Turn off Windows Err
ADMX Info:
-- GP English name: *Disable Windows Error Reporting*
+- GP Friendly name: *Disable Windows Error Reporting*
- GP name: *WerDisable_2*
- GP path: *Windows Components/Windows Error Reporting*
- GP ADMX file name: *ErrorReporting.admx*
@@ -256,7 +256,7 @@ See also the Configure Error Reporting policy setting.
ADMX Info:
-- GP English name: *Display Error Notification*
+- GP Friendly name: *Display Error Notification*
- GP name: *PCH_ShowUI*
- GP path: *Windows Components/Windows Error Reporting*
- GP ADMX file name: *ErrorReporting.admx*
@@ -326,7 +326,7 @@ If you disable or do not configure this policy setting, then consent policy sett
ADMX Info:
-- GP English name: *Do not send additional data*
+- GP Friendly name: *Do not send additional data*
- GP name: *WerNoSecondLevelData_2*
- GP path: *Windows Components/Windows Error Reporting*
- GP ADMX file name: *ErrorReporting.admx*
@@ -396,7 +396,7 @@ If you disable or do not configure this policy setting, Windows Error Reporting
ADMX Info:
-- GP English name: *Prevent display of the user interface for critical errors*
+- GP Friendly name: *Prevent display of the user interface for critical errors*
- GP name: *WerDoNotShowUI*
- GP path: *Windows Components/Windows Error Reporting*
- GP ADMX file name: *ErrorReporting.admx*
diff --git a/windows/client-management/mdm/policy-csp-eventlogservice.md b/windows/client-management/mdm/policy-csp-eventlogservice.md
index d86bd44edc..43366ce6ff 100644
--- a/windows/client-management/mdm/policy-csp-eventlogservice.md
+++ b/windows/client-management/mdm/policy-csp-eventlogservice.md
@@ -101,7 +101,7 @@ Note: Old events may or may not be retained according to the "Backup log automat
ADMX Info:
-- GP English name: *Control Event Log behavior when the log file reaches its maximum size*
+- GP Friendly name: *Control Event Log behavior when the log file reaches its maximum size*
- GP name: *Channel_Log_Retention_1*
- GP path: *Windows Components/Event Log Service/Application*
- GP ADMX file name: *eventlog.admx*
@@ -171,7 +171,7 @@ If you disable or do not configure this policy setting, the maximum size of the
ADMX Info:
-- GP English name: *Specify the maximum log file size (KB)*
+- GP Friendly name: *Specify the maximum log file size (KB)*
- GP name: *Channel_LogMaxSize_1*
- GP path: *Windows Components/Event Log Service/Application*
- GP ADMX file name: *eventlog.admx*
@@ -241,7 +241,7 @@ If you disable or do not configure this policy setting, the maximum size of the
ADMX Info:
-- GP English name: *Specify the maximum log file size (KB)*
+- GP Friendly name: *Specify the maximum log file size (KB)*
- GP name: *Channel_LogMaxSize_2*
- GP path: *Windows Components/Event Log Service/Security*
- GP ADMX file name: *eventlog.admx*
@@ -311,7 +311,7 @@ If you disable or do not configure this policy setting, the maximum size of the
ADMX Info:
-- GP English name: *Specify the maximum log file size (KB)*
+- GP Friendly name: *Specify the maximum log file size (KB)*
- GP name: *Channel_LogMaxSize_4*
- GP path: *Windows Components/Event Log Service/System*
- GP ADMX file name: *eventlog.admx*
diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md
index 90192d37ac..ff50ae9cb0 100644
--- a/windows/client-management/mdm/policy-csp-experience.md
+++ b/windows/client-management/mdm/policy-csp-experience.md
@@ -152,7 +152,7 @@ Value type is integer. Supported values:
ADMX Info:
-- GP English name: *Allow Clipboard History*
+- GP Friendly name: *Allow Clipboard History*
- GP name: *AllowClipboardHistory*
- GP path: *System/OS Policies*
- GP ADMX file name: *OSPolicy.admx*
@@ -229,7 +229,7 @@ Most restricted value is 0.
ADMX Info:
-- GP English name: *Allow Cortana*
+- GP Friendly name: *Allow Cortana*
- GP name: *AllowCortana*
- GP path: *Windows Components/Search*
- GP ADMX file name: *Search.admx*
@@ -361,7 +361,7 @@ When Find My Device is off, the device and its location are not registered and t
ADMX Info:
-- GP English name: *Turn On/Off Find My Device*
+- GP Friendly name: *Turn On/Off Find My Device*
- GP name: *FindMy_AllowFindMyDeviceConfig*
- GP path: *Windows Components/Find My Device*
- GP ADMX file name: *FindMy.admx*
@@ -642,7 +642,7 @@ Most restricted value is 0.
ADMX Info:
-- GP English name: *Do not use diagnostic data for tailored experiences*
+- GP Friendly name: *Do not use diagnostic data for tailored experiences*
- GP name: *DisableTailoredExperiencesWithDiagnosticData*
- GP path: *Windows Components/Cloud Content*
- GP ADMX file name: *CloudContent.admx*
@@ -712,7 +712,7 @@ Specifies whether to allow app and content suggestions from third-party software
ADMX Info:
-- GP English name: *Do not suggest third-party content in Windows spotlight*
+- GP Friendly name: *Do not suggest third-party content in Windows spotlight*
- GP name: *DisableThirdPartySuggestions*
- GP path: *Windows Components/Cloud Content*
- GP ADMX file name: *CloudContent.admx*
@@ -785,7 +785,7 @@ Most restricted value is 0.
ADMX Info:
-- GP English name: *Turn off Microsoft consumer experiences*
+- GP Friendly name: *Turn off Microsoft consumer experiences*
- GP name: *DisableWindowsConsumerFeatures*
- GP path: *Windows Components/Cloud Content*
- GP ADMX file name: *CloudContent.admx*
@@ -857,7 +857,7 @@ Most restricted value is 0.
ADMX Info:
-- GP English name: *Turn off all Windows spotlight features*
+- GP Friendly name: *Turn off all Windows spotlight features*
- GP name: *DisableWindowsSpotlightFeatures*
- GP path: *Windows Components/Cloud Content*
- GP ADMX file name: *CloudContent.admx*
@@ -928,7 +928,7 @@ Most restricted value is 0.
ADMX Info:
-- GP English name: *Turn off Windows Spotlight on Action Center*
+- GP Friendly name: *Turn off Windows Spotlight on Action Center*
- GP name: *DisableWindowsSpotlightOnActionCenter*
- GP path: *Windows Components/Cloud Content*
- GP ADMX file name: *CloudContent.admx*
@@ -998,7 +998,7 @@ Added in Windows 10, version 1803. This policy allows IT admins to turn off Sugg
ADMX Info:
-- GP English name: *Turn off Windows Spotlight on Settings*
+- GP Friendly name: *Turn off Windows Spotlight on Settings*
- GP name: *DisableWindowsSpotlightOnSettings*
- GP path: *Windows Components/Cloud Content*
- GP ADMX file name: *CloudContent.admx*
@@ -1070,7 +1070,7 @@ Most restricted value is 0.
ADMX Info:
-- GP English name: *Turn off the Windows Welcome Experience*
+- GP Friendly name: *Turn off the Windows Welcome Experience*
- GP name: *DisableWindowsSpotlightWindowsWelcomeExperience*
- GP path: *Windows Components/Cloud Content*
- GP ADMX file name: *CloudContent.admx*
@@ -1136,7 +1136,7 @@ Enables or disables Windows Tips / soft landing.
ADMX Info:
-- GP English name: *Do not show Windows tips*
+- GP Friendly name: *Do not show Windows tips*
- GP name: *DisableSoftLanding*
- GP path: *Windows Components/Cloud Content*
- GP ADMX file name: *CloudContent.admx*
@@ -1264,7 +1264,7 @@ Allows IT admins to specify whether spotlight should be used on the user's lock
ADMX Info:
-- GP English name: *Configure Windows spotlight on lock screen*
+- GP Friendly name: *Configure Windows spotlight on lock screen*
- GP name: *ConfigureWindowsSpotlight*
- GP path: *Windows Components/Cloud Content*
- GP ADMX file name: *CloudContent.admx*
@@ -1333,7 +1333,7 @@ If you disable or do not configure this policy setting, Windows experiences will
ADMX Info:
-- GP English name: *Turn off cloud optimized content*
+- GP Friendly name: *Turn off cloud optimized content*
- GP name: *DisableCloudOptimizedContent*
- GP path: *Windows Components/Cloud Content*
- GP ADMX file name: *CloudContent.admx*
@@ -1403,7 +1403,7 @@ If you disable or do not configure this policy setting, users can control how of
ADMX Info:
-- GP English name: *Do not show feedback notifications*
+- GP Friendly name: *Do not show feedback notifications*
- GP name: *DoNotShowFeedbackNotifications*
- GP path: *Data Collection and Preview Builds*
- GP ADMX file name: *FeedbackNotifications.admx*
@@ -1472,7 +1472,7 @@ Related policy:
ADMX Info:
-- GP English name: *Do not sync browser settings*
+- GP Friendly name: *Do not sync browser settings*
- GP name: *DisableWebBrowserSettingSync*
- GP path: *Windows Components/Sync your settings*
- GP ADMX file name: *SettingSync.admx*
@@ -1567,7 +1567,7 @@ Related policy:
ADMX Info:
-- GP English name: *Prevent users from turning on browser syncing*
+- GP Friendly name: *Prevent users from turning on browser syncing*
- GP name: *PreventUsersFromTurningOnBrowserSyncing*
- GP path: *Windows Components/Sync your settings*
- GP ADMX file name: *SettingSync.admx*
@@ -1664,7 +1664,7 @@ If you do not configure this policy setting, the lock option is shown in the Use
ADMX Info:
-- GP English name: *Show lock in the user tile menu*
+- GP Friendly name: *Show lock in the user tile menu*
- GP name: *ShowLockOption*
- GP path: *File Explorer*
- GP ADMX file name: *WindowsExplorer.admx*
diff --git a/windows/client-management/mdm/policy-csp-exploitguard.md b/windows/client-management/mdm/policy-csp-exploitguard.md
index 80e9be3716..e192bd9e82 100644
--- a/windows/client-management/mdm/policy-csp-exploitguard.md
+++ b/windows/client-management/mdm/policy-csp-exploitguard.md
@@ -81,7 +81,7 @@ The system settings require a reboot; the application settings do not require a
ADMX Info:
-- GP English name: *Use a common set of exploit protection settings*
+- GP Friendly name: *Use a common set of exploit protection settings*
- GP name: *ExploitProtection_Name*
- GP element: *ExploitProtection_Name*
- GP path: *Windows Components/Windows Defender Exploit Guard/Exploit Protection*
diff --git a/windows/client-management/mdm/policy-csp-fileexplorer.md b/windows/client-management/mdm/policy-csp-fileexplorer.md
index 58b2bf5175..82dce114b4 100644
--- a/windows/client-management/mdm/policy-csp-fileexplorer.md
+++ b/windows/client-management/mdm/policy-csp-fileexplorer.md
@@ -89,7 +89,7 @@ Disabling data execution prevention can allow certain legacy plug-in application
ADMX Info:
-- GP English name: *Turn off Data Execution Prevention for Explorer*
+- GP Friendly name: *Turn off Data Execution Prevention for Explorer*
- GP name: *NoDataExecutionPrevention*
- GP path: *File Explorer*
- GP ADMX file name: *Explorer.admx*
@@ -155,7 +155,7 @@ Disabling heap termination on corruption can allow certain legacy plug-in applic
ADMX Info:
-- GP English name: *Turn off heap termination on corruption*
+- GP Friendly name: *Turn off heap termination on corruption*
- GP name: *NoHeapTerminationOnCorruption*
- GP path: *File Explorer*
- GP ADMX file name: *Explorer.admx*
diff --git a/windows/client-management/mdm/policy-csp-handwriting.md b/windows/client-management/mdm/policy-csp-handwriting.md
index dea9168e36..615be07c90 100644
--- a/windows/client-management/mdm/policy-csp-handwriting.md
+++ b/windows/client-management/mdm/policy-csp-handwriting.md
@@ -85,7 +85,7 @@ The docked mode is especially useful in Kiosk mode where you do not expect the e
ADMX Info:
-- GP English name: *Handwriting Panel Default Mode Docked*
+- GP Friendly name: *Handwriting Panel Default Mode Docked*
- GP name: *PanelDefaultModeDocked*
- GP path: *Windows Components/Handwriting*
- GP ADMX file name: *Handwriting.admx*
diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md
index 5760215ef8..8222726809 100644
--- a/windows/client-management/mdm/policy-csp-internetexplorer.md
+++ b/windows/client-management/mdm/policy-csp-internetexplorer.md
@@ -863,7 +863,7 @@ If you disable or do not configure this policy setting, the user can configure t
ADMX Info:
-- GP English name: *Add a specific list of search providers to the user's list of search providers*
+- GP Friendly name: *Add a specific list of search providers to the user's list of search providers*
- GP name: *AddSearchProvider*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -934,7 +934,7 @@ If you disable or do not configure this policy setting, ActiveX Filtering is not
ADMX Info:
-- GP English name: *Turn on ActiveX Filtering*
+- GP Friendly name: *Turn on ActiveX Filtering*
- GP name: *TurnOnActiveXFiltering*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -1011,7 +1011,7 @@ If you disable this policy setting, the list is deleted. The 'Deny all add-ons u
ADMX Info:
-- GP English name: *Add-on List*
+- GP Friendly name: *Add-on List*
- GP name: *AddonManagement_AddOnList*
- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -1083,7 +1083,7 @@ If you do not configure this setting, the user has the freedom of turning on Aut
ADMX Info:
-- GP English name: *Turn on the auto-complete feature for user names and passwords on forms*
+- GP Friendly name: *Turn on the auto-complete feature for user names and passwords on forms*
- GP name: *RestrictFormSuggestPW*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -1154,7 +1154,7 @@ If you disable or do not configure this policy setting, the user can choose whet
ADMX Info:
-- GP English name: *Turn on certificate address mismatch warning*
+- GP Friendly name: *Turn on certificate address mismatch warning*
- GP name: *IZ_PolicyWarnCertMismatch*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -1229,7 +1229,7 @@ If the "Prevent access to Delete Browsing History" policy setting is enabled, th
ADMX Info:
-- GP English name: *Allow deleting browsing history on exit*
+- GP Friendly name: *Allow deleting browsing history on exit*
- GP name: *DBHDisableDeleteOnExit*
- GP path: *Windows Components/Internet Explorer/Delete Browsing History*
- GP ADMX file name: *inetres.admx*
@@ -1302,7 +1302,7 @@ If you do not configure this policy, users will be able to turn on or turn off E
ADMX Info:
-- GP English name: *Turn on Enhanced Protected Mode*
+- GP Friendly name: *Turn on Enhanced Protected Mode*
- GP name: *Advanced_EnableEnhancedProtectedMode*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -1375,7 +1375,7 @@ If you do not configure this policy setting, users can change the Suggestions se
ADMX Info:
-- GP English name: *Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar*
+- GP Friendly name: *Allow Microsoft services to provide enhanced suggestions as the user types in the Address bar*
- GP name: *AllowServicePoweredQSA*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -1457,7 +1457,7 @@ If you disable or don't configure this policy setting, the menu option won't app
ADMX Info:
-- GP English name: *Let users turn on and use Enterprise Mode from the Tools menu*
+- GP Friendly name: *Let users turn on and use Enterprise Mode from the Tools menu*
- GP name: *EnterpriseModeEnable*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -1528,7 +1528,7 @@ If you disable or don't configure this policy setting, Internet Explorer opens a
ADMX Info:
-- GP English name: *Use the Enterprise Mode IE website list*
+- GP Friendly name: *Use the Enterprise Mode IE website list*
- GP name: *EnterpriseModeSiteList*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -1600,7 +1600,7 @@ If you disable this policy, system defaults will be used.
