mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Merge branch 'master' into TVM_API_JAN
This commit is contained in:
commit
9a5fef3a29
@ -186,6 +186,6 @@
|
|||||||
### [IExpress Wizard command-line options](ie11-ieak/iexpress-command-line-options.md)
|
### [IExpress Wizard command-line options](ie11-ieak/iexpress-command-line-options.md)
|
||||||
### [Internet Explorer Setup command-line options and return codes](ie11-ieak/ie-setup-command-line-options-and-return-codes.md)
|
### [Internet Explorer Setup command-line options and return codes](ie11-ieak/ie-setup-command-line-options-and-return-codes.md)
|
||||||
|
|
||||||
## Troubleshooting
|
## KB Troubleshoot
|
||||||
### [Clear the Internet Explorer cache from a command line](/../troubleshooting/clear-ie-cache-from-command-line.md)
|
### [Clear the Internet Explorer cache from a command line](kb-support/clear-ie-cache-from-command-line.md)
|
||||||
### [IE and Microsoft Edge FAQ for IT Pros](/../troubleshooting/ie-edge-faqs.md)
|
### [Internet Explorer and Microsoft Edge FAQ for IT Pros](kb-support/ie-edge-faqs.md)
|
||||||
|
@ -1,16 +1,19 @@
|
|||||||
---
|
---
|
||||||
title: Clear the Internet Explorer cache from a command line
|
title: Clear the Internet Explorer cache from a command line
|
||||||
description: Introduces command-line commands and a sample batch file for clearing the IE cache.
|
description: Introduces command-line commands and a sample batch file for clearing the IE cache.
|
||||||
author: ramakoni
|
|
||||||
manager: dcscontentpm
|
|
||||||
ms.prod: internet-explorer
|
|
||||||
ms.topic: troubleshooting
|
|
||||||
ms.author: ramakoni
|
|
||||||
ms.custom: CI=111020
|
|
||||||
ms.reviewer: ramakoni, DEV_Triage
|
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
|
manager: msmets
|
||||||
|
author: ramakoni1
|
||||||
|
ms.author: ramakoni
|
||||||
|
ms.reviewer: ramakoni, DEV_Triage
|
||||||
|
ms.prod: internet-explorer
|
||||||
|
ms.technology:
|
||||||
|
ms.topic: troubleshooting
|
||||||
|
ms.custom: CI=111020
|
||||||
ms.localizationpriority: Normal
|
ms.localizationpriority: Normal
|
||||||
ms.date: 01/20/2020
|
# localization_priority: medium
|
||||||
|
# ms.translationtype: MT
|
||||||
|
ms.date: 01/22/2020
|
||||||
---
|
---
|
||||||
# How to clear Internet Explorer cache by using the command line
|
# How to clear Internet Explorer cache by using the command line
|
||||||
|
|
||||||
@ -50,7 +53,7 @@ Command to reset Internet Explorer settings:
|
|||||||
|
|
||||||
## Sample batch file to clear Internet Explorer cache files
|
## Sample batch file to clear Internet Explorer cache files
|
||||||
|
|
||||||
A sample batch file is available that you can use to clear Internet Explorer cache files and other items. You can download the file from https://msdnshared.blob.core.windows.net/media/2017/09/ClearIE_Cache.zip.
|
A sample batch file is available that you can use to clear Internet Explorer cache files and other items. You can download the file from [https://msdnshared.blob.core.windows.net/media/2017/09/ClearIE_Cache.zip](https://msdnshared.blob.core.windows.net/media/2017/09/ClearIE_Cache.zip).