ADMX Info:
-- GP English name: *Allow fallback to SSL 3.0 (Internet Explorer)*
+- GP Friendly name: *Allow fallback to SSL 3.0 (Internet Explorer)*
- GP name: *Advanced_EnableSSL3Fallback*
- GP path: *Windows Components/Internet Explorer/Security Features*
- GP ADMX file name: *inetres.admx*
@@ -1671,7 +1671,7 @@ If you disable or do not configure this policy setting, the user can add and rem
ADMX Info:
-- GP English name: *Use Policy List of Internet Explorer 7 sites*
+- GP Friendly name: *Use Policy List of Internet Explorer 7 sites*
- GP name: *CompatView_UsePolicyList*
- GP path: *Windows Components/Internet Explorer/Compatibility View*
- GP ADMX file name: *inetres.admx*
@@ -1744,7 +1744,7 @@ If you do not configure this policy setting, Internet Explorer uses an Internet
ADMX Info:
-- GP English name: *Turn on Internet Explorer Standards Mode for local intranet*
+- GP Friendly name: *Turn on Internet Explorer Standards Mode for local intranet*
- GP name: *CompatView_IntranetSites*
- GP path: *Windows Components/Internet Explorer/Compatibility View*
- GP ADMX file name: *inetres.admx*
@@ -1821,7 +1821,7 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP English name: *Internet Zone Template*
+- GP Friendly name: *Internet Zone Template*
- GP name: *IZ_PolicyInternetZoneTemplate*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -1898,7 +1898,7 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP English name: *Intranet Zone Template*
+- GP Friendly name: *Intranet Zone Template*
- GP name: *IZ_PolicyIntranetZoneTemplate*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -1975,7 +1975,7 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP English name: *Local Machine Zone Template*
+- GP Friendly name: *Local Machine Zone Template*
- GP name: *IZ_PolicyLocalMachineZoneTemplate*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2052,7 +2052,7 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP English name: *Locked-Down Internet Zone Template*
+- GP Friendly name: *Locked-Down Internet Zone Template*
- GP name: *IZ_PolicyInternetZoneLockdownTemplate*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2129,7 +2129,7 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP English name: *Locked-Down Intranet Zone Template*
+- GP Friendly name: *Locked-Down Intranet Zone Template*
- GP name: *IZ_PolicyIntranetZoneLockdownTemplate*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2206,7 +2206,7 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP English name: *Locked-Down Local Machine Zone Template*
+- GP Friendly name: *Locked-Down Local Machine Zone Template*
- GP name: *IZ_PolicyLocalMachineZoneLockdownTemplate*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2283,7 +2283,7 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP English name: *Locked-Down Restricted Sites Zone Template*
+- GP Friendly name: *Locked-Down Restricted Sites Zone Template*
- GP name: *IZ_PolicyRestrictedSitesZoneLockdownTemplate*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2354,7 +2354,7 @@ If you disable or do not configure this policy setting, Internet Explorer does n
ADMX Info:
-- GP English name: *Go to an intranet site for a one-word entry in the Address bar*
+- GP Friendly name: *Go to an intranet site for a one-word entry in the Address bar*
- GP name: *UseIntranetSiteForOneWordEntry*
- GP path: *Windows Components/Internet Explorer/Internet Settings/Advanced settings/Browsing*
- GP ADMX file name: *inetres.admx*
@@ -2426,7 +2426,7 @@ For more information, see [https://go.microsoft.com/fwlink/?linkid=2102115](/dep
ADMX Info:
-- GP English name: *Allow "Save Target As" in Internet Explorer mode*
+- GP Friendly name: *Allow "Save Target As" in Internet Explorer mode*
- GP name: *AllowSaveTargetAsInIEMode*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2518,7 +2518,7 @@ The list is a set of pairs of strings. Each string is separated by F000. Each pa
ADMX Info:
-- GP English name: *Site to Zone Assignment List*
+- GP Friendly name: *Site to Zone Assignment List*
- GP name: *IZ_Zonemaps*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2616,7 +2616,7 @@ If you do not configure this policy, users can choose to run or install files wi
ADMX Info:
-- GP English name: *Allow software to run or install even if the signature is invalid*
+- GP Friendly name: *Allow software to run or install even if the signature is invalid*
- GP name: *Advanced_InvalidSignatureBlock*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -2689,7 +2689,7 @@ If you do not configure this policy setting, the user can turn on and turn off t
ADMX Info:
-- GP English name: *Turn on Suggested Sites*
+- GP Friendly name: *Turn on Suggested Sites*
- GP name: *EnableSuggestedSites*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -2766,7 +2766,7 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP English name: *Trusted Sites Zone Template*
+- GP Friendly name: *Trusted Sites Zone Template*
- GP name: *IZ_PolicyTrustedSitesZoneTemplate*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2843,7 +2843,7 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP English name: *Locked-Down Trusted Sites Zone Template*
+- GP Friendly name: *Locked-Down Trusted Sites Zone Template*
- GP name: *IZ_PolicyTrustedSitesZoneLockdownTemplate*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2920,7 +2920,7 @@ Note. It is recommended to configure template policy settings in one Group Polic
ADMX Info:
-- GP English name: *Restricted Sites Zone Template*
+- GP Friendly name: *Restricted Sites Zone Template*
- GP name: *IZ_PolicyRestrictedSitesZoneTemplate*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -2993,7 +2993,7 @@ If you do not configure this policy setting, Internet Explorer will not check se
ADMX Info:
-- GP English name: *Check for server certificate revocation*
+- GP Friendly name: *Check for server certificate revocation*
- GP name: *Advanced_CertificateRevocation*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -3066,7 +3066,7 @@ If you do not configure this policy, Internet Explorer will not check the digita
ADMX Info:
-- GP English name: *Check for signatures on downloaded programs*
+- GP Friendly name: *Check for signatures on downloaded programs*
- GP name: *Advanced_DownloadSignatures*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -3156,7 +3156,7 @@ If the Windows Update for the next version of Microsoft Edge* or Microsoft Edge
ADMX Info:
-- GP English name: *Configure which channel of Microsoft Edge to use for opening redirected sites*
+- GP Friendly name: *Configure which channel of Microsoft Edge to use for opening redirected sites*
- GP name: *NeedEdgeBrowser*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -3433,7 +3433,7 @@ If you do not configure this policy setting, Internet Explorer requires consiste
ADMX Info:
-- GP English name: *Internet Explorer Processes*
+- GP Friendly name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_5*
- GP path: *Windows Components/Internet Explorer/Security Features/Consistent Mime Handling*
- GP ADMX file name: *inetres.admx*
@@ -3504,7 +3504,7 @@ If you disable or do not configure this setting, IE continues to download update
ADMX Info:
-- GP English name: *Turn off automatic download of the ActiveX VersionList*
+- GP Friendly name: *Turn off automatic download of the ActiveX VersionList*
- GP name: *VersionListAutomaticDownloadDisable*
- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -3588,7 +3588,7 @@ Note that Adobe Flash can still be disabled through the "Add-on List" and "Deny
ADMX Info:
-- GP English name: *Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects*
+- GP Friendly name: *Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects*
- GP name: *DisableFlashInIE*
- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -3659,7 +3659,7 @@ If you disable or do not configure this policy setting, the user can bypass Wind
ADMX Info:
-- GP English name: *Prevent bypassing SmartScreen Filter warnings*
+- GP Friendly name: *Prevent bypassing SmartScreen Filter warnings*
- GP name: *DisableSafetyFilterOverride*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -3730,7 +3730,7 @@ If you disable or do not configure this policy setting, the user can bypass Wind
ADMX Info:
-- GP English name: *Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet*
+- GP Friendly name: *Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet*
- GP name: *DisableSafetyFilterOverrideForAppRepUnknown*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -3801,7 +3801,7 @@ If you disable or do not configure this policy setting, the user can use the Com
ADMX Info:
-- GP English name: *Turn off Compatibility View*
+- GP Friendly name: *Turn off Compatibility View*
- GP name: *CompatView_DisableList*
- GP path: *Windows Components/Internet Explorer/Compatibility View*
- GP ADMX file name: *inetres.admx*
@@ -3883,7 +3883,7 @@ If you disable or do not configure this policy setting, a user can set the numbe
ADMX Info:
-- GP English name: *Disable "Configuring History"*
+- GP Friendly name: *Disable "Configuring History"*
- GP name: *RestrictHistory*
- GP path: *Windows Components/Internet Explorer/Delete Browsing History*
- GP ADMX file name: *inetres.admx*
@@ -3954,7 +3954,7 @@ If you disable or do not configure this policy setting, the crash detection feat
ADMX Info:
-- GP English name: *Turn off Crash Detection*
+- GP Friendly name: *Turn off Crash Detection*
- GP name: *AddonManagement_RestrictCrashDetection*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -4027,7 +4027,7 @@ If you do not configure this policy setting, the user can choose to participate
ADMX Info:
-- GP English name: *Prevent participation in the Customer Experience Improvement Program*
+- GP Friendly name: *Prevent participation in the Customer Experience Improvement Program*
- GP name: *SQM_DisableCEIP*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -4102,7 +4102,7 @@ If the "Prevent access to Delete Browsing History" policy setting is enabled, th
ADMX Info:
-- GP English name: *Prevent deleting websites that the user has visited*
+- GP Friendly name: *Prevent deleting websites that the user has visited*
- GP name: *DBHDisableDeleteHistory*
- GP path: *Windows Components/Internet Explorer/Delete Browsing History*
- GP ADMX file name: *inetres.admx*
@@ -4173,7 +4173,7 @@ If you disable or do not configure this policy setting, the user can set the Fee
ADMX Info:
-- GP English name: *Prevent downloading of enclosures*
+- GP Friendly name: *Prevent downloading of enclosures*
- GP name: *Disable_Downloading_of_Enclosures*
- GP path: *Windows Components/RSS Feeds*
- GP ADMX file name: *inetres.admx*
@@ -4246,7 +4246,7 @@ Note: SSL 2.0 is off by default and is no longer supported starting with Windows
ADMX Info:
-- GP English name: *Turn off encryption support*
+- GP Friendly name: *Turn off encryption support*
- GP name: *Advanced_SetWinInetProtocols*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -4317,7 +4317,7 @@ If you disable or do not configure this policy setting, the user can synchronize
ADMX Info:
-- GP English name: *Turn off background synchronization for feeds and Web Slices*
+- GP Friendly name: *Turn off background synchronization for feeds and Web Slices*
- GP name: *Disable_Background_Syncing*
- GP path: *Windows Components/RSS Feeds*
- GP ADMX file name: *inetres.admx*
@@ -4403,7 +4403,7 @@ If you disable or do not configure this policy setting, Internet Explorer may ru
ADMX Info:
-- GP English name: *Prevent running First Run wizard*
+- GP Friendly name: *Prevent running First Run wizard*
- GP name: *NoFirstRunCustomise*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -4478,7 +4478,7 @@ If you don't configure this setting, users can turn this behavior on or off, usi
ADMX Info:
-- GP English name: *Turn off the flip ahead with page prediction feature*
+- GP Friendly name: *Turn off the flip ahead with page prediction feature*
- GP name: *Advanced_DisableFlipAhead*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -4551,7 +4551,7 @@ If you do not configure this policy setting, browser geolocation support can be
ADMX Info:
-- GP English name: *Turn off browser geolocation*
+- GP Friendly name: *Turn off browser geolocation*
- GP name: *GeolocationDisable*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -4632,7 +4632,7 @@ If you disable or do not configure this policy setting, the Home page box is ena
ADMX Info:
-- GP English name: *Disable changing home page settings*
+- GP Friendly name: *Disable changing home page settings*
- GP name: *RestrictHomePage*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -4708,7 +4708,7 @@ If you disable, or do not configure this policy, all sites are opened using the
ADMX Info:
-- GP English name: *Disable Internet Explorer 11 as a standalone browser*
+- GP Friendly name: *Disable Internet Explorer 11 as a standalone browser*
- GP name: *DisableInternetExplorerApp*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -4797,7 +4797,7 @@ If you disable or do not configure this policy setting, the user can choose to i
ADMX Info:
-- GP English name: *Prevent ignoring certificate errors*
+- GP Friendly name: *Prevent ignoring certificate errors*
- GP name: *NoCertError*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel*
- GP ADMX file name: *inetres.admx*
@@ -4872,7 +4872,7 @@ If you do not configure this policy setting, InPrivate Browsing can be turned on
ADMX Info:
-- GP English name: *Turn off InPrivate Browsing*
+- GP Friendly name: *Turn off InPrivate Browsing*
- GP name: *DisableInPrivateBrowsing*
- GP path: *Windows Components/Internet Explorer/Privacy*
- GP ADMX file name: *inetres.admx*
@@ -4947,7 +4947,7 @@ If you don't configure this policy setting, users can turn this feature on or of
ADMX Info:
-- GP English name: *Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows*
+- GP Friendly name: *Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows*
- GP name: *Advanced_EnableEnhancedProtectedMode64Bit*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -5018,7 +5018,7 @@ If you disable or do not configure this policy setting, the user can configure p
ADMX Info:
-- GP English name: *Prevent changing proxy settings*
+- GP Friendly name: *Prevent changing proxy settings*
- GP name: *RestrictProxy*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -5089,7 +5089,7 @@ If you disable or do not configure this policy setting, the user can change the
ADMX Info:
-- GP English name: *Prevent changing the default search provider*
+- GP Friendly name: *Prevent changing the default search provider*
- GP name: *NoSearchProvider*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -5162,7 +5162,7 @@ Note: If the “Disable Changing Home Page Settings” policy is enabled, the us
ADMX Info:
-- GP English name: *Disable changing secondary home page settings*
+- GP Friendly name: *Disable changing secondary home page settings*
- GP name: *SecondaryHomePages*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -5233,7 +5233,7 @@ If you disable or do not configure this policy setting, the feature is turned on
ADMX Info:
-- GP English name: *Turn off the Security Settings Check feature*
+- GP Friendly name: *Turn off the Security Settings Check feature*
- GP name: *Disable_Security_Settings_Check*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -5305,7 +5305,7 @@ This policy is intended to help the administrator maintain version control for I
ADMX Info:
-- GP English name: *Disable Periodic Check for Internet Explorer software updates*
+- GP Friendly name: *Disable Periodic Check for Internet Explorer software updates*
- GP name: *NoUpdateCheck*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -5378,7 +5378,7 @@ If you do not configure this policy setting, users can choose to turn the auto-c
ADMX Info:
-- GP English name: *Turn off the auto-complete feature for web addresses*
+- GP Friendly name: *Turn off the auto-complete feature for web addresses*
- GP name: *RestrictWebAddressSuggest*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -5464,7 +5464,7 @@ If you disable or do not configure this policy setting, Internet Explorer notifi
ADMX Info:
-- GP English name: *Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled*
+- GP Friendly name: *Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled*
- GP name: *Advanced_DisableEPMCompat*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page*
- GP ADMX file name: *inetres.admx*
@@ -5540,7 +5540,7 @@ Also, see the "Security zones: Use only machine settings" policy.
ADMX Info:
-- GP English name: *Security Zones: Do not allow users to add/delete sites*
+- GP Friendly name: *Security Zones: Do not allow users to add/delete sites*
- GP name: *Security_zones_map_edit*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -5616,7 +5616,7 @@ Also, see the "Security zones: Use only machine settings" policy.
ADMX Info:
-- GP English name: *Security Zones: Do not allow users to change policies*
+- GP Friendly name: *Security Zones: Do not allow users to change policies*
- GP name: *Security_options_edit*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -5689,7 +5689,7 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T
ADMX Info:
-- GP English name: *Turn off blocking of outdated ActiveX controls for Internet Explorer*
+- GP Friendly name: *Turn off blocking of outdated ActiveX controls for Internet Explorer*
- GP name: *VerMgmtDisable*
- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -5766,7 +5766,7 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T
ADMX Info:
-- GP English name: *Turn off blocking of outdated ActiveX controls for Internet Explorer on specific domains*
+- GP Friendly name: *Turn off blocking of outdated ActiveX controls for Internet Explorer on specific domains*
- GP name: *VerMgmtDomainAllowlist*
- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -5839,7 +5839,7 @@ If you do not configure this policy setting, users choose whether to force local
ADMX Info:
-- GP English name: *Intranet Sites: Include all local (intranet) sites not listed in other zones*
+- GP Friendly name: *Intranet Sites: Include all local (intranet) sites not listed in other zones*
- GP name: *IZ_IncludeUnspecifiedLocalSites*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -5912,7 +5912,7 @@ If you do not configure this policy setting, users choose whether network paths
ADMX Info:
-- GP English name: *Intranet Sites: Include all network paths (UNCs)*
+- GP Friendly name: *Intranet Sites: Include all network paths (UNCs)*
- GP name: *IZ_UNCAsIntranet*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page*
- GP ADMX file name: *inetres.admx*
@@ -5985,7 +5985,7 @@ If you do not configure this policy setting, users cannot load a page in the zon
ADMX Info:
-- GP English name: *Access data sources across domains*
+- GP Friendly name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6058,7 +6058,7 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP English name: *Automatic prompting for ActiveX controls*
+- GP Friendly name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6129,7 +6129,7 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP English name: *Automatic prompting for file downloads*
+- GP Friendly name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6204,7 +6204,7 @@ If you do not configure this policy setting, a script can perform a clipboard op
ADMX Info:
-- GP English name: *Allow cut, copy or paste operations from the clipboard via script*
+- GP Friendly name: *Allow cut, copy or paste operations from the clipboard via script*
- GP name: *IZ_PolicyAllowPasteViaScript_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6277,7 +6277,7 @@ If you do not configure this policy setting, users can drag files or copy and pa
ADMX Info:
-- GP English name: *Allow drag and drop or copy and paste files*
+- GP Friendly name: *Allow drag and drop or copy and paste files*
- GP name: *IZ_PolicyDropOrPasteFiles_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6350,7 +6350,7 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP English name: *Allow font downloads*
+- GP Friendly name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6423,7 +6423,7 @@ If you do not configure this policy setting, Web sites from less privileged zone
ADMX Info:
-- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP Friendly name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6496,7 +6496,7 @@ If you do not configure this policy setting, the user can decide whether to load
ADMX Info:
-- GP English name: *Allow loading of XAML files*
+- GP Friendly name: *Allow loading of XAML files*
- GP name: *IZ_Policy_XAML_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6569,7 +6569,7 @@ If you do not configure this policy setting, Internet Explorer will execute unsi
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6640,7 +6640,7 @@ If you disable this policy setting, the user does not see the per-site ActiveX p
ADMX Info:
-- GP English name: *Allow only approved domains to use ActiveX controls without prompt*
+- GP Friendly name: *Allow only approved domains to use ActiveX controls without prompt*
- GP name: *IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Internet*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6711,7 +6711,7 @@ If you disable this policy setting, the TDC Active X control will run from all s
ADMX Info:
-- GP English name: *Allow only approved domains to use the TDC ActiveX control*
+- GP Friendly name: *Allow only approved domains to use the TDC ActiveX control*
- GP name: *IZ_PolicyAllowTDCControl_Both_Internet*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6784,7 +6784,7 @@ If you do not configure this policy setting, the possible harmful actions contai
ADMX Info:
-- GP English name: *Allow script-initiated windows without size or position constraints*
+- GP Friendly name: *Allow script-initiated windows without size or position constraints*
- GP name: *IZ_PolicyWindowsRestrictionsURLaction_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6857,7 +6857,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scripting of Internet Explorer WebBrowser controls*
+- GP Friendly name: *Allow scripting of Internet Explorer WebBrowser controls*
- GP name: *IZ_Policy_WebBrowserControl_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -6930,7 +6930,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scriptlets*
+- GP Friendly name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7005,7 +7005,7 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP English name: *Turn on SmartScreen Filter scan*
+- GP Friendly name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7076,7 +7076,7 @@ If you disable or do not configure this policy setting, script is not allowed to
ADMX Info:
-- GP English name: *Allow updates to status bar via script*
+- GP Friendly name: *Allow updates to status bar via script*
- GP name: *IZ_Policy_ScriptStatusBar_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7149,7 +7149,7 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP English name: *Userdata persistence*
+- GP Friendly name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7224,7 +7224,7 @@ If you do not configure or disable this policy setting, VBScript is prevented fr
ADMX Info:
-- GP English name: *Allow VBScript to run in Internet Explorer*
+- GP Friendly name: *Allow VBScript to run in Internet Explorer*
- GP name: *IZ_PolicyAllowVBScript_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7297,7 +7297,7 @@ If you don't configure this policy setting, Internet Explorer always checks with
ADMX Info:
-- GP English name: *Don't run antimalware programs against ActiveX controls*
+- GP Friendly name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7370,7 +7370,7 @@ If you do not configure this policy setting, users are queried whether to downlo
ADMX Info:
-- GP English name: *Download signed ActiveX controls*
+- GP Friendly name: *Download signed ActiveX controls*
- GP name: *IZ_PolicyDownloadSignedActiveX_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7443,7 +7443,7 @@ If you do not configure this policy setting, users cannot run unsigned controls.