|
||||||
|
|
||||||
The batch file offers the following options:
|
The batch file offers the following options:
|
||||||
|
|
||||||
@ -125,9 +128,10 @@ goto Home
|
|||||||
::enter below in search/run to see Low history dir if exists
|
::enter below in search/run to see Low history dir if exists
|
||||||
::C:\Users\%username%\AppData\Local\Microsoft\Windows\History\low
|
::C:\Users\%username%\AppData\Local\Microsoft\Windows\History\low
|
||||||
|
|
||||||
::Delete all low(untrusted history) very hidden
|
::Delete all low (untrusted history) very hidden
|
||||||
::this will clean any unlocked files under the dir and not delete the dir structure
|
::this will clean any unlocked files under the dir and not delete the dir structure
|
||||||
::del /s /q low\* /ah ::del /s /q C:\Users\%username%\AppData\Local\Microsoft\Windows\History\low\* /ah
|
::del /s /q low\* /ah ::del /s /q C:\Users\%username%\AppData\Local\Microsoft\Windows\History\low\* /ah
|
||||||
|
|
||||||
goto Home
|
goto Home
|
||||||
|
:quit
|
||||||
```
|
```
|
@ -1,16 +1,19 @@
|
|||||||
---
|
---
|
||||||
title: IE and Microsoft Edge FAQ for IT Pros
|
title: IE and Microsoft Edge FAQ for IT Pros
|
||||||
description: Describes frequently asked questions about Internet Explorer and Microsoft Edge for IT professionals.
|
description: Describes frequently asked questions about Internet Explorer and Microsoft Edge for IT professionals.
|
||||||
author: ramakoni
|
|
||||||
manager: dcscontentpm
|
|
||||||
ms.prod: internet-explorer
|
|
||||||
ms.topic: troubleshooting
|
|
||||||
ms.author: ramakoni
|
|
||||||
ms.custom: CI=111020
|
|
||||||
ms.reviewer: ramakoni
|
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
|
manager: msmets
|
||||||
|
author: ramakoni1
|
||||||
|
ms.author: ramakoni
|
||||||
|
ms.reviewer: ramakoni, DEV_Triage
|
||||||
|
ms.prod: internet-explorer
|
||||||
|
ms.technology:
|
||||||
|
ms.topic: troubleshooting
|
||||||
|
ms.custom: CI=111020
|
||||||
ms.localizationpriority: Normal
|
ms.localizationpriority: Normal
|
||||||
ms.date: 01/20/2020
|
# localization_priority: medium
|
||||||
|
# ms.translationtype: MT
|
||||||
|
ms.date: 01/22/2020
|
||||||
---
|
---
|
||||||
# Internet Explorer and Microsoft Edge frequently asked questions (FAQ) for IT Pros
|
# Internet Explorer and Microsoft Edge frequently asked questions (FAQ) for IT Pros
|
||||||
|
|
||||||
@ -35,7 +38,7 @@ For more information about how Internet Explorer handles cookies, see the follow
|
|||||||
To see where Internet Explorer stores its cookies, follow these steps:
|
To see where Internet Explorer stores its cookies, follow these steps:
|
||||||
|
|
||||||
1. Start File Explorer.
|
1. Start File Explorer.
|
||||||
2. Select **Views** > **Change folder and search options**.
|
2. Select **Views** \> **Change folder and search options**.
|
||||||
3. In the **Folder Options** dialog box, select **View**.
|
3. In the **Folder Options** dialog box, select **View**.
|
||||||
4. In **Advanced settings**, select **Do not show hidden files, folders, or drivers**.
|
4. In **Advanced settings**, select **Do not show hidden files, folders, or drivers**.
|
||||||
5. Clear **Hide protected operation system files (Recommended)**.
|
5. Clear **Hide protected operation system files (Recommended)**.
|
||||||
@ -67,11 +70,9 @@ For more information, see [Internet Explorer Cookie Internals (FAQ)](https://blo
|
|||||||
#### Additional information about cookie limits
|
#### Additional information about cookie limits
|
||||||
|
|
||||||
**What does the Cookie RFC allow?**
|
**What does the Cookie RFC allow?**
|
||||||
|
|
||||||
RFC 2109 defines how cookies should be implemented, and it defines minimum values that browsers support. According to the RFC, browsers would ideally have no limits on the size and number of cookies that a browser can handle. To meet the specifications, the user agent should support the following:
|
RFC 2109 defines how cookies should be implemented, and it defines minimum values that browsers support. According to the RFC, browsers would ideally have no limits on the size and number of cookies that a browser can handle. To meet the specifications, the user agent should support the following:
|
||||||
|
|
||||||
- At least 300 cookies total
|
- At least 300 cookies total
|
||||||
|
|
||||||
- At least 20 cookies per unique host or domain name
|
- At least 20 cookies per unique host or domain name
|
||||||
|
|
||||||
For practicality, individual browser makers set a limit on the total number of cookies that any one domain or unique host can set. They also limit the total number of cookies that can be stored on a computer.
|
For practicality, individual browser makers set a limit on the total number of cookies that any one domain or unique host can set. They also limit the total number of cookies that can be stored on a computer.
|
||||||
@ -99,13 +100,11 @@ function FindProxyForURL(url, host)
|
|||||||
For more information about how to write a PAC file and about the different functions in a PAC file, see [the FindProxyForURL website](https://findproxyforurl.com/).
|
For more information about how to write a PAC file and about the different functions in a PAC file, see [the FindProxyForURL website](https://findproxyforurl.com/).
|
||||||
|
|
||||||
**Third-party information disclaimer**
|
**Third-party information disclaimer**
|
||||||
|
|
||||||
The third-party products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products.
|
The third-party products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products.
|
||||||
|
|
||||||
### How to improve performance by using PAC scripts
|
### How to improve performance by using PAC scripts
|
||||||
|
|
||||||
- [Browser is slow to respond when you use an automatic configuration script](https://support.microsoft.com/help/315810/browser-is-slow-to-respond-when-you-use-an-automatic-configuration-scr)
|
- [Browser is slow to respond when you use an automatic configuration script](https://support.microsoft.com/help/315810/browser-is-slow-to-respond-when-you-use-an-automatic-configuration-scr)
|
||||||
|
|
||||||
- [Optimizing performance with automatic Proxyconfiguration scripts (PAC)](https://blogs.msdn.microsoft.com/askie/2014/02/07/optimizing-performance-with-automatic-proxyconfiguration-scripts-pac/)
|
- [Optimizing performance with automatic Proxyconfiguration scripts (PAC)](https://blogs.msdn.microsoft.com/askie/2014/02/07/optimizing-performance-with-automatic-proxyconfiguration-scripts-pac/)
|
||||||
|
|
||||||
## Other questions
|
## Other questions
|
||||||
@ -136,12 +135,12 @@ For more information, see the following articles:
|
|||||||
### Where to find Internet Explorer security zones registry entries
|
### Where to find Internet Explorer security zones registry entries
|
||||||
|
|
||||||
Most of the Internet Zone entries can be found in [Internet Explorer security zones registry entries for advanced users](https://support.microsoft.com/help/182569/internet-explorer-security-zones-registry-entries-for-advanced-users).
|
Most of the Internet Zone entries can be found in [Internet Explorer security zones registry entries for advanced users](https://support.microsoft.com/help/182569/internet-explorer-security-zones-registry-entries-for-advanced-users).
|
||||||
|
|
||||||
This article was written for Internet Explorer 6 but is still applicable to Internet Explorer 11.
|
This article was written for Internet Explorer 6 but is still applicable to Internet Explorer 11.
|
||||||
|
|
||||||
The default Zone Keys are stored in the following locations:
|
The default Zone Keys are stored in the following locations:
|
||||||
|
|
||||||
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
|
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
|
||||||
|
|
||||||
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
|
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
|
||||||
|
|
||||||
### Why don't HTML5 videos play in Internet Explorer 11?
|
### Why don't HTML5 videos play in Internet Explorer 11?
|
||||||
@ -151,7 +150,7 @@ To play HTML5 videos in the Internet Zone, use the default settings or make sure
|
|||||||
- 0 (the default value): Allow
|
- 0 (the default value): Allow
|
||||||
- 3: Disallow
|
- 3: Disallow
|
||||||
|
|
||||||
This key is read by the **URLACTION_ALLOW_AUDIO_VIDEO 0x00002701** URL action flag that determines whether media elements (audio and video) are allowed in pages in a URL security zone.