ADMX Info:
-- GP English name: *Download unsigned ActiveX controls*
+- GP Friendly name: *Download unsigned ActiveX controls*
- GP name: *IZ_PolicyDownloadUnsignedActiveX_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7514,7 +7514,7 @@ If you disable this policy setting, the XSS Filter is turned off for sites in th
ADMX Info:
-- GP English name: *Turn on Cross-Site Scripting Filter*
+- GP Friendly name: *Turn on Cross-Site Scripting Filter*
- GP name: *IZ_PolicyTurnOnXSSFilter_Both_Internet*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7589,7 +7589,7 @@ In Internet Explorer 9 and earlier versions, if you disable this policy or do no
ADMX Info:
-- GP English name: *Enable dragging of content from different domains across windows*
+- GP Friendly name: *Enable dragging of content from different domains across windows*
- GP name: *IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7664,7 +7664,7 @@ In Internet Explorer 9 and earlier versions, if you disable this policy setting
ADMX Info:
-- GP English name: *Enable dragging of content from different domains within a window*
+- GP Friendly name: *Enable dragging of content from different domains within a window*
- GP name: *IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7737,7 +7737,7 @@ If you do not configure this policy setting, the MIME Sniffing Safety Feature wi
ADMX Info:
-- GP English name: *Enable MIME Sniffing*
+- GP Friendly name: *Enable MIME Sniffing*
- GP name: *IZ_PolicyMimeSniffingURLaction_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7810,7 +7810,7 @@ If you do not configure this policy setting, the user can turn on or turn off Pr
ADMX Info:
-- GP English name: *Turn on Protected Mode*
+- GP Friendly name: *Turn on Protected Mode*
- GP name: *IZ_Policy_TurnOnProtectedMode_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7883,7 +7883,7 @@ If you do not configure this policy setting, the user can choose whether path in
ADMX Info:
-- GP English name: *Include local path when user is uploading files to a server*
+- GP Friendly name: *Include local path when user is uploading files to a server*
- GP name: *IZ_Policy_LocalPathForUpload_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -7958,7 +7958,7 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP English name: *Initialize and script ActiveX controls not marked as safe*
+- GP Friendly name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8078,7 +8078,7 @@ If you do not configure this policy setting, the permission is set to High Safet
ADMX Info:
-- GP English name: *Java permissions*
+- GP Friendly name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8151,7 +8151,7 @@ If you do not configure this policy setting, users are queried to choose whether
ADMX Info:
-- GP English name: *Launching applications and files in an IFRAME*
+- GP Friendly name: *Launching applications and files in an IFRAME*
- GP name: *IZ_PolicyLaunchAppsAndFilesInIFRAME_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8232,7 +8232,7 @@ If you do not configure this policy setting, logon is set to Automatic logon onl
ADMX Info:
-- GP English name: *Logon options*
+- GP Friendly name: *Logon options*
- GP name: *IZ_PolicyLogon_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8305,7 +8305,7 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP English name: *Navigate windows and frames across different domains*
+- GP Friendly name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8378,7 +8378,7 @@ If you do not configure this policy setting, Internet Explorer will execute sign
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components signed with Authenticode*
- GP name: *IZ_PolicySignedFrameworkComponentsURLaction_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8451,7 +8451,7 @@ If you do not configure this policy setting, the user can configure how the comp
ADMX Info:
-- GP English name: *Show security warning for potentially unsafe files*
+- GP Friendly name: *Show security warning for potentially unsafe files*
- GP name: *IZ_Policy_UnsafeFiles_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8524,7 +8524,7 @@ If you do not configure this policy setting, most unwanted pop-up windows are pr
ADMX Info:
-- GP English name: *Use Pop-up Blocker*
+- GP Friendly name: *Use Pop-up Blocker*
- GP name: *IZ_PolicyBlockPopupWindows_1*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8597,7 +8597,7 @@ If you do not configure this policy setting, users are queried to choose whether
ADMX Info:
-- GP English name: *Access data sources across domains*
+- GP Friendly name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8670,7 +8670,7 @@ If you do not configure this policy setting, users will receive a prompt when a
ADMX Info:
-- GP English name: *Automatic prompting for ActiveX controls*
+- GP Friendly name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8741,7 +8741,7 @@ If you disable or do not configure this setting, users will receive a file downl
ADMX Info:
-- GP English name: *Automatic prompting for file downloads*
+- GP Friendly name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8814,7 +8814,7 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP English name: *Allow font downloads*
+- GP Friendly name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8887,7 +8887,7 @@ If you do not configure this policy setting, Web sites from less privileged zone
ADMX Info:
-- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP Friendly name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -8960,7 +8960,7 @@ If you do not configure this policy setting, Internet Explorer will execute unsi
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -9033,7 +9033,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scriptlets*
+- GP Friendly name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -9108,7 +9108,7 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP English name: *Turn on SmartScreen Filter scan*
+- GP Friendly name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -9181,7 +9181,7 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP English name: *Userdata persistence*
+- GP Friendly name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -9254,7 +9254,7 @@ If you don't configure this policy setting, Internet Explorer won't check with y
ADMX Info:
-- GP English name: *Don't run antimalware programs against ActiveX controls*
+- GP Friendly name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -9329,7 +9329,7 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP English name: *Initialize and script ActiveX controls not marked as safe*
+- GP Friendly name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -9408,7 +9408,7 @@ If you do not configure this policy setting, the permission is set to Medium Saf
ADMX Info:
-- GP English name: *Java permissions*
+- GP Friendly name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -9481,7 +9481,7 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP English name: *Navigate windows and frames across different domains*
+- GP Friendly name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_3*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -9562,7 +9562,7 @@ For more information on how to use this policy together with other related polic
ADMX Info:
-- GP English name: *Keep all Intranet Sites in Internet Explorer*
+- GP Friendly name: *Keep all Intranet Sites in Internet Explorer*
- GP name: *KeepIntranetSitesInInternetExplorer*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -9653,7 +9653,7 @@ If you do not configure this policy setting, users can load a page in the zone t
ADMX Info:
-- GP English name: *Access data sources across domains*
+- GP Friendly name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -9726,7 +9726,7 @@ If you do not configure this policy setting, users will receive a prompt when a
ADMX Info:
-- GP English name: *Automatic prompting for ActiveX controls*
+- GP Friendly name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -9797,7 +9797,7 @@ If you disable or do not configure this setting, users will receive a file downl
ADMX Info:
-- GP English name: *Automatic prompting for file downloads*
+- GP Friendly name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -9870,7 +9870,7 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP English name: *Allow font downloads*
+- GP Friendly name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -9943,7 +9943,7 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP Friendly name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -10016,7 +10016,7 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -10089,7 +10089,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scriptlets*
+- GP Friendly name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -10164,7 +10164,7 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP English name: *Turn on SmartScreen Filter scan*
+- GP Friendly name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -10237,7 +10237,7 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP English name: *Userdata persistence*
+- GP Friendly name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -10310,7 +10310,7 @@ If you don't configure this policy setting, Internet Explorer won't check with y
ADMX Info:
-- GP English name: *Don't run antimalware programs against ActiveX controls*
+- GP Friendly name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -10385,7 +10385,7 @@ If you do not configure this policy setting, users are queried whether to allow
ADMX Info:
-- GP English name: *Initialize and script ActiveX controls not marked as safe*
+- GP Friendly name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -10464,7 +10464,7 @@ If you do not configure this policy setting, the permission is set to Medium Saf
ADMX Info:
-- GP English name: *Java permissions*
+- GP Friendly name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -10537,7 +10537,7 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP English name: *Navigate windows and frames across different domains*
+- GP Friendly name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_9*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -10610,7 +10610,7 @@ If you do not configure this policy setting, users cannot load a page in the zon
ADMX Info:
-- GP English name: *Access data sources across domains*
+- GP Friendly name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -10683,7 +10683,7 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP English name: *Automatic prompting for ActiveX controls*
+- GP Friendly name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -10754,7 +10754,7 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP English name: *Automatic prompting for file downloads*
+- GP Friendly name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -10827,7 +10827,7 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP English name: *Allow font downloads*
+- GP Friendly name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -10900,7 +10900,7 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP Friendly name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -10973,7 +10973,7 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11046,7 +11046,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scriptlets*
+- GP Friendly name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11121,7 +11121,7 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP English name: *Turn on SmartScreen Filter scan*
+- GP Friendly name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11194,7 +11194,7 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP English name: *Userdata persistence*
+- GP Friendly name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11269,7 +11269,7 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP English name: *Initialize and script ActiveX controls not marked as safe*
+- GP Friendly name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11348,7 +11348,7 @@ If you do not configure this policy setting, Java applets are disabled.
ADMX Info:
-- GP English name: *Java permissions*
+- GP Friendly name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11421,7 +11421,7 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP English name: *Navigate windows and frames across different domains*
+- GP Friendly name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_2*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11500,7 +11500,7 @@ If you do not configure this policy setting, Java applets are disabled.
ADMX Info:
-- GP English name: *Java permissions*
+- GP Friendly name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11573,7 +11573,7 @@ If you do not configure this policy setting, users are queried to choose whether
ADMX Info:
-- GP English name: *Access data sources across domains*
+- GP Friendly name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11646,7 +11646,7 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP English name: *Automatic prompting for ActiveX controls*
+- GP Friendly name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11717,7 +11717,7 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP English name: *Automatic prompting for file downloads*
+- GP Friendly name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11790,7 +11790,7 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP English name: *Allow font downloads*
+- GP Friendly name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11863,7 +11863,7 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP Friendly name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -11936,7 +11936,7 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -12009,7 +12009,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scriptlets*
+- GP Friendly name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -12084,7 +12084,7 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP English name: *Turn on SmartScreen Filter scan*
+- GP Friendly name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -12157,7 +12157,7 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP English name: *Userdata persistence*
+- GP Friendly name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -12232,7 +12232,7 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP English name: *Initialize and script ActiveX controls not marked as safe*
+- GP Friendly name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -12305,7 +12305,7 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP English name: *Navigate windows and frames across different domains*
+- GP Friendly name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_4*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
- GP ADMX file name: *inetres.admx*
@@ -12378,7 +12378,7 @@ If you do not configure this policy setting, users can load a page in the zone t
ADMX Info:
-- GP English name: *Access data sources across domains*
+- GP Friendly name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -12451,7 +12451,7 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP English name: *Automatic prompting for ActiveX controls*
+- GP Friendly name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -12522,7 +12522,7 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP English name: *Automatic prompting for file downloads*
+- GP Friendly name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -12595,7 +12595,7 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP English name: *Allow font downloads*
+- GP Friendly name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -12668,7 +12668,7 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP Friendly name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -12741,7 +12741,7 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -12814,7 +12814,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scriptlets*
+- GP Friendly name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -12889,7 +12889,7 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP English name: *Turn on SmartScreen Filter scan*
+- GP Friendly name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -12962,7 +12962,7 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP English name: *Userdata persistence*
+- GP Friendly name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -13037,7 +13037,7 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP English name: *Initialize and script ActiveX controls not marked as safe*
+- GP Friendly name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -13116,7 +13116,7 @@ If you do not configure this policy setting, Java applets are disabled.
ADMX Info:
-- GP English name: *Java permissions*
+- GP Friendly name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -13189,7 +13189,7 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP English name: *Navigate windows and frames across different domains*
+- GP Friendly name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_10*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone*
- GP ADMX file name: *inetres.admx*
@@ -13262,7 +13262,7 @@ If you do not configure this policy setting, users cannot load a page in the zon
ADMX Info:
-- GP English name: *Access data sources across domains*
+- GP Friendly name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -13335,7 +13335,7 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP English name: *Automatic prompting for ActiveX controls*
+- GP Friendly name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -13406,7 +13406,7 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP English name: *Automatic prompting for file downloads*
+- GP Friendly name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -13479,7 +13479,7 @@ If you do not configure this policy setting, users are queried whether to allow
ADMX Info:
-- GP English name: *Allow font downloads*
+- GP Friendly name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -13552,7 +13552,7 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP Friendly name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -13625,7 +13625,7 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -13698,7 +13698,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scriptlets*
+- GP Friendly name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -13773,7 +13773,7 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP English name: *Turn on SmartScreen Filter scan*
+- GP Friendly name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -13846,7 +13846,7 @@ If you do not configure this policy setting, users cannot preserve information i
ADMX Info:
-- GP English name: *Userdata persistence*
+- GP Friendly name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -13921,7 +13921,7 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP English name: *Initialize and script ActiveX controls not marked as safe*
+- GP Friendly name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14000,7 +14000,7 @@ If you do not configure this policy setting, Java applets are disabled.
ADMX Info:
-- GP English name: *Java permissions*
+- GP Friendly name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14073,7 +14073,7 @@ If you do not configure this policy setting, users cannot open other windows and
ADMX Info:
-- GP English name: *Navigate windows and frames across different domains*
+- GP Friendly name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_8*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14146,7 +14146,7 @@ If you do not configure this policy setting, users can load a page in the zone t
ADMX Info:
-- GP English name: *Access data sources across domains*
+- GP Friendly name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14219,7 +14219,7 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP English name: *Automatic prompting for ActiveX controls*
+- GP Friendly name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14290,7 +14290,7 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP English name: *Automatic prompting for file downloads*
+- GP Friendly name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14363,7 +14363,7 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP English name: *Allow font downloads*
+- GP Friendly name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14436,7 +14436,7 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP Friendly name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14509,7 +14509,7 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14582,7 +14582,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scriptlets*
+- GP Friendly name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14657,7 +14657,7 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP English name: *Turn on SmartScreen Filter scan*
+- GP Friendly name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14730,7 +14730,7 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP English name: *Userdata persistence*
+- GP Friendly name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14805,7 +14805,7 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP English name: *Initialize and script ActiveX controls not marked as safe*
+- GP Friendly name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14884,7 +14884,7 @@ If you do not configure this policy setting, Java applets are disabled.
ADMX Info:
-- GP English name: *Java permissions*
+- GP Friendly name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -14957,7 +14957,7 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP English name: *Navigate windows and frames across different domains*
+- GP Friendly name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_6*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -15030,7 +15030,7 @@ If you do not configure this policy setting, the MK Protocol is prevented for Fi
ADMX Info:
-- GP English name: *Internet Explorer Processes*
+- GP Friendly name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_3*
- GP path: *Windows Components/Internet Explorer/Security Features/MK Protocol Security Restriction*
- GP ADMX file name: *inetres.admx*
@@ -15103,7 +15103,7 @@ If you do not configure this policy setting, MIME sniffing will never promote a
ADMX Info:
-- GP English name: *Internet Explorer Processes*
+- GP Friendly name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_6*
- GP path: *Windows Components/Internet Explorer/Security Features/Mime Sniffing Safety Feature*
- GP ADMX file name: *inetres.admx*
@@ -15174,7 +15174,7 @@ If you disable or do not configure this policy setting, users can select their p
ADMX Info:
-- GP English name: *Specify default behavior for a new tab*
+- GP Friendly name: *Specify default behavior for a new tab*
- GP name: *NewTabAction*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -15261,7 +15261,7 @@ If you do not configure this policy setting, the Notification bar will be displa
ADMX Info:
-- GP English name: *Internet Explorer Processes*
+- GP Friendly name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_10*
- GP path: *Windows Components/Internet Explorer/Security Features/Notification bar*
- GP ADMX file name: *inetres.admx*
@@ -15332,7 +15332,7 @@ If you disable or do not configure this policy setting, the user is prompted to
ADMX Info:
-- GP English name: *Prevent managing SmartScreen Filter*
+- GP Friendly name: *Prevent managing SmartScreen Filter*
- GP name: *Disable_Managing_Safety_Filter_IE9*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -15403,7 +15403,7 @@ If you disable or do not configure this policy setting, ActiveX controls can be
ADMX Info:
-- GP English name: *Prevent per-user installation of ActiveX controls*
+- GP Friendly name: *Prevent per-user installation of ActiveX controls*
- GP name: *DisablePerUserActiveXInstall*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -15476,7 +15476,7 @@ If you do not configure this policy setting, any zone can be protected from zone
ADMX Info:
-- GP English name: *Internet Explorer Processes*
+- GP Friendly name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_9*
- GP path: *Windows Components/Internet Explorer/Security Features/Protection From Zone Elevation*
- GP ADMX file name: *inetres.admx*
@@ -15549,7 +15549,7 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T
ADMX Info:
-- GP English name: *Remove "Run this time" button for outdated ActiveX controls in Internet Explorer*
+- GP Friendly name: *Remove "Run this time" button for outdated ActiveX controls in Internet Explorer*
- GP name: *VerMgmtDisableRunThisTime*
- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
- GP ADMX file name: *inetres.admx*
@@ -15622,7 +15622,7 @@ If you do not configure this policy setting, the user's preference will be used
ADMX Info:
-- GP English name: *Internet Explorer Processes*
+- GP Friendly name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_11*
- GP path: *Windows Components/Internet Explorer/Security Features/Restrict ActiveX Install*
- GP ADMX file name: *inetres.admx*
@@ -15695,7 +15695,7 @@ If you do not configure this policy setting, the user's preference determines wh
ADMX Info:
-- GP English name: *Internet Explorer Processes*
+- GP Friendly name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_12*
- GP path: *Windows Components/Internet Explorer/Security Features/Restrict File Download*
- GP ADMX file name: *inetres.admx*
@@ -15768,7 +15768,7 @@ If you do not configure this policy setting, users cannot load a page in the zon
ADMX Info:
-- GP English name: *Access data sources across domains*
+- GP Friendly name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -15841,7 +15841,7 @@ If you do not configure this policy setting, script code on pages in the zone is
ADMX Info:
-- GP English name: *Allow active scripting*
+- GP Friendly name: *Allow active scripting*
- GP name: *IZ_PolicyActiveScripting_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -15914,7 +15914,7 @@ If you do not configure this policy setting, ActiveX control installations will
ADMX Info:
-- GP English name: *Automatic prompting for ActiveX controls*
+- GP Friendly name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -15985,7 +15985,7 @@ If you disable or do not configure this setting, file downloads that are not use
ADMX Info:
-- GP English name: *Automatic prompting for file downloads*
+- GP Friendly name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16058,7 +16058,7 @@ If you do not configure this policy setting, binary and script behaviors are not
ADMX Info:
-- GP English name: *Allow binary and script behaviors*
+- GP Friendly name: *Allow binary and script behaviors*
- GP name: *IZ_PolicyBinaryBehaviors_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16133,7 +16133,7 @@ If you do not configure this policy setting, a script cannot perform a clipboard
ADMX Info:
-- GP English name: *Allow cut, copy or paste operations from the clipboard via script*
+- GP Friendly name: *Allow cut, copy or paste operations from the clipboard via script*
- GP name: *IZ_PolicyAllowPasteViaScript_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16206,7 +16206,7 @@ If you do not configure this policy setting, users are queried to choose whether
ADMX Info:
-- GP English name: *Allow drag and drop or copy and paste files*
+- GP Friendly name: *Allow drag and drop or copy and paste files*
- GP name: *IZ_PolicyDropOrPasteFiles_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16279,7 +16279,7 @@ If you do not configure this policy setting, files are prevented from being down
ADMX Info:
-- GP English name: *Allow file downloads*
+- GP Friendly name: *Allow file downloads*
- GP name: *IZ_PolicyFileDownload_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16352,7 +16352,7 @@ If you do not configure this policy setting, users are queried whether to allow
ADMX Info:
-- GP English name: *Allow font downloads*
+- GP Friendly name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16425,7 +16425,7 @@ If you do not configure this policy setting, the possibly harmful navigations ar
ADMX Info:
-- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP Friendly name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16498,7 +16498,7 @@ If you do not configure this policy setting, the user can decide whether to load
ADMX Info:
-- GP English name: *Allow loading of XAML files*
+- GP Friendly name: *Allow loading of XAML files*
- GP name: *IZ_Policy_XAML_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16571,7 +16571,7 @@ If you do not configure this policy setting, a user's browser that loads a page
ADMX Info:
-- GP English name: *Allow META REFRESH*
+- GP Friendly name: *Allow META REFRESH*
- GP name: *IZ_PolicyAllowMETAREFRESH_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16644,7 +16644,7 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16715,7 +16715,7 @@ If you disable this policy setting, the user does not see the per-site ActiveX p
ADMX Info:
-- GP English name: *Allow only approved domains to use ActiveX controls without prompt*
+- GP Friendly name: *Allow only approved domains to use ActiveX controls without prompt*
- GP name: *IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16786,7 +16786,7 @@ If you disable this policy setting, the TDC Active X control will run from all s
ADMX Info:
-- GP English name: *Allow only approved domains to use the TDC ActiveX control*
+- GP Friendly name: *Allow only approved domains to use the TDC ActiveX control*
- GP name: *IZ_PolicyAllowTDCControl_Both_Restricted*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16859,7 +16859,7 @@ If you do not configure this policy setting, the possible harmful actions contai
ADMX Info:
-- GP English name: *Allow script-initiated windows without size or position constraints*
+- GP Friendly name: *Allow script-initiated windows without size or position constraints*
- GP name: *IZ_PolicyWindowsRestrictionsURLaction_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -16932,7 +16932,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scripting of Internet Explorer WebBrowser controls*
+- GP Friendly name: *Allow scripting of Internet Explorer WebBrowser controls*
- GP name: *IZ_Policy_WebBrowserControl_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17005,7 +17005,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scriptlets*
+- GP Friendly name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17080,7 +17080,7 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP English name: *Turn on SmartScreen Filter scan*
+- GP Friendly name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17151,7 +17151,7 @@ If you disable or do not configure this policy setting, script is not allowed to
ADMX Info:
-- GP English name: *Allow updates to status bar via script*
+- GP Friendly name: *Allow updates to status bar via script*
- GP name: *IZ_Policy_ScriptStatusBar_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17224,7 +17224,7 @@ If you do not configure this policy setting, users cannot preserve information i
ADMX Info:
-- GP English name: *Userdata persistence*
+- GP Friendly name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17299,7 +17299,7 @@ If you do not configure or disable this policy setting, VBScript is prevented fr
ADMX Info:
-- GP English name: *Allow VBScript to run in Internet Explorer*
+- GP Friendly name: *Allow VBScript to run in Internet Explorer*
- GP name: *IZ_PolicyAllowVBScript_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17372,7 +17372,7 @@ If you don't configure this policy setting, Internet Explorer always checks with
ADMX Info:
-- GP English name: *Don't run antimalware programs against ActiveX controls*
+- GP Friendly name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17445,7 +17445,7 @@ If you do not configure this policy setting, signed controls cannot be downloade
ADMX Info:
-- GP English name: *Download signed ActiveX controls*
+- GP Friendly name: *Download signed ActiveX controls*
- GP name: *IZ_PolicyDownloadSignedActiveX_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17518,7 +17518,7 @@ If you do not configure this policy setting, users cannot run unsigned controls.
ADMX Info:
-- GP English name: *Download unsigned ActiveX controls*
+- GP Friendly name: *Download unsigned ActiveX controls*
- GP name: *IZ_PolicyDownloadUnsignedActiveX_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17589,7 +17589,7 @@ If you disable this policy setting, the XSS Filter is turned off for sites in th
ADMX Info:
-- GP English name: *Turn on Cross-Site Scripting Filter*
+- GP Friendly name: *Turn on Cross-Site Scripting Filter*
- GP name: *IZ_PolicyTurnOnXSSFilter_Both_Restricted*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17664,7 +17664,7 @@ In Internet Explorer 9 and earlier versions, if you disable this policy or do no
ADMX Info:
-- GP English name: *Enable dragging of content from different domains across windows*
+- GP Friendly name: *Enable dragging of content from different domains across windows*
- GP name: *IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17739,7 +17739,7 @@ In Internet Explorer 9 and earlier versions, if you disable this policy setting
ADMX Info:
-- GP English name: *Enable dragging of content from different domains within a window*
+- GP Friendly name: *Enable dragging of content from different domains within a window*
- GP name: *IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17812,7 +17812,7 @@ If you do not configure this policy setting, the actions that may be harmful can
ADMX Info:
-- GP English name: *Enable MIME Sniffing*
+- GP Friendly name: *Enable MIME Sniffing*
- GP name: *IZ_PolicyMimeSniffingURLaction_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17885,7 +17885,7 @@ If you do not configure this policy setting, the user can choose whether path in
ADMX Info:
-- GP English name: *Include local path when user is uploading files to a server*
+- GP Friendly name: *Include local path when user is uploading files to a server*
- GP name: *IZ_Policy_LocalPathForUpload_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -17960,7 +17960,7 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad
ADMX Info:
-- GP English name: *Initialize and script ActiveX controls not marked as safe*
+- GP Friendly name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18039,7 +18039,7 @@ If you do not configure this policy setting, Java applets are disabled.
ADMX Info:
-- GP English name: *Java permissions*
+- GP Friendly name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18112,7 +18112,7 @@ If you do not configure this policy setting, users are prevented from running ap
ADMX Info:
-- GP English name: *Launching applications and files in an IFRAME*
+- GP Friendly name: *Launching applications and files in an IFRAME*
- GP name: *IZ_PolicyLaunchAppsAndFilesInIFRAME_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18193,7 +18193,7 @@ If you do not configure this policy setting, logon is set to Prompt for username
ADMX Info:
-- GP English name: *Logon options*
+- GP Friendly name: *Logon options*
- GP name: *IZ_PolicyLogon_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18266,7 +18266,7 @@ If you do not configure this policy setting, users cannot open other windows and
ADMX Info:
-- GP English name: *Navigate windows and frames across different domains*
+- GP Friendly name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18341,7 +18341,7 @@ If you do not configure this policy setting, controls and plug-ins are prevented
ADMX Info:
-- GP English name: *Run ActiveX controls and plugins*
+- GP Friendly name: *Run ActiveX controls and plugins*
- GP name: *IZ_PolicyRunActiveXControls_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18414,7 +18414,7 @@ If you do not configure this policy setting, Internet Explorer will not execute
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components signed with Authenticode*
- GP name: *IZ_PolicySignedFrameworkComponentsURLaction_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18489,7 +18489,7 @@ If you do not configure this policy setting, script interaction is prevented fro
ADMX Info:
-- GP English name: *Script ActiveX controls marked safe for scripting*
+- GP Friendly name: *Script ActiveX controls marked safe for scripting*
- GP name: *IZ_PolicyScriptActiveXMarkedSafe_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18564,7 +18564,7 @@ If you do not configure this policy setting, scripts are prevented from accessin
ADMX Info:
-- GP English name: *Scripting of Java applets*
+- GP Friendly name: *Scripting of Java applets*
- GP name: *IZ_PolicyScriptingOfJavaApplets_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18637,7 +18637,7 @@ If you do not configure this policy setting, the user can configure how the comp
ADMX Info:
-- GP English name: *Show security warning for potentially unsafe files*
+- GP Friendly name: *Show security warning for potentially unsafe files*
- GP name: *IZ_Policy_UnsafeFiles_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18710,7 +18710,7 @@ If you do not configure this policy setting, the user can turn on or turn off Pr
ADMX Info:
-- GP English name: *Turn on Protected Mode*
+- GP Friendly name: *Turn on Protected Mode*
- GP name: *IZ_Policy_TurnOnProtectedMode_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18783,7 +18783,7 @@ If you do not configure this policy setting, most unwanted pop-up windows are pr
ADMX Info:
-- GP English name: *Use Pop-up Blocker*
+- GP Friendly name: *Use Pop-up Blocker*
- GP name: *IZ_PolicyBlockPopupWindows_7*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -18856,7 +18856,7 @@ If you do not configure this policy setting, popup windows and other restriction
ADMX Info:
-- GP English name: *Internet Explorer Processes*
+- GP Friendly name: *Internet Explorer Processes*
- GP name: *IESF_PolicyExplorerProcesses_8*
- GP path: *Windows Components/Internet Explorer/Security Features/Scripted Window Security Restrictions*
- GP ADMX file name: *inetres.admx*
@@ -18927,7 +18927,7 @@ If you disable or do not configure this policy setting, the user can configure h
ADMX Info:
-- GP English name: *Restrict search providers to a specific list*
+- GP Friendly name: *Restrict search providers to a specific list*
- GP name: *SpecificSearchProvider*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -19001,7 +19001,7 @@ Also, see the "Security zones: Do not allow users to change policies" policy.