|
This key is read by the **URLACTION\_ALLOW\_AUDIO\_VIDEO 0x00002701** URL action flag that determines whether media elements (audio and video) are allowed in pages in a URL security zone.
|
||||||
|
|
||||||
For more information, see [Unable to play HTML5 Videos in IE](https://blogs.msdn.microsoft.com/askie/2014/12/31/unable-to-play-html5-videos-in-ie/).
|
For more information, see [Unable to play HTML5 Videos in IE](https://blogs.msdn.microsoft.com/askie/2014/12/31/unable-to-play-html5-videos-in-ie/).
|
||||||
|
|
||||||
@ -186,7 +185,6 @@ For more information about how to configure TLS/SSL for Internet Explorer, see [
|
|||||||
Site to Zone usually refers to one of the following:
|
Site to Zone usually refers to one of the following:
|
||||||
|
|
||||||
**Site to Zone Assignment List**
|
**Site to Zone Assignment List**
|
||||||
|
|
||||||
This is a Group Policy policy setting that can be used to add sites to the various security zones.
|
This is a Group Policy policy setting that can be used to add sites to the various security zones.
|
||||||
|
|
||||||
The Site to Zone Assignment List policy setting associates sites to zones by using the following values for the Internet security zones:
|
The Site to Zone Assignment List policy setting associates sites to zones by using the following values for the Internet security zones:
|
||||||
@ -199,21 +197,18 @@ The Site to Zone Assignment List policy setting associates sites to zones by usi
|
|||||||
If you set this policy setting to **Enabled**, you can enter a list of sites and their related zone numbers. By associating a site to a zone, you can make sure that the security settings for the specified zone are applied to the site.
|
If you set this policy setting to **Enabled**, you can enter a list of sites and their related zone numbers. By associating a site to a zone, you can make sure that the security settings for the specified zone are applied to the site.
|
||||||
|
|
||||||
**Site to Zone Mapping**
|
**Site to Zone Mapping**
|
||||||
|
|
||||||
Site to Zone Mapping is stored as the name of the key. The protocol is a registry value that has a number that assigns it to the corresponding zone. Internet Explorer will read from the following registry subkeys for the sites that are deployed through the Site to Zone assignment list:
|
Site to Zone Mapping is stored as the name of the key. The protocol is a registry value that has a number that assigns it to the corresponding zone. Internet Explorer will read from the following registry subkeys for the sites that are deployed through the Site to Zone assignment list:
|
||||||
|
|
||||||
- HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
|
- HKEY\_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
|
||||||
- HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapKey
|
- HKEY\_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMapKey
|
||||||
|
|
||||||
**Site to Zone Assignment List policy**
|
**Site to Zone Assignment List policy**
|
||||||
|
|
||||||
This policy setting is available for both Computer Configuration and User Configuration:
|
This policy setting is available for both Computer Configuration and User Configuration:
|
||||||
|
|
||||||
- Computer Configuration > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page
|
- Computer Configuration > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page
|
||||||
- User Configuration > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page
|
- User Configuration > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page
|
||||||
|
|
||||||
**References**
|
**References**
|
||||||
|
|
||||||
[How to configure Internet Explorer security zone sites using group polices](https://blogs.msdn.microsoft.com/askie/2012/06/05/how-to-configure-internet-explorer-security-zone-sites-using-group-polices/)
|
[How to configure Internet Explorer security zone sites using group polices](https://blogs.msdn.microsoft.com/askie/2012/06/05/how-to-configure-internet-explorer-security-zone-sites-using-group-polices/)
|
||||||
|
|
||||||
### What are the limits for MaxConnectionsPerServer, MaxConnectionsPer1_0Server for the current versions of Internet Explorer?