ADMX Info:
-- GP English name: *Security Zones: Use only machine settings*
+- GP Friendly name: *Security Zones: Use only machine settings*
- GP name: *Security_HKLM_only*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -19075,7 +19075,7 @@ If you disable, or not configure this setting, then it opens all sites based on
ADMX Info:
-- GP English name: *Send all sites not included in the Enterprise Mode Site List to Microsoft Edge*
+- GP Friendly name: *Send all sites not included in the Enterprise Mode Site List to Microsoft Edge*
- GP name: *RestrictInternetExplorer*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -19166,7 +19166,7 @@ If you disable or do not configure this policy setting, ActiveX controls, includ
ADMX Info:
-- GP English name: *Specify use of ActiveX Installer Service for installation of ActiveX controls*
+- GP Friendly name: *Specify use of ActiveX Installer Service for installation of ActiveX controls*
- GP name: *OnlyUseAXISForActiveXInstall*
- GP path: *Windows Components/Internet Explorer*
- GP ADMX file name: *inetres.admx*
@@ -19239,7 +19239,7 @@ If you do not configure this policy setting, users can load a page in the zone t
ADMX Info:
-- GP English name: *Access data sources across domains*
+- GP Friendly name: *Access data sources across domains*
- GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -19312,7 +19312,7 @@ If you do not configure this policy setting, users will receive a prompt when a
ADMX Info:
-- GP English name: *Automatic prompting for ActiveX controls*
+- GP Friendly name: *Automatic prompting for ActiveX controls*
- GP name: *IZ_PolicyNotificationBarActiveXURLaction_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -19383,7 +19383,7 @@ If you disable or do not configure this setting, users will receive a file downl
ADMX Info:
-- GP English name: *Automatic prompting for file downloads*
+- GP Friendly name: *Automatic prompting for file downloads*
- GP name: *IZ_PolicyNotificationBarDownloadURLaction_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -19456,7 +19456,7 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa
ADMX Info:
-- GP English name: *Allow font downloads*
+- GP Friendly name: *Allow font downloads*
- GP name: *IZ_PolicyFontDownload_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -19529,7 +19529,7 @@ If you do not configure this policy setting, a warning is issued to the user tha
ADMX Info:
-- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
+- GP Friendly name: *Web sites in less privileged Web content zones can navigate into this zone*
- GP name: *IZ_PolicyZoneElevationURLaction_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -19602,7 +19602,7 @@ If you do not configure this policy setting, Internet Explorer will execute unsi
ADMX Info:
-- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
+- GP Friendly name: *Run .NET Framework-reliant components not signed with Authenticode*
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -19675,7 +19675,7 @@ If you do not configure this policy setting, the user can enable or disable scri
ADMX Info:
-- GP English name: *Allow scriptlets*
+- GP Friendly name: *Allow scriptlets*
- GP name: *IZ_Policy_AllowScriptlets_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -19750,7 +19750,7 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt
ADMX Info:
-- GP English name: *Turn on SmartScreen Filter scan*
+- GP Friendly name: *Turn on SmartScreen Filter scan*
- GP name: *IZ_Policy_Phishing_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -19823,7 +19823,7 @@ If you do not configure this policy setting, users can preserve information in t
ADMX Info:
-- GP English name: *Userdata persistence*
+- GP Friendly name: *Userdata persistence*
- GP name: *IZ_PolicyUserdataPersistence_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -19896,7 +19896,7 @@ If you don't configure this policy setting, Internet Explorer won't check with y
ADMX Info:
-- GP English name: *Don't run antimalware programs against ActiveX controls*
+- GP Friendly name: *Don't run antimalware programs against ActiveX controls*
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -19971,7 +19971,7 @@ If you do not configure this policy setting, users are queried whether to allow
ADMX Info:
-- GP English name: *Initialize and script ActiveX controls not marked as safe*
+- GP Friendly name: *Initialize and script ActiveX controls not marked as safe*
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -20050,7 +20050,7 @@ If you do not configure this policy setting, the permission is set to Low Safety
ADMX Info:
-- GP English name: *Java permissions*
+- GP Friendly name: *Java permissions*
- GP name: *IZ_PolicyJavaPermissions_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
@@ -20123,7 +20123,7 @@ If you do not configure this policy setting, users can open windows and frames f
ADMX Info:
-- GP English name: *Navigate windows and frames across different domains*
+- GP Friendly name: *Navigate windows and frames across different domains*
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_5*
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
- GP ADMX file name: *inetres.admx*
diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md
index b5331fa661..2b2391edc6 100644
--- a/windows/client-management/mdm/policy-csp-kerberos.md
+++ b/windows/client-management/mdm/policy-csp-kerberos.md
@@ -104,7 +104,7 @@ If you disable or do not configure this policy setting, the Kerberos client does
ADMX Info:
-- GP English name: *Use forest search order*
+- GP Friendly name: *Use forest search order*
- GP name: *ForestSearch*
- GP path: *System/Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -173,7 +173,7 @@ If you disable or do not configure this policy setting, the client devices will
ADMX Info:
-- GP English name: *Kerberos client support for claims, compound authentication and Kerberos armoring*
+- GP Friendly name: *Kerberos client support for claims, compound authentication and Kerberos armoring*
- GP name: *EnableCbacAndArmor*
- GP path: *System/Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -247,7 +247,7 @@ If you disable or do not configure this policy setting, the client computers in
ADMX Info:
-- GP English name: *Fail authentication requests when Kerberos armoring is not available*
+- GP Friendly name: *Fail authentication requests when Kerberos armoring is not available*
- GP name: *ClientRequireFast*
- GP path: *System/Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -317,7 +317,7 @@ If you disable or do not configure this policy setting, the Kerberos client requ
ADMX Info:
-- GP English name: *Require strict KDC validation*
+- GP Friendly name: *Require strict KDC validation*
- GP name: *ValidateKDC*
- GP path: *System/Kerberos*
- GP ADMX file name: *Kerberos.admx*
@@ -391,7 +391,7 @@ Note: This policy setting configures the existing MaxTokenSize registry value in
ADMX Info:
-- GP English name: *Set maximum Kerberos SSPI context token buffer size*
+- GP Friendly name: *Set maximum Kerberos SSPI context token buffer size*
- GP name: *MaxTokenSize*
- GP path: *System/Kerberos*
- GP ADMX file name: *Kerberos.admx*
diff --git a/windows/client-management/mdm/policy-csp-lanmanworkstation.md b/windows/client-management/mdm/policy-csp-lanmanworkstation.md
index bb03f10884..f7c4cf4015 100644
--- a/windows/client-management/mdm/policy-csp-lanmanworkstation.md
+++ b/windows/client-management/mdm/policy-csp-lanmanworkstation.md
@@ -85,7 +85,7 @@ Insecure guest logons are used by file servers to allow unauthenticated access t
ADMX Info:
-- GP English name: *Enable insecure guest logons*
+- GP Friendly name: *Enable insecure guest logons*
- GP name: *Pol_EnableInsecureGuestLogons*
- GP path: *Network/Lanman Workstation*
- GP ADMX file name: *LanmanWorkstation.admx*
diff --git a/windows/client-management/mdm/policy-csp-licensing.md b/windows/client-management/mdm/policy-csp-licensing.md
index bfef6090cc..3bc05c7260 100644
--- a/windows/client-management/mdm/policy-csp-licensing.md
+++ b/windows/client-management/mdm/policy-csp-licensing.md
@@ -82,7 +82,7 @@ Added in Windows 10, version 1607. Enables or Disable Windows license reactivat
ADMX Info:
-- GP English name: *Control Device Reactivation for Retail devices*
+- GP Friendly name: *Control Device Reactivation for Retail devices*
- GP name: *AllowWindowsEntitlementReactivation*
- GP path: *Windows Components/Software Protection Platform*
- GP ADMX file name: *AVSValidationGP.admx*
@@ -148,7 +148,7 @@ Added in Windows 10, version 1607. Enabling this setting prevents this computer
ADMX Info:
-- GP English name: *Turn off KMS Client Online AVS Validation*
+- GP Friendly name: *Turn off KMS Client Online AVS Validation*
- GP name: *NoAcquireGT*
- GP path: *Windows Components/Software Protection Platform*
- GP ADMX file name: *AVSValidationGP.admx*
diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
index 0d4580ee4b..c004295d70 100644
--- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
+++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
@@ -224,7 +224,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Accounts: Block Microsoft accounts*
+- GP Friendly name: *Accounts: Block Microsoft accounts*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -302,7 +302,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Accounts: Limit local account use of blank passwords to console logon only*
+- GP Friendly name: *Accounts: Limit local account use of blank passwords to console logon only*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -371,7 +371,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Accounts: Rename administrator account*
+- GP Friendly name: *Accounts: Rename administrator account*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -434,7 +434,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Accounts: Rename guest account*
+- GP Friendly name: *Accounts: Rename guest account*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -498,7 +498,7 @@ Disabling this policy may tempt users to try and physically remove the laptop fr
GP Info:
-- GP English name: *Devices: Allow undock without having to log on*
+- GP Friendly name: *Devices: Allow undock without having to log on*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -562,7 +562,7 @@ Default: This policy is not defined and only Administrators have this ability.
GP Info:
-- GP English name: *Devices: Allowed to format and eject removable media*
+- GP Friendly name: *Devices: Allowed to format and eject removable media*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -628,7 +628,7 @@ This setting does not affect the ability to add a local printer. This setting do
GP Info:
-- GP English name: *Devices: Prevent users from installing printer drivers*
+- GP Friendly name: *Devices: Prevent users from installing printer drivers*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -691,7 +691,7 @@ Default: This policy is not defined and CD-ROM access is not restricted to the l
GP Info:
-- GP English name: *Devices: Restrict CD-ROM access to locally logged-on user only*
+- GP Friendly name: *Devices: Restrict CD-ROM access to locally logged-on user only*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -751,7 +751,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Interactive logon: Display user information when the session is locked*
+- GP Friendly name: *Interactive logon: Display user information when the session is locked*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -824,7 +824,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Interactive logon: Don't display last signed-in*
+- GP Friendly name: *Interactive logon: Don't display last signed-in*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -897,7 +897,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Interactive logon: Don't display username at sign-in*
+- GP Friendly name: *Interactive logon: Don't display username at sign-in*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -971,7 +971,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Interactive logon: Do not require CTRL+ALT+DEL*
+- GP Friendly name: *Interactive logon: Do not require CTRL+ALT+DEL*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1040,7 +1040,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Interactive logon: Machine inactivity limit*
+- GP Friendly name: *Interactive logon: Machine inactivity limit*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1109,7 +1109,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Interactive logon: Message text for users attempting to log on*
+- GP Friendly name: *Interactive logon: Message text for users attempting to log on*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1172,7 +1172,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Interactive logon: Message title for users attempting to log on*
+- GP Friendly name: *Interactive logon: Message title for users attempting to log on*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1251,7 +1251,7 @@ On Windows Vista and above: For this setting to work, the Smart Card Removal Pol
GP Info:
-- GP English name: *Interactive logon: Smart card removal behavior*
+- GP Friendly name: *Interactive logon: Smart card removal behavior*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1327,7 +1327,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
GP Info:
-- GP English name: *Microsoft network client: Digitally sign communications (if server agrees)*
+- GP Friendly name: *Microsoft network client: Digitally sign communications (if server agrees)*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1390,7 +1390,7 @@ Default: Disabled.
GP Info:
-- GP English name: *Microsoft network client: Send unencrypted password to third-party SMB servers*
+- GP Friendly name: *Microsoft network client: Send unencrypted password to third-party SMB servers*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1459,7 +1459,7 @@ Default:This policy is not defined, which means that the system treats it as 15
GP Info:
-- GP English name: *Microsoft network server: Amount of idle time required before suspending session*
+- GP Friendly name: *Microsoft network server: Amount of idle time required before suspending session*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1556,7 +1556,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
GP Info:
-- GP English name: *Microsoft network server: Digitally sign communications (always)*
+- GP Friendly name: *Microsoft network server: Digitally sign communications (always)*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1636,7 +1636,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
GP Info:
-- GP English name: *Microsoft network server: Digitally sign communications (if client agrees)*
+- GP Friendly name: *Microsoft network server: Digitally sign communications (if client agrees)*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1709,7 +1709,7 @@ This policy has no impact on domain controllers.
GP Info:
-- GP English name: *Network access: Do not allow anonymous enumeration of SAM accounts*
+- GP Friendly name: *Network access: Do not allow anonymous enumeration of SAM accounts*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1772,7 +1772,7 @@ Default: Disabled.
GP Info:
-- GP English name: *Network access: Do not allow anonymous enumeration of SAM accounts and shares*
+- GP Friendly name: *Network access: Do not allow anonymous enumeration of SAM accounts and shares*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1835,7 +1835,7 @@ Default: Enabled.
GP Info:
-- GP English name: *Network access: Restrict anonymous access to Named Pipes and Shares*
+- GP Friendly name: *Network access: Restrict anonymous access to Named Pipes and Shares*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1898,7 +1898,7 @@ This policy is supported on at least Windows Server 2016.
GP Info:
-- GP English name: *Network access: Restrict clients allowed to make remote calls to SAM*
+- GP Friendly name: *Network access: Restrict clients allowed to make remote calls to SAM*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -1959,7 +1959,7 @@ When a service connects with the device identity, signing and encryption are sup
GP Info:
-- GP English name: *Network security: Allow Local System to use computer identity for NTLM*
+- GP Friendly name: *Network security: Allow Local System to use computer identity for NTLM*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2027,7 +2027,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Network security: Allow PKU2U authentication requests to this computer to use online identities.*
+- GP Friendly name: *Network security: Allow PKU2U authentication requests to this computer to use online identities.*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2101,7 +2101,7 @@ This setting can affect the ability of computers running Windows 2000 Server, Wi
GP Info:
-- GP English name: *Network security: Do not store LAN Manager hash value on next password change*
+- GP Friendly name: *Network security: Do not store LAN Manager hash value on next password change*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2184,7 +2184,7 @@ Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send
GP Info:
-- GP English name: *Network security: LAN Manager authentication level*
+- GP Friendly name: *Network security: LAN Manager authentication level*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2252,7 +2252,7 @@ Windows 7 and Windows Server 2008 R2: Require 128-bit encryption.