|
### What are the limits for MaxConnectionsPerServer, MaxConnectionsPer1_0Server for the current versions of Internet Explorer?
|
||||||
@ -225,5 +220,3 @@ For more information about these settings and limits, see [Connectivity Enhancem
|
|||||||
The **MaxConnectionsPerProxy** setting controls the number of connections that a single-user client can maintain to a given host by using a proxy server.
|
The **MaxConnectionsPerProxy** setting controls the number of connections that a single-user client can maintain to a given host by using a proxy server.
|
||||||
|
|
||||||
For more information, see [Understanding Connection Limits and New Proxy Connection Limits in WinInet and Internet Explorer](https://blogs.msdn.microsoft.com/jpsanders/2009/06/29/understanding-connection-limits-and-new-proxy-connection-limits-in-wininet-and-internet-explorer/).
|
For more information, see [Understanding Connection Limits and New Proxy Connection Limits in WinInet and Internet Explorer](https://blogs.msdn.microsoft.com/jpsanders/2009/06/29/understanding-connection-limits-and-new-proxy-connection-limits-in-wininet-and-internet-explorer/).
|
||||||
|
|
||||||
|
|
@ -34,6 +34,9 @@ You can use the Threat & Vulnerability Management capability in [Microsoft Defen
|
|||||||
- Select remediation options, triage and track the remediation tasks
|
- Select remediation options, triage and track the remediation tasks
|
||||||
- Select exception options and track active exceptions
|
- Select exception options and track active exceptions
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Machines that are not active in the last 30 days are not factored in on the data that reflects your organization's Threat & Vulnerability Management exposure score and configuration score.
|
||||||
|
|
||||||
## Threat & Vulnerability Management in Microsoft Defender Security Center
|
## Threat & Vulnerability Management in Microsoft Defender Security Center
|
||||||
When you open the portal, you’ll see the main areas of the capability:
|
When you open the portal, you’ll see the main areas of the capability:
|
||||||
|
|
||||||
@ -66,9 +69,6 @@ Area | Description
|
|||||||
**Top remediation activities** | Track the remediation activities generated from the security recommendations. You can click each item on the list to see the details in the **Remediation** page or click **Show more** to see the rest of the remediation activities, and active exceptions.
|
**Top remediation activities** | Track the remediation activities generated from the security recommendations. You can click each item on the list to see the details in the **Remediation** page or click **Show more** to see the rest of the remediation activities, and active exceptions.
|
||||||
**Top exposed machines** | See the exposed machine names and their exposure level. You can click each machine name from the list and it will take you to the machine page where you can view the alerts, risks, incidents, security recommendations, installed software, discovered vulnerabilities associated with the exposed machines. You can also do other EDR-related tasks in it, such as: manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate machine. You can also click **Show more** to see the rest of the exposed machines list.
|
**Top exposed machines** | See the exposed machine names and their exposure level. You can click each machine name from the list and it will take you to the machine page where you can view the alerts, risks, incidents, security recommendations, installed software, discovered vulnerabilities associated with the exposed machines. You can also do other EDR-related tasks in it, such as: manage tags, initiate automated investigations, initiate a live response session, collect an investigation package, run antivirus scan, restrict app execution, and isolate machine. You can also click **Show more** to see the rest of the exposed machines list.
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Machines with no alerts seen in the last 30 days do not count towards the exposure score of Threat & Vulnerability Management.
|
|
||||||
|
|
||||||
See [Microsoft Defender ATP icons](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection#windows-defender-atp-icons) for more information on the icons used throughout the portal.
|
See [Microsoft Defender ATP icons](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/portal-overview-windows-defender-advanced-threat-protection#windows-defender-atp-icons) for more information on the icons used throughout the portal.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
Loading…
x
Reference in New Issue
Block a user