GP Info:
-- GP English name: *Network security: Minimum session security for NTLM SSP based (including secure RPC) clients*
+- GP Friendly name: *Network security: Minimum session security for NTLM SSP based (including secure RPC) clients*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2320,7 +2320,7 @@ Windows 7 and Windows Server 2008 R2: Require 128-bit encryption
GP Info:
-- GP English name: *Network security: Minimum session security for NTLM SSP based (including secure RPC) servers*
+- GP Friendly name: *Network security: Minimum session security for NTLM SSP based (including secure RPC) servers*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2385,7 +2385,7 @@ The naming format for servers on this exception list is the fully qualified doma
GP Info:
-- GP English name: *Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication*
+- GP Friendly name: *Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2464,7 +2464,7 @@ This policy is supported on at least Windows 7 or Windows Server 2008 R2.
GP Info:
-- GP English name: *Network security: Restrict NTLM: Audit Incoming NTLM Traffic*
+- GP Friendly name: *Network security: Restrict NTLM: Audit Incoming NTLM Traffic*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2543,7 +2543,7 @@ This policy is supported on at least Windows 7 or Windows Server 2008 R2.
GP Info:
-- GP English name: *Network security: Restrict NTLM: Incoming NTLM traffic*
+- GP Friendly name: *Network security: Restrict NTLM: Incoming NTLM traffic*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2622,7 +2622,7 @@ This policy is supported on at least Windows 7 or Windows Server 2008 R2.
GP Info:
-- GP English name: *Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers*
+- GP Friendly name: *Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2699,7 +2699,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *Shutdown: Allow system to be shut down without having to log on*
+- GP Friendly name: *Shutdown: Allow system to be shut down without having to log on*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2770,7 +2770,7 @@ Default: Disabled.
GP Info:
-- GP English name: *Shutdown: Clear virtual memory pagefile*
+- GP Friendly name: *Shutdown: Clear virtual memory pagefile*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2837,7 +2837,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop*
+- GP Friendly name: *User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2920,7 +2920,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode*
+- GP Friendly name: *User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -2980,7 +2980,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *User Account Control: Behavior of the elevation prompt for standard users*
+- GP Friendly name: *User Account Control: Behavior of the elevation prompt for standard users*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -3053,7 +3053,7 @@ Disabled: Application installation packages are not detected and prompted for el
GP Info:
-- GP English name: *User Account Control: Detect application installations and prompt for elevation*
+- GP Friendly name: *User Account Control: Detect application installations and prompt for elevation*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -3118,7 +3118,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *User Account Control: Only elevate executables that are signed and validated*
+- GP Friendly name: *User Account Control: Only elevate executables that are signed and validated*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -3190,7 +3190,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *User Account Control: Only elevate UIAccess applications that are installed in secure locations*
+- GP Friendly name: *User Account Control: Only elevate UIAccess applications that are installed in secure locations*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -3258,7 +3258,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *User Account Control: Run all administrators in Admin Approval Mode*
+- GP Friendly name: *User Account Control: Run all administrators in Admin Approval Mode*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -3323,7 +3323,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *User Account Control: Switch to the secure desktop when prompting for elevation*
+- GP Friendly name: *User Account Control: Switch to the secure desktop when prompting for elevation*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -3388,7 +3388,7 @@ The options are:
GP Info:
-- GP English name: *User Account Control: Admin Approval Mode for the Built-in Administrator account*
+- GP Friendly name: *User Account Control: Admin Approval Mode for the Built-in Administrator account*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
@@ -3449,7 +3449,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
GP Info:
-- GP English name: *User Account Control: Virtualize file and registry write failures to per-user locations*
+- GP Friendly name: *User Account Control: Virtualize file and registry write failures to per-user locations*
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md
index bc065532ed..774ac1a21f 100644
--- a/windows/client-management/mdm/policy-csp-lockdown.md
+++ b/windows/client-management/mdm/policy-csp-lockdown.md
@@ -81,7 +81,7 @@ The easiest way to verify the policy is to restart the explorer process or to re
ADMX Info:
-- GP English name: *Allow edge swipe*
+- GP Friendly name: *Allow edge swipe*
- GP name: *AllowEdgeSwipe*
- GP path: *Windows Components/Edge UI*
- GP ADMX file name: *EdgeUI.admx*
diff --git a/windows/client-management/mdm/policy-csp-maps.md b/windows/client-management/mdm/policy-csp-maps.md
index 34c246f134..ce0ddd9868 100644
--- a/windows/client-management/mdm/policy-csp-maps.md
+++ b/windows/client-management/mdm/policy-csp-maps.md
@@ -145,7 +145,7 @@ After the policy is applied, you can verify the settings in the user interface i
ADMX Info:
-- GP English name: *Turn off Automatic Download and Update of Map Data*
+- GP Friendly name: *Turn off Automatic Download and Update of Map Data*
- GP name: *TurnOffAutoUpdate*
- GP path: *Windows Components/Maps*
- GP ADMX file name: *WinMaps.admx*
diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md
index 43fe8e0e47..8b8b95188e 100644
--- a/windows/client-management/mdm/policy-csp-messaging.md
+++ b/windows/client-management/mdm/policy-csp-messaging.md
@@ -79,7 +79,7 @@ Added in Windows 10, version 1607. Enables text message back up and restore and
ADMX Info:
-- GP English name: *Allow Message Service Cloud Sync*
+- GP Friendly name: *Allow Message Service Cloud Sync*
- GP name: *AllowMessageSync*
- GP path: *Windows Components/Messaging*
- GP ADMX file name: *messaging.admx*
diff --git a/windows/client-management/mdm/policy-csp-multitasking.md b/windows/client-management/mdm/policy-csp-multitasking.md
index fd1e3372e8..9c58b25ef3 100644
--- a/windows/client-management/mdm/policy-csp-multitasking.md
+++ b/windows/client-management/mdm/policy-csp-multitasking.md
@@ -95,7 +95,7 @@ This policy only applies to the Alt+Tab switcher. When the policy is not enabled
ADMX Info:
-- GP English name: *Configure the inclusion of Edge tabs into Alt-Tab*
+- GP Friendly name: *Configure the inclusion of Edge tabs into Alt-Tab*
- GP name: *BrowserAltTabBlowout*
- GP path: *Windows Components/Multitasking*
- GP ADMX file name: *Multitasking.admx*
diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md
index e438503509..8646c8830d 100644
--- a/windows/client-management/mdm/policy-csp-networkisolation.md
+++ b/windows/client-management/mdm/policy-csp-networkisolation.md
@@ -100,7 +100,7 @@ Contains a list of Enterprise resource domains hosted in the cloud that need to
ADMX Info:
-- GP English name: *Enterprise resource domains hosted in the cloud*
+- GP Friendly name: *Enterprise resource domains hosted in the cloud*
- GP name: *WF_NetIsolation_EnterpriseCloudResources*
- GP element: *WF_NetIsolation_EnterpriseCloudResourcesBox*
- GP path: *Network/Network Isolation*
@@ -160,7 +160,7 @@ Sets the enterprise IP ranges that define the computers in the enterprise networ
ADMX Info:
-- GP English name: *Private network ranges for apps*
+- GP Friendly name: *Private network ranges for apps*
- GP name: *WF_NetIsolation_PrivateSubnet*
- GP element: *WF_NetIsolation_PrivateSubnetBox*
- GP path: *Network/Network Isolation*
@@ -233,7 +233,7 @@ Integer value that tells the client to accept the configured list and not to use
ADMX Info:
-- GP English name: *Subnet definitions are authoritative*
+- GP Friendly name: *Subnet definitions are authoritative*
- GP name: *WF_NetIsolation_Authoritative_Subnet*
- GP path: *Network/Network Isolation*
- GP ADMX file name: *NetworkIsolation.admx*
@@ -292,7 +292,7 @@ This is the comma-separated list of internal proxy servers. For example "157.54.
ADMX Info:
-- GP English name: *Intranet proxy servers for apps*
+- GP Friendly name: *Intranet proxy servers for apps*
- GP name: *WF_NetIsolation_Intranet_Proxies*
- GP element: *WF_NetIsolation_Intranet_ProxiesBox*
- GP path: *Network/Network Isolation*
@@ -413,7 +413,7 @@ This is a comma-separated list of proxy servers. Any server on this list is cons
ADMX Info:
-- GP English name: *Internet proxy servers for apps*
+- GP Friendly name: *Internet proxy servers for apps*
- GP name: *WF_NetIsolation_Domain_Proxies*
- GP element: *WF_NetIsolation_Domain_ProxiesBox*
- GP path: *Network/Network Isolation*
@@ -473,7 +473,7 @@ Integer value that tells the client to accept the configured list of proxies and
ADMX Info:
-- GP English name: *Proxy definitions are authoritative*
+- GP Friendly name: *Proxy definitions are authoritative*
- GP name: *WF_NetIsolation_Authoritative_Proxies*
- GP path: *Network/Network Isolation*
- GP ADMX file name: *NetworkIsolation.admx*
@@ -532,7 +532,7 @@ List of domain names that can used for work or personal resource.
ADMX Info:
-- GP English name: *Domains categorized as both work and personal*
+- GP Friendly name: *Domains categorized as both work and personal*
- GP name: *WF_NetIsolation_NeutralResources*
- GP element: *WF_NetIsolation_NeutralResourcesBox*
- GP path: *Network/Network Isolation*
diff --git a/windows/client-management/mdm/policy-csp-notifications.md b/windows/client-management/mdm/policy-csp-notifications.md
index 34f3bd6b74..b9cb69c43d 100644
--- a/windows/client-management/mdm/policy-csp-notifications.md
+++ b/windows/client-management/mdm/policy-csp-notifications.md
@@ -96,7 +96,7 @@ No reboots or service restarts are required for this policy setting to take effe
ADMX Info:
-- GP English name: *Turn off notifications network usage*
+- GP Friendly name: *Turn off notifications network usage*
- GP name: *NoCloudNotification*
- GP path: *Start Menu and Taskbar/Notifications*
- GP ADMX file name: *WPN.admx*
@@ -170,7 +170,7 @@ No reboot or service restart is required for this policy to take effect.
ADMX Info:
-- GP English name: *Turn off notification mirroring*
+- GP Friendly name: *Turn off notification mirroring*
- GP name: *NoNotificationMirroring*
- GP path: *Start Menu and Taskbar/Notifications*
- GP ADMX file name: *WPN.admx*
@@ -242,7 +242,7 @@ No reboots or service restarts are required for this policy setting to take effe
ADMX Info:
-- GP English name: *Turn off tile notifications*
+- GP Friendly name: *Turn off tile notifications*
- GP name: *NoTileNotification*
- GP path: *Start Menu and Taskbar/Notifications*
- GP ADMX file name: *WPN.admx*
diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md
index e710db1e1b..c9c793a619 100644
--- a/windows/client-management/mdm/policy-csp-power.md
+++ b/windows/client-management/mdm/policy-csp-power.md
@@ -153,7 +153,7 @@ If you disable this policy setting, standby states (S1-S3) are not allowed.
ADMX Info:
-- GP English name: *Allow standby states (S1-S3) when sleeping (on battery)*
+- GP Friendly name: *Allow standby states (S1-S3) when sleeping (on battery)*
- GP name: *AllowStandbyStatesDC_2*
- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -223,7 +223,7 @@ If you disable this policy setting, standby states (S1-S3) are not allowed.
ADMX Info:
-- GP English name: *Allow standby states (S1-S3) when sleeping (plugged in)*
+- GP Friendly name: *Allow standby states (S1-S3) when sleeping (plugged in)*
- GP name: *AllowStandbyStatesAC_2*
- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -295,7 +295,7 @@ If the user has configured a slide show to run on the lock screen when the machi
ADMX Info:
-- GP English name: *Turn off the display (on battery)*
+- GP Friendly name: *Turn off the display (on battery)*
- GP name: *VideoPowerDownTimeOutDC_2*
- GP path: *System/Power Management/Video and Display Settings*
- GP ADMX file name: *power.admx*
@@ -367,7 +367,7 @@ If the user has configured a slide show to run on the lock screen when the machi
ADMX Info:
-- GP English name: *Turn off the display (plugged in)*
+- GP Friendly name: *Turn off the display (plugged in)*
- GP name: *VideoPowerDownTimeOutAC_2*
- GP path: *System/Power Management/Video and Display Settings*
- GP ADMX file name: *power.admx*
@@ -431,7 +431,7 @@ If you disable or do not configure this policy setting, users control this setti
ADMX Info:
-- GP English name: *Energy Saver Battery Threshold (on battery)*
+- GP Friendly name: *Energy Saver Battery Threshold (on battery)*
- GP name: *EsBattThresholdDC*
- GP element: *EnterEsBattThreshold*
- GP path: *System/Power Management/Energy Saver Settings*
@@ -504,7 +504,7 @@ If you disable or do not configure this policy setting, users control this setti
ADMX Info:
-- GP English name: *Energy Saver Battery Threshold (plugged in)*
+- GP Friendly name: *Energy Saver Battery Threshold (plugged in)*
- GP name: *EsBattThresholdAC*
- GP element: *EnterEsBattThreshold*
- GP path: *System/Power Management/Energy Saver Settings*
@@ -586,7 +586,7 @@ If the user has configured a slide show to run on the lock screen when the machi
ADMX Info:
-- GP English name: *Specify the system hibernate timeout (on battery)*
+- GP Friendly name: *Specify the system hibernate timeout (on battery)*
- GP name: *DCHibernateTimeOut_2*
- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -658,7 +658,7 @@ If the user has configured a slide show to run on the lock screen when the machi
ADMX Info:
-- GP English name: *Specify the system hibernate timeout (plugged in)*
+- GP Friendly name: *Specify the system hibernate timeout (plugged in)*
- GP name: *ACHibernateTimeOut_2*
- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -728,7 +728,7 @@ If you disable this policy setting, the user is not prompted for a password when
ADMX Info:
-- GP English name: *Require a password when a computer wakes (on battery)*
+- GP Friendly name: *Require a password when a computer wakes (on battery)*
- GP name: *DCPromptForPasswordOnResume_2*
- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -798,7 +798,7 @@ If you disable this policy setting, the user is not prompted for a password when
ADMX Info:
-- GP English name: *Require a password when a computer wakes (plugged in)*
+- GP Friendly name: *Require a password when a computer wakes (plugged in)*
- GP name: *ACPromptForPasswordOnResume_2*
- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -861,7 +861,7 @@ If you disable this policy setting or do not configure it, users can see and cha
ADMX Info:
-- GP English name: *Select the lid switch action (on battery)*
+- GP Friendly name: *Select the lid switch action (on battery)*
- GP name: *DCSystemLidAction_2*
- GP element: *SelectDCSystemLidAction*
- GP path: *System/Power Management/Button Settings*
@@ -940,7 +940,7 @@ If you disable this policy setting or do not configure it, users can see and cha
ADMX Info:
-- GP English name: *Select the lid switch action (plugged in)*
+- GP Friendly name: *Select the lid switch action (plugged in)*
- GP name: *ACSystemLidAction_2*
- GP element: *SelectACSystemLidAction*
- GP path: *System/Power Management/Button Settings*
@@ -1019,7 +1019,7 @@ If you disable this policy setting or do not configure it, users can see and cha
ADMX Info:
-- GP English name: *Select the Power button action (on battery)*
+- GP Friendly name: *Select the Power button action (on battery)*
- GP name: *DCPowerButtonAction_2*
- GP element: *SelectDCPowerButtonAction*
- GP path: *System/Power Management/Button Settings*
@@ -1098,7 +1098,7 @@ If you disable this policy setting or do not configure it, users can see and cha
ADMX Info:
-- GP English name: *Select the Power button action (plugged in)*
+- GP Friendly name: *Select the Power button action (plugged in)*
- GP name: *ACPowerButtonAction_2*
- GP element: *SelectACPowerButtonAction*
- GP path: *System/Power Management/Button Settings*
@@ -1177,7 +1177,7 @@ If you disable this policy setting or do not configure it, users can see and cha
ADMX Info:
-- GP English name: *Select the Sleep button action (on battery)*
+- GP Friendly name: *Select the Sleep button action (on battery)*
- GP name: *DCSleepButtonAction_2*
- GP element: *SelectDCSleepButtonAction*
- GP path: *System/Power Management/Button Settings*
@@ -1256,7 +1256,7 @@ If you disable this policy setting or do not configure it, users can see and cha
ADMX Info:
-- GP English name: *Select the Sleep button action (plugged in)*
+- GP Friendly name: *Select the Sleep button action (plugged in)*
- GP name: *ACSleepButtonAction_2*
- GP element: *SelectACSleepButtonAction*
- GP path: *System/Power Management/Button Settings*
@@ -1344,7 +1344,7 @@ If the user has configured a slide show to run on the lock screen when the machi
ADMX Info:
-- GP English name: *Specify the system sleep timeout (on battery)*
+- GP Friendly name: *Specify the system sleep timeout (on battery)*
- GP name: *DCStandbyTimeOut_2*
- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -1416,7 +1416,7 @@ If the user has configured a slide show to run on the lock screen when the machi
ADMX Info:
-- GP English name: *Specify the system sleep timeout (plugged in)*
+- GP Friendly name: *Specify the system sleep timeout (plugged in)*
- GP name: *ACStandbyTimeOut_2*
- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -1479,7 +1479,7 @@ If you set this policy setting to 1 or do not configure this policy setting, use
ADMX Info:
-- GP English name: *Turn off hybrid sleep (on battery)*
+- GP Friendly name: *Turn off hybrid sleep (on battery)*
- GP name: *DCStandbyWithHiberfileEnable_2*
- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -1555,7 +1555,7 @@ If you set this policy setting to 1 or do not configure this policy setting, use
ADMX Info:
-- GP English name: *Turn off hybrid sleep (plugged in)*
+- GP Friendly name: *Turn off hybrid sleep (plugged in)*
- GP name: *ACStandbyWithHiberfileEnable_2*
- GP path: *System/Power Management/Sleep Settings*
- GP ADMX file name: *power.admx*
@@ -1633,7 +1633,7 @@ If the user has configured a slide show to run on the lock screen when the machi
ADMX Info:
-- GP English name: *Specify the unattended sleep timeout (on battery)*
+- GP Friendly name: *Specify the unattended sleep timeout (on battery)*
- GP name: *UnattendedSleepTimeOutDC*
- GP element: *EnterUnattendedSleepTimeOut*
- GP path: *System/Power Management/Sleep Settings*
@@ -1709,7 +1709,7 @@ If the user has configured a slide show to run on the lock screen when the machi
ADMX Info:
-- GP English name: *Specify the unattended sleep timeout (plugged in)*
+- GP Friendly name: *Specify the unattended sleep timeout (plugged in)*
- GP name: *UnattendedSleepTimeOutAC*
- GP element: *EnterUnattendedSleepTimeOut*
- GP path: *System/Power Management/Sleep Settings*
diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md
index e93f27025d..90268db913 100644
--- a/windows/client-management/mdm/policy-csp-printers.md
+++ b/windows/client-management/mdm/policy-csp-printers.md
@@ -109,7 +109,7 @@ If you disable this policy setting:
ADMX Info:
-- GP English name: *Point and Print Restrictions*
+- GP Friendly name: *Point and Print Restrictions*
- GP name: *PointAndPrint_Restrictions_Win7*
- GP path: *Printers*
- GP ADMX file name: *Printing.admx*
@@ -204,7 +204,7 @@ If you disable this policy setting:
ADMX Info:
-- GP English name: *Point and Print Restrictions*
+- GP Friendly name: *Point and Print Restrictions*
- GP name: *PointAndPrint_Restrictions*
- GP path: *Control Panel/Printers*
- GP ADMX file name: *Printing.admx*
@@ -276,7 +276,7 @@ Note: This settings takes priority over the setting "Automatically publish new p
ADMX Info:
-- GP English name: *Allow printers to be published*
+- GP Friendly name: *Allow printers to be published*
- GP name: *PublishPrinters*
- GP path: *Printers*
- GP ADMX file name: *Printing2.admx*
diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md
index 1519ff7e40..f8c10ffd3f 100644
--- a/windows/client-management/mdm/policy-csp-start.md
+++ b/windows/client-management/mdm/policy-csp-start.md
@@ -756,7 +756,7 @@ Enabling this policy prevents context menus from being invoked in the Start Menu
ADMX Info:
-- GP English name: *Disable context menus in the Start Menu*
+- GP Friendly name: *Disable context menus in the Start Menu*
- GP name: *DisableContextMenusInStart*
- GP path: *Start Menu and Taskbar*
- GP ADMX file name: *StartMenu.admx*
@@ -1242,7 +1242,7 @@ Value type is integer.
ADMX Info:
-- GP English name: *Remove the People Bar from the taskbar*
+- GP Friendly name: *Remove the People Bar from the taskbar*
- GP name: *HidePeopleBar*
- GP path: *Start Menu and Taskbar*
- GP ADMX file name: *StartMenu.admx*
@@ -1454,7 +1454,7 @@ Added in Windows 10, version 1703. Allows IT Admins to configure Start by hidin
ADMX Info:
-- GP English name: *Remove "Recently added" list from Start Menu*
+- GP Friendly name: *Remove "Recently added" list from Start Menu*
- GP name: *HideRecentlyAddedApps*
- GP path: *Start Menu and Taskbar*
- GP ADMX file name: *StartMenu.admx*
@@ -2083,7 +2083,7 @@ For further details on how to customize the Start layout, please see [Customize
ADMX Info:
-- GP English name: *Start Layout*
+- GP Friendly name: *Start Layout*
- GP name: *LockedStartLayout*
- GP path: *Start Menu and Taskbar*
- GP ADMX file name: *StartMenu.admx*
diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md
index e55afed42c..ecd7532d32 100644
--- a/windows/client-management/mdm/policy-csp-storage.md
+++ b/windows/client-management/mdm/policy-csp-storage.md
@@ -105,7 +105,7 @@ Value type is integer.
ADMX Info:
-- GP English name: *Allow downloading updates to the Disk Failure Prediction Model*
+- GP Friendly name: *Allow downloading updates to the Disk Failure Prediction Model*
- GP name: *SH_AllowDiskHealthModelUpdates*
- GP path: *System/Storage Health*
- GP ADMX file name: *StorageHealth.admx*
@@ -176,7 +176,7 @@ If you do not configure this policy setting, Storage Sense is turned off by defa
ADMX Info:
-- GP English name: *Allow Storage Sense*
+- GP Friendly name: *Allow Storage Sense*
- GP name: *SS_AllowStorageSenseGlobal*
- GP path: *System/Storage Sense*
- GP ADMX file name: *StorageSense.admx*
@@ -252,7 +252,7 @@ If you do not configure this policy setting, Storage Sense will delete the user
ADMX Info:
-- GP English name: *Allow Storage Sense Temporary Files cleanup*
+- GP Friendly name: *Allow Storage Sense Temporary Files cleanup*
- GP name: *SS_AllowStorageSenseTemporaryFilesCleanup*
- GP path: *System/Storage Sense*
- GP ADMX file name: *StorageSense.admx*
@@ -328,7 +328,7 @@ If you disable or do not configure this policy setting, then Storage Sense will
ADMX Info:
-- GP English name: *Configure Storage Sense Cloud Content dehydration threshold*
+- GP Friendly name: *Configure Storage Sense Cloud Content dehydration threshold*
- GP name: *SS_ConfigStorageSenseCloudContentDehydrationThreshold*
- GP path: *System/Storage Sense*
- GP ADMX file name: *StorageSense.admx*
@@ -404,7 +404,7 @@ If you disable or do not configure this policy setting, then Storage Sense will
ADMX Info:
-- GP English name: *Configure Storage Storage Downloads cleanup threshold*
+- GP Friendly name: *Configure Storage Storage Downloads cleanup threshold*
- GP name: *SS_ConfigStorageSenseDownloadsCleanupThreshold*
- GP path: *System/Storage Sense*
- GP ADMX file name: *StorageSense.admx*
@@ -486,7 +486,7 @@ If you do not configure this policy setting, then the Storage Sense cadence is s
ADMX Info:
-- GP English name: *Configure Storage Sense cadence*
+- GP Friendly name: *Configure Storage Sense cadence*
- GP name: *SS_ConfigStorageSenseGlobalCadence*
- GP path: *System/Storage Sense*
- GP ADMX file name: *StorageSense.admx*
@@ -562,7 +562,7 @@ If you disable or do not configure this policy setting, Storage Sense will delet
ADMX Info:
-- GP English name: *Configure Storage Sense Recycle Bin cleanup threshold*
+- GP Friendly name: *Configure Storage Sense Recycle Bin cleanup threshold*
- GP name: *SS_ConfigStorageSenseRecycleBinCleanupThreshold*
- GP path: *System/Storage Sense*
- GP ADMX file name: *StorageSense.admx*
@@ -641,7 +641,7 @@ If you disable or do not configure this policy setting, Windows will activate un
ADMX Info:
-- GP English name: *Do not allow Windows to activate Enhanced Storage devices*
+- GP Friendly name: *Do not allow Windows to activate Enhanced Storage devices*
- GP name: *TCGSecurityActivationDisabled*
- GP path: *System/Enhanced Storage Access*
- GP ADMX file name: *enhancedstorage.admx*
@@ -707,7 +707,7 @@ Supported values:
ADMX Info:
-- GP English name: *Removable Disks: Deny write access*
+- GP Friendly name: *Removable Disks: Deny write access*
- GP name: *RemovableDisks_DenyWrite_Access_2*
- GP element: *RemovableDisks_DenyWrite_Access_2*
- GP path: *System/Removable Storage Access*
diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md
index f199fbc4c1..456891257d 100644
--- a/windows/client-management/mdm/policy-csp-system.md
+++ b/windows/client-management/mdm/policy-csp-system.md
@@ -158,7 +158,7 @@ If you enable or do not configure this policy setting, users can download and in
ADMX Info:
-- GP English name: *Toggle user control over Insider builds*
+- GP Friendly name: *Toggle user control over Insider builds*
- GP name: *AllowBuildPreview*
- GP path: *Data Collection and Preview Builds*
- GP ADMX file name: *AllowBuildPreview.admx